0% found this document useful (0 votes)
17 views

CBLM

This are the CBLM for Computer System Servicing NC2

Uploaded by

christiandayo74
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

CBLM

This are the CBLM for Computer System Servicing NC2

Uploaded by

christiandayo74
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 59

COMPETENCY-BASED LEARNING

MATERIAL

Sector:
ELECTRONICS

Qualifications:
COMPUTER SYSTEMS SERVICING NCII

Unit of Competency:
MAINTAIN AND REPAIR COMPUTER SYSTEMS AND NETWORKS

Module Title:
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS

CORE INSTITUTE OF TECHNOLOGY, INC.


San Pedro Street, Davao City
COMPUTER SYSTEMS SERVICING NC II

Table of Contents
Module of Instruction ...................................................................................... iv
List of Competencies ........................................................................................ v
Module Content .............................................................................................. vi
Learning Outcome – Core Competencies
LO1 – Plan and Prepare for Maintenance and Repair ........................................ 1
Learning Experiences ................................................................................... 2
Information Sheet 4.1 – 1: Procedures in planning and conducting
maintenance ........................................................... 4
Self-Check 4.1 – 1 ........................................................................................ 15
Answer Key 4.1 – 1 ...................................................................................... 16
Task Sheet 4.1 – 1 ....................................................................................... 17
Performance Criteria Checklist 4.1 – 1 ........................................................ 19
Information Sheet 4.1 – 2: Tools, equipment and testing devices ................... 20
Self-Check 4.1 – 2 ........................................................................................ 25
Answer Key 4.1 – 2 ...................................................................................... 26
Task Sheet 4.1 – 2 ....................................................................................... 27
Performance Criteria Checklist 4.1 – 2 ......................................................... 28
Information Sheet 4.1 – 3: Personal Computer System and Specification ....... 29
Self-Check 4.1 – 3 ........................................................................................ 33
Answer Key 4.1 – 3 ...................................................................................... 34
Task Sheet 4.1 – 3 ....................................................................................... 35
Performance Criteria Checklist 4.1 – 3 ......................................................... 36
Information Sheet 4.1 – 4: Occupational health and safety procedures .......... 37
Self-Check 4.1 – 4 ........................................................................................ 38
Answer Key 4.1 – 4 ...................................................................................... 39
Task Sheet 4.1 – 4 ....................................................................................... 40

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII
Page
Prepared by: CORE INSTITUTE
Maintaining and OF TECHNOLOGY
Repairing Computer
ii of vii
ASNIDA PANGCATAN
Systems and Networks Revision # 01
Performance Criteria Checklist 4.1 – 4 ......................................................... 41
Information Sheet 4.1 – 5: Network maintenance task ................................... 42
Self-Check 4.1 – 5 ........................................................................................ 47
Answer Key 4.1 – 5 ...................................................................................... 48
Task Sheet 4.1 – 5 ....................................................................................... 49
Performance Criteria Checklist 4.1 – 5 ......................................................... 50
References ...................................................................................................... 51

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII
Page
Prepared by: CORE INSTITUTE
Maintaining and OF TECHNOLOGY
Repairing Computer
iii of vii
ASNIDA PANGCATAN
Systems and Networks Revision # 01
HOW TO USE THIS COMPETENCY BASED LEARNING MATERIAL

Welcome!

The unit of competency "Maintain and Repair Computer Systems and


Networks", is one of the competencies of Computer Systems Servicing NC II,
a course which comprises the knowledge, skills and attitude required for a
TVET trainer to possess.

The module, Maintaining and repairing computer systems and networks,


contains training materials and activities related to Plan and prepare for
maintenance and repair, maintain computer systems and networks, diagnose
faults of computer systems and networks, rectify/correct defects in computer
systems and networks, and Inspect and test computer systems for you to
complete.

In this module, you are required to go through a series of learning


activities in order to complete each learning outcome. In each learning outcome
are Information Sheets, Self-checks, Task Sheets and Operation Sheets.
Follow these activities on your own. If you have questions, don‘t hesitate to ask
your facilitator for assistance.

Remember to:

1. Read information sheets and complete the self-checks. Suggested


references are included to supplement the materials provided in
this module.
2. Perform the Task Sheets and Operation Sheets until you are
confident that your outputs conform to the Performance Criteria
Checklist that follows the sheets.
3. Submit outputs of the task sheets and job sheets to your facilitator
for evaluation and recording in the Accomplishment Chart.
Outputs shall serve as your portfolio during the Institutional
Competency Evaluation. When you feel confident that you have
had sufficient practice, ask your trainer to evaluate you. The
results of your assessment will be recorded in your Progress Chart
and Accomplishment Chart.

You must pass the Institutional Competency Evaluation for this


competency before moving to another competency. A Certificate of Achievement
will be awarded to you after passing the evaluation.

You need to complete this module to be called competent.


COMPUTER SYTEMS SERVICING NC II

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII
Page
Prepared by: CORE INSTITUTE
Maintaining and OF TECHNOLOGY
Repairing Computer
iv of vii
ASNIDA PANGCATAN
Systems and Networks Revision # 01
COMPETENCY – BASED LEARNING MATERIALS
LIST OF COMPETENCIES

No. Unit of Competency Module Title Code

1. Install and configure Installing and configuring ELC724331


computer systems computer systems

2. Set-up computer Setting-up computer ELC724332


networks networks

3. Set-up computer servers Setting-up computer ELC724333


servers

4. Maintain and repair Maintaining and ELC724334


computer systems and repairing computer
networks systems and networks

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII
Page
Prepared by: CORE INSTITUTE
Maintaining and OF TECHNOLOGY
Repairing Computer
v of vii
ASNIDA PANGCATAN
Systems and Networks Revision # 01
MODULE CONTENT

UNIT OF COMPETENCY Maintain and Repair Computer Systems and


Networks
MODULE TITLE Maintaining and Repairing Systems and
Networks

MODULE DESCRIPTOR This unit covers the knowledge, skills and


attitudes needed to maintain and repair
computer systems and networks

NOMINAL DURATION 40 hours

LEARNING OUTCOMES:
At the end of this module you MUST be able to:
1. Plan and prepare for maintenance and repair
2. Maintain computer systems and networks
3. Diagnose faults of computer systems and networks
4. Rectify/correct defects in computer systems and networks
5. Inspect and test configured computer systems and networks

ASSESSMENT CRITERIA:
1. Maintenance and/or Diagnosis of faults is planned and prepared in
line with job requirements.
2. Tools, equipment and testing devices needed for the maintenance
are obtained and checked for correct operation and safety.
3. Materials necessary to complete the work are obtained in
accordance with established procedures and checked against job
requirements
4. OHS policies and procedures are followed in line with job
requirements.
5. Computer systems and networks for maintenance are checked
against job/service order or instructions and specifications.
6. Appropriate personal protective equipment is used in line with
standard procedures.
7. Normal function of computer systems and networks are checked in
accordance with manufacturer‘s instructions.

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII
Page
Prepared by: CORE INSTITUTE
Maintaining and OF TECHNOLOGY
Repairing Computer
vi of vii
ASNIDA PANGCATAN
Systems and Networks Revision # 01
8. Scheduled/periodic maintenance is performed in accordance with
manufacturer‘s requirements.
9. Where necessary, needed repairs/replacements are made in
accordance with established procedures.
10. Unplanned events or conditions are responded to in accordance
with established procedures.
11. Faults or problems in the computer systems and networks are
diagnosed according to requirements and in line with the standard
procedures.
12. Contingency measures are managed and implemented in
accordance with established procedures.
13. Defective components or parts are replaced or corrected without
damage to the surrounding environment or services.
14. Adjustments, if necessary are made in accordance with established
procedures.
15. Final inspections are undertaken to ensure that the testing
conducted on the device conforms with the manufacturer‘s
instruction/manual
16. Computer systems and networks are checked/tested to ensure safe
operation.
17. OHS standards and 5S principles are followed according to
enterprise policies.
18. Work site is cleaned and cleared of all debris and left in safe
condition in accordance with company procedures.
19. Excess components and materials are disposed of based on WEEE
directives and 3Rs waste management program.
20. Report is prepared and completed according to company
requirements.

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII
Page
Prepared by: CORE INSTITUTE
Maintaining and OF TECHNOLOGY
Repairing Computer
vii of vii
ASNIDA PANGCATAN
Systems and Networks Revision # 01
LEARNING OUTCOME NO.1 PLAN AND PREPARE FOR MAINTENANCE AND
REPAIR

Contents:

1. Procedures in Planning and Conducting Maintenance


2. Tools and Equipment and their Function
3. Personal Computer System Specification
4. Occupational Health and Safety Procedures
5. Network Maintenance Task

Assessment Criteria

1. Maintenance and/or Diagnosis of faults is planned and prepared in


line with job requirements.
2. Tools, equipment and testing devices needed for the maintenance
are obtained and checked for correct operation and safety
3. Materials necessary to complete the work are obtained in
accordance with established procedures and checked against job
requirements.
4. OHS policies and procedures are followed in line with job
requirements.
5. Computer systems and networks for maintenance are checked
against job/service order or instructions and specifications.

Conditions

The students/trainees must be provided with the following:

1. OH & S policies and procedures


a) Manuals
2. Tools
a) Pliers
b) Philips screw driver
3. Equipment/testing devices
a) Computer

Assessment Method:

a. Observation with oral Questioning


b. Interview
c. Portfolio

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
1 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
Learning Experiences
LEARNING OUTCOME NO. 1

Plan and Prepare For Maintenance and Repair

Learning Activities Special Instructions

Read Information Sheet 4.1-1 on


This learning outcome deals with the
Procedures in Planning and
development of the institutional
Conduction Maintenance
competency evaluation tool which
Answer Self Check 4.1-1, compare trainers us in evaluating their trainees
answer with the answer key 4.1-1 after finishing a competency of the
qualification
Perform Task Sheet 4.1-1 on
Go through the learning activities
Procedures in Planning and
outlined for you on the left column to
Conduction Maintenance
gain the necessary information or
Read Information Sheet 4.1-2 on
knowledge before doing the task to
Tools, Equipment and Testing
practice making the parts of the
devices
evaluation tool
Answer Self Check 4.1-2, compare
answer with the answer key 4.1-2 The output of this LO is a complete
Institutional competency evaluation
Perform Task Sheet 4.1-2 on Tools, package for one competency of your
Equipment and Testing devices qualification
Your output shall serve as one of your
Read Information Sheet 4.1-3 on portfolio for your Institutional
Personal Computer System and competency evaluation for plan training
Specification sessions
Feel free to show your outputs to your
Answer Self Check 4.1-3, compare
trainer for guidance and evaluation of
answer with the answer key 4.1-3
your output
Perform Task Sheet 4.1-3 on
Personal Computer System and
Specification
Read Information Sheet 4.1-4 on
Occupational Health and Safety
Procedures

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
2 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
Answer Self Check 4.1-4, compare
answer with the answer key 4.1-4
Perform Task Sheet 4.1-4 on
Occupational Health and Safety
Procedures
Read Information Sheet 4.1-5 on
Network maintenance task
Answer Self Check 4.1-5, compare
answer with the answer key 4.1-5
Perform Task Sheet 4.1-5 on
Network maintenance task
After performing the activities of LO1
you may proceed to LO2

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
3 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
Information Sheet 4.1-1
PROCEDURES IN PLANNING AND CONDUCTING
MAINTENANCE

Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Identify the different maintenance procedures in taking care of
computers;
2. Diagnose a Faulty Computer and Network System.

Preventive Maintenance

Preventive maintenance can be described as maintenance of equipment or


systems before fault occurs. It can be divided into two subgroups: Planned
Maintenance and Conditioned-Based Maintenance.

Planned Maintenance (PM) is any variety of scheduled maintenance to an


object or item of equipment. Specifically, PM is a scheduled service visit carried
out by a competent and suitable agent, to ensure that an item of equipment is
operating correctly to avoid any unscheduled breakdown and downtime of
equipment.

Condition Based Maintenance (CBM) is a maintenance strategy that uses


the actual condition of the asset to decide what maintenance needs to be done.
CBM dictates that maintenance should only be performed when certain
indicators show decreasing performance or upcoming failure. Checking a
machine for these indicators may include non-invasive measurements, visual
inspection, performance data and scheduled tests. Condition data can be
gathered at certain intervals, or continuously.

The purpose of systematic inspection, detection and correction of existing


future problems is very important to maintain equipment facilities in
satisfactory condition before it may cause major problem.

Maintenance, including tests, measurements, adjustments, and parts


replacement, performed specifically to prevent faults from occurring.
Maintenance is divided into two (2) general types. Preventive maintenance is

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
4 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
given for maintaining equipment and facilities in satisfactory operating
condition to extend the life of the equipment. Corrective maintenance is task
performed to identify, isolate and rectify a fault so that the failed equipment or
system can be restored to an operational condition within the tolerances or
limits.

Common methods of determining what preventive (or other) failure


management policies should be applied are: Original Equipment Manufacturer
(OEM) recommendations, requirements of codes and legislation within a
jurisdiction, what an "expert" thinks ought to be done, or the maintenance that
is already done to similar equipment, and most important measured values and
performance indications

Maintenance Procedures

In preparing maintenance procedure, you also have to consider designing


a systematic plan for both for hardware and software. This saves time, money
and frustration and ensures safe conditions to prevent injury to people and
damage to computer equipment.

Planning Maintenance Procedures for Computer System and Networking:


A. Design a systematic maintenance plan for hardware.
1. Design a monitoring, evaluating and updating plan
2. Place your computer in a well-ventilated area.
3. Schedule the use of computer for its longer life.
4. Move the computer only when it is turned off and unplugged.
5. Treat your computer properly.

B. Design a systematic maintenance plan for your software.


1. Backup your files.
2. Install or secure passwords.
3. Delete temporary files.
4. Update anti-virus and spyware.

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
5 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
Do systematic maintenance plan for your computer hardware.

The goal of systematic maintenance is to reduce downtime by


continuously checking that your machines are working optimally. With
systematic maintenance, you have the opportunity to minimize errors and
breakdowns and thereby ensure a longer service life of your machines.

1. Place your computer in a well-ventilated


area.

 This will allow proper circulation of air


inside the computer unit.

2. Schedule the use of computer for its


longer life.

 This will help lessen the attacks of


viruses and increases the life span of
your computer.

3. Move the computer only when it is


turned off and unplugged.

 To avoid damage to the computer unit


always turn off and unplug it when
transferring the computer to another
location.

4. Treat your computer properly.

 This means taking care of your


computer. PCs and laptops should be
properly turned off.

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
6 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
Do systematic maintenance plan for your computer software.

The goal of systematic maintenance is to reduce downtime by


continuously checking that your machines are working optimally. With
systematic maintenance, you have the opportunity to minimize errors and
breakdowns and thereby ensure a longer service life of your machines.

1. Back-up your files


 Protecting your files means creating
backups, storing your file backups
on your hard drive or any removable
storage device regularly.

2. Install or secure passwords.


 Installing passwords makes your files
more secure.

3. Delete temporary files.


 Deleting the temporary files on your
computer will enhance its speed and
will create more disk space for your
files.

4. Update anti-virus and spy ware.


 Updating anti-virus and spy ware will
protect your computer from viruses
and other types of malwares, such as
ransom ware and spyware.

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
7 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
Diagnoses and Identification of Faulty Computer and Network Systems

The following topics will familiarize you with planning and preparing for
installation; installing equipment and devices; and conducting test on the
installed computer system. Read carefully all the topics and apply the skills you
have gained from the lessons provided in this module.

A. Preventing Computer Systems Failure

Computers, in general, are pretty stable, and you can usually rely on
them to not fail you. However, if you develop some basic habits, you can
postpone serious computer problems, if not avoiding them entirely.

1. Computer issues.
Know that your computer is going to fail.
You need to treat your computer as if it were a doomed
failure. Always assume that failure is imminent.

A fatal error results in data loss, damage to your


computer and/or its ability to function, hardware
failure, or other serious issues.

Signs of imminent failure might include regular poor


performance, frequent errors and/or pop-ups, unknown programs being
installed, frequent power loss (the computer shuts down automatically
frequently), frequent crashes, or certain parts not working.

2. Dust issues. Preventing failure means making


sure your computer is physically clean in its
operations. Make sure that there is not too much
dust inside, especially on the fans. Dust can
reduce performance and cause overheating.

3. RAM issues. Know your computer's


specifications and its limits. RAM runs even the
PC is running idly. It consumes RAM storages
capacity making you difficult to open a program if
RAM storage had been consumed.

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
8 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
4. Malware issues. Make sure that your anti-
virus software is updated to be able to scan
unnecessary files that enter your PC. Do not
install programs that you‘re not familiar with or if
do not fully trust.

5. Hardware issues. When something is not


working properly, either diagnose the problem
yourself and fix it, to prevent further damage or
contact a professional and have them look at it
for you. Take advantage of warranties on parts if
they fail.

6. Warning issues. If the same error message


shows up every time you log in, be sure to
investigate it. Although unlikely, these errors
could be important.

7. Usage issues. Give your computer a break.


Believe it or not, your computer likes rest, too.
Leaving it on all of the time wears out hardware,
and puts unnecessary wear and tear on the
hardware. Giving your computer a break also
saves you money (electrical bills).

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
9 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
8. Warranty issues. Always take advantage of
warranties. Get a warranty to protect your
hardware, so it can be replaced in case of failure.

9. Backup issues. Back-up everything. Run


regular backup of your important files to other
disks, computers, or an online backup service.

10. Error message issues. If your PC fails to


function, diagnose the problem. Write down the
necessary info such as error messages or things
don‘t work properly. If you know how to fix it,
do it, to avoid further damage but if not then
seek for professional help.

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
10 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
Network Problems
When you suddenly cannot connect to the Internet, any of several things
could be wrong. Use this checklist to find and solve common Internet
connection problems.

1. Unplugged Network Cable


Unplugged or loose network cables are one of the most common
reasons why you might suddenly find yourself unable to connect to the
Internet. That's a problem on wireless networks, but on most laptops the
wireless-fidelity (Wi-Fi) radio can be inadvertently shut off instead. On
home networks, it's also possible that someone unplugged the router.

Action: Ensure your wired or wireless network hardware is switched on and


plugged in.

2. Website Temporarily Offline


What may seem to be a network problem connecting to the Internet
is sometimes simply a Web site (or whatever server is on the other end of
the connection) being temporarily offline.

Action: Before assuming your Internet connection is faulty, try visiting


several popular Web sites rather than just one.

3. IP Address Conflicts
If your computer and another on the network both have the same IP
address, the conflict between them will prevent either from working
properly online.

Action: To resolve an IP conflict, follow these instructions to release and


renew your IP address. If your network uses static IP addresses,
manually change your IP to a different number.

Windows 7 to 11

Step 1: Press windows + R to run the dialog box


Step 2: Type CMD. Then press [enter]
Step 3: Type the ipconfig/release in the Command Prompt windows.
Then press [enter]
Step 4: Type ipconfig/renew. Then press [enter]

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
11 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
4. Computer Firewall Malfunctions
Firewall software running on most computers is intended to prevent
unwanted network traffic from disrupting its operation. Unfortunately,
these software firewalls can malfunction and start blocking valid Internet
traffic. When two software firewalls, such as Windows Firewall plus a
third-party product, are installed on the same computer, contention
between the two can also incorrectly block traffic.

Action: If you have recently installed or upgraded software firewalls on your


computer, temporarily disable them to determine whether it may be
the cause of Internet connection problems.

5. Outside Wireless Signal Range


The performance of Wi-Fi network connections depends on distance
between the device and the wireless access point. The farther away a Wi-
Fi device is, the slower the local connection generally runs, until it breaks
altogether. Wireless signal interference in the area can also limit the
effective range of a Wi-Fi connection. Whenever you are unable to reach
the access point, you also cannot connect to the Internet, obviously.

Action: Use one of the options written below to measure the strength of
your wireless signal and try these ideas to expand the range of your
Wi-Fi.

 Place the router at a height in some central location and away from other
cordless devices.
 Make sure that the router is not placed near something metallic (like an
almirah or window grills) as that will weaken the wireless signals.
 Avoid mirrors as they can reflect the wireless signals away from the
desired direction.
 Wireless routers generally ship with omni-directional antennas but you
can replace them with more powerful uni-directional antennas and that
will keep the signal from getting broadcast in all directions.

Omni-directional antennas Uni-directional antennas


(Radiation power equally distributed in (Radiation power concentrated in
all horizontal directions) one specific direction)

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
12 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
6. Wireless Network Configuration
Wi-Fi networks with encryption options like WPA or WEP turned on
require computers to use matching security keys when connecting. If
someone changes the encryption keys or password on the access point,
devices that worked before will suddenly be unable to establish sessions
and Internet connections. Likewise (though less likely), if the access point
settings are changed to require using a specific Wi-Fi channel number,
some computers may be unable to discover it.

Action: Confirm that the Wi-Fi channel number and encryption keys on
your router have not recently changed (check with the network
administrator if necessary). When using a hotspot, follow the
provider's instructors for signing in carefully.

7. Broadband Router or Access Point Malfunctions


Home networks that use broadband routers are easier to manage
than those without one, but technical glitches with the router can also
prevent computers from connecting to the Internet. Router failures are
caused by overheating, excessive traffic, or simply a faulty unit. Typical
symptoms of a flaky router include computers on the network not being
able to obtain IP addresses, or the router console not responding to
requests.

Action: Check the router's lights and console if possible to ensure it is


running and responding properly. Troubleshoot and reset the router
if necessary. Change the old router if necessary.

8. Blocked By Your Service Provider


Internet Service Providers (ISPs) can choose to block access from
your account if you fail to make payment or otherwise violate the
provider's Terms of Service. Especially when using paid hotspots that
charge by the hour or day, sometimes people forget to keep their
subscription updated. Other common reasons an ISP might block your
account include exceeding bandwidth caps, sending spam e-mail, and
downloading illegal or inappropriate content.

Action: Contact your ISP if you suspect your account has been blocked.

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
13 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
9. Computer Glitches
Computers suffer from technical glitches or malfunctions. Although
relatively uncommon nowadays, a computer's network adapter hardware
might suddenly fail due to overheating or age. Failures in the operating
system software that control the adapter, on the other hand, can occur
frequently especially with computers that are heavily used. Viruses and
worms also may disable or block a computer's network interfaces from
functioning properly. If using a laptop or other mobile device, transporting
it from one location to another can corrupt the state of its network.

Action: Check the computer and remove any malware that you will find. On
Windows computers, try resetting the network connection. Reboot
the computer if necessary.

10. Network Downtime


Those using satellite Internet service may notice they cannot
connect to the Internet during periods of very bad weather. Providers in
dense urban areas (including cellular Internet carriers) sometimes are
unable to support peaks in network traffic that causes sporadic outages
for some customers. Finally, those who subscribe to newer or more
complex forms of Internet services (such as fixed wireless broadband) may
experience more downtime than others as providers encounter more
issues with relatively less mature equipment.

Action: If all else fails, contact your Internet provider to verify whether they
are experiencing an outage. Some providers also give advice on
troubleshooting problems connecting to their network.

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
14 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
SELF CHECK 4.1-1
Enumeration: Read the given details and identify the issues being described.

__________________ 1. Preventing failures means making sure our computer is


physically clean in its operations. Make sure that there is not too much
unwanted particles inside, especially on the fans. These unwanted particles
reduce performance and cause overheating.

___________________2. When something is not working properly, either diagnose


the problem yourself and fix it, to prevent further damage or contact a
professional and have them look at it for you. Take advantage of warranties on
parts if they fail.

___________________3. Make sure that your ant-virus software is updated to e


able to scan unnecessary files that enter your PC. Do not install programs that
you‘re not familiar with or if do not fully trust.

___________________4. Know your computer‘s specifications and its limits.


Memory device runs even the PC is running idly. It consumes memory storages
capacity making you difficult to open a program if memory storage had been
consumed.

___________________5. If your PC fails to function, diagnose the problem. Write


down the necessary info such as error messages or things don‘t work properly. If
you know how fix it, do it, to avoid further damage but if not then seek for
professional help.

___________________6. Save everything. Run regular saving on removable drives


of your important files or unto other disks, computers, or an online service.

___________________7. Always take advantage of free replacement or repair from


the store owner. Get a replacement or repair from the store owner to protect
your Hardware, so it can be replaced in case of failure.
___________________8 .Give your computer a break. Believe it or not, your
computer likes rest, too. Leaving it on all of the time wears out hardware, and
puts unnecessary wear and tear on the hardware. Giving your computer a break
also saves you money (electrical bills).

___________________9. If the same error message shows up every time you log in,
be sure to investigate it. Although unlikely, these errors could be important.

__________________10. Know that your computer is going to fail. You need to


treat your computer as if it were a doomed failure. Always assume that failure is
imminent.

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
15 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
ANSWER KEY 4.1-1
1. Dust Issues
2. Hardware issues
3. Malware Issues
4. Ram Issues
5. Error Message Issues
6. Backup issues
7. Warranty issues
8. Usage issues
9. Warning Issues
10. Computer Issues.

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
16 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
TASK SHEET 4.1-1
Title : Procedures in Planning and Conducting
Maintenance
Performance Objective : Be able to remove the malware from the computer
Supplies/Materials : Malware software
Steps/Procedure:
You log onto your computer and it takes forever to boot. When it finally does, a
few unfamiliar applications litter your desktop, and your browser immediately
sends you to an ad for hair loss products.

Sounds like your PC has a problem with malware.

So what should you do?

1. Computer acting suspect? Do a little digging and check for symptoms.

Look for issues characteristic of a malware infection:

● Does your web browser freeze or become unresponsive?


● Do you get redirected to web pages other than the ones you are trying to
visit?
● Are you bombarded with pop-up messages?
● Does your computer run slower than usual?
● Do you see new icons on your desktop that you don‘t recognize?

Unfortunately, even if you see nothing wrong with your computer, there
may be trouble brewing under the surface, sneaking around and screwing
with your files undetected. So it‘s a safe bet to move on to Step 2 even if
you can‘t find a symptom.

2. Use protection: Enter safe mode.

● Remove CDs and DVDs, and unplug USB drives from your computer.
Then shut down.
● When you restart, press the F8 key repeatedly. This should bring up the
Advanced Boot Options menu.
● Select Safe Mode with Networking and press Enter.

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
17 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
3. Back up your files.

● This includes documents, photos, and videos. Especially cat videos.


● Do not back up program files, as those are where infections like to hide.
You can always download these programs again if files are lost.

4. Download an on-demand malware scanner such as Malwarebytes.

 If you had no trouble connecting to the Internet before you suspected the
infection, you can leave Safe Mode after having backed up your files and
return to using your ―normal‖ system.
● Follow set-up instructions and install the program.

5. Run the scan.

● Directly go to the scan. If you do have an infection, you‘re on-demand


scanner should let you know that your computer is at risk. A list of scan
results tells you what malware was found and removed.

6. Restart your computer.

● Properly reboot/restart your computer.

7. Update your operating system, browser, and applications.

● If there‘s an update available on any of your software, go ahead and do it.


Some of the most dangerous forms of malware are delivered by exploits
that take advantage of out-of-date software.

8. Reset all of your passwords.

 Before being deleted, malware could have captured your passwords and
forwarded them to criminals. Change each and every password you can
think of, and make sure they‘re strong.

Assessment Method: Direct Observation

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
18 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
Performance Criteria Checklist 4.1.1

CRITERIA YES NO

1. Computer acting suspect?

2. Enter safe mode.

3. Back files.

4. Download a malware scanner.

5. Run the scanner

6. Restart the computer

7. Update operating system, browser and


application.

8. Reset all the password

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
19 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
Information Sheet 4.1-2

TOOLS, EQUIPMENT AND TESTING DEVICES

Learning Objectives:

After reading this INFORMATION SHEET, YOU MUST be able to:


1. Identify the different tools, equipment and their uses;
2. Clean a computer system;
3. Appreciate the usage of each tool in computer system.

Hand Tools

A hand tool is a device for performing work on a material or a physical


system using only hands. Hand tools can be used manually or electrically
powered, using electrical current. Examples of Hand Tools are as follows:

Table 1. Hand Tools

Hand Tools Description

Flat Head Screwdriver

 Used to loosen or tighten slotted screws.

Philips Head Screwdriver

 Used to loosen or tighten cross-head


screws.

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
20 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
Hand Tools Description

Torx Screwdriver

 Used to loosen or tighten screws that have


a star-like depression on the top, a feature
that is mainly found on laptop.

Hex Driver

 Sometimes called a nut driver, is used to


tighten nuts in the same way that a
screwdriver tightens screws.

Needle-Nose Pliers

 Used to hold small parts.

Wire Cutter

 Used to strip and cut wires.

Tweezers

 Used to manipulate small parts.

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
21 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
Hand Tools Description

Part Retriever

 Used to retrieve parts from location that is


too small for your hand to fit.

Flashlight

 Used to light up areas that you cannot see


well.

Crimper

 Used to attach connectors to wires.

Wire stripper
 Used to remove the insulation from wire so
that it can be twisted to other wires or
crimped to connectors to make a cable.

Punch-down tool
 Used to terminate wire into termination
blocks. Some cable connectors must be
connected to cables using a punch down
tool.

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
22 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
Cleaning Tools

Having the appropriate cleaning tools is essential when maintaining or


repairing computers. Using these tools ensures that computer components are
not damaged during cleaning. Examples:

Table 2. Cleaning Tools

Cleaning Tools Description

Lint-free Cloth

 Used to clean different computer


components without scratching or leaving
debris.

Compressed Air
 Used to blow away dust and debris from
different computer parts without touching
the components.

Cable Ties

 Used to bundle cables neatly inside and


outside of a computer.

Parts Organizer

 Used to hold screw, jumpers, fasteners and


other small parts and prevents them from
getting mixed together.

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
23 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
Diagnostic Tools

Computers are easier to use and more dependable with each new
generation of hardware and operating system update, but that does not mean
they are problem-free. Here are the most popular tools for diagnosing your
computer problems:

Table 3. Diagnostic tools

Diagnostic Tools Description

Multimeter
 Used to test the integrity of circuits and the
quality of electricity in computer
components.

Loopback Adapter
 Used to test the functionality of computer
ports.

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
24 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
Self-Check 4.1-2
A. Multiple Choices: Choose the best answer. Write the letter of your choice on
your answer sheet.

1. Where does compressed air belong?


a. Cleaning tool
b. Hand tool
c. Diagnostic tool
2. Used to bundle cables neatly inside and outside of a computer.
a. Tweezers
b. Cable ties
c. Compressed air
3. ________ is a device that can take many types of measurements
a. needle nose pliers
b. digital multimeter
c. Philips head screwdriver
4. Is used to remove the insulation from wire so that it can be twisted
to other wires or crimped to connectors to make a cable.
a. crimper
b. Punch down tool
c. wire stripper
5. Used to tighten or loosen cross-headed screws.
a. Philips head screwdriver
b. Flat head screwdriver
c. Soft cloth
B. Direction: Identify the appropriate term describe in each sentence.

_________________1. It is a hand tools that used to retrieve parts from location


that is too small for your hand to fit.
_________________2. Used to test the functionality of computer ports.
_________________3. It is a tool that used to loosen or tighten screws that have a
star-like depression on the top, a feature that is mainly found on laptop.
_________________4. Used to test the integrity of circuits and the quality of
electricity in computer components.
_________________5. Used to clean different computer components without
scratching or leaving debris.

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
25 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
Answer Key 4.1-2
A.
1. A.
2. B.
3. B.
4. C.
5. A.

B.

1. Part Retriever
2. Loopback Adapter
3. Torx Screwdriver
4. Multimeter
5. Lint-free Cloth

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
26 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
TASK SHEET 4.1-2
Title : Tools, equipment and testing devices
Performance Objective: Be able to clean the computer to improve the computer
performance
Supplies/Materials : Dry clean cloth
Brush
Philips screw driver
Steps/Procedure:
1. Prepare the materials needed like Philips screw driver, soft cloth,
soft paint brush and soft eraser.
2. Turn off the computer if the computer is turned on and unplug
3. Open the system unit by removing the cover at the side.
4. Remove all the cables inside the system unit, like the floppy cable,
SATA cable, IDE cable, the connector to the front panel, and the
cables from the power supply.
5. Remove the hard drive, CD or DVD rom, expansion cards and the
power supply
6. Remove the motherboard from the case by removing the screws
7. Remove the memory, CPU fan and the processor
8. Clean the inside of the computer case using a brush, compressed air
or a blower and wipe it w/ a clean dry cloth
9. Brush the motherboard properly
10. Place the Processor in the CPU socket
11. Clean the CPU fan using a brush and place it above the processor
12. Brush the memory and clean the lower edge of the memory using a
eraser and place it in the memory slot in the motherboard.
13. Place the motherboard inside the computer case and lock it inside
the case using a screws
14. Clean the cords/cable of the power supply using the cloth and
brush the inside of the power supply
15. Place the power supply inside the case tightly by screwing it
16. Place the expansion slots to the motherboard,
17. Clean the hard drive and the cd/dvd rom and place the hard drive
and the cd/dvd rom inside the case
18. Connect the power cord of the power supply to the motherboard,
hard drive and the cd/dvd rom
19. Connect the front panel connector
20. Close the side case and connect the power cable
21. Connect it to the monitor.

Assessment Method: Direct Observation

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
27 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
Performance Criteria Checklist 4.1.2

CRITERIA YES NO
1. Prepare the materials needed like Philips screw driver,
soft cloth, soft paint brush and soft eraser.
2. Turn off the computer if the computer is turned on and
unplug
3. Open the system unit by removing the cover at the side.
4. Remove all the cables inside the system unit, like the
floppy cable, SATA cable, IDE cable, the connector to the
front panel, and the cables from the power supply.
5. Remove the hard drive, CD or DVD ROM, expansion
cards and the power supply
6. Remove the motherboard from the case by removing the
screws
7. Remove the memory, CPU fan and the processor
8. Clean the inside of the computer case using a brush,
compressed air or a blower and wipe it w/ a clean dry
cloth
9. Brush the motherboard properly
10. Place the Processor in the CPU socket
11. Clean the CPU fan using a brush and place it above the
processor
12. Brush the memory and clean the lower edge of the
memory using a eraser and place it in the memory slot in
the motherboard.
13. Place the motherboard inside the computer case and
lock it inside the case using a screws
14. Clean the cords/cable of the power supply using the
cloth and brush the inside of the power supply
15. Place the power supply inside the case tightly by
screwing it
16. Place the expansion slots to the motherboard
17. Clean the hard drive and the CD/DVD ROM and place
the hard drive and the CD/DVD ROM inside the case
18. Connect the power cord of the power supply to the
motherboard, hard drive and the CD/DVD ROM
19. Clean the IDE cable and SATA cable and connect it to
the hard drive and CD/DVD ROM
20. Connect the front panel connector
21. Close the side case and connect the power cable

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
28 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
Information Sheet 4.1-3
Personal Computer System and Specification

Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Identify the different computer specification of each device.

What is Specification?
The specification or ‗spec‘ is a list of the key components that make up the
computer. It is provided by retailers to help buyers decide which PC, and which
combination of features, they need. When buying a PC you start by deciding
what you want your PC to do. This tells the specification you actually need.
When reviewing a computer specification, the most important component
to take are the processor, the size of RAM and the size of the hard drive as these
are central to the overall capability of the system. If it is planned to use
specialized programs for students with special needs, it is advisable to purchase
a suitable specification computer to meet the system requirements for these
programs.

Understanding a Specification
Sample specification for a certain desktop computers:

PC Specification

Processor Information
Intel or AMD
The processor is the ―brain‖ of the computer and
Processor Model No
controls most of the work done.
Memory Information
DRAM (Dynamic Random Access Memory) is a
8 GB DRAM
working memory and a type of RAM that works
well with computing-intensive application.
Storage Information
500 GB Hard Drive /
Is a central storage area for the programs being
Solid-State Drive
run and the documents or assets created
17‘‘ Flat Screen Color
Other Information
Monitor
Includes the information about the sound and
Integrated Graphics
graphics capability of the computer, as well as
Card
details of the monitor, operating system and
Microsoft Windows software that come with the computer
10

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
29 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
Processors
Two companies - Intel Inc. and AMD Inc. – are the manufacturers of most
of today‘s PC processors and both offer a range that balances price and
performance. Processors are generally defined by their speed, in megahertz
(MHz) or in gigahertz (GHz), and this relates to the number of operations they
can perform per second. The higher the value, the faster the PC will perform and
the more expensive it is. More recent and more powerful processors use 64 Bit
architecture, rather than the previous 32 Bit models.

Memory (RAM)
Entry- level processor Mid-range processor High-end processor
IDEAL FOR

 Office applications  Education software  Processor intensive


 Internet browsing  Office applications multimedia creation
 Basic graphics  General multimedia application, eg. 3D
programs applications graphics and video
 Home computing  Internet browsing editing
 Office applications
 Internet browsing
PROCESSOR

 Intel Core i3  Intel Core i5 and i7  Intel Core i9


 AMD Ryzen 3  AMD Ryzen 5  AMD Ryzen 9 7950x
TYPES

The main working memory in a computer is called random access memory


or RAM. The processor uses this memory to run programs. RAM is measured in
megabytes (MB). Most modern computers use DDR4 SDRAM. A minimum of
8192 MB (8GB) of RAM is recommended for casual usage and internet browsing.
16384 MB (16GB) is for spreadsheets and other office programs, and 32768 MB
(32GB) for gamers and multimedia creators.

Storage
The Hard Drive The hard drive is the computer‘s primary storage area. It
stores the applications and programs that run on the PC, as well as any work
created by users. From a school‘s perspective, the capacity of the hard drive,
measured in gigabytes (GB), is a key criterion and should be given due
consideration when reviewing PC specifications.

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
30 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
Some of the most common storage drive capacities include the following:

 16 GB, 32 GB and 64 GB. This range is among the lowest for HDD
storage space and is typically found in older and smaller devices.
 120 GB and 256 GB. This range is generally considered an entry point for
HDD devices such as laptops or computers.
 500 GB, 1 TB and 2 TB. Around 500 GB and above of HDD storage is
typically considered decent for an average user. Users can most likely
store all their music, photos, videos and other files with this much space.
Individuals with games that take up a lot of space should find 1 TB to 2
TB of HDD space suitable.
 More than 2 TB. Anything over 2 TB of HDD space is suitable for users
who work with high-resolution files, who need to store or house a large
amount of data, or who want to use that space for backup and
redundancy.

Other Specifications

Monitors
 The older Cathode Ray Tube (CRT) has been largely replaced by Liquid
Crystal Display (LCD) and Light Emitting Diode (LED) flat-screens. A 15‖
LCD/LED has the same viewing area as the older 17‖ CRT.
 Average entry-level PCs usually come with a 17‖ flat-screen and this is
adequate for most general purpose applications.
 Larger 19‖ flat-screens are available and may be appropriate if video
editing and advanced graphics work is being carried out.
 Teachers of students with special needs may want to consider using larger
monitors with their students.

Optical Drives
CD R/W drives are standard on PCs and allow the information on a
compact disc (either data or audio) to be read and written to by the PC. It is
defined by its speed (i.e., 48x or 48 speed).
DVD drives can read both CDs and DVDs. Standard on entry level
computers are 48x DVD-ROM/CD_RW drives and allows you to copy blank CDs.
High performance computer use 52x DVD-RWs. Educational software is being
developed in both DVD and CD formats, but a DVD can hold over 25 times more
data than a CD.

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
31 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
Graphics and Sound Cards
These cards are installed inside a PC and are responsible for determining
the quality of the audio and visuals (graphics and video) output by the
computer. They hold their own memory (in MB), which is why they add to a
computer‘s capability. An integrated graphics card with 256MB of memory is
recommended for general purpose PCs. Computers running high-end
applications generally require a separate 256MB graphics card. A sound card
generally comes as standard in most PCs purchased today. If students intend to
work extensively with digital music, the school should consider getting a high-
end sound card as this will create greater depth, complexity and realism of
sound.

Speakers and Headphones


Most computers come with either built-in or external speakers. Schools
may also consider buying headphones to control sound levels within a
classroom or computer room. Cheap ‗headphone splitters‘ can also be
purchased — these enable two sets of headphones to be used per computer.

Network Interface Card (NIC)


It is recommended that all PCs be purchased with a suitable network
interface card (NIC). A network card allows a computer to be connected to a
network. A 10/100/1000 Mbps (Megabits per second) card is the standard
network card today. Few school networks currently operate at speeds higher
than 100Mbps.

Operating Systems (OS)


PCs are generally purchased with an operating system pre-installed. It is
worth checking that your existing software will still work with the operating
system of any new systems being purchased. It may be possible to choose a
particular operating system and, if so, this may help standardize new machines
with existing school PCs. At present, Microsoft‘s newer OS is Windows 11.
Microsoft‘s Windows is the most widely used computer operating system
in the world, accounting for 70.68 percent share of the desktop, tablet, and
console OS market in August 2022. Apple‘s macOS and iOS rank as the next
most widely used operating systems, with the latter was being the standard
installation on all iPad devices. Linux OS versions serve as the primary option
for users who prefer open-source software and intend to avoid the influence of
major OS developers.

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
32 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
Self-Check 4.1-3
Multiple Choice: Choose the best answer. Write the letter of your choice on
your answer sheet.

1. What is the computer primary storage device?


a. Hard Drive b. RAM c. Optical Drive
2. What are two Manufacturer of the Processor?
a. BMI and Intel b. Intle and BMI c. Intel and AMD
3. DVD drives stand for?
a. Digital Versatile Disk
b. Disk Video Digital
c. Data Video Digital
4. DVD drives can read both CD and _____?
a. CDR b. DVD c. Optical Disk
5. These cards are installed inside a PC and are responsible for determining the
quality of the audio and visuals output by the computer?
a. Speaker
b. NIC
c. Graphics and Sound Cards
6. It essentially displays a signal sent by the computer in a visual format
a. Speaker b. Monitor c. Microphone
7. It is the main memory of the computer
a. Hard drive b. DVD c. RAM
8. What was the first monitor called?
a. Liquid Crystal Display
b. Cathode-ray tube
c. Light Emitting Diode
9. These cards are installed inside a PC and are responsible for determining the
quality of the audio and visuals output by the computer.
a. Speaker
b. NIC
c. Graphics and Sound Cards
10. A card allows a computer to be connected to a network.
a. Memory Card
b. Network Interface Card (NIC)
c. Graphics and Sound Cards

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
33 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
Answer Key 4.1-3
1. a
2. c
3. a
4. b
5. c
6. b
7. c
8. b
9. c
10. b

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
34 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
TASK SHEET 4.1-3
Title : Personal Computer System and Specification
Performance Objective: Be able to know the specification and comparison
of personal computer

Supplies/Materials : Pen, paper and computer system

Directions: Make a market study on components, its brand, functionality


and cost. You can ask computer vendors of the price lists and inquire of its
specifications. Choose two brands then make comparisons. Be ready on oral
presentation.

COMPONENTS BRAND NO1. COST STRENGHT WEAKNESS


Processor
Motherboard
Memory
Graphic Card
Sound Card

COMPONENTS BRAND NO2. COST STRENGHT WEAKNESS


Processor
Motherboard
Memory
Graphic Card
Sound Card

Assessment Method: Direct Observation

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
35 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
Performance Criteria Checklist 4.1.3

Detail Points

Brand model is precisely given

Cost is based on the market selling price

Strength/weakness are accurate

Presentation skills (Clarity of the voice)

Score Reference:
0= Some facts are clearly inconsistent with source material
1= Some facts are questionable/unrealistic
2= All facts seem accurate

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
36 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
Information Sheet 4.1-4
OCCUPATIONAL HEALTH AND SAFETY PROCEDURES

Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Enumerate OHS policies and procedures;
2. Perform the OHS procedure.

OHS policies and procedures:

1. Always ground or discharge yourself before touching any part of the


computer.
2. Do not work alone so that there is someone who can take care of you in
case of accident or emergency.
3. Be careful with the tools that may cause short circuit.
4. Always pull the cable connector on the handle and not hold on the cable
itself.
5. Use only rubber shoes when standing on the ground or in a concrete floor.
6. Make sure that the pins are properly aligned when connecting a cable
connector.
7. Always power off and unplug the computer before working on it.
8. Take away any liquid such as mineral water or soft drinks near your
working area or near computers to avoid getting electrocuted or
accidentally damaging computer parts.
9. Contingency measures during workplace accidents, fire, and other
emergencies are recognized.
10. Always wear personal protective equipment (PPE) in accordance with
the organization‘s OHS procedures and practices.
11. Hazard/risks in the workplace and their corresponding indicators are
identified to minimize or eliminate risk to co‐workers, workplace, and
environment.
12. Take necessary precautions to protect the component of the computer
from damaged caused by Electrostatic Discharge (ESD).
13. Hold the components by edges and do not touch the Integrated Circuit
(IC) parts.
14. Read and follow instructions on the manual carefully.
15. Do not use excessive force if things do not quite slip into place.

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
37 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
SELF CHECK 4.1-4
Multiple Choice: Choose the best answer. Write the letter of your choice on
your answer sheet.

1. Measures during workplace accidents, fire and other emergencies are


recognized.
a. Contingency b. Excessive force c. Discharge
2. Is not used if things don‘t quite slip into place.
a. Contingency b. Excessive force c. Discharge
3. Always done before touching a computer
a. Contingency b. Excessive force c. Discharge
4. Are correctly used in accordance with organization OHS procedures and
practices
a. Personal protective equipment
b. Protective personal equipment
c. Procedures and practices of equipment

5. It should be worn when standing on the ground or in a concrete floor.


a. Sandals b. Slippers c. Rubber shoes

6. Refers to the legislation, policies, procedures and activities that aim to,
protect the health, safety and welfare of all people at the workplace.
a. PPE b. OHS c. DVD

7. Do not work alone so that there‘s someone who can take care of you in
case of emergency.
a. True b. False c. Maybe

8. Always wear PPE in accordance with the organization‘s OHS procedures


and practices.
a. True b. False c. Maybe

9. Always power off the computer and unplug the computer before working
on it.
a. True b. False c. Maybe

10. Clean the area before and after using it to maintain sanitation and
prevent accidents.
a. True b. False c. Maybe

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
38 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
ANSWER KEY 4.1-4
1. a
2. b
3. c
4. a
5. c
6. b
7. a
8. a
9. a
10. a

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
39 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
TASK SHEET 4.1-4
Title : Occupational Health and Safety Procedures
Performance Objective : To ensure safety and prevent static electricity of
the body to the computer
Tools/Materials : Anti static wrist
Anti static mat
Anti static bag
Protective goggle

Equipment : Computer

Steps/Procedure:

1. Always ground yourself before touching any part of the computer


by touching a no power metallic object
2. Keep away any liquid fluids that might be spilled on the
computer to avoid grounding
3. Prepare the things needed like anti-static mat, and anti-static
wrist strap
4. Be careful with tools that may cause short circuit
5. Replace only fuses with those proper ratings
6. Wear safety glasses for protection against sparks and metal
fragmented
7. Use only grounded plugs and receptacles
8. Working area should have ventilations, trash can, fire exit and
capable of being disinfect.
9. Keep one hand in your pocket when working live circuit.
10. Wear rubber sole shoes when standing on the ground or in a
Concrete floor
11. Always power off and unplug the computer before working on it.
12. Do not use excessive force if things don‘t quite slip into place.
13. Take necessary precautions to protect the component of the
computer from damaged cause by Electrostatic discharge.

Assessment Method: Lecture and Practical Observation

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
40 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
Performance Criteria Checklist 4.1.4

CRITERIA YES NO

1. Always ground yourself before touching any part of 4.


the computer by touching a no power metallic object
2. Keep away any liquid fluids that might be spilled on 5.
the computer to avoid grounding
3. Prepare the things needed like anti static mat, and 6.
anti static wrist strap
4. Be careful with tools that may cause short circuit 7.
8.
5. Replace only fuses with those proper ratings

6. Wear safety glasses for protection against sparks 9.


and metal fragmented
7. Use only grounded plugs and receptacles 10.

8. Working area should have ventilations, trash can, 11.


fire exit and capable of being disinfect.
9. Keep one hand in your pocket when working live 12.
circuit.
10. Wear rubber sole shoes when standing on the 13.
ground or in a concrete floor
11. Always power off and unplug the computer before 14.
working on it
12. Do not use excessive force if things don‘t quite slip 15.
into place.
13. Take necessary precautions to protect the 16.
component of the computer from damaged cause by
Electrostatic discharge.

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
41 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
Information Sheet 4.1-5
NETWORK MAINTENANCE TASK

Learning Objectives:

After reading this information sheet, you must be able to:


1. Computer systems and networks for maintenance are checked against
job/service order or instructions and specifications

Network Maintenance Tasks

Network maintenance tasks are those tasks which network administrators


perform on a day-to-day basis, allowing for the up keep of the network. Some of
the more common network maintenance tasks include, but are not limited to,
the following general activities:

1. Installing, replacing or upgrading both hardware and software


2. Monitoring, tuning and optimizing the network
3. Documenting the network and maintaining network documentation
4. Securing the network from both internal and external threats
5. Planning for network upgrades, expansions, or enhancements
6. Scheduling backups and restoring services or the network from
backups
7. Ensuring compliance with legal regulations and corporate policies
8. Troubleshooting problem reports
9. Maintaining and updating device configurations

Installing, replacing or upgrading both hardware and software

Hardware and software installation, replacement and upgrades are very


common network maintenance tasks. In a Cisco internetwork, this may include
replacing older or failed hardware, such as switch line cards and supervisor
modules in Catalyst 4500 and 6500 series switches, for example, as well as
upgrading the Cisco IOS images to current revision or patch levels for routers
and switches alike.

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
42 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
Monitoring, tuning and optimizing the network

One of the core facilitators of an effective network maintenance solution or


strategy is proactive monitoring. Proactive monitoring allows potential problems
to be detected and remedied before they cause an outage or affect operation.
Event logging and network monitoring can be used to proactively react to
network or system alerts and be used to do the following:

1. Verify the performance of the network and all internetwork devices in


the network
2. Baseline the performance of the network itself
3. Understand the amount of direction and traffic flows in the network
4. Identify and troubleshoot potential network issues
Documenting the network and maintaining network documentation

While most network engineers consider documentation a rather mundane


and even lowly task, it is important to understand that documentation is a
critical component of network maintenance as well as troubleshooting and
support. It is important to understand that different organizations have different
standards for acceptable levels of documentation.

There are several guidelines or recommendations that you should follow when
documenting the network:

1. Determine the scope of responsibility


2. Understanding the objective
3. Maintain documentation consistency
4. Make sure that the documentation is easily accessible
5. Maintain the documentation
The first guideline is ensuring that you understand your scope of
responsibility. That is, it is important to understand what it is that you are
responsible for. For example, you may be working in an organization that has a
voice, security, and storage and network team all under the Information
Technology (IT) department umbrella. Rather than attempting to create
documentation for all the teams, you should make sure you should only
document those networks and devices that are within your administrative
responsibility.

It is important to understand what the documentation will be used for. A


common mistake that is made by network engineers is either including too little

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
43 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
or too much information within the documentation. Take time to fully
understand what the document you are creating will be used for and take into
consideration the audience the document is targeted to and what information
would be useful or excessive for that particular group. Over-documentation
makes documented information hard to understand. On the other hand, under-
documentation makes network support and troubleshooting difficult to perform.

Consistency when creating network documentation is a key component that


should be adhered to as much as possible. In most organizations, design and
documentation templates are available for reference when creating new
documentation. Maintaining consistency increases the usability of those
documents and makes them easier to understand for everyone else.

No matter how great the documentation that is created is, it helps no one if
the documentation cannot be accessed by those that may need it to support
troubleshooting or support functions.

Where possible, documentation should be stored in a location that is readily


and easily accessible to all those that may use it, such as on a secure network
location or share. In some cases, depending on the organization, it may be
necessary for documentation to be stored in a secured, offsite location for
disaster recovery and business continuity purposes.

And finally, once the documentation has been created, it is important to


ensure that it is always maintained and up-to-date. Network diagrams from
years ago may contain misleading and incorrect information that may hamper
troubleshooting information. Network documentation should be considered
living documentation that changes at the same rate as the network. Following
the completion of each network project, existing documentation should be
updated to reflect the changes that were made to the network.

Although there are no standards that determine what information should


and should not be included in network documentation, most organizations and
businesses have their own standards for what should be included in the
network documentation. It is important to adhere to these standards and
guidelines when creating documentation.

From a best practices perspective, network documentation should include the


following information at a minimum:

1. Information about the interconnects between devices for LAN and WAN
connections
2. IP addressing and VLAN information
3. A physical topology diagram of the network

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
44 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
4. A logical topology diagram of the network
5. An inventory of all internetwork devices, components and modules
6. A revision control section detailing changes to the topology
7. Configuration information
8. Any original or additional design documentation and notes
9. Data or traffic flow patterns
Securing the network from both internal and external threats

Network security is an integral component of network operation and


maintenance. It is also very important that consideration be given to both
internal and external threats. While most organizations have a dedicated
security team, monitoring and a structured maintenance approach can also be
used to discover vulnerabilities or potential security threats which can then
allow for the appropriate action to be taken before an incident occurs.

Planning for network upgrades, expansions, or enhancements

Using network monitoring, you can identify potential issues before they arise
as well as plan for possible network upgrades or expansions, i.e. capacity
planning, based on the identified potential issues. Effective planning can be
used to define the maintenance tasks required on the network and then
prioritize those tasks and the order in which they will be implemented.

Scheduling backups and restoring services or the network from backups

Backups are a routine maintenance task that is usually given a very low
priority. However, it is important to understand the important of backups –
especially when attempting to recover from a serious or critical failure of the
network. Backups should therefore be considered a core common network
maintenance task, and should be allocated a high priority. It is important to
ensure that backups of core network components and devices are scheduled,
monitored and verified at all times. Having up-to-date backups of core devices
can assist in the faster recovery of the network or individual network
components following hardware or software failures, or even data (configuration)
loss.

Ensuring compliance with legal regulations and corporate policies

A structured network maintenance methodology also ensures that the


network is compliant with both legal obligations as well as corporate policies.
Regulatory policies, which are mandatory enforcements of compliance with
industry regulations and laws, will differ for businesses. Regardless of the

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
45 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
industry and the requirements, it is important to ensure the business is
following the industry standards as regulated by the law. Unlike legal
regulations, corporate policies will vary on a business-by-business basis;
however, it is still important to ensure that the network adheres to these policies
and can provide the required functions.

Troubleshooting problem reports

Troubleshooting problem reports is core network maintenance function.


While troubleshooting methodologies are described in detail later in this guide,
troubleshooting is simplified by a structure network maintenance approach,
which includes documentation, backups, and some form of proactive monitoring
system.

Maintaining and updating device configurations

Configuration changes are common because of the day-to-day moves,


additions, or changes (MACs) within organizations. Device configurations may
also change due to scheduled maintenance tasks and planned changes to the
network. For this reason, maintain and updating device configurations is
considered a core network management function. Each time configurations on
devices change, they should not only be documented, but should be saved both
on the device and to an alternate backup location, e.g. an FTP or TFTP server (if
one is available).

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
46 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
SELF CHECK 4.1-5

Written Test: Identify the answer of each question.


1. Allows potential problems to be detected and remedied before they cause
an outage or affect operation.

2. An integral component of network operation and maintenance. It is also


very important that consideration be given to both internal and external
threats.

3. A routine maintenance task that is usually given a very low priority.


However, it is important to understand the important of backups –
especially when attempting to recover from a serious or critical failure of
the network.

4. Tasks which network administrators perform on a day-to-day basis,


allowing for the upkeep of the network.

5. Can identify potential issues before they arise as well as plan for possible
network upgrades or expansions, i.e. capacity planning, based on the
identified potential issues.

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
47 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
Answer Key 4.1-5

1. PROACTIVE MONITORING
2. NETWORK SECURITY
3. BACKUPS
4. NETWORK MAINTENANCE TASKS
5. NETWORK MONITORING

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
48 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
TASK SHEET 4.1-5
Title : Network Maintenance Task

Performance Objective : Be able to back- up the files of the computer system


Supplies/Materials : Computer software.
Steps/Procedure:
1. Find an appropriate storage device. You will need a device which is capable of
storing all of the data you need to back up. This should be at least twice the size
of the hard drive you are trying to back up. An external hard drive is the best
option, and these are easy to find.
2. You have to find the Windows 7 back-up program. Press the ‗Windows‘ button
on the left-hand side of the taskbar and type in ‗backup‘ in the search box that
appears.
Alternatively, press the ‗Windows‘ button and click Control Panel in the right-
hand column then click Back up your computer on the ‗System and Security‘
menu.
3. No matter which route you took to get there, you should now have arrived on
a page headed ‗Back up or restore your files‘. Click Set up backup.
4. The first page is ‗Select where you want to save your backup‘. This is where
you‘ll tell the computer to send copies of all your files and
programs/applications.
You‘re given a number of choices, depending on which back-up method you‘ve
set up. Here the choices are: to send copies to a DVD in the DVD drive; or, as
Microsoft recommends, to send them to an external hard drive.
Click on the option that suits you and then click Next.
5. You‘ll now see the ‗What do you want to back up?‘ page. Here you can choose
what Windows recommends – that is, a combination of a system copy and back-
ups of all your data files – or you can opt for ‗Let me choose‘ and pick only those
items you want Windows to copy.
Make your choice and then click Next.
6. You‘ve now reached the ‗How often do you want to back up?‘ page, where you
can set up a schedule for regular back-ups. This is highly recommended – it‘s
very easy to forget to do a back-up!
Make your choices and then click OK.

Assessment Method: Direct Observation

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
49 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
Performance Criteria Checklist 4.1.5

CRITERIA YES NO
17.
1. Find appropriate device for back up.
18.
2. You have to find the Windows 7 back-up program.
Press the ‗Windows‘ button on the left-hand side of the
taskbar and type in ‗backup‘ in the search box that
appears or press the Control Panel.

3. Click Set the Back up 19.


20.
4. Select where you want to save the back-up files.
21.
5. Choose what do you want to back – up files
22.
6. Choose how often you want to back-up your files.

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
50 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
References:

 https://www.slideshare.net/AlvinGabejan/1-procedures-in-planning-
and-conducting-maintenance
 http://www.ciscopress.com/articles/article.asp?p=2086239&seqNum
=7
 http://www.ncte.ie/documents/advicesheets/02PCspecificationsNov
08.pdf
 http://www.the12list.com/2014/06/12-ohs-procedures-for-
computer-hardware.html
 https://www.howtonetwork.org/tshoot/module-1/network-
maintenance-tasks/
 https://www.scribd.com/document/346444834/CHS-Module
 http://www.adrc.com/sm/maintaining_system.html
 http://www.ciscopress.com/articles/article.asp?p=2273070
 https://leapfrogservices.com/16-common-computer-problems-how-
to-tell-if-theyre-hardware-or-software/
 http://techblog.cosmobc.com/2012/05/06/top-10-common-
computer-problems/
 https://www.slideshare.net/ynlcadapan/ict-9-module-4-lesson-23-
techniques-for-diagnosing-computer-systems
 https://www.howtogeek.com/howto/windows-vista/using-windows-
vista-system-restore/
 https://www.digitalunite.com/guides/using-a-computer/how-back-
up-your-computer
 https://www.google.com
 https://www.umass.edu/it/support/hardware/recommended-
minimum-computer-configurations-windows
 https://www.techtarget.com/searchstorage/definition/hard-disk-
drive
 https://www.statista.com/statistics/268237/global-market-share-
held-by-operating-systems-since-
2009/#:~:text=Microsoft's%20Windows%20is%20the%20most,OS%20
market%20in%20August%202022.

Date Prepared: Document No. CIT-CSS-2023


COMPUTER FEBRUARY 2023
SYSTEMS Issued by:
SERVICING NCII CORE INSTITUTE Page
Prepared by:
Maintaining and OF TECHNOLOGY
Repairing Computer
51 of 51
ASNIDA PANGCATAN
Systems and Networks Revision # 01
CORE INSTITUTE OF TECHNOLOGY, INC.
3rd Flr. JCMM Bldg., San Pedro St., Davao City
Tel. no. (082)221-8172 e-mail: [email protected]

You might also like