basic pc maintenance notes
basic pc maintenance notes
Pc support and maintenance is the process of offering technical support and repairing the computer. Technical
support involves both the hardware and the software. We repair the hardware parts and install/ support the
software that enables the hardware to function properly.
There is a lot of equipment in computer labs that could short circuit itself or cause electric shocks, so one
needs to be very careful.
1. Screwdrivers: used to tighten or loosen screws. Different types of screwdrivers are flat-head for
slotted screws, Phillips-head for cross-headed screws, and star for star-headed screws.
2. Nut drivers: they are also called hex drivers. Nut drivers are used to tighten or loosen nuts and bolts.
3. Tweezers: used to remove tiny components or removing small wires on the personal computer (PC).
4. Wire cutter and stripper: it is used to cut the wire and strip the insulation material to uncover the
wires. They can be used to strip cables when terminating network cables.
1
5. Multimeter: it is used to measure multiple electrical values such as voltage, ohms, and current. The
best is a digital multimeter which has an LCD display.
6. Memory module tester: it is special equipment that tests main memory (RAM) functionality.
7. Pliers: Used for cutting and gripping or holding parts. Types include needle-nose, slip-joint, and
cutting piers among others.
8. Soldering rod: it is used to remove solder from components and fix others. The rod is used during
repair to fix components on the motherboard.
9. Flashlight: Used to light up areas that you cannot see well. It can be used at the repair table.
10. Cable crimper: Used to attach connectors to wires. The most common is the network cable crimper
that terminates the RJ45 to the ethernet cable.
11. Soft cleaning cloth: Used to clean computer components without scratching or damaging them.
12. Cleaning agent: use the correct type of cleaning agent to clean different components either when
maintaining or repairing. The recommended agent is isopropyl alcohol or distilled water. What is used
depends on which part is being cleaned.
13. Antistatic wrist strap: it is used to protect computer components against static electricity.
14. Cables ties: they are used to bundle cables together in an organized manner. When you use cable ties
you cannot remove them unless you cut the tie completely.
15. Air blower: used to blow away dust from different parts of the computer. They can be used in general
maintenance routines or before you repair components.
1. Data recovery software: This is software that is used to help recover data that is lost due to storage
media problems. They can be used to repair and recover data. We have some that are freeware and
others more advanced that are for pay.
2. Disk utility software: Hard disk is a critical component that holds all user data and it has a number of
repair tools dedicated to it. Some disk management programs are disk cleaners, defragmenters,
partitioners, formatting, and checker among others. We have a more detailed article about different
types of disk utility software you can read.
3. Antivirus and malware: antivirus programs are used to scan, detect, and remove malicious programs
from the computer. By using this software we can reduce many problems that are associated with
computer viruses. There are many antivirus programs on the market such as Norton, Kaspersky, Avast,
Bit Defender, Comodo, and Avira among others.
4. The driver’s installer and updater: up-to-date drivers ensure that all components are functioning
optimally. These repair tools are used to detect any missing drivers and install them. They also check
the version and update it to the latest drivers.
5. Software uninstaller: when you uninstall a program from your computer, most of the time it only
removes the directory where the program was but other files still remain. The uninstaller software
deletes all data for the specific programs including the registry data. This frees up storage space for
other programs.
2
1. Always clean your tools after use. Depending on the type of the tool clean it using the appropriate
cleaning agent after use.
2. Return the tools to the right location. You should have a designated storage location for all your
tools like a tool rack. After use return them to the right position on the rack or toolbox.
3. Use the tool for the right job: each tool is designed to be used for a specific function try and stick to
the basic use of that tool. This ensures that you don’t damage the item and the component that is being
repaired.
4. Keep your tool dry to avoid then rusting: most hardware repair tools are metallic which means theta
re susceptible to rust if left wet. Always ensure they are dry before returning them to the toolbox or
rack.
5. Follow safety guidelines: check the safety rules and guidelines that are given in the tool user manual
and follow them. This ensures the equipment work as specified and the user is also safe.
All the software applications we use every day are likely riddled with security issues. These security issues are
constantly being found --- whether we're talking about Windows, Microsoft Edge, Mozilla Firefox, Google
Chrome, Adobe's PDF Reader, Microsoft Office --- the list goes on and on.
These days, a lot of operating systems and programs come with automatic updates to close these security
holes. No longer do you need to click a button or download a file to update your software; it'll update itself in
the background without any input from you.
Some people like to turn this off for one reason or another. Others will delay it for weeks. Maybe you don't
like that Windows restarts after installing an update, or maybe you just don't like change. But from a security
perspective, you should always leave automatic updates on.
Let's set the record straight: you should be running antivirus, even if you're careful on the web. Which one?
It's up to you --- though when it comes to free, simple, and good, there's nothing wrong with using Microsoft
Defender. It's built in to Windows, it updates automatically with the Windows Update utility, it has a minimal
impact on performance, and it's free. To be effective, an antivirus application need to integrate with the
operating system on a very deep level.
We also recommend using Malwarebytes alongside your antivirus. Just like your belt can use a good pair of
suspenders to give it a little help, applications like Malwarebytes can provide extra protection against
malicious software that traditional antivirus products may not identify.
3
We’re no longer in the olden days of the internet, where you can just use the same password everywhere and
call it a day. Services get hacked all the time, and if you're using the same password everywhere, you've given
someone access to all of your accounts when one service leaks information. You need to use long passwords
and you need to use different ones on every site and service.
You should also have a password or PIN on your computer and a passcode on your phone, too.
I recommend everyone use a password manager like LastPass. It'll automatically generate passwords for you,
save them securely in one central place, and even automatically insert them for you as you browse. Password
managers will also save you from phishing and typosquatting.
This may seem obvious, but it deserves saying: never, ever leave your computer or phone unattended in
public. On your coffee table in your house? Sure. On your table at Starbucks? No way. Doing so is asking for
it to be stolen.
Be Careful About Programs You Download and Run (and Stop Pirating Software)
Always be careful about the programs you download and run. Only download and run software that's widely
known and trustworthy, or recommended by trustworthy sites. Make sure you always get the software from its
official website -- -if you want to download VLC, download it from VLC's official website. Don't click a
"Download VLC" banner on another website and download it from someone else that may bundle malware or
adware along with it. Even if you're using a search engine, make sure it's leading you to the real site
Similarly, never download or install something you didn't go looking for. If a website tells you Flash is out of
date, Chrome needs to be updated, or an extension needs to be added, pump your brakes. This is a common
trick to get you to install something for an attacker. Even if you think the pop-up might be legitimate, you
still shouldn't click on it.
Hardware Devices
1. Mouse -
2. Keyboard -
3. Case/System unit –
4. Network cards.
5. Cables
6. Sound cards
7. Modem –
8. CMOS (complementary metal oxide semi conductor)
9. Monitor
Resolution: the number of pixels per inch on the screen. The higher the resolution the more the number of
pixels per square inch hence the clearer the image.
Pixels: They are tiny dots which are used to form the image displayed on the screen
4
Colour depth: Refers to number of colours which can be displayed by a pixel
Display size: Refers to the size of the screen usually measured in inches as the diagonal length of the screen
from top to bottom left.
10.Motherboard
The motherboard is the board that contains the logic circuits that tie all parts of your PC together.
The motherboard components serve specific functions they include:
1. BUS - A bus is an electronic path for signal to flow from one point to another in a circuit. The ALU,
CU and main memory are linked through electrical pathways called buses.
Control Bus: Controls function sent by the control unit to other parts of the system
Address Bus: Locates the storage position in memory of the data to be executed or an instruction to be
decoded
Data Bus: This is the pathway where the actual data transfer takes place.
2. Expansion Slots - for connecting other devices/controller cards to the motherboard such as the ISA,
AGP,PCI (peripheral component interconnect)
3. Memory Slots - provides receptacles for adding additional memory chips
4. BIOS Chip – The BIOS is a type or ROM which stores the settings of the input and output system
provides a definition of the system for booting.
What is Booting?
Booting is a process or set of operations that loads and hence starts the operating system, starting from the
point when user switches on the power button.
What is Booting Sequence?
Booting sequence comprises of the following steps:
o Turn on the Power button.
o CPU pins are reset and registers are set to specific value.
o CPU jump to address of BIOS
o BIOS run POST (Power-On Self Test) and other necessary checks. POST- Power on Self Test is the
foremost routine which checks and tests the basic hardware. If it fails then it displays error POST-
Power on Self Test is the foremost routine which checks and tests the basic hardware. If it fails then
it displays error
o BIOS jumps to MBR (Master Boot Record).
o Primary Boot loader runs from MBR and jumps to Secondary Boot loader.
o Secondary Boot loaders load Operating System.
5. Ports - some newer machines will have a port for the Universal Serial Bus (USB) connection.
5
11. MEMORY
RAM/ROM
Types
DIMM (Dual Inline memory Module) - A type of circuit board that contains two banks of memory chips that
act as the memory for the computer processor. It uses both of its sides to store data.
SIMM: single inline memory module: Uses one of its sides to save data.
DDR2 (Double Data Rate Two) - A new form of memory for personal computer systems that improves upon
the older DDR standard. It has a lower density and faster clock rate that allows for higher bandwidth.
Special Purpose memory
1. Buffer: It is a special purpose memory used during input/out or processing to temporarily hold data
or instructions between communicating elements
2. Cache memory: It’s a very high speed type of static RAM whose purpose is to allow the processor
(CPU)to access data and instructions faster
3. Register: They are temporarily storage locations within CPU that holds one piece of data at a time
Examples of Registers
a) Accumulators: Temporally holds the results of the last processing step of ALU
b) Instruction register: Temporally holds an instruction before its interpreted into a form the CPU
can understand it.
c) Address Register: Temporarily holds next piece of data waiting to be processed
d) Storage register: Temporarily holds piece of data that is on its way to and from the CPU and main
memory
12. Central Processing Unit – it is normally referred to as the brain of the computer. Though the term relates
to a specific chip or the processor a CPU's performance is determined by the rest of the computer's circuitry
and chips. The processing speed varies from computer to computer and they normally range from:
Pentium I 100 MHz -133 MHz
Pentium II 134- 500 MHz
Pentium III 501 MHZ – 1GHz
Pentium IV 1GHz and above
7
Device Manager provides you with a graphical view of the hardware that is installed on your computer. You
can use Device Manager to update the drivers (or software) for hardware devices, modify hardware settings,
and troubleshoot problems.
You will typically use Device Manager to check the status of your hardware and update device drivers on
your computer. Advanced users who have a thorough understanding of computer hardware might also use
Device Manager's diagnostic features to resolve device conflicts and change resource settings.
Software installation
Ensure that you’re CD/DVD ROM is working. After connecting the computer put the operating systems CD
in the Drive and Start the computer. The CD should be a bootable one for WINDOWS XP Professional.
Follow the installation procedures after which you will install Microsoft office suite.
How to install the O/S
Insert a bootable CD of The operating system into the CD/DVD drive and restart your computer.
Press the necessary key to go to the boot menu and choose the first boot device to be the CD/DVD
Rom.
Wait as the system copies the installation files.
Accept the License agreement.
Choose the drive where you want to install the operating system.
Format and partition the hard disk if necessary.
Put the licensing key and wait for a while as the system installs.
Choose the location where you are using the GMT.
Create the administrators account and provide the password.
Complete the installation.
How to install the office suite
Insert the office installation CD into the CD/DVD drive
Provide the installation licensing key
Choose the installation type that you want whether typical or complete installation and click next
Choose the location where you want to install the office.
Wait for the installation to complete and click finish.
Uninstalling software
Control panel, programs and features or add remove programs, Select the program you want to uninstall and
remove.
Computer Crimes
8
1. Hacking: This refers to intentionally breaking of codes and passwords to gain unauthorized entry
to computer system data and information files
2. Cracking: This is the use of guess work over and over again by a person until they finally discover a
weakness in the security policies or code of a software
3. Piracy: Making illegal copies of copyrighted software, information or data
4. Sabotage: Illegal destruction of data and information with the aim of crippling service delivery or
causing great loss to an organization
5. Logic Bomb: it’s a program that is executed when a certain set of condition is made e.g. a fired
employee can load a logic bomb to a computer to destroy it when his record is updated on
database.
Prevention
1. Audit trials: Careful study of an information system to establish and find out all the weakness that
could lead to security threats
2. Data Encryption: Hiding the real meaning of information or data
3. Log files: Special systems that keeps a record log of events on the use of computers and resources.
4. Fire Walls: Software that filters the data and information exchanged between different networks.
Spyware: Software that obtains information from a user’s computer without the user’s knowledge or
consent.