0% found this document useful (0 votes)
505 views

Module 1-Ongoing Maintenance of Computer Systems

This module provides guidance on maintaining computer systems. It begins by outlining the objectives of understanding basic maintenance like scanning for viruses and cleaning systems. Next, it details different types of computer viruses like Trojan horses, worms, boot sector viruses, and parasitic viruses that can harm systems. The module then explains procedures for preventative maintenance planning, including both hardware and software maintenance through activities like backing up files, updating anti-virus software, and properly storing the computer.

Uploaded by

Melvin Dipasupil
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
505 views

Module 1-Ongoing Maintenance of Computer Systems

This module provides guidance on maintaining computer systems. It begins by outlining the objectives of understanding basic maintenance like scanning for viruses and cleaning systems. Next, it details different types of computer viruses like Trojan horses, worms, boot sector viruses, and parasitic viruses that can harm systems. The module then explains procedures for preventative maintenance planning, including both hardware and software maintenance through activities like backing up files, updating anti-virus software, and properly storing the computer.

Uploaded by

Melvin Dipasupil
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

MODULE 1: ONGOING MAINTENANCE OF COMPUTER SYSTEMS

Prepared by: MELVIN DIPASUPIL

Overview:

This module will guide you on how to maintain your computer systems. It will begin by
knowing the prior knowledge about maintenance of computer system and defining the
different viruses that can harm our computer system. This module will also ask you to
perform different proper caring of your computer system by doing an activity. After knowing
the different maintenance of computer system you will be guided on the next topic categories
of computer.

Module Objectives:

After completing the module, you are expected to:

1. Perform simple maintenance on the computer system: scandisk, defrag, and obtain
virus updates.
2. Aware that individual protection against viruses impacts everyone
3. Define a computer virus and its type of virus.
4. Perform proper ways of cleaning your computer system..

Course Materials:

Pre-Activity
SKILLS TEST
Directions: Listed below are some of the most important skills that you must master in order to
render quality service when you enter the industry of Computer Hardware Servicing. Read
the skills carefully. Write “YES” if you can do the skill and “NO” if not . Feel free to answer
each skill. Write your answers in your notebook.

I can… YES NO
plan and prepare work to ensure occupational health
and safety (OHS) policies and procedures are followed.

obtain materials, tools, equipment and testing devices


needed to conform with job requirements.

interpret work instructions according to job


requirements.

obtain computer components/ devices/ systems and


determine its location prior to installation.
install equipment / devices / systems in accordance to
job requirements.
check / test devices / systems and / or installations to
determine the conformity to job requirements.

check computer systems and networks for configuration


in accordance with specifications and requirements.
diagnose fault or problem in the computer systems and
networks in line with standard operating procedures
(SOP).
configure the identified systems and networks based on
specifications and job requirements.
inspect and test configured computer systems and
networks in conformity with manufacturer's instructions
/ manual.
correct / adjust components or parts of computer
systems and networks in accordance with job
requirements.

test computer systems and networks to ensure safe


operation.
perform scheduled / periodic maintenance in
accordance with manufacturer's requirements.
make needed repairs / replacements in accordance with
established procedures, when necessary.

clean and clear worksite of all surplus/excess materials


in accordance with company SOP

Watch
1. Be able to watch this video clip about computer maintenance.
https://www.youtube.com/watch?v=9aFVjvCJcbk
2. What are your significant learning from the video?
3. What are your reflections about the video?

Read

Procedures in Planning and Conducting Maintenance Preventive Maintenance


Preventive maintenance can be described as maintenance of equipment or systems before fault
occurs. It can be divided into two subgroups: Planned Maintenance and Conditioned-Based
Maintenance. Planned Maintenance (PM) is any variety of scheduled maintenance to an object
or item of equipment. Specifically, PM is a scheduled service visit carried out by a competent
and suitable agent, to ensure that an item of equipment is operating correctly to avoid any
unscheduled breakdown and downtime of an equipment. Condition Based Maintenance
(CBM) is a maintenance strategy that uses the actual condition of the asset to decide what
maintenance needs to be done. CBM dictates that maintenance should only be performed
when certain indicators show decreasing performance or upcoming failure. Checking a
machine for these indicators may include non-invasive measurements, visual inspection,
performance data and scheduled tests. Condition data can be gathered at certain intervals, or
continuously. The purpose of systematic inspection, detection and correction of existing /
future problems is very important to maintain equipment / facilities in satisfactory condition
before it may cause major problem. Maintenance, including tests, measurements, adjustments,
and parts replacement, performed specifically to prevent faults from occurring. Maintenance
is divided into two (2) general type. Preventive maintenance is given for maintaining
equipment and facilities in satisfactory operating condition to extend the life of the equipment.
Corrective maintenance is task performed to identify, isolate and rectify a fault so that the
failed equipment or system can be restored to an operational conditions within the tolerances
or limits.
Common methods of determining what preventive (or other) failure management policies
should be applied are: Original Equipment Manufacturer (OEM) recommendations,
requirements of codes and legislation within a jurisdiction, what an "expert" thinks ought to be
done, or the maintenance that is already done to similar equipment, and most important
measured values and performance indications.

Maintenance Procedures
In preparing maintenance procedure, you also have to consider designing a systematic plan
for both for hardware and software. This saves time, money and frustration and ensures safe
conditions to prevent injury to people and damage to computer equipment.

Planning Maintenance Procedures for Computer System and Networking:


A. Design a systematic maintenance plan for hardware.
1. Design a monitoring, evaluating and updating plan.
2. Place your computer in a well-ventilated area.
3. Schedule the use of computer for its longer life.
4. Move the computer only when it is turned off and unplugged.
5. Treat your computer properly.
B. Design a systematic maintenance plan for your software.
1. Backup your files.
2. Install or secure passwords.
3. Delete temporary files.
4. Update anti-virus and spyware.

Way on how to maintain computer system.


1. Place your computer in a well-ventilated area.
This will allow proper circulation of air inside the computer unit.

2. Schedule the use of computer for its longer life.


This will help lessen the attacks of viruses and increases the life span of your computer.

3. Move the computer only when it is turned off and unplugged.


To avoid damage to the computer unit always turn off and unplug it when transferring the
computer to another location.

4.Treat your computer properly


This means taking care of your computer. PCs and laptops should be properly turned off.
Do systematic maintenance plan for your computer software.
1.Back-up your files
Protecting your files means creating backups, storing your file backups on your hard
drive or any removable storage device regularly.

2. Install or secure passwords.


Installing passwords makes your files more secure.

3. Delete temporary files.


Deleting the temporary files on your computer will enhance its speed and will create
more disk space for your files.
4. Update anti-virus and spy ware.
Regularly update your anti-virus for your computer protection against viruses.

Type of Computer Virus

A computer virus is a computer program that can spread across computers and
networks by making copies of itself, usually without the user’s knowledge.
Viruses can have harmful side-effects. These can range from displaying irritating messages to
deleting all the files on your computer.

How does a virus infect computers?

A virus program has to be run before it can infect your computer. Viruses have ways of
making sure that this happens. They can attach themselves to other programs or hide in code
that is run automatically when you open certain types of files. You might receive an infected
file on a disk, in an email attachment, or in a download from the internet. As soon as you
launch the file, the virus code runs. Then the virus can copy itself to other files or disks and
make changes on your computer.
1. Trojan horses
Trojan horses are programs that do things that are not described in their specifications.
The user runs what they think is a legitimate program, allowing it to carry out hidden, often
harmful, functions.
Trojan horses are sometimes used as a means of infecting a user with a computer virus.
Backdoor Trojans are programs that allow other computer users to take control of your PC
over the internet.
2. Worms
Worms are similar to viruses but do not need a carrier (like a macro or a boot sector). Worms
simply create exact copies of themselves and use communications between computers to
spread. Many viruses, such as Kakworm (VBS/Kakworm) or Love Bug (VBS/LoveLet-A),
behave like worms and use email to forward themselves to other users.

3. Boot sector viruses

Boot sector viruses were the first type of virus to appear. They spread by modifying the boot
sector, which contains the program that enables your computer to start up.
When you switch on, the hardware looks for the boot sector program – which is usually on the
hard disk, but can be on floppy or CD – and runs it. This program then loads the rest of the
operating system into memory.
A boot sector virus replaces the original boot sector with its own, modified version (and
usually hides the original somewhere else on the hard disk). When you next start up, the
infected boot sector is used and the virus becomes active.

4. Parasitic viruses (file viruses)

Parasitic viruses, also known as file viruses, attach themselves to programs (or ‘executables’).
When you start a program infected with a file virus, the virus is launched first. To hide itself,
the virus then runs the original program. The operating system on your computer sees the
virus as part of the program you were trying to run and gives it the same rights. These rights
allow the virus to copy itself, install itself in memory or release its payload. Parasitic viruses
appeared early in virus history but they still pose a real threat. The internet has made it easier
than ever to distribute programs, giving these viruses new opportunities to spread.

What can viruses do?


Virus side-effects, often called the payload, are the aspect of most interest to users. Here are
some of the things that viruses are capable of.
1. Messages
2. Pranks
3. Denying Access
4. Data theft
5. Corrupting Data
6. Deleting Data
7. Disabling Hardware

Where are the virus risks?


1. The internet
Downloaded programs or documents may be infected.
2. Programs
Programs that carry a virus can infect your machine as soon as you run them.
3. Email
Email can include infected attachments. If you double-click on an infected attachment, you risk
infecting your machine. Some emails even include malicious scripts that run as soon as you
preview the mail or read the body text.
4. Documents and spreadsheets
These can contain macro viruses, which can infect and make changes to other documents or
spreadsheets.
5. Floppy disks and CDs Floppy
Disks can have a virus in the boot sector. They can also hold infected programs or documents.
CDs may also hold infected items.

What is Anti-Virus?
Anti-virus is a security program you install on your computer or mobile device to protect it
from getting infected by malware. The term “malware” is a catch-all phrase for any type of
malicious software, such as viruses, worms, Trojans and spyware. In fact, the term malware
comes from combining the words malicious and software. If your computer has become
infected by malware, a cyber attacker can capture all of your keystrokes, steal your documents
or use your computer to attack others.

How Anti-Virus Works

In general, there are two ways anti-virus software identifies malware: signature detection and
behavior detection. Signature detection works like the human immune system. It scans your
computer for characteristics or signatures of programs known to be malicious. It does this by
referring to a dictionary of known malware. If something on your computer matches a pattern
in the dictionary, the program attempts to neutralize it. Like the human immune system, the
dictionary approach requires updates, like flu shots, to protect against new strains of malware.
Anti-virus can only protect against what it recognizes as harmful. The problem is that cyber
attackers are developing new malware so fast that anti-virus vendors cannot keep up. As a
result, no matter how recently your anti-virus was updated, there is always some new variant
of malware that can potentially bypass your anti-virus software.

Anti-Virus Tips
1. Obtain anti-virus software only from known, trusted sources and vendors. It is a common
ploy of cyber attackers to distribute fake anti-virus programs that are really malware.
2. Make sure you have the latest version of your anti-virus software installed, that your
annual subscription is paid for and active and that your anti-virus is configured to update
automatically. If your computer has been offline or powered off for a while, your anti-virus
software will need to update itself when you turn it back on or reconnect it to the Internet. Do
not postpone these updates.

Review:

Importance of maintaining computer system. Answer the following essay question below.
Questions Answer
1. What is the importance of protecting our
computer from viruses?

2. Search for the best anti-virus for a


computer system? Explain how it works.

3. Did you experienced logging when using


computer. Did you think there is a virus?
Explain.

Activity 1.

Guess the following picture below then explain.

Picture Virus/Anti -Virus Explanation


1.

2.

3.
4.

5.

6.
7.

Activities/Assignments:
Answer the following question.
1. What are the proper ways in cleaning your computer?
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________

2. What can viruses do to your computer?


____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
3.Search for the best anti-virus in our computer system.
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________

4. How can anti-virus help you when using computer?

5.  Write a reflection about the significance of the lesson?

Reference
https://www.stcharlessd.org/cms/lib/MO01910164/Centricity/Domain/103/K-
8_Computer_Technology_curriculum_guide_revised%20April%202019.pdf

You might also like