CBLM CSS Coc 1
CBLM CSS Coc 1
Sector:
Remember to:
Work through all the information and complete the activities in each section.
Read information sheets and complete the self-check. Suggested references are
included to supplement the materials provided in this module.
Most probably your trainer will also be your supervisor or manager. He/She is
there to support you and show you the correct way to do things.
You will be given plenty of opportunity to ask questions and practice on the job.
Make sure you practice your new skills during regular work shifts. This way you
will improve both your speed and memory and also your confidence.
Use the Self-checks, Operation Sheets or Task Sheets at the end of each section
to test your own progress.
When you feel confident that you have had sufficient skill, ask your Trainer to
evaluate you. The results of your assessment will be recorded in your Progress
Chart and Accomplishment Chart.
You need to complete this module before you perform the module on Setting Up
Computer Networks.
List of Competencies
Setting – up computer
3. Set-up Computer Servers
servers
3. Install application 3.1 Install application software are based on the software
software installation guides, end –users requirement and software
license.
3.2 Installing WinRAR
3.3 Installing network device driver
3.4 Installing Kingsoft office
4. Network cabling 4.1 Ethernet Cable ; types, connections and guides in making
And network Configuration Ethernet cable
4.2 Patch panel; types and guides in patching a patch panel
4.3 Network Connection diagram
4.4 Router; types and configuration
4.5 Windows Firewall
Contents:
1. Types/Parts of computers
a. Description and purpose of hardware
i. Input devices
ii. Processing devices
iii. Output devices
4. System Unit
a. Parts of Motherboard
b. RAM
c. Power Supply Unit
Conditions:
Assessment Method:
Written exam
Practical exam/demonstration
Observation in workplace
Oral Questioning
Computer Basics
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to know what a
Computer is and identify the key parts of a Personal Computer.
What is a Computer?
Hardware is any physical part of the computer which include all the internal
components and also the external part like the monitor and the keyboard.
Software is any set of instructions that tells the hardware what to do such
as a web browser, media player or word processor.
Types of Computers
A. Mobile phones
B. Tablets
C. Game consoles
D. TV's
The PC System
Types/Parts of Computer
Desktop computer
Desktop computers come in a variety of styles ranging from large
vertical tower cases to small form factor models that can be tucked
behind an LCD monitor. In this sense, the term 'desktop' refers
specifically to a horizontally-oriented case, usually intended to have
the display screen placed on top to save space on the desk top. Most
modern desktop computers have separate screens and keyboards.
Laptop
A laptop computer or simply “laptop”, also called a notebook
computer or sometimes a notebook, is a small personal computer
designed for portability.
A hard disk drive (HDD) is a data storage device used for storing and
retrieving digital information using rapidly rotating
discs (platters) coated with magnetic material. An HDD
Document No. CSS – 2015-001
Date Developed:
Computer March 2, 2017 Date Revised:
Systems March 1, 2017
Developed by: Page 9 of 119
Servicing NCII
Ronaldo B. Racelis Revision No.: 02
retains its data even when powered off. Data is read in a random-
access manner, meaning individual blocks of data can be stored or
retrieved in any order rather than sequentially. An HDD consists of
one or more rigid ("hard") rapidly rotating discs (platters) with
magnetic heads arranged on a moving actuator arm to read and write
data to the surfaces.
After reading this INFORMATION SHEET, YOU MUST be able to identify and apply
OHS policies and procedures in Computer Systems Servicing.
A. Workplace
B. Computer systems
1. Always power off and unplug the computer before working on it. When
making circuit changes switch off and unplug the power cord from the
equipment then discharge the capacitors.
2. Replace only fuses with those proper rating (usually on AVRs).
3. Handle all sensitive components in non-conducting metallic edge.
4. Check all signal pins and alignment to avoid incorrect connection.
5. Be careful with the sharp edges inside the computer case.
6. Do not use excessive force when installing computer components to prevent
damage.
7. Do not clean your system with wet clothes or any liquid detergents.
8. Use brush, compressed air or blower in cleaning the computer system.
C. Technician
After reading this INFORMATION SHEET, YOU MUST be able to identify Use of
hand tools and proper use.
Selecting the best tool for each task requires training in the proper use of the
tools, field experience in their safe use, and following the manufacturer’s
guidance and instructions for that specific tool.
When obtaining the tool all the associated tooling and consumable parts, as
recommended by the manufacturer, must be included. In addition, related
consumable parts must also be selected and used according to their
manufacturer’s instructions.
Each tool be examined before use and damaged or defective tools NOT to be
used
The right protective equipment for the tool and activity be used
Hardware Tools
To complete hardware repairs, it is important to have a toolkit that should contain
all of the necessary tools. As you gain experience, you will learn which tools to have
available for different types of jobs. Hardware tools are grouped into these four
categories:
Document No. CSS – 2015-001
Date Developed:
March 2, 2017 Date Revised:
Computer March 1, 2017
Systems Page 12 of
Servicing NCII Developed by: 119
Ronaldo B. Racelis Revision No.: 02
Electro-Static Discharge (ESD) tools
Hand tools
Cleaning tools
Diagnostic tools
Hand Tools
A hand tool is a device for performing work on a material or a physical
system using only hands. The hand tools can be manually used employing
force, or electrically powered, using electrical current.
Hex driver – sometimes called a nut driver, is used to tighten nuts in the
same way that a screwdriver tightens screws.
Part retriever - used to retrieve parts from location those are too small for
your hand to fit.
Using these tools ensures that computer components are not damaged
during cleaning.
Compressed air - used to blow away dust and debris from different
computer parts without touching the components.
Cable ties - used to bundle cables neatly inside and outside of a computer.
Diagnostic Tools
The good news: To find your way around a motherboard, all you'll need to know are
the major motherboard parts and their functions.
And what better way is there... than to do it with labeled photos? Let's take a closer
look at the different motherboard components below:
9. Front Panel Connectors Connects to the power switch, reset switch, power LED,
hard drive LED and front audio ports of a computer case.
See image above for a close-up view.
10. IDE Connector Connects to older hard drive disks and optical drives for
data transfer. See image above for a close-up view.
Have been replaced over by SATA connectors (see
motherboard components #13 below).
11. CMOS Battery Supplies power to store BIOS settings and keep the real-
time clock running. See image above for a close-up view.
The CMOS battery found on most motherboards is the
CR2032 lithium coin cell.
12. Southbridge Also known as the Input/Output Controller Hub (ICH).
17. mSATA Connector Connects to amSATA solid state drive. In most cases, this
SSD is used as cache to speed up hard disk drives, but it's
possible to re-purpose it as a regular hard drive.
18. Front Panel USB 3.0 Connects to USB 3.0 ports at the front or top of the
Connector computer case.
19. Power & Reset Button Onboard button to turn on, turn off and reboot the
computer.
Learning Objective:
Identifying RAM’s
After reading this INFORMATION SHEET, YOU MUST be able to identify RAM’s.
There are many different types of RAM which have appeared over the years and it is
often difficult knowing the difference between them both performance wise and
visually identifying them. This article tells a little about each RAM type, what it
looks like and how it performs.
FPM RAM
FPM RAM, which stands for “Fast Page Mode” RAM is a type of Dynamic RAM
(DRAM). The term "Fast Page Mode" comes from the capability of memory being
able to access data that is on the same page and can be done with less latency.
Most 486 and Pentium based systems from 1995 and earlier use FPM Memory.
EDO RAM
EDO RAM, which stands for "Extended Data Out RAM" came out in 1995 as a
new type of memory available for Pentium based systems. EDO is a modified form
of FPM RAM which is commonly referred to as "Hyper Page Mode". Extended Data
Out refers to fact that the data output drivers on the memory module are not
switched off when the memory controller removes the column address to begin the
next cycle, unlike FPM RAM. Most early Pentium based systems use EDO.
SDRAM
SDRAM , which is short for Synchronous DRAM is a type of DRAM that runs in
synchronization with the memory bus. Beginning in 1996 most Intel based chipsets
began to support SDRAM which made it a popular choice for new systems in 2001.
DDR RAM
DDR RAM, which stands for "Double Data Rate" which is a type of SDRAM and
appeared first on the market around 2001 but didn’t catch on until about 2001
when the mainstream motherboards started supporting it. The difference between
SDRAM and DDR RAM is that instead of doubling the clock rate it transfers data
twice per clock cycle which effectively doubles the data rate. DDRRAM has become
mainstream in the graphics card market and has become the memory standard.
DDR2 RAM
DDR2 RAM, which stands for "Double Data Rate 2" is a newer version of DDR
which is twice as fast as the original DDR RAM. DDR2RAM came out in mid 2003
and the first chipsets that supported DDR2 came out in mid 2004. DDR2 still is
double data rate just like the original DDR however DDR2-RAM has modified
signaling which enables higher speeds to be achieved with more immunity to signal
noise and cross-talk between signals.
RAMBUS RDRAM is a type of ram of its own, it came out in 1999 and was
developed from traditional DRAM but its architecture is totally new. The RAMBUS
design gives smarter access to the ram meaning that units can prefetch data and
free some CPU work. The idea behind RAMBUS RAM is to get small packets of data
Document No. CSS – 2015-001
Date Developed:
March 2, 2017 Date Revised:
Computer March 1, 2017
Systems Page 25 of
Servicing NCII Developed by: 119
Ronaldo B. Racelis Revision No.: 02
from the RAM, but at very high clock speeds. For example, SD RAM can get 64bit of
information at 100MHz where RAMBUS RAM would get 16bits of data at 800MHz.
RIMM ram was generally unsuccessful as Intel had a lot of problems with the RAM
timing or signal noise. RD RAM did make an appearance in the Sony Playstation 2
and the Nintendo 64 game consoles.
DDR3 RAM
DDR3 was the next generation memory introduced in the summer of 2007 as the
natural successor to DDR2. DDR3 increased the pre-fetch buffer size to 8-bits an
increased the operating frequency once again resulting in high data transfer rates
than its predecessor DDR2. In addition, to the increased data transfer rate memory
chip voltage level was lowered to 1.5 V to counter the heating effects of the high
frequency. By now you can see the trend of memory to increase pre-fetch buffer
size and chip
operating frequency, and lowering the operational voltage level to counter heat.
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to know and identify
Power Supply Unit and its functions.
It allows you turn on the motherboard: early models had a 20-pin configuration,
whilst the current standard is now 24. Note that it still comes as a block of 20 pins,
to which you can add a block of 4 pins. This is to ensure compatibility with older
motherboards and their 20-pin connectors.
This connector, called P4-ATX (ATX 12V or as), was introduced by Intel for Pentium
4 (hence the name): it plugs into the motherboard and exclusively powers the
processor.
Today, most motherboards possess 4 to 8 pins dedicated to powering up the CPU.
The latest standards for power supply make use of an 8-pin connector (sometimes
called EPS 12V), made up of 2 x 4-pin blocks, again to ensure compatibility with
old motherboards and the classic ATX P4.
Connector attached:
The MOLEX
The most classic. Still very present in every
PC, it is sometimes used directly on the
Document No. CSS – 2015-001
Date Developed:
March 2, 2017 Date Revised:
Computer March 1, 2017
Systems Page 28 of
Servicing NCII Developed by: 119
Ronaldo B. Racelis Revision No.: 02
motherboard (MSI) and is used to connect the hard disk and other drives. Some
graphics cards may require this connector too. Note that Molex/Sata connectors
are easily available nowadays.
Modern graphics cards need more power. They need to power themselves directly
from the power block. This is the role of this connector. Originally a 6-pin
configuration and now available in 8-pin.
If your power supply doesn't have an 8-pin connector, there are 6 to 8 adapters:
Notes:
The use of these adapters is not recommended and requires the power supply to be
of good quality and powerful enough to feed the latest graphics card.
The pins
As you can see, all these connectors are fitted with pins. Never force! Take your
time, look at the connector and ask yourself two questions: is this correct? is it in
the right direction?
Learning Objective:
To Disassemble:
3. Touch the unpainted part of your system unit with your bare
hands to remove the ESD of your body. Wear anti-static strap.
This is an important part before opening your system case.
You might destroy your RAM, Chipsets and other components
of your motherboard.
8. Next to remove are the RAM, Video Card and other card
peripheral components. Again have them secured in a safe
place and put the screws back. Clean the connector edges
of the card peripherals by rubbing the gold colored edge
moderately with a rubber eraser then brushing off the
shredding. Do not attempt to clean the edge by blowing or
brushing it off with your fingers. Our body is acidic and you
might only cause the edges to tarnish faster.
11. After removing the header connectors, we are now ready to remove the motherboard.
To remove the motherboard, locate first all the screws and lightly unscrew all screws
alternately. With this technique, we are reducing the risk of warping or bending our
motherboard. It may not have a large impact on the bending of the motherboard but still it
does have even a little. Upon lightly loosening all screws, remove all screws then.
Remove the motherboard by carefully and lightly pulling it away from the I/O shield.
Why? because we need to free the ports that are fitted from the holes in the I/O shield.
After freeing the motherboard ports from the I/O shield holes, lift up the motherboard and
put it on the safe place.
1. Provided that all peripherals are clean and ready. We are now going to assemble your
computer. In assembling back your computer, what we have done during disassembling
is just doing the reverse order to assemble it. Since the motherboard was last to be
removed, it should then be the first to put back. Remove the retaining screws from the
standoff screws of the motherboard and let the motherboard seat on it with the ports
facing out towards the I/O shield. Lightly push the motherboard to set its ports to the
holes of the I/O shield. Put the retaining screws on the motherboard screw holes but do
not tighten it yet. Now be careful in doing this one and if this is your first time doing it, it is
best if you lend a hand for assistance. Lightly push the motherboard towards to I/O shield
and lightly tighten the motherboard retaining screws alternately until all screws are tight
enough but not too tight. This is to ensure that your ports are protruding correctly out of
the I/O shield.
2. Once the motherboard is secured, put back the FP, Audio, and USB header
connectors as you will be using your documentation for reference.
4. Connect back the RAM, Video Card and other card peripherals to its proper slot
inserting it properly and some cards will require screws to be secured.
5. The data cables (IDE, SATA, floppy cable) should be connected to its proper headers
and drives. Remember the proper configuration of the placement of the cables specially if
you are dealing with the IDE cables.
6. After the data cables are properly connected, put back the power supply and secure it
with the screws you removed earlier. After securing the PSU to the chassis, connect the
power connectors to the drives and the motherboard.
7. Once all peripherals are connected properly, have a final inspection by visually
checking for loose connection or improper connection. Once the system unit connections
are thoroughly checked and verified, connect the keyboard; the monitor, and the power
connector then power up the computer. This initial powering up of the computer while the
side cover is open ensures us that everything is ok before putting back the side cover. In
case something goes wrong, we can accessibly correct the problem right away. If
everything is fine shutdown the computer, unplugged the AVR and remove the cables
connected to the back of your computer. Put the side cover back.
8. Put the assembled computer back to its place and connect the rest of the cables and
connectors. Power it up and see if there are unusual effects of your
disassembling/assembling procedure done earlier.
Contents:
After reading this INFORMATION SHEET, YOU MUST be able to know the system
requirements for windows Server 2008 R2
System Requirements
Before installing Windows Server 2008 R2, the computer must meet the following
minimum system requirements
Materials/Application Needed:
Power Iso
Rufus
After reading this INFORMATION SHEET, YOU MUST be able to how to create ISO
image using PowerISO
PowerISO can make an ISO file from a CD, DVD, or Blu-ray disc. PowerISO do a
sector-by-sector copying. All information in the disc, including the boot
information, will be copied. You can launch the iso maker using the main program
or the shell context menu.
Run PowerISO.
Click "Copy" button on toolbar, then choose "Make CD / DVD / BD Image
File..." from the popup menu.
Open "My Computer" and select the drive which holds the disc you want to
copy..
Right-click on the drive selected, the shell context menu will popup.
Choose the menu "Make Image File".
The "ISO maker" dialog will display.
Choose the output file name, and set output format to ISO.
Click "OK" to start making.
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to create a bootable
Windows Server 2008 R2 x64 USB using Rufus.
Once you have the required items, you can start by opening up Rufus. Don’t
worry about any of the settings here as Rufus will automatically do this for you
depending on the type of ISO you are using.
By default, it will appear to have many of the options blank until you connect your
USB. Once you connect the USB, these fields will be automatically filled for you.
Next, connect your USB to your computer
Select the file by left clicking on it once and then clicking on Open.
Rufus will now have filled out the fields for you. All you have to do now is hit Start.
If your USB is the correct size then you will get a standard warning telling you that
any data/partitions that was on the USB before starting the process will be
permanently deleted.
How long the process will take to complete will depend on the specs of your
computer, the USB (read/write speeds) and the size of the ISO you are using.
Document No. CSS – 2015-001
Date Developed:
March 2, 2017 Date Revised:
Computer March 1, 2017
Systems Page 41 of
Servicing NCII Developed by: 119
Ronaldo B. Racelis Revision No.: 02
That’s it. You now have a bootable USB.
Learning Objective:
To boot from a CD, DVD or USB device, make sure that the device has boot
sequence priority over the hard drive.
BIOS Boot
BIOS (Basic Input Output Subsystem) is a programmable chip that controls how
information is passed to various devices in the computer system. A typical method
to access the BIOS settings screen is to press ESC, F1, F2, F8 or F10 during the
boot sequence.
BIOS settings allow you to run a boot sequence from a floppy drive, a hard drive, a
CD-ROM drive or an external device. You may configure the order that your
computer searches these physical devices for the boot sequence.
The first device in the order list has the first boot priority. For example, to boot
from a CD-ROM drive instead of a hard drive, place the CD-ROM drive ahead of the
hard drive in priority.
Before you set boot priority for a USB device, plug the device into a USB port.
1. Start the computer and press ESC, F1, F2, F8 or F10 during the initial
startup screen. Depending on the BIOS manufacturer, a menu may appear.
2. Choose to enter BIOS setup. The BIOS setup utility page appears.
3. Use the arrow keys to select the BOOT tab. System devices appear in order
of priority.
4. To give a CD or DVD drive boot sequence priority over the hard drive, move it
to the first position in the list.
5. To give a USB device boot sequence priority over the hard drive, do the
following:
Move the hard drive device to the top of the boot sequence list.
Expand the hard drive device to display all hard drives.
Move the USB device to the top of the list of hard drives.
6. Save and exit the BIOS setup utility.
7. The computer will restart with the changed settings.
Some computer manufacturers allow you to select the device that contains the boot
sequence from a special device selection menu. The example below uses a Dell
system board.
1. Reboot the computer.
Document No. CSS – 2015-001
Date Developed:
March 2, 2017 Date Revised:
Computer March 1, 2017
Systems Page 44 of
Servicing NCII Developed by: 119
Ronaldo B. Racelis Revision No.: 02
2. When prompted for an installation language and other regional options make
your selection and press next.
On Select the Operating System you want to install page, from the displayed
Windows Server 2008 R2 editions (choose: Standard full Installation), edition
6. In the “Which type of installation do you want?” window, click the only
available option – Custom (Advanced).
8. From the enabled options, click New to create a new disk drive partition. On
the Size field, specify the size of the new volume in MB.
11. After second restart, on the displayed screen, click OK to change the user
password before logging on for the first time. On the available fields, type and
retype the new password and press Enter.
12. On the next confirmation screen, click OK to log on to the Windows Server 2008 R2
computer.
Learning Outcome 3
Document No. CSS – 2015-001
Date Developed:
March 2, 2017 Date Revised:
Computer March 1, 2017
Systems Page 50 of
Servicing NCII Developed by: 119
Ronaldo B. Racelis Revision No.: 02
Contents:
1. Application Software
a. Types of Application software
2. WinRAR
Learning Objective:
WinRAR is a trialware file archiver utility for Windows. It can create and view
archives in RAR or ZIP file formats, and unpack numerous archive file
formats.
3. Click Yes
How to use WinRAR for creating Archive, zip, and unzip files
1. Compresing 3 pdf files and creating RAR archieve. Usually people use
it for the larger files. WinRAR reduces the size of a file into RAR and
ZIP file format.
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to install network
device driver.
Open Device Manager, and then follow the instructions in the procedure.
Step 1
Select the Start button, type Device Manager, and select it from the list of results.
Step 3
Select the option to search automatically for updated driver software. This option will search the Internet for any
new drivers available for your Ethernet card. If you presently have the latest drivers then you will be prompted
that the latest drivers are already installed on your system and the window will close. If new drivers are
available they will be automatically installed.
Step 4
Then browse the driver in your file then click next
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to install Kingsoft
office.
Step 1: To install Kingsoft Office to your PC, first download the office to your computer .
Then click Save button in the following picture:
Step 2: It will be automatically saved in your system files unless you choose to save it in specific
file. Then just wait for it to finish the downloading as the following picture:
Step 3: Once the downloading is accomplished, begin the installation as follows:
It's required that you accept the License Agreement.It's required that you accept the License
Agreement, otherwise the installation will fail.
Step 4: Then for further access, input serial number which you will obtain once purchasing the
product. Or You may have access the product for free within 30 days.
Then you can browse The Kingsoft Office in the file you prefer, or leave it to be automatically
stored.
Then click the Install and wait for it to complete the setup:
Document No. CSS – 2015-001
Date Developed:
March 2, 2017 Date Revised:
Computer March 1, 2017
Systems Page 63 of
Servicing NCII Developed by: 119
Ronaldo B. Racelis Revision No.: 02
Then feel free to choose your favorite interface style and the installation is thus completed.
Till now we've accomplished the Kingsoft Office Installation. You can close it.
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to know how use
the Windows firewall
Windows Firewall with Advanced Security combines a host firewall and Internet
Protocol security (IPsec). Unlike a perimeter firewall, Windows Firewall with
Advanced Security runs on each computer running this version of Windows and
provides local protection from network attacks that might pass through your
perimeter network or originate inside your organization. It also provides computer-
to-computer connection security by allowing you to require authentication and data
protection for communications.
Settings Value
Data integrity
Setting Value
Data encryption
Setting Value
Protocol ESP
Authentication method
Computer Kerberos version 5 authentication is the default authentication method.
Policies created using the Windows Firewall with Advanced Security snap-in and distributed
with Group Policy are applied in this order:
Learning Outcome 4
Contents:
8. Computer Virus
a. Types of Computer Virus
b. Symptoms of an infected computer
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to know the PC’s
common troubleshooting techniques & Strategies.
Here are five common-sense techniques and strategies to solve common computer
hardware problems.
(1) Trial-and-error
Personal computers are highly modular by design. The most powerful trouble-
shooting technique is to isolate the problem to a specific component by trial-and-
error. Swap compatible components and see if the system still works. Try different
peripherals on different machines and see if the same problem occurs. Make one
change at a time.
More than 70% of all computer problems are related to cabling and connections.
Ensure all cables are connected firmly. IDE and floppy ribbon cables and power
cables can often go loose. Ensure microprocessor, memory modules, and adapters
such as video card and sound card are inserted correctly and didn't "pop-up"
during transportation.
Of course the fun could run out quickly once you are frustrated and have spent too
Document No. CSS – 2015-001
Date Developed:
March 2, 2017 Date Revised:
Computer March 1, 2017
Systems Page 72 of
Servicing NCII Developed by: 119
Ronaldo B. Racelis Revision No.: 02
much time on the same problem. If you feel frustrated, it's time to leave it for a
while and go back with some new ideas or call someone who can help. Rule of
thumb: You shouldn't spend more than three hours on the same problem at one
time.
Take notes of what you have done and all the error messages. You may need to use
them later. For instance, when you see unusual blue screen with an error message
you may copy the entire message onto a piece of paper. In many situations, that
message may point to the right direction in getting the problem solved quickly.
It's OK to open a computer case and take a look inside. There is only 5V and 12V
DC voltage supplied to the components outside the power supply. Those who have
never seen the inside of a computer are often amazed by how simple it looks. Of
course, still always power down and unplug the power cord first.
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to know the
troubleshooting for new monitors.
Here are some basic troubles shooting tips for new monitors:
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to know the
troubleshooting for a motherboard
More than 70% of all computer problems are related to cabling and connections.
Ensure all cables are connected and connected firmly. IDE and floppy ribbon
cables and power cables can often go loose. Ensure microprocessor, memory
modules, and adapters such as video card are inserted correctly and didn't "pop-
up" due to vibration.
System has no power at all. Power light does not illuminate, fan of power
supply does not turn on, and indicator light on keyboard does not turn on.
System inoperative. Keyboard lights are on, power indicator lights are lit, and
hard drive is spinning.
Document No. CSS – 2015-001
Date Developed:
March 2, 2017 Date Revised:
Computer March 1, 2017
Systems Page 74 of
Servicing NCII Developed by: 119
Ronaldo B. Racelis Revision No.: 02
PROBABLE CAUSE DIAGNOSIS SOLUTION
Expansion card is partiallyTurn off computer. Take
Using even pressure on
dislodged from expansioncover off system unit.
both ends of the expansion
slot on the motherboard. Check all expansion cards to
card, press down firmly on
ensure they are securely
expansion card.
seated in slots.
Turn system off.
Disconnect the cables from
one of the floppy drives.
Defective floppy disk driveTurn on the system, checkContact Technical
or tape drive. to see if the keyboardSupport.
operates normally. Repeat
until you have located
defective unit.
Defective expansion card. Make sure expansion card
Turn computer off.
is secure in expansion
Remove an expansion card.
socket.
System does not boot from hard disk drive, can be booted from floppy disk
drive.
System only boots from Floppy Disk. Hard Disk can be read and applications
can be used, but booting from Hard Disk is impossible.
Disk formatted on IBM PS/2 will not operate with this system.
After install an expansion card (network card, tape drive card, etc.) the
system no longer works properly.
Screen is blank.
System does not boot from hard disk drive, can be booted from floppy disk
drive.
Problem
Keyboard failure.
No color on screen.
C: drive failure.
PROBABLE CAUSE DIAGNOSIS SOLUTION
Boot from drive A: using
SETUP program does not DOS system disk. Input
have correct information. correct information to
SETUP program.
Hard Drive cable not
Check Hard drive cable.
connected properly.
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to know the
troubleshooting tips after installing a new hard drive.
If you have installed your drive and it does not function properly, perform the
following basic checks:
Warning: Always turn off the computer before changing jumpers or unplugging
cables and cards. Wear a ground strap or use other antistatic precautions while
working on your computer or handling your drive.
Verify compatibility. Verify that the host adapter and drive are appropriately
matched to each other and to your computer. Refer to the relevant
documentation for details.
Check all cards. Verify that all cards are seated in their slots on the
motherboard and secured with mounting screws.
Check all connectors and cables. Make sure all ribbon and power cables are
securely connected. Ribbon cables are easily damaged, especially at the
connector. Try a new cable that you know is good. Make sure no connector
pins are bent. Verify that pin 1 on the interface cable is aligned with pin 1 on
the drive and host adapter (see Figure 2 on page 6).
Verify jumper settings. Review the instructions in this guide and in your
host adapter installation guide. Make sure all appropriate jumpers are
installed or removed as necessary.
Check your power-supply specifications. Each time you add a new device to
your computer, make sure your computer's internal power supply can support
the total power demand. If necessary, consult your dealer for a new power
supply.
If you have performed the preceding basic checks but the problem persists, follow
these guidelines for troubleshooting specific cases:
After you install your new drive, your computer will not boot, and no error
message appears on the screen.
The screen remains blank when you power up the system.
The system does not recognize the drive.
The dealer partitioned and formatted the drive for you in the store, but the
drive does not respond when you install it.
The system hangs in FDISK or fails to create or save the partition record.
The system error message, "Drive not Ready," appears.
The FDISK error message, "No Fixed Disk Present," appears.
The drive does not format to full capacity.
The DOS message "Disk Boot Failure," "Non-System Disk" or "No ROM Basic -
SYSTEM HALTED" appears.
The system error message, "HDD controller failure" appears.
2. After you install your new drive, your computer will not boot, and no error
message appears on the screen.
Turn off your computer, open the case, and remove your new drive.
If the steps listed above do not remedy this problem, try the following:
The dealer partitioned and formatted the drive for you in the store, but the
drive does not respond when you install it.
Reboot the computer and make sure the drive spins up.
Check all cables.
Make sure the power supply is adequate for system needs.
The system hangs in FDISK or fails to create or save the partition record.
Check all cable connections. Make sure pin 1 of the drive is connected to pin 1
of the hard-disc controller or host adapter.
Make sure the power supply is adequate for system needs.
Reboot the computer and make sure the drive spins up.
Verify the drive-type values in the system setup program. One of the following
problems may have occurred:
The values may be set with an incorrect translation characteristic.
You may have entered a parameter value that exceeds the physical capacity of
the drive.
You entered a translation characteristic that does not take full advantage of
the drive's capacity.
The drive's physical specifications exceed the translation limits imposed by the
BIOS.
3
4
5
The DOS message "Disk Boot Failure," "Non-System Disk" or "No ROM Basic -
SYSTEM HALTED" appears.
Reinstall the DOS system files using the DOS SYS utility.
Check all cables.
Use FDISK to verify that the primary partition is active.
Check for viruses.
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to know the
troubleshooting for Network Card.
When you work with network cabling, concentrators (hubs or switch), and NICs
from different venders, it is possible to connect everything and still have no
communication between file servers and workstations.
When there are several unknown variables, it is difficult to determine which
component is broken. Use these tips to isolate the problem.
Determine whether your equipment complies with the 10Base-T or
100Base-TX standard. This is particularly important for hubs and switches.
Connect a straight-through cable from the PC to the hub. The hub
performs an internal crossover so that the signal can go from TD+ to RD+ and
TD- to RD- (see How to Make Network Cables). When you look at an RJ-45
connector from the front, pin 1 is identified on the left-hand side when the
metal contacts are facing up.
Make sure that the TD+ and TD- wires are twisted together , and that
the RD+ and RD- wires are twisted together.Using wires from opposing
pairs can cause signals to be lost. For a 100Base-TX cable, pins #1 and #2 ,
and #3 and #6 must be on the same twisted strand.
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to know the
troubleshooting tips for soundcard.
Microsoft Volume Control or your mixer programs mute options and volume
sliders.
Connect headphones to the stereo phone jack on your CD-ROM drive’s front
panel; adjust the volume control settings on the drive. If there is sound from
your headphones, check the CD audio cable connection from the CD-ROM drive
to the audio card.
Ensure the speakers are properly connected to the audio card’s output
connector.
The audio card joystick port conflicts with another joystick port in the system.
Disable the audio card joystick port, and use the system’s joystick port.
The joystick drivers, MSJSTICK.DRV and VJOYD.VXD, may not be installed.
Uninstall the joystick, then reinstall to load the drivers. The drivers should
come with the driver CD or floppy diskette with your sound card.
Try different resource settings for the audio card, or set the card to use
low DMA.
Move the audio card to another PCI slot. Feedback from the power supply
or another device may be responsible.
Tech Acronyms
Learning Objectives:
After Reading this information sheet you will be able to know the different
Computer and Internet acronyms.
Acronyms Meanings
Computer Virus
Different types of computer viruses would reach you through the normal web activities
like,
1. Opening email attachments from fake accounts.
2. Clicking inappropriate internet advertisements without understanding fully.
3. Installing/downloading the free games, tool-bars or system utilities.
4. Visiting an infected webpage
5. Setting up of software without license agreements and so on.
Not only with web activities, if you are not running the latest updates of your operating
system and not using the good antivirus software, computer viruses would reach you
easily.
1. Macro Virus
Macro virus is a type of email virus which mainly targets to infect the programs that
contain Macros like Microsoft office files. These are mini programs which have the
power to infect the template and document of that file.
3. Multipartite Virus
Multipartite virus spreads in multiple ways and infects the programming files. They
used to hide in the memory like Memory resident virus and do infect the hard disk.
4. Polymorphic Virus
Polymorphic virus are the powerful virus which might guards itself with encryption
algorithm and has the tendency to change automatically when certain conditions are
meet. Because of having encrypting capability, it is tough to find it by even with an
antivirus program.
5. FAT virus
FAT virus spoils the file allocation system section (Information where the location of
files and the details of the available spaces are stored) and might cause crucial damage
to it. It would result in defeating the individual files or complete directories.
Not only these! There are still some common types of computer viruses like Web
scripting viruses, Boot sector viruses, time/logic bombs, direct action viruses, Trojan
horse virus, Root kits, spywares and worms have affinity to disrupts the computer
operation.
In late 1980’s, computer viruses has started to born. Did you know about the first
computer virus? It is “The Brain” released from Pakistan in the year 1986. So the
25th anniversary of the first PC virus was marked in 2011. The danger rating of the
first computer virus is very low, but the most dangerous viruses came into existence in
1990’s. Let’s check some worst types of computer viruses now.
1. Code red
A powerful worm named “Code red” had made the anti-virus researchers in hindrance
and it infected millions of computers and lakhs of servers. It took advantage in
Microsoft internet information server too and was first detected by the employees of
eEye digital security. It is not necessary to open an email attachment or execute a file,
it catches your PC if you open a specific webpage.
2. Melissa
3. My doom
My doom was considered a powerful virus in 2004 as it had the proficiency to stop
accessing the antivirus program by the operating system. This virus spread through
email with the text “Mail transaction failed” and gets downloaded into the system once
the message got clicked. Millions of computers were infested through this virus and
loss was estimated in billions.
4. Nimda
Nimda virus had risen in the year 2001 and it is just the reverse form of the word
“Admin”. This virus targeted to slow down the internet traffic and it propagated to the
system in different ways through emails, while sharing files, server weakness etc. Once
this worm gets activated on the computer, the attacker would have the full control to
the system if certain conditions are meet.
5. Conficker
Conficker is the widespread internet virus and so the anti-virus researchers called it as
“Super worm”. Microsoft operating systems was targeted by this dangerous virus and
so millions of computer which had vulnerable Windows OS had hit by it. This worst
virus might spread through removable drives and assembled in such a way to take the
financial and other vital data from the system.If you’re are using computer from long,
then you might be aware of some other worst types of viruses ike I love you (2000),
Stuxnet (2009), agent.btz (2008), SQL Slammer (2003) and Blackworm (2006).
Now, do check some types of computer viruses which caused significant damage to the
computers in the year 2012.
Shamoon
Shamoon was discovered in August 2012 that has been used for cyber spying. It
infects the system runs on Windows NT, Windows me and Windows 9x. The attacker
uses the “dropper” function to spread in the network to the hard disk of the computer
so that to compile the list of files on attacked computers. Then the attacker receives
the data with the help of “reporter” program. “Wiper” is the function used to erase the
involved files and this might create problems in booting by overwriting action.
Gauss
DNS changer
Cyber-criminals created this virus to redirect the internet traffic to a phishing website.
The DNS changer computer virus modified the Domain Name System (DNS)
configuration of computers and redirects the users to a specific website. FBI got
involved in this virus and the interim servers were official shutdown on July 9, 2012.
Belgian
Belgian is the worst computer virus spreads through spam emails or hacked
webpages. It locked the computers and then asked for some money to unlock the data.
This global virus has the power to gain the remote access to computers to track the
files and launch the malware when Windows gets started.
Flame
Flame is the complex malware found in 2012 which used Bluetooth to send
commands. It was discovered in Russian lab and it grabs the data from chats, emails
and screenshots. It steal sensitive data and infects many computers in Iran and
Middle east countries.
Many types of computer viruses are created everyday and the new computer virus like
Ransomware (freezes the PC and ask to pay ransom to unlock) have started to cause
damage to the computer this year. Even though the anti-virus researches are working
to prevent these actions with powerful anti-virus software, cyber-criminals are
tactically creating the malware.
Computer virus symptoms are a not cast in stone, but rather a moving target. Just
like with the human viral conditions, they evolve through generations – which in
computer technology terms may mean weeks or even days. Some symptoms may not
necessarily mean an infection – for example, if you are sneezing, you do not
necessarily have a flu, it may be just an allergy – which means different cause, and
different treatment methods. Same with computers – if your system seems to be slower
than usual, it may be a symptom of a virus, but it may also be a symptom of “program
overload” – when you have too many programs running at once, and it crashes your
computer system’s performance.
With that in mind, let’s go over some of the most common symptoms that can alert you
to the potential virus within your computer system, or even your computer network,
presented here in no particular order.
If sudden sounds of the CD-ROM tray opening completely out if its own will give you
the heebie jeebies, I don’t blame you! If your hardware – computer, printer, etc. –
started acting up on its own, without you requesting any action by means of keyboard
If you are not doing anything, and your computer seems to be putting in extra effort
and looks like it is communicating with 8th dimension completely by itself, consider an
emergency antivirus scan.
We’ve all been there: working away, and then BAM – nothing happens! You can’t move
your mouse, the keyboard does zilch, you go into panic mode “ouch, did I save that
document I was writing for the past 2 hours?”…. (Now, in the voice of “desperate
housewives narrator: “Yes. We all had the frozen iceberg for a computer before”).
Lockup alone may not necessarily mean you have a virus – it could also be a symptom
of a desperate need for a cleanup (we will be going over it in another article) – but if it
presents itself in array of other symptoms, be on a lookout for a virus.
Check out our Computer Keeps Freezing section for more info
If you notice that certain actions take much longer then usual, you should be
concerned. As in the previous paragraphs – you must account for specifics of certain
files and programs when making a judgment of the slow performance: one PDF
document may take much longer time to open simply because it is of a much larger
size, and it will not be indicative of the computer virus.
However, keep in mind that some viruses can reproduce and multiply your files and
overcrowd disk space, overloading disk usage. In another example, when you are
browsing your documents folders and you notice that it takes – unusually – longer to
browse from one folder to another, or if it takes more and more time to open the same
program, you should be on a lookout for other computer virus symptoms.
If it takes way too long, then it may be a symptom of a viral infection in your computer.
When your computer crashes spontaneously, be careful. After computer restarts, you
may notice it does not seem to run normally. If it self-restarts frequently, every few
minutes – beware of a virus. This symptom alone may indicate that your system is
infected. If your computer crashed, best course of action – Do Not Resuscitate and call
your IT support company.
When you notice that applications on your computer do not work correctly, you may
also notice some of your files are missing. That includes different types of files. Some
may be the files that you created, such as images or documents you had saved on your
drive. You may physically notice absence of those when you actually look for them and
can’t seem to find them anywhere. As a result of computer virus infection your
computer may also be missing system files. As a user, you may not know what they
are and may not notice they are gone, however, if you are trying to use certain
applications (browser, email client, document editor, etc.) sometimes those application
will refuse to run properly and pop up a warning for you that “critical file is missing” –
usually accompanied by the name of the file that is MIA – alerting you to a loss of
some files.
If you are loosing the network connection – or worse yet cannot connect to the USB
drive you just plugged in, or you go to My Computer and only see one drive instead of
your usual X number of drives, you may be in trouble. If you cannot connect to all,
some of the drives or cannot access your CD-ROM, it may be one of the symptoms
indicating your computer is infected.
You may visually notice extra pop ups and extra programs that seem to be running on
your computer, especially on startup. You may notice (if you check for it) that your
disk space suddenly quadrupled in size without you making 200 copies of your
vacation photos folder on your C: drive.
If you cannot get your documents to print correctly, or cannot print at all, you may be
dealing with a virus. First, rule out your printer not being turned on. Next, ensure it is
connected to your network and is not offline. If it turned on and it is online (connected
to your network), and you still have problems with printer, your computer system may
have a virus and may affect not just your drive, but you network, as well.
This may include gibberish messages, messages you hadn’t seen before, undesired ad
messages and such. Special attention must be paid to messages that disguise
themselves as anti-virus warning messages. They are designed to trick you into
thinking that you are at risk, and must take action to protect your computer system.
Sometimes that is how the virus introduces itself into the system, and sometimes it
may already be in your system, and that is how it takes over it, making your more and
more vulnerable, and doing further damage to your computer. Again, when you are in
doubt, it is best to call professional computer Support Company.
If you decide to pay for your antivirus software you can buy it directly from the
antivirus company or head out to your local store with a electronic section and buy
it there.
If you decide to download a free antivirus application you can download it from
directly from the antivirus company's website. If you have dial-up internet it may
take hours to download.
2. Run the installer for your antivirus application. Follow all steps exactly as the
installer says too. About all antivirus installers setup the antivirus application
for maximum protection.
4. Once everything is setup and updated it is also a good idea to run a scan and
remove any virus that may have been on your computer before the antivirus
application was installed.
Computer Basics
Supplies/Materials : Motherboard
Equipment : Motherboard
Steps/Procedure:
1. Identify each part of the motherboard
2. What is the function of that part
Yellow
Red
Orange
Black
Purple
Green
Grey
White
Blue
Steps/Procedure:
1. Disassemble the computer
2. Assemble the Computer
3. Identify the parts of the computer
4. Identify the function of the parts of the computer
Supplies/Materials : PowerISO
Steps/Procedure:
1. Download PowerISO
2. Install PowerISO
3. Create ISO image
Steps/Procedure:
1. Download Rufus
2. Install Rufus
3. Create Bootable flash drive using Rufus
Steps/Procedure:
1. Change the BIOS boot order so the USB device option is listed
first.
2. Create a partition for the hard drive;
Drive C: 40 %
Drive D: 60 %
3. Install Windows Server 2008 R2
4. Put password : asian@12345
Steps/Procedure:
1. Install winRAR
2. Install Network device driver
3. Install kingsoft office
Computer Basics:
http://www.gcflearnfree.org/computerbasics/what-is-a-
computer/1/
Disassembling/Assembling:
http://clhidohsr.blogspot.com/2010/11/steps-for-safe-and-
successful-system.html
https://turbofuture.com/computers/Dissassembling-and-
Assembling-the-computer-system