0% found this document useful (0 votes)
51 views9 pages

basic pc maintenance notes

The document outlines the essentials of basic PC support and maintenance, including technical support for hardware and software, safety rules in computer labs, and common maintenance tools. It emphasizes the importance of following safety precautions, using appropriate software for maintenance, and caring for hardware tools to ensure longevity. Additionally, it covers hardware components, booting processes, and basic assembly instructions for computers.

Uploaded by

mercyn633
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views9 pages

basic pc maintenance notes

The document outlines the essentials of basic PC support and maintenance, including technical support for hardware and software, safety rules in computer labs, and common maintenance tools. It emphasizes the importance of following safety precautions, using appropriate software for maintenance, and caring for hardware tools to ensure longevity. Additionally, it covers hardware components, booting processes, and basic assembly instructions for computers.

Uploaded by

mercyn633
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

BASIC PC SUPPORT AND MAINTENANCE

Pc support and maintenance is the process of offering technical support and repairing the computer. Technical
support involves both the hardware and the software. We repair the hardware parts and install/ support the
software that enables the hardware to function properly.

Common Computer Lab Rules


Most of these rules are quite general in nature, and they are applicable to a computer lab anywhere.

Rules for Protecting Yourself


 Do not run inside the computer lab.
 Take a note of all the exits in the room, and also take note of the location of fire extinguishers in the
room for the sake of fire safety.
 Keep bags and coats in the designated area, as they can cause people to trip if they are simply lying
around the room.
 Try not to type continuously for extremely long periods.
 Look away from the screen once in a while to give your eyes a rest.
 Do not touch any exposed wires or sockets.
 Avoid making loud noises and speaking loudly.
 Do not attempt to open any machines, and do not touch the backs of machines when they are switched
on.
 Do not spill water or any other liquid on the machine, in order to maintain electrical safety.

There is a lot of equipment in computer labs that could short circuit itself or cause electric shocks, so one
needs to be very careful.

Rules for Protecting Equipment


 Do not bring any food or drinks near the machine.
 Turn off the machine you were using, when you are done using it.
 Do not access external devices without scanning them for computer viruses.
 Ensure that the temperature in the room stays cool, since there are a lot of machines inside a lab, and
these can overheat easily. This is one of the many ways of ensuring computer safety.
 Try not to touch any of the circuit boards and power sockets when something is connected to them and
switched on.
 Always maintain an extra copy of all your important data.
 Dust can affect computers adversely. Ensure that the machines are cleaned on a regular basis.
The laboratory equipment that is present inside a computer lab is very expensive, and it is your responsibility
to ensure that this equipment is kept safe and sound. If some damage is incurred by this equipment, the cost of
repairing or replacing it will be very high indeed. Hence, the importance of following these lab safety rules.

Common computer maintenance tools and equipment and their functions

Hardware repair and maintenance tools and equipment

1. Screwdrivers: used to tighten or loosen screws. Different types of screwdrivers are flat-head for
slotted screws, Phillips-head for cross-headed screws, and star for star-headed screws.
2. Nut drivers: they are also called hex drivers. Nut drivers are used to tighten or loosen nuts and bolts.
3. Tweezers: used to remove tiny components or removing small wires on the personal computer (PC).
4. Wire cutter and stripper: it is used to cut the wire and strip the insulation material to uncover the
wires. They can be used to strip cables when terminating network cables.

1
5. Multimeter: it is used to measure multiple electrical values such as voltage, ohms, and current. The
best is a digital multimeter which has an LCD display.
6. Memory module tester: it is special equipment that tests main memory (RAM) functionality.
7. Pliers: Used for cutting and gripping or holding parts. Types include needle-nose, slip-joint, and
cutting piers among others.
8. Soldering rod: it is used to remove solder from components and fix others. The rod is used during
repair to fix components on the motherboard.
9. Flashlight: Used to light up areas that you cannot see well. It can be used at the repair table.
10. Cable crimper: Used to attach connectors to wires. The most common is the network cable crimper
that terminates the RJ45 to the ethernet cable.
11. Soft cleaning cloth: Used to clean computer components without scratching or damaging them.
12. Cleaning agent: use the correct type of cleaning agent to clean different components either when
maintaining or repairing. The recommended agent is isopropyl alcohol or distilled water. What is used
depends on which part is being cleaned.
13. Antistatic wrist strap: it is used to protect computer components against static electricity.
14. Cables ties: they are used to bundle cables together in an organized manner. When you use cable ties
you cannot remove them unless you cut the tie completely.
15. Air blower: used to blow away dust from different parts of the computer. They can be used in general
maintenance routines or before you repair components.

Software maintenance and repair tools


Software maintenance and repair tools are used to manage the software components and can also check the
functionality of computer hardware. Mostly they are specialized for a specific function. The main software
repair and maintenance tools are:

1. Data recovery software: This is software that is used to help recover data that is lost due to storage
media problems. They can be used to repair and recover data. We have some that are freeware and
others more advanced that are for pay.
2. Disk utility software: Hard disk is a critical component that holds all user data and it has a number of
repair tools dedicated to it. Some disk management programs are disk cleaners, defragmenters,
partitioners, formatting, and checker among others. We have a more detailed article about different
types of disk utility software you can read.
3. Antivirus and malware: antivirus programs are used to scan, detect, and remove malicious programs
from the computer. By using this software we can reduce many problems that are associated with
computer viruses. There are many antivirus programs on the market such as Norton, Kaspersky, Avast,
Bit Defender, Comodo, and Avira among others.
4. The driver’s installer and updater: up-to-date drivers ensure that all components are functioning
optimally. These repair tools are used to detect any missing drivers and install them. They also check
the version and update it to the latest drivers.
5. Software uninstaller: when you uninstall a program from your computer, most of the time it only
removes the directory where the program was but other files still remain. The uninstaller software
deletes all data for the specific programs including the registry data. This frees up storage space for
other programs.

How to maintain and take care of hardware tools


How long your hardware tools will last depends on how you take care of them. Better care better service they
will offer and for a long time. These are some of the tips you can use to ensure your hardware repair tools last
longer.

2
1. Always clean your tools after use. Depending on the type of the tool clean it using the appropriate
cleaning agent after use.
2. Return the tools to the right location. You should have a designated storage location for all your
tools like a tool rack. After use return them to the right position on the rack or toolbox.
3. Use the tool for the right job: each tool is designed to be used for a specific function try and stick to
the basic use of that tool. This ensures that you don’t damage the item and the component that is being
repaired.
4. Keep your tool dry to avoid then rusting: most hardware repair tools are metallic which means theta
re susceptible to rust if left wet. Always ensure they are dry before returning them to the toolbox or
rack.
5. Follow safety guidelines: check the safety rules and guidelines that are given in the tool user manual
and follow them. This ensures the equipment work as specified and the user is also safe.

SAFETY PRECAUTIONS IN BASIC PC MAINTENANCE

Don't Delay Automatic Updates

All the software applications we use every day are likely riddled with security issues. These security issues are
constantly being found --- whether we're talking about Windows, Microsoft Edge, Mozilla Firefox, Google
Chrome, Adobe's PDF Reader, Microsoft Office --- the list goes on and on.

These days, a lot of operating systems and programs come with automatic updates to close these security
holes. No longer do you need to click a button or download a file to update your software; it'll update itself in
the background without any input from you.

Some people like to turn this off for one reason or another. Others will delay it for weeks. Maybe you don't
like that Windows restarts after installing an update, or maybe you just don't like change. But from a security
perspective, you should always leave automatic updates on.

Use Antivirus and Anti-Malware

Let's set the record straight: you should be running antivirus, even if you're careful on the web. Which one?
It's up to you --- though when it comes to free, simple, and good, there's nothing wrong with using Microsoft
Defender. It's built in to Windows, it updates automatically with the Windows Update utility, it has a minimal
impact on performance, and it's free. To be effective, an antivirus application need to integrate with the
operating system on a very deep level.

We also recommend using Malwarebytes alongside your antivirus. Just like your belt can use a good pair of
suspenders to give it a little help, applications like Malwarebytes can provide extra protection against
malicious software that traditional antivirus products may not identify.

Craft Better Passwords, and Automate Them

3
We’re no longer in the olden days of the internet, where you can just use the same password everywhere and
call it a day. Services get hacked all the time, and if you're using the same password everywhere, you've given
someone access to all of your accounts when one service leaks information. You need to use long passwords
and you need to use different ones on every site and service.

You should also have a password or PIN on your computer and a passcode on your phone, too.
I recommend everyone use a password manager like LastPass. It'll automatically generate passwords for you,
save them securely in one central place, and even automatically insert them for you as you browse. Password
managers will also save you from phishing and typosquatting.

Never Leave Your Phone or Computer Unattended

This may seem obvious, but it deserves saying: never, ever leave your computer or phone unattended in
public. On your coffee table in your house? Sure. On your table at Starbucks? No way. Doing so is asking for
it to be stolen.

Be Careful About Programs You Download and Run (and Stop Pirating Software)

Always be careful about the programs you download and run. Only download and run software that's widely
known and trustworthy, or recommended by trustworthy sites. Make sure you always get the software from its
official website -- -if you want to download VLC, download it from VLC's official website. Don't click a
"Download VLC" banner on another website and download it from someone else that may bundle malware or
adware along with it. Even if you're using a search engine, make sure it's leading you to the real site

Don't Trust Any Popup Notifications

Similarly, never download or install something you didn't go looking for. If a website tells you Flash is out of
date, Chrome needs to be updated, or an extension needs to be added, pump your brakes. This is a common
trick to get you to install something for an attacker. Even if you think the pop-up might be legitimate, you
still shouldn't click on it.

Hardware Devices
1. Mouse -
2. Keyboard -
3. Case/System unit –
4. Network cards.
5. Cables
6. Sound cards
7. Modem –
8. CMOS (complementary metal oxide semi conductor)
9. Monitor
Resolution: the number of pixels per inch on the screen. The higher the resolution the more the number of
pixels per square inch hence the clearer the image.
Pixels: They are tiny dots which are used to form the image displayed on the screen
4
Colour depth: Refers to number of colours which can be displayed by a pixel
Display size: Refers to the size of the screen usually measured in inches as the diagonal length of the screen
from top to bottom left.
10.Motherboard
The motherboard is the board that contains the logic circuits that tie all parts of your PC together.
The motherboard components serve specific functions they include:
1. BUS - A bus is an electronic path for signal to flow from one point to another in a circuit. The ALU,
CU and main memory are linked through electrical pathways called buses.
Control Bus: Controls function sent by the control unit to other parts of the system
Address Bus: Locates the storage position in memory of the data to be executed or an instruction to be
decoded
Data Bus: This is the pathway where the actual data transfer takes place.

2. Expansion Slots - for connecting other devices/controller cards to the motherboard such as the ISA,
AGP,PCI (peripheral component interconnect)
3. Memory Slots - provides receptacles for adding additional memory chips
4. BIOS Chip – The BIOS is a type or ROM which stores the settings of the input and output system
provides a definition of the system for booting.
What is Booting?
Booting is a process or set of operations that loads and hence starts the operating system, starting from the
point when user switches on the power button.
What is Booting Sequence?
Booting sequence comprises of the following steps:
o Turn on the Power button.
o CPU pins are reset and registers are set to specific value.
o CPU jump to address of BIOS
o BIOS run POST (Power-On Self Test) and other necessary checks. POST- Power on Self Test is the
foremost routine which checks and tests the basic hardware. If it fails then it displays error POST-
Power on Self Test is the foremost routine which checks and tests the basic hardware. If it fails then
it displays error
o BIOS jumps to MBR (Master Boot Record).
o Primary Boot loader runs from MBR and jumps to Secondary Boot loader.
o Secondary Boot loaders load Operating System.
5. Ports - some newer machines will have a port for the Universal Serial Bus (USB) connection.

5
11. MEMORY
RAM/ROM
Types
DIMM (Dual Inline memory Module) - A type of circuit board that contains two banks of memory chips that
act as the memory for the computer processor. It uses both of its sides to store data.
SIMM: single inline memory module: Uses one of its sides to save data.
DDR2 (Double Data Rate Two) - A new form of memory for personal computer systems that improves upon
the older DDR standard. It has a lower density and faster clock rate that allows for higher bandwidth.
Special Purpose memory
1. Buffer: It is a special purpose memory used during input/out or processing to temporarily hold data
or instructions between communicating elements
2. Cache memory: It’s a very high speed type of static RAM whose purpose is to allow the processor
(CPU)to access data and instructions faster
3. Register: They are temporarily storage locations within CPU that holds one piece of data at a time

Examples of Registers
a) Accumulators: Temporally holds the results of the last processing step of ALU
b) Instruction register: Temporally holds an instruction before its interpreted into a form the CPU
can understand it.
c) Address Register: Temporarily holds next piece of data waiting to be processed
d) Storage register: Temporarily holds piece of data that is on its way to and from the CPU and main
memory

12. Central Processing Unit – it is normally referred to as the brain of the computer. Though the term relates
to a specific chip or the processor a CPU's performance is determined by the rest of the computer's circuitry
and chips. The processing speed varies from computer to computer and they normally range from:
Pentium I 100 MHz -133 MHz
Pentium II 134- 500 MHz
Pentium III 501 MHZ – 1GHz
Pentium IV 1GHz and above

13. Hard Drive Storage


It’s a storage media whose main function is to host the operating system. Most hard drives also have jumper settings on
the back end that define how the motherboard is to recognize the drive when more than one is present. These settings
vary from drive to drive so check with your hard drive manufacturer for details.

14. POWER SUPPLY


ATX and AT power supply: Check the power supply to avoid using the wrong voltages.
15. Integrated Drive Electronics (IDE) DRIVE & SATA cables: connects the hard disk to the motherboard.
16. PRINTERS
Types
Impact and non impact printers
Know how to remove a paper jam on a printer and how to install new cartridges and tonners

How to setup and assemble computers


Assemble:
 Have the computer casing in place.
 Lay down the motherboard on the casing and put the necessary screws.
 If the processor is off board connect it and connect the processor fun
 Connect the memory on the memory slots
6
 Check the CMOS battery if not connected, connect
 Put the hard disk and connect it to the motherboard
 Connect the CD/DVD drive also
 Connect the power supply on the two power connections on the motherboard
 Power the hard disk the CD/DVD drive
 Connect the power switch on the motherboard
 Connect additional cards on the expansion slots if any
Setup the computer: Make sure all the computer components are intact i.e. mouse keyboard, monitor
then connect the UPS to the main power socket. Using back to back cables connect the system unit and the
Monitor to the UPS.

Cleaning the computer


All the components of the computer should be cleaned at least once a month to improve their functionality.
Use a blower to blow off the dust then use Menthilated spirit or dump clean clothe to wipe off the dust.
Caution no liquids should be used to clean the computers e.g. water

The techniques used in PC Maintenance and Repair


Troubleshooting: it is a process of identifying and diagnose a problem and offering remedy to common
computer problems.
a) Mouse /keyboard problems
b) Booting problem: Check the power connection, the hard disk connection, memory and the CPU.
c) Processor problem: Check the processor fun and check whether the processor is overheating
d) Memory problem: If there is a beeping sound at start up check the memory
e) Power problem:
f) Drivers problem: Go to device manager and check the driver status
g) Motherboard problem

Advanced troubleshooting options


1. Starting your computer using Safe Mode
Starts the computer using only basic files and drivers Safe mode helps you diagnose problems. If a symptom
does not reappear when you start in safe mode, you can eliminate the default settings and minimum device
drivers as possible causes. If a newly added device or a changed driver is causing problems, you can use safe
mode to remove the device or reverse the change.

2. Last Known Good Configuration


When to use it: When you suspect that a change you made to your computer before restarting might be
causing the failure.
What it does: Restores the registry settings and drivers that were in effect the last time the computer started
successfully.
3. Automated System Recovery
When to use it: After all other attempts at recovery fail, or if you have replaced a damaged system hard drive.
You must have previously used Backup to create an Automated System Recovery set.
4. System Restore
When to use it: You recently updated a device driver, and using Device Driver Roll Back did not restore
stability to your system. You must be logged on as an administrator to use this feature.
What it does: Restores all system and application settings back to those that were in effect at a point in time
you specify. Undoes key application, driver, and operating system file changes made since that time. Does not
affect data files
5. Device Manager Overview

7
Device Manager provides you with a graphical view of the hardware that is installed on your computer. You
can use Device Manager to update the drivers (or software) for hardware devices, modify hardware settings,
and troubleshoot problems.
You will typically use Device Manager to check the status of your hardware and update device drivers on
your computer. Advanced users who have a thorough understanding of computer hardware might also use
Device Manager's diagnostic features to resolve device conflicts and change resource settings.

3. The use of software and an overview of operating systems


CLASSIFICATION OF SOFTWARE
1. Open source/non- proprietary: Refers to software whose code is freely made available to users. The
user can use and modify the software
2. Proprietary: Refers to software whose code is hidden and modifications are only made by
engineers. They are usually licensed to users at a fee or applied freely.
Types of Software
1 Application
2 System software
Factors to consider when choosing an O/S
1. Hardware configuration
2. Applications intended for the computer
3. User friendliness
4. Cost
5. Availability in the market

Software installation
Ensure that you’re CD/DVD ROM is working. After connecting the computer put the operating systems CD
in the Drive and Start the computer. The CD should be a bootable one for WINDOWS XP Professional.
Follow the installation procedures after which you will install Microsoft office suite.
How to install the O/S
 Insert a bootable CD of The operating system into the CD/DVD drive and restart your computer.
 Press the necessary key to go to the boot menu and choose the first boot device to be the CD/DVD
Rom.
 Wait as the system copies the installation files.
 Accept the License agreement.
 Choose the drive where you want to install the operating system.
 Format and partition the hard disk if necessary.
 Put the licensing key and wait for a while as the system installs.
 Choose the location where you are using the GMT.
 Create the administrators account and provide the password.
 Complete the installation.
How to install the office suite
Insert the office installation CD into the CD/DVD drive
 Provide the installation licensing key
 Choose the installation type that you want whether typical or complete installation and click next
 Choose the location where you want to install the office.
 Wait for the installation to complete and click finish.
Uninstalling software
Control panel, programs and features or add remove programs, Select the program you want to uninstall and
remove.
Computer Crimes

8
1. Hacking: This refers to intentionally breaking of codes and passwords to gain unauthorized entry
to computer system data and information files
2. Cracking: This is the use of guess work over and over again by a person until they finally discover a
weakness in the security policies or code of a software
3. Piracy: Making illegal copies of copyrighted software, information or data
4. Sabotage: Illegal destruction of data and information with the aim of crippling service delivery or
causing great loss to an organization
5. Logic Bomb: it’s a program that is executed when a certain set of condition is made e.g. a fired
employee can load a logic bomb to a computer to destroy it when his record is updated on
database.
Prevention
1. Audit trials: Careful study of an information system to establish and find out all the weakness that
could lead to security threats
2. Data Encryption: Hiding the real meaning of information or data
3. Log files: Special systems that keeps a record log of events on the use of computers and resources.
4. Fire Walls: Software that filters the data and information exchanged between different networks.
Spyware: Software that obtains information from a user’s computer without the user’s knowledge or
consent.

You might also like