Professional Documents
Culture Documents
com
MODULE 4:
DIAGNOSE AND
TROUBLESHOOT
COMPUTER SYSTEMS (DT)
165
In this module, there will be four (4) major topics that you will
encounter: (1) be plan and prepare diagnosis of computer system errors;
(2) diagnose and configure computer systems and networks; (3) inspect and
test the configured computer systems and networks; and (4) test systems and
networks. The four major topics contains sub-topics which all leads to
diagnose and troubleshoot computer systems. This module contains what
to KNOW, what to PROCESS, what to REFLECT and UNDERSTAND as well
as what to TRANSFER. The competencies for this module are:
166
In order to master the above listed competencies, you must be
knowledgeable of the topics under what to KNOW, perform activities required
under what to PROCESS, accomplish additional meaningful tasks under what
to REFLECT and UNDERSTAND and finally show some evidences of your
learning by transferring what you have learned in a different context under
what to TRANSFER.
You will be challenged to dig deeper into your prior knowledge and
previous experiences about computer hardware servicing.
Instruction:
Read each of the statements in the left-hand column of the chart.
Place a check on the column that indicates your answers.
Knowledgeable Have a No
Little Knowledge
Knowledge at All
Plan and prepare work to ensure
occupational health and safety
(OHS) policies and procedures
are followed
Obtain materials, tools,
equipment and testing devices
needed to conform with job
requirements
Interpret work instructions
according to job requirements
Obtain computer
components/devices/systems and
determines its location prior to
installation
Install
equipment/devices/systems in
accordance with job requirements
Check/Test devices/systems
and/or installations to determine
the conformity to job
requirements.
Check computer systems and
networks for configuration in
accordance with specifications
167
and requirements
Diagnose fault or problem in the
computer systems and networks
in line with standard operating
procedures (SOP)
Configure the identified systems
and networks based on
specifications and job
requirements
Inspect and test configured
computer systems and networks
in conformity with manufacturer's
instructions/manual
Correct/adjust components or
parts of computer systems and
networks in accordance with job
requirements
Test computer systems and
networks to ensure safe
operation
Perform scheduled/periodic
maintenance in accordance with
manufacturer's requirements
Make needed
repairs/replacements in
accordance with established
procedures, when necessary
Document tasks undertaken in
accordance with SOP
Clean and clear worksite of all
surplus/excess materials in
accordance with company SOP
168
LESSON 1: PLAN AND PREPARE FOR DIAGNOSIS OF COMPUTER
SYSTEMS ERRORS
SAFETY PRECAUTIONS
1. Anti-static devices
2. Power surge protectors
3. Personal equipment
Anti-static devices
Devices designed to protect the computer from static electricity.
Source: www.desktopreality.com
Source: www.desktopreality.com
Anti-static Mat
Anti-static Wrist Strap
169
Source: www.desktopreality.com Source: www.rapidonline.com
Anti-static Bag Anti-static Spray
Source: www.neopower.com
Source: www.amazon.co.uk
170
Personal Equipment
screw drivers
compressed air
handheld vacuum
171
Directions: Perform the activity below.
Choose a partner
Do a simulation exercise
o One will act out the role of a computer teacher.
o The other will be the student
Situation: Computer teacher will show/demonstrate to the students the
Personal Protective Devices, what they are and how they are used.
The Student keeps on asking about the Personal Protective
Devices/Equipment and how they can be maintained in good condition
of PC.
172
TYPES OF COMPUTER SYSTEM ERROR
There are several errors in a computer from the point you open it upto the
point you reach the stand by window (reaching standby windows means boot
process has no error). Below is a list of computer errors.
1. No Video Output - When you open your PC, nothing shows up in your
monitor and the LED indicator of your monitor is flashing in yellow color.
2. No Video Output - Same as number one but now the LED indicator of your
monitor is in steady orange color.
3. Doesn't Boot - When you open your PC it will show the processor’s brand
and/or the motherboard’s brand but doesn't continue. Usually this error will
result to system restart over and over again.
6. Lots of hardware installation windows appear - This happens even if you try
installing the hardware. When you restart your set it will happen again.
7. Safe mode doesn't work - When you try going to safe mode, all you will see
is a list of files in Command prompt style.
8. Keyboard and mouse system restart - This will happen only in standby
mode, when you move your mouse or type something, your system will
automatically restart and the worst part is it will delete a file at random.
173
9. Sound on/off error - Upon loading the operating system, you will hear a
loading sound and then the sound stops, when you try running an audio file,
no sound will be heard.
10. Application causes system to restart - Just like the mouse problem, when
you open a program that will take the whole screen like for example a game
and/or a program applications, when you close it, it will cause your system to
restart.
Aside from the common computer errors, computers also can have
different Operating System (OS) errors. OS errors can be classified into
various categories such as:
174
7. Browser Status Codes – These are caused by problems faced by
browsers when trying to access a website. These can be caused by
misplaced web pages in the server of the website itself, or due to
connection problems. For instance, a 404 error would indicate that the
browser is trying to access a webpage that does not exist in the
specified location.
PC Diagnosing
Trial and error: When you find a faulty component in your computer,
check it with the other computers so that you can make sure whether
the fault is in the component or not.
Check cables: In case of any device failure, check all the cables of
your computer such as data cables, power cable, internal circuitry
cable and make sure that all these are plugged in and working fine.
Hardware settings: Check the hardware settings in the CMOS and in
the device manager of the system and make all the device drivers up
to date and all the cards are plugged in properly.
Notice changes: When you notice a software or hardware error in
your computer, determine what was changed before the problem
occurred.
Event viewer: In the event viewer, you will find the error or warning
messages associated with any faulty hardware or software.
175
Make notes: Troubleshooting is a useful skill and we can learn a lot
when we face any kind of troubleshooting in our computer. Make notes
including the error messages and their solutions, so that you have a
record on how a certain problem occurred and how did you solve it.
Steps
1. Check the POST. POST stands for Power On Self-Test. This is generally
the first or second thing that appears on a computer after turning on the
power. This appears before the operating system begins to load. The POST
will display any problem found with the hardware that makes the computer
unable to boot. POST may also display problems with hardware that allow the
computer to boot, but not operate at its full capacity during operation.
2. Notice the load time of the OS (operating system). A longer than usual
load time may indicate errors in the hard drive.
176
use the Device Manager, this can be accessed by entering the Control Panel,
clicking the System icon, clicking the Hardware tab, and clicking on Device
Manager. Use this to check and arrange the properties of hardware.
10. Check for the problem in safe mode. To enter safe mode, press F8
repeatedly during POST (this works on most systems). If the problem persists
in safe mode, it is a fair bet that the operating system itself is to blame.
177
5. Check the boot sequence configuration in the advance BIOS (Basic
Input/Output Unit) setup.
178
Task: Develop a Sample Diagnostic Plan
AC outlet
AVR
AVR fuse
Monitor Power Cable
Monitor Switch
Power Supply
179
LESSON2: DIAGNOSE AND CONFIGURE COMPUTER SYSTEMS AND
NETWORKS
SAFETY PRECAUTIONS
Every worker has the right to a healthy and safe work and to a work
environment that enables them to live a socially and economically productive
life. Safety practices should be learned early and must be followed when
working with any electrical device including personal computers and
peripherals.
The following are some safety precautions to take before working with any
computer devices:
180
The student is further expected to maintain good health, to be neat in
personal appearance and to practice safe working procedures at all time with
appropriate equipment.
181
measured in volt (V).
Conductors are materials that easily allow the flow of current, or it has
a low resistance to current flow.
Insulators are materials that do not easily allow the flow of current, or
it has a high resistance to current flow.
Types of Current
1. Direct Current
Most DC circuits are relatively low in voltage; for example, your car's
battery is approximately 12V, and that's about as high a DC voltage as most
people ever use.
182
Source: www.electrostudy.com
Figure 1.Direct Current
Direct currents flow in one direction only and are constant in time. Their
appearance is that of a straight line which does not vary. They are produced
from power sources such as batteries, power supplies and DC generators.
Photovoltaic devices such as solar cells also generate DC power.
2. AC Alternating Current
Alternating currents change direction, flowing first one way and then
the other. They are sinusoidal waves, so that they change in time. They are
produced from sources such as power supplies and AC generators. In North
America, AC is 120 volts and 60 hertz or cycles per second. This means it
changes direction 60 times per second. In Europe, it is generally 50 hertz with
220 to 240 volts.
183
Source: www.electrostudy.com
Figure2. Alternating Current
Why does standard electricity come only in the form of alternating
current?
There are a number of reasons, but one of the most important is that a
characteristic of AC is that it is relatively easy to change voltages from one
level to another using a transformer, while transformers do not work for DC.
This capability allows the companies that generate and distribute electricity to
do it in a more efficient manner, by transmitting it at high voltage for long
lengths, which reduces energy loss due to the resistance in the transmission
wires. Another reason is that it may be easier to mechanically generate
alternating current electricity than direct current.
PC’s use only direct current, which means that the alternating current
provided by your utility must be converted to direct current before use.
This is the primary function of your power supply.
MOTHERBOARD
DRIVES
COOLING FANS
184
Electric Circuit
Components of Circuit
Types of Circuit
1. Open Circuit - a type of circuit that has an open path for current to flow. It
means that current cannot flow in open circuit.
- +
Supply
Load
Switch
185
The switch is said to be “OPEN” the current can’t flow into the circuit
and the bulb is “OFF”
2. Closed Circuit - a type of circuit that has a closed path for current to flow.
It means that current can flow in a closed circuit.
Load
- +
Supply
Switch
The switch is said to be “CLOSED” the current can’t flow into the circuit
and the bulb is “ON”
I. Identification:
Direction: Identify the following statement.
186
_________5. Anything that occupy space and has mass. It can be a solid, liquid
or gas in state.
_________8. The amount of pulling force that makes the electron flow. Also
known as potential difference or EMF (electromotive force). The
amount of voltage can be measured in volt (V).
_________9. Materials that easily allow the flow of current, or it has a low
resistance to current flow.
_________10. Materials that do not easily allow the flow of current, or it has a high
resistance to current flow.
_________11. A computer power supply converts AC to ___________________.
_________16. A type of circuit that has a closed path for current to flow. It means
that current can flow in this circuit.
_________17. A type of circuit that has an open path for current to flow. It means
that current cannot flow in this circuit.
_________18. A circuit connection has only one path of current flow. In this circuit
connection the current remain constant.
187
_________19. A circuit connection that has 2 or more path of current. In this circuit
the voltage remains constant.
Computer Diagnosis
Sometimes when the problem with a system is not totally apparent and
intermittent, using a basic common diagnostic procedure may help determine
what is wrong. This procedure has a number of steps that, if followed each
time, can be of help.
188
ESD (Electro Static Discharge)
Electricity
Problem Isolation
Component Isolation
189
Flowchart for ATX Power Supply Repair
Warning! You must unplug your ATX power supply from the wall before
working inside the case.
190
Things to Consider:
Take notes about error messages: If your computer gives you error
messages, be sure to write down as much information as possible. If the
basic troubleshooting steps don't work, you may need the information you
have taken.
Remember the steps you've taken, or write them down: Once you start
troubleshooting, you will want to remember what you have done, so you
don't repeat yourself. If you can't remember it, then write it down. If you
end up asking someone for help, it will be much easier if they know
exactly which steps you've taken.
191
Simple Solutions to Common Problems
If a program is running slowly or otherwise isn't working right, the first thing
you should try is closing the program and re-opening it.
You can also shut down your computer, wait a few seconds, and boot it
up again. Some minor problems will work themselves out when you do
this.
Check with the company for any known problems or updates to the
software.
192
Figure 9.The Task Manager
If your computer does not start, begin by checking the power cord to
confirm that it is plugged securely into the back of the computer case and
the power outlet.
If it is plugged into an outlet, make sure it is a working outlet. Often, this
will require you to plug a lamp or other electrical device into the outlet to
make sure it is receiving power.
If the computer is plugged into a surge protector, verify that it is turned
on. You may have to reset the surge protector by turning it off and then
back on. You can also plug a lamp or other device into the surge protector
to verify that it is on.
193
If you are using a laptop, the battery may not be charged. Plug the AC
adapter into the wall and then try to turn on the laptop. If it still doesn't
start up, you may need to wait a few minutes and then try again.
If you get this message when you boot up your computer, it usually
means there is a CD, DVD, USB flash drive, or floppy disk in your
computer, which is interfering with your computer's booting process.
Remove the disk from the drive and restart the computer.
194
Computer Begins Randomly Rebooting or Crashing
Check for overheating. Make sure the vents in the case are not blocked.
Confirm that there is good air flow around the computer.
Update your antivirus software and scan for viruses.
Figure13.Virus Scanning
195
Monitor Goes Blank Periodically
No Sound
Check the volume control on your computer. In Windows, the sound icon
will usually be on the taskbar, and you can also access the sound options
in the Control Panel. On Macs, the sound options are found at the top of
the screen or in System Preferences.
Most media programs (such as iTunes or Windows Media Player) have
a volume control, which will need to be turned up.
Make sure the speakers are turned on, if using external speakers.
196
Make sure external speakers are connected to the correct audio port or a
USB port. If your computer has color-coded ports, the audio output will
usually be green.
Connect headphones to the correct audio port and determine if sound is
audible from the headphones.
If you still haven't found a solution to your problem, you may need to
ask someone else for help. Try searching the web for the problem that
you're having, as other people may have had similar problems. Also, if you
have a friend or family member who knows a lot about computers, they may
be able to help you.
1. Look at the back of your computer. Without opening the case, list the ports
that you believe come directly from the motherboard.
2. Remove the cover of the case. List the different expansion cards in the
expansion slots. Was your guess correct about which ports come from the
motherboard?
3. To expose the motherboard so you can identify its parts, remove all the
expansion cards.
4. Draw a diagram of the motherboard and label these parts: Processor
(Include the prominent label on the processor housing.)
a) RAM (each DIMM slot)
b) CMOS battery
c) Expansion slots (Identify the slots as PCI, PCIe x1, PCIe x4, PCIe
x16, and AGP.) Each port coming directly from the motherboard
197
Power supply connections, SATA or IDE drive connectors and
floppy drive connector
5. Draw a rectangle on the diagram to represent each bank of jumpers on
the board.
6. What is the brand and model of the motherboard?
7. Locate the manufacturer’s Web site. If you can find the motherboard
manual on the site, download it.
8. You can complete the following activity only if you have the documentation
for the motherboard:.
Directions: Divide the class into five (5) groups. Choose a leader for each
group. The group will prepares a chart and perform the tasks required by the
Diagnostics Procedure of ATX Power Supply Failure. After the activity
they will be graded through the given Performance Score Card below:
198
PERFORMANCE SCORE CARD
199
Tools for Testing Computer System
Tools and equipment play vital roles in troubleshooting. They help the
user determine the errors found in their computer hardware and network.
1. Screw drivers - are used for installing and removing screws in the computer
unit.
2. Pliers and tweezers - are used for picking small parts in the computer unit.
3. Soldering iron- is primarily used for connecting terminals in the power supply
and circuit board with the use of a soldering lead.
200
Figure19. Soldering iron
4. Anti-static wrist strap, mat and spray- are used for eliminating electrostatic
discharge in the work area.
5. Lens cleaner – a device used for cleaning optical media, such as DVD-
ROMS and CD-writers.
201
Figure22. Thermal Paste
Source: www.nudata.com
Figure23. LAN Tester
2. Crimping tool- is a device used to crimp the RJ45 connector to the UTP
cable.
Source: www.ted-kyte.com
Figure24. Crimping Tool
202
Direction: Answer the following question. Write your answers on your
notebook.
203
Troubleshooting computer system network
Solution
Verify that the network cable is properly connected to the back of the
computer. In addition, when checking the connection of the network cable,
ensure that the LEDs on the network are properly illuminated. For example, a
network card with a solid green LED or light usually indicates that the card is
either connected or receiving a signal.
If, however, the card does not have any lights or has orange or red
lights, it is possible that the card is bad, not connected properly, or the card is
not receiving a signal from the network.
204
If you are on a small or local network and have the capability of
checking a hub or switch, verify that the cables are properly connected and
that the hub or switch has power.
Adapter resources
Ensure that if this is a new network card being installed into the
computer that the card's resources are properly set and not conflicting with
any hardware in the computer.
Adapter functionality
Protocol
Verify that the correct protocols are installed on the computer. Most
networks today will utilize TCP/IP, but may also utilize or
require IPX/SPX and NetBEUI.
When the TCP/IP protocol is installed, unless a DNS server or other
computer assigns the IPX address, the user must specify an IP address as
well as a Subnet Mask. To do this, follow the instructions below.
1. Click Start / Settings / Control Panel
2. Double-click the Network icon
3. Within the configuration tab double-click the TCP/IP protocol icon. Note: Do
not click on the PPP or Dial-Up adapter, click on the network card adapter.
4. In the TCP/IP properties click the IP address tab
5. Select the option to specify an IP address
6. Enter the IP address and Subnet Mask address, an example of such an
address could be:
IP Address: 102.55.92.1
Subnet Mask: 255.255.255.192
205
7. When specifying these values, the computers on the network must all
have the same Subnet Mask and have a different IP Address. For
example, when using the above values on one computer you would want
to use an IP address of 102.55.92.2 on another computer and then specify
the same Subnet Mask.
Firewall
If your computer network utilizes a firewall, ensure that all ports required
are open. If possible, close the firewall software program or disconnect the
computer from the firewall to ensure it is not causing the problem.
Additional time
Additional troubleshooting
206
if you are a Linux / Unix variant user. To use this command you must be at
the command prompt or shell. Ortrace route 102.55.92.2
This should begin listing the hops between the computer and network
devices. When the connection fails, determine what device is causing the
issue by reviewingthe trace route listing.
a. How many network devices are listed in the output? Record their names in
your worksheet.
b. Is there an IPv4 address listed for any of the network devices? If so, record
your
4. Connect your computer to a network switch using a patch cable. Did you
get a light on the switch? Record the port number you connected to in your
worksheet.
207
5. Draw a diagram of the entire local area network in the space below,
including the
7. In the terminal window, type dhclient eth1 and press Enter. Describe what
happens.
1. Check connectivity with the router with the ping command. Type ping -c4
10.0.1.1 and press Enter. Record the times listed in the last column of the
output. What was the average round trip time (rtt) from your computer to the
router and back?
2. Ask another group for their IP address. Check connectivity with that group's
computer with ping. Run ping as shown above, substituting the new IP
address for the one listed in the previous item. Record the times listed in the
last column below. What was the average round trip time (rtt)?
3. When you have completed the activity, shut down your computer and
return to your seat.
208
Procedures:
Getting connected
2. Type ipconfig and press Enter. Are your network setting correct? If
not, repeat the steps 4–11 in the previous section.
3. Ask another group for their IP address. Check connectivity with that
group's computer with ping. For example, ping -c4 10.0.1.200.
Record the times listed in the last column below. What was the
average round trip time?
209
Evaluation:
CRITERIA
Passed Failed
Remarks
210
Computer System and Network Configurations
Computer Networks
The most common networks are Local Area Networks or LANs for
short. A LAN connects computers within a single geographical location, such
as one office building, office suite, or home. By contrast, Wide Area Networks
(WANs) span different cities or even countries, using phone lines or satellite
links.
All networks go through roughly the same steps in terms of design, rollout,
configuration, and management.
Plan on the design phase to take anywhere from one to three working
days, depending on how much help you have ad how big your network is.
211
Choose software and hardware solutions to handle day-to-day
management chores.
Network configuration means customizing the network for your own use.
212
Managing Your Network
The work you do right after your LAN is up and running and configured can
save you huge amounts of time in the coming months.
Smooth Setup
A UTP cable (category 5) is one of the most popular LAN cables. This
cable consists of 4 twisted pairs of metal wires (that means there are 8 wires
in the cable). Adding RJ45 connectors at both ends of the UTP cable it
becomes a LAN cable they usually use.
213
Preparation
Making Cable
Follow the steps below.
1. Remove the outmost vinyl shield for 12mm at one end of the cable (we
call this side A-side).
2. Arrange the metal wires in parallel (refer the each section's wire
arrangement table). Don't remove the shield of each metal line.
3. Insert the metal wires into RJ45 connector on keeping the metal wire
arrangement.
4. Set the RJ45 connector (with the cable) on the pliers, and squeeze it
tightly.
5. Make the other side of the cable (we call this side B-side) in the same
way.
6. After you made it, you don't need to take care of the direction of the cable.
(Any cable in this page is directionless --- that means you can set either
end of the cable to either device.)
214
How to see the wire arrangement
Take the UTP cable with your left hand and a RJ45 connector with
your right hand. Hold the RJ45 connector in the way you can see the contact
metal face of the RJ45 connector.
The tables below are for the case where the UTP cable consists of
green/green-white, orange/orange-white, blue/blue-white, brown/brown-white
twisted pairs.
10BaseT and 100BaseT are most common mode of LAN. You can use
UTP category-5 cable for both modes. (You can use UTP category-3 cable for
10BaseT, in which there are only 3 wires inside the cable.)
215
10 Base T / 100 Base T Cross
A cross cable for 10BaseT and 100BaseT is used to connect 2
computers directly (with ONLY the UTP cable). It is also used when you
connect 2 hubs with a normal port on both hubs. (In other words, the cross
cable is used relatively in a rare case.)
To create a peer network, follow these steps for each computer connected to
the network:
216
1. Shut down the computer and install the network card and appropriate
cabling for each computer.
2. Start Windows and install the network drivers. Windows may detect your
network card and install the drivers when you start the computer. If the
network card drivers are not included with Windows, follow the manufacturer's
instructions about how to install the network drivers.
a. Click Start, point to Settings, click Control Panel, and then double-click
Network.
4. Configure a peer server. Each computer that is configured for File and
Printer Sharing can act as a server. To configure a computer for File and
Printer Sharing, use the following steps:
a. Click Start, point to Settings, click Control Panel, and then double-click
Network.
b. Click File and Print Sharing, click one or both options to share files and
printers, click OK, and then click OK again.
5. Give each computer a unique computer name. To do this, use the following
steps:
217
a. Click Start, point to Settings, click Control Panel, and then double-click
Network.
b. On the Identification tab, type a unique name in the Computer name box.
c. Click OK, and then click Yes when you are prompted to restart your
computer.
NOTE: The computer name must be unique for each computer on the
network and should be no more than 15 characters in length. In small
networks, the workgroup name should be the same for each computer
so that all computers are visible in the same workgroup when
browsing. You should not use spaces or the following characters in
: computer and workgroup names
In this activity, you will learn how useful the Internet can be for a PC support
technician.
2. Research the Web site for your motherboard and print the instructions for
flashing BIOS.
218
Task 1. Setting Windows Network Connection
CRITERIA 1 2 3 4 5
Safety Precautions are observed.
All the UTP are properly connected to the computer
and hub.
Computers are properly connected and seen in the
network.
Proper boot-up and shutdown of the computer is
observed.
Total:
Task2. Analyze the situations below and answer the questions that
follow.
When Enzo travels on company business, he finds it’s a great help to be able
to access his office computer from anywhere on the road using Remote
Desktop. However, he wants to make sure his office computer as well as the
entire corporate network is as safe as possible.One way you can help Enzo to
add more security is to change the port that Remote Desktop uses.
Knowledgeable hackers know that Remote Desktop uses port 3389, but if you
change this port to a secret port, hackers are less likely to find the open port.
Search the MicrosoftKnowledge Base articles (support.microsoft.com) for a
way to change the port that RemoteDesktop uses. Practice implementing this
change by doing the following:
219
1. Set up Remote Desktop on a computer to be the host computer. Use
another computer (the client computer) to create a Remote Desktop
session to the host computer. Verify the session works by transferring files
in both directions.
2. Next, change the port that Remote Desktop uses on the host computer to
a secret port. Print a screen shot showing how you made the change. Use
the client computer to create a Remote Desktop session to the host
computer using the secret port. Print a screen shot showing how you
made the connection using the secret port. Verify the session works by
transferring files in both directions.
3. What secret port did you use?
220
Lesson 3.INSPECT AND TEST THE CONFIGURED COMPUTER
SYSTEMS AND NETWORKS
Observe good housekeeping in the area of the machines during and after
maintenance.
Place removed covers and other parts in a safe place, away from all
personnel, while you are servicing the machine.
Keep your tool case away from walk areas so that other people will not trip
over it.
Do not wear loose clothing that can be trapped in the moving parts of a
machine. Ensure that your sleeves are fastened or rolled up above your
elbows. If your hair is long, use hair net or hair cap.
Insert the ends of your necktie or scarf inside clothing or fasten it with a
nonconductive clip, approximately three (3) inches from the end.
Do not wear jewelry, chains, metal-frame eyeglasses, or metal fasteners.
After service, reinstall all safety shields, guards, labels, and ground wires.
Replace any safety device that is worn out or defective.
Finally, reinstall all covers correctly before returning the unit to the
customers.
221
Electrical safety
Electric current from power, telephone, and communication cables can
be hazardous. To avoid personal injury or equipment damage, disconnect the
attached power cords, telecommunications systems, networks and modems
before you open the server/workstation covers, unless instructed otherwise in
the installation and configuration procedure.
Precautions
These steps will help you identify potentially unsafe conditions on electrical
products:
Check exterior covers for damage (loose, broken, or sharp edges)
Power-off computer. Disconnect the power cord.
The power cord should be the appropriate type.
Insulation on the power cord must not be frayed or worn out.
Remove the cover.
Check for any obvious alteration. Use good judgment as to the
safety of any alterations.
Check for worn out, frayed or pinched cables.
Check that the power-supply cover fasteners (screws or rivets)
have not been removed or tampered with.
Accident Reporting Policy and Procedure
There must be a process put in place to report accidents, incidents or near
misses for immediate action and to help track causes. The organization needs to
222
identify what needs to be reported, to whom it is to be reported, and how to report
it, then put this process into a written procedure.
For example:
Any accident, incident, or "near miss," no matter how slight the injury or
damage, must be reported to the department supervisor immediately for
appropriate action.
The supervisor is responsible for taking appropriate follow-up action,
including getting medical attention for the injured, completing an investigation
report and recommending or implementing appropriate corrective actions.
The primary purpose of the accident investigation is to identify the cause(s)
of the accident, incident or "near miss" and take action to prevent a similar
occurrence in the future. In some instances, an employee's or volunteer's failure to
follow recognized safety procedures requires disciplinary action to protect co-
workers.
Remember: One person's actions can jeopardize the safety of others in the
workplace.
Approved by
Chairman:
Date:
223
Accident Investigation Procedures
The senior staff member available at the accident scene or the first
member notified should complete the appropriate investigation reporting form
(accident, incident, near miss). The completed form should be given to the
organization's safety committee, which will forward a copy of the report to the
safety coordinator for review.
224
Fill out the appropriate accident, incident or near-miss form, giving an
accurate account of the facts.
Send the form to the safety coordinator and safety committee for their
review.
Accident reports
Forms are used to give specific details with regards to the accidents
happened in the laboratory during experiments.
Date:
Name: Yr/Sec:
225
Replacing different Components
When replacing computer parts and peripherals, you need to consider the
following factors:
Form factor
1. Memory
2. Video Cards (also referred to as a graphics accelerator)
3. Network Interface Card
4. Hard disk drive
5. Motherboard
6. Processor
7. CMOS Battery
8. CD/DVD Drive
9. Sound card
226
Directions: Write your answer on your notebook
a. Memory
b. Video card
c. NIC
d. Motherboard
e. HDD
227
Upgrading Your Computer Components
228
Figure 26. Defragmenter Utility
4. Disk Cleanup: You can delete unwanted programs and files from your
computer and this will be helpful in increasing the speed.
5. Empty Recycle Bin: Delete all the files and folders from the recycle bin
and you will get the space of C drive for reusability.
229
Figure 28. Emptying the recycle bin
Memory Upgrade
To make your computer faster, you can upgrade its memory. Here are
the steps in upgrading your computer’s memory
1. Remove the memory modules from the slot.
230
3. Now you are ready to install the module,
ensuring the notches line up with the keys
gently but firmly push the memory into the
slot until it is seated fully(see Figure 32 the
ejector clips should rise to the vertical
position as shown in Figure 33). Figure 32. Ejector clips
1. Take the video card (hold it by the edges) and line it up with the slot
paying careful attention to the alignment notch. When it is aligned correctly,
press gently but firmly until the card is seated fully and evenly into the slot.
2. When you are happy that the card is firmly in place, insert the fixing
screw and check to make sure you have not loosened anything during
installation.
3. When you reboot your machine Windows (or other OS) should find the
card automatically, it may then ask you to insert the disk/CD that came with
your video card, insert the CD and follow the on-screen instructions to install
the video card driver.
The first thing to do (after removing the case covers) is to locate the
drive bay where the hard drive will go.
231
The next step is to attach the IDE and power cables.
In figure 34 below you can see a standard IDE Cable, note there are
three (3) connections (notice the difference in distance between the
connectors). Connection A plugs into the motherboard and then the slave and
master connections are used for IDE devices such as hard drives, if you are
only installing one drive or the new drive is to be the master then use the
master connector, if the drive is to be the slave then use the slave connector.
The IDE cable will be marked down one side with a red or black strip,
this denotes Pin 1, match this with the Pin 1 indicator on the back of the hard
drive.
The power cable you will find in your case is attached to your power
supply; you can see an example below in figure 35.
232
Basic Network Errors
Please make sure that your network Please make sure that your network
adapter is securely plugged into a USB adapter is securely plugged into a USB
port on the back of the box. port on the back of the box.
3. If these steps have not resolved your issue, see Detailed Steps
below for additional assistance.
233
Network problem error message 2
Read the message in the box.
Box running software 14.8 and Box running software 14.7 and
above: below:
234
Possible solution for error message 3
235
Network problem error message 8
Read the message in the box:
Box running software 14.8 and Box running software 14.7 and below:
above:
Your network adapter has not been
Adapter not set up. (N08) set up for use with the box. (N08)
236
ME and NT if this is a mixed OS network.
9. Cache credential by using net
use \\computername\share /user:username
command (it is better to have the username
logon shared computer).
10. If you have tried enabling netbios over tcp/ip
but doesn't work, you may try to load netbeui
(loading netbeui may slow your network).
11. Make sure the server service is running.
12. Still need help, contact
consultant at http://hidev.com/contactus.asp f
or the tech support.
An extended error has 1. This issue may occur if the workstation doesn't
occurred" or "Access synchronize the time with the server. After
Denied" Symptoms: verifying that basic network connectivity exists,
When mapping a you can force time synchronization on the
network drive using client computer manually. To do this, run net
net use or using time /domain /set command.
the net 2. Make sure you have granted enough licenses
view command to for clients accessing.
view a different
computer in the
domain, you may
receive: "An extended
error has occurred" or
"Access Denied" error
messages.
“Computer name is 1. Are you sure the logon user has permission to
not accessible. No the shared folder?
permission to access 2. Have you tried to logon using the same user
the resources" name and password of the accessed
computer?
3. The last and risky one, if you enable guest
account in computer, can you access now?
237
"Multiple connections 1. Try using net use /d from a command to clear
to the server or allyour mapped connections before joining the
shared resource domain. You can also disconnect the mapped
are not allowed" drive in Windows Explorer by right-click the
mapped drive and select disconnection.
Symptom: when
attempting to join a
domain, you may
receive "Multiple
connections to the
server or shared
resource are not
allowed. Please
disconnect all
previous connections
to the server or
shared resource and
try again."
"Network path not 1. This issue may occur if the TCP/IP NetBIOS
found" in a domain Helper Service is not running on the client
network 1 computer. To start the TCP/IP NetBIOS
Helper Service, go to MMS>Services, double-
SYMPTOMS: click TCP/IP NetBIOS Helper Service.
When trying to join a
domain by using he
NetBIOS domain
name, you are
successful but not the
FQDN and you may
receive one of the
following error
messages:
238
2) Network path not
found.
"Network path not 1. You can find some computer browser errors
found" in a domain on the DNS server. Disable one of two NICs
network 2 will work. More resolutions can be found in
browser Issue page.
"Network path not 1. Make sure that File and Printer Sharing is
found" in a workgroup enabled on the shared computer.
network - error 53 Make sure that shared machine has
something shared.
2. Make sure that you have created the same
workgroup and logon the same username
Make sure that you have enabled NetBIOS
over TCP/IP if this is a mixed OS network.
239
you may receive "Not IRPStackSize and the Data Type is
enough server REG_DWORD.
storage is available to 2. Remove any unnecessary entries from this
process this value in the registry,
command." error. You HKEY_LOCAL_MACHINE\System\CurrentCo
may receive this ntrolSet\Services\LanmanServer\Parameters\
message and Event NullSessionPipes.
ID: 2011 after you 3. Disable Norton antivirus to see if that will fix
install Norton the problem.
Antivirus for Windows.
240
message: System
error 6118 has
occurred. The list of
servers for this
workgroup is not
currently available.
241
attempt to browse accessed computer?
your network by 5. Is the workstation service running?
opening Entire
Network in My
Network
Places/Network
Neighborhood, you
may receive the
following error
message: Unable to
Browse Network.
242
Award BIOS / CMOS Setup
This is the BIOS setup for Award BIOS v6.00PG. If you have a
different version of the Award BIOS there would be a lot of similarities. If your
BIOS are AMI or Phoenix then the common BIOS features would have some
similarities. Whatever BIOS you have, this setup guide should give you an
idea about how to setup BIOS.
Softmenu III
Softmenu III is where you can setup up the CPU without setting
jumpers on the motherboard. You can setup the CPU simply by selecting the
speed i.e. Pentium III 750 from the list. This ensures that the CPU bus,
multiplier, voltage etc, is correctly set for that particular CPU. However you
can manually setup each feature if required. Once you have finished with the
setup press ESC to return the previous menu.
243
Standard CMOS Features
Here you can setup the basic BIOS features such as date, time, type of
floppy etc. Use the arrow keys to move around and press enter to select the
required option. You can specify what IDE devices you have such as Hard
drive, CD-ROM, ZIP drive etc. The easiest way to setup the IDE devices is by
leaving it set to auto. This allows the BIOS to detect the devices automatically
so you don't have to do it manually. At the bottom, it also displays the total
memory in your system.
As you can see from figure 3, there are numerous advance settings
which you can select if required. For most cases leaving the default setting
should be adequate. As you can see the first boot device is set to floppy. This
ensures that the floppy disk is read first when the system boots, and therefore
can boot from windows boot disk. The second boot device is the Hard disk
and third is set to LS120. If you want to boot from a bootable CD then you can
set the third boot device to CD/DVD-ROM.
244
Figure 37. Advance Bios Feature
Here you can setup the contents of the chipset buffers. It is closely
related to the hardware and is therefore recommended that you leave the
default setting unless you know what you are doing. Having an incorrect
setting can make your system unstable. If you know that your SDRAM can
handle CAS 2, then making changes can speed up the memory timing. If you
have 128MB SDRAM then the maximum amount of memory the AGP card
can use is 128MB.
245
Integrated Peripherals
This menu allows you to change the various I/O devices such as IDE
controllers, serial ports, parallel port, keyboard etc. You can make changes as
necessary.
246
PnP/PCI Configurations
This menu allows you to configure your PCI slots. You can assign
IRQ's for various PCI slots. It is recommended that you leave the default
settings as it can get a bit complicated messing around with IRQ's
PC Health Status
This menu displays the current CPU temperature, the fan speeds,
voltages etc. You can set the warning temperature which will trigger an alarm
if the CPU exceeds the specified temperature.
247
Load Fail-Safe Defaults
If you made changes to the BIOS and your system becomes unstable
as a result, you can change it back to default. However if you made many
changes and don't know which one is causing the problem, your best bet is to
choose the option "Load Fail Safe Mode Defaults" from the BIOS menu. This
uses a minimal performance setting, but the system would run in a stable
way. From the dialog box Choose "Y" followed by enter to load Fail-Safe
Defaults.
Like the Fail-Safe mode above, this option loads the BIOS default
settings, but runs the system at optimal performance. From the dialog box
Choose "Y" followed by enter to load Optimized Defaults.
248
Figure 45. Load optimized
To save any changes you made to the BIOS you must choose this
option. From the dialog box choose "Y".
If you don't want to save changes made to the BIOS, choose "N" from
the dialog box.
249
Task 1. The BIOS settings in the CMOS memory have become corrupted
or damaged
Procedure:
Evaluation
CRITERIA
Passed Failed
Remarks
250
Task 1. Practicing TCP/IP Networking Skills
6. What response do you get when you ping the default gateway?
1. Give a brief description of FiOS and how it is used for Internet access.
3. When using FiOS, does your telephone voice communication share the
fiber-optic cablewith Internet data?
4. What does Verizon say about FiOS cabling used for television?
251
Hardware Upgrade
Tools
Anti-static mat
Equipment
Network Card
Evaluation
CRITERIA
Passed Failed
Remarks
252
LESSON 4: TEST SYSTEMS AND NETWORKS
Is your PC healthy? Don't be too sure. Think back to when you heard a
kerklunk sound coming from the hard drive. Or maybe you remember the last
time your Internet connection was down.
The best way to find out what's wrong is to take a proactive approach:
Check under your PC's hood with the following mostly free diagnostic tools,
and see if anything is amiss--before disaster strikes.
Hardware
Software
Firmware
Keyboard connector
Mouse Connector
253
3. I/O port and devices
4. Power supply
Power cord
Fuse
254
2. Application Software
Check for live updates
256
Error Beep codes
1. First, it will check all the basic components including among other things
the system clock, the processor, RAM, the keyboard controller and the Video
2. After the video has been tested the BIOS will then indicate any errors
encountered by displaying either a numeric code or a text message on the
screen.
When a device fails the first part of the POST, the BIOS will send a
series of beeps from the PC's speaker (internal) to inform the PC user that
there is a problem these beeps are coded allowing the user to diagnose the
troublesomemcomponent.
When the POST has been completed successfully, the PC will make a
short beep to let the user know everything is as it should be.
1. AWARD BIOS
2. Phoenix BIOS
3. AMI BIOS
257
Each type of BIOS chip has it own error code
258
Phoenix BIOS ERROR BEEP CODES
259
AWARD BIOS ERROR BEEP CODES
Directions: Answer the following questions and place your answers on your
answer sheet.
1-2-2-3
1-3-4-1
2-1-2-3
1-1-4-1
1-3-1-1
260
Directions:
Test I. Identify the tools presented below and write your answer in separate
paper.
1.
2.
3.
4.
5.
261
Directions:
Test II. List down at list Five (5) common problem and solution. Use a
separate sheet of paper if needed.
Obtain the manual for the motherboard for your PC. (If you cannot find the
manual, try downloading it from the motherboard manufacturer’s Web site.)
Answer these questions:
4. If the board has a PCIe slot, what version of PCIe does the board use?
Using the Windows Help and Support window, Search for information
on Windows MeetingSpace. Describe the tool. When would you want to use
it? What can you do with WindowsMeeting Space? Set up and test the tool
with a friend on a network connection.
262
Task 1. Testing a Computer Unit
Tools
Multi-tester
Screw driver
Equipment
Computer unit
Monitor
Power cables
Materials
Bond paper
Directions: Test the following computer peripherals and equipment with the
use of the tools provider. Document your testing with the use of an
accomplishment form.
Computer monitor
Power supply
263
Keyboard
Mouse
CRITERIA Percentage
Tools
Screw drivers
Anti-static wrist strap
Equipment
Computer unit
Given the tools and equipment, identify the memory error code by removing
the module in the computer unit
264
You will be assessed using the following criteria
Evaluation:
CRITERIA Percentage
265
POST ASSESSMENT
One way to help Enzo add more security is to change the port that
Remote Desktop uses. Knowledgeable hackers know that Remote Desktop
uses port 3389, but if you change this port to a secret port, hackers are less
likely to find the open port. Search the Microsoft Knowledge Base articles
(support.microsoft.com) for a way to change the port that Remote Desktop
uses.
2. Next, change the port that Remote Desktop uses on the host computer to a
secret port. Print a screen shot showing how you made the change. Use the
client computer to create a Remote Desktop session to the host computer
using the secret port. Print a screen shot showing how you made the
connection using the secret port. Verify the session works by transferring files
in both directions.
266
Instruction:
Read each of the questions in the left-hand column of the chart.
Place a check on the columnthat indicate your answers
I Can YES NO
Plan and prepare work to ensure occupational health and
safety
(OHS) policies and procedures are followed
Obtain materials, tools, equipment and testing devices
needed to onform with job requirements
Interpret work instructions according to job requirements
Obtain computer components/devices/systems and
determines its location prior to installation
Install equipment/devices/systems in accordance with job
requirements
Check/Test devices/systems and/or installations to
determine the conformity to job requirements.
Check computer systems and networks for configuration
in accordance with specifications and requirements
Diagnose fault or problem in the computer systems and
networks in line with standard operating procedures
(SOP)
267
I. Identify what computer error is illustrated on the following situations.
_________ 2.When you open your PC, nothing shows up in your monitor and
the LED indicator of your monitor is flashing in yellow color.
__________3. When you open your PC it will show the processor brand
and/or the motherboard brand but doesn't continue. Usually this error will
result to system restart over and over again.
__________5. The computer opens up then boots but when the operating
system loads it doesn't continue and it will take a lifetime if you're going to
wait for it to load.
__________6. This happens even if you try installing the hardware. When
you restart your set it will happen again.
__________7. When you try going to safe mode all you will see is a list of
files in Command prompt style.
__________9.This will happen only in standby mode, when you move your
mouse or type something, your system will automatically restart and the worst
part is it will delete a file at random.
__________10. Just like the mouse problem, when you open a program that
will take the whole screen like for example a game and/or a program
applications, when you close it, it will cause your system to restart.
268
II. Choose the letter of the best answer:
1) These are moderately dangerous types of errors among those that can
pop up on your PC. System errors are caused by malfunctioning
hardware components, corrupted operating system modules, etc.
a. System error c. Stop errors
b. Runtime errors d. Device managers errors
269
usually caused by glitches in the program code itself. These are
usually resolved by updating the program to its latest version.
a. System error c. Application errors
b. Browser status errors d. Post Code errors
a. electricity c. Proton
b. atom d. Post Code errors
9) the amount of pulling force that makes the electron flow. Also known
as potential difference or EMF(electromotive force).
a. electricity c. Current
b. resistance d. Voltage
10) a type of circuit that has an open path for current to flow. It means that
current cannot flow in open circuit.
a. Open circuit c. Current circuit
b. resistance d. close circuit
Column A Column B
1. Used for installing and A. Screw drivers
removing screws in the
computer unit.
2. Used for picking small parts in B. Pliers and tweezers
the computer unit.
3. Used for eliminating C. Soldering iron
electrostatic discharge in the
work area.
4. Primarily used for connecting D. Lens cleaner
terminals in the power supply
270
and circuit board with the use
of a soldering lead.
5. It is a paste used for heat E. Anti-static wrist strap, mat and
dissipation of the processor. spray
6. A device used for cleaning F. Thermal paste
optical media, such as DVD-
ROMS and CD-writers.
7. A device used to crimp the G. LAN Tester
RJ45 connector to the UTP
cable
8. A device used for testing the H. Crimping tool
network connection
I. Systems Tool Box
IV. Arrange the following steps in verifying the correct protocols are
installed on the computer.
_____When specifying these values, the computers on the network must all
have the same Subnet Mask and have a different IP Address. For example,
when using the above values on one computer you would want to use an IP
address of 102.55.92.2 on another computer and then specify the same
Subnet Mask.
_____Enter the IP address and Subnet Mask address, an example of such an
address could be:IP Address: 102.55.92.1, Subnet Mask: 255.255.255.192
271
V. List down at list Five (5) common computer problems and solutions.
272
Books and Articles and Printed Materials:
273
Computer System - The complete computer made up of the CPU, memory
and related electronics (main cabinet), all the peripheral devices connected to
it and its operating system. Computer systems fall into two broad divisions:
clients and servers. Client machines fall into three categories from low to high
end: laptop, desktop and workstation. Servers range from small to large: low-
end servers, midrange servers and mainframes.
Connector - Any plug and socket that links two devices together. Although
taken for granted and rarely in the limelight, connectors are a huge industry,
and the quality of these components is more critical than most people would
imagine. When not designed or constructed properly, they often become the
weakest element in an electronic system.
ESD (Electro Static Discharge)-A small amount of static electricity that can
destroy small parts of your computer.
Expansion Board - A printed circuit board that plugs into an expansion slot
and extends the computer's capability to control a peripheral device. All the
boards (cards) that plug into a computer's bus are expansion boards, such as
display adapters, disk controllers, network adapters and sound cards.
274
users interact with a computer, and the major GUIs are the Windows and Mac
interfaces along with Motif for Unix and the GNOME and KDE interfaces for
Linux.
Motherboard - Also called the "system board," it is the main printed circuit
board in an electronic device, which contains sockets that accept additional
boards. In a desktop computer, the motherboard contains the CPU, chipset,
PCI bus slots, AGP slot, memory sockets and controller circuits for the
keyboard, mouse, disks and printer. It may also have built-in controllers for
modem, sound, display and network, obviating the need to plug in a card. A
laptop motherboard typically has all peripheral controllers built in.
Operating System - The master control program that runs the computer. The
first program loaded when the computer is turned on, its main part, the
"kernel," resides in memory at all times. The operating system sets the
standards for all application programs that run in the computer. The
applications "talk to" the operating system for all user interface and file
management operations. Also called an "executive" or "supervisor," an
operating system performs the following functions.
User Interface - All graphics based today, the user interface includes the
windows, menus and method of interaction between you and the computer.
Prior to the Mac, Windows and Motif (Unix) interfaces, all interaction was
based on commands entered by the user. Operating systems may support
optional interfaces and allow a new shell, or skin, to be used instead.
Virus- Software used to infect a computer. After the virus code is written, it is
buried within an existing program. Once that program is executed, the virus
275
code is activated and attaches copies of itself to other programs in the
system. Infected programs copy the virus to other programs.
276