0% found this document useful (0 votes)
121 views

Computer System Servicing: Quarter 4 - Week 5-8

COMPUTER SYSTEM SERVICING WEEK 5

Uploaded by

myrna
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
121 views

Computer System Servicing: Quarter 4 - Week 5-8

COMPUTER SYSTEM SERVICING WEEK 5

Uploaded by

myrna
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 25

11

COMPUTER SYSTEM
SERVICING
Quarter 4 – Week 5-8
Learning Activity Sheets (LAS)

SCHOOLS DIVISION OF DINAGAT ISLANDS


Empowerment Technologies 11/12
Unang Kwarter – Mga Gawain sa Pagkatuto
Ikatatlong Set
Unang Edisyon, 2020

Republic Act 8293, section 176 states that: No copyright shall subsist in any work of the
Government of the Philippines. However, prior approval of the government agency or office
wherein the work is created shall be necessary for exploitation of such work for profit. Such
agency or office may, among other things, impose as a condition the payment of royalties.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names, trademarks,
etc.) included in this book are owned by their respective copyright holders. Every effort has
been exerted to locate and seek permission to use these materials from their respective
copyright owners. The publisher and authors do not represent nor claim ownership over them.

Published by Schools Division of Dinagat Islands

Development Team of the Learning Activity Sheets

Writers: Myrna C. Maglipac


Editor: Nilgen S. Cuaton
Reviewers: Juan Dela Cruz, Juan Dela Cruz Layout Artist:
Fernando O. Galito, Jovelyn Abe Management Team:
Schools Division Superintendent
FELISA G. LARANJO, PhD, CESO VI
OIC, Assistant Schools Division Superintendent Chief Education Supervisor,
SGOD LEONEVEE V. SILVOSA MILA O.
GERALDINO, PhD LOPE C.
Chief Education Supervisor, CID Education Program Supervisor, SHS/TVL
Education Program Supervisor, LRMS Project Development Officer IIPAPELERAS, PhD EDELIZA F.
SDO Librarian II SEGUIS
MICHAEL PASO, PhD

Printed in the Philippines by ___ _

Department of Education – Learning Resource Management Section Office


Address: White Beach, Dinagat, Dinagat Islands
E-mail Address: sample@gmail.com,
lrms.dinagatislands.caraga@deped.gov.ph
Telephone no.: Sample number

2
Week
5 Maintain Network Systems

Name: _____________________________________ Section: _____________

Objectives:
Network inspection procedures

Code: TLE_IACSS9- 12SUCN-IIf-j-36


Time Allotment: 1 Week

PRE - TEST: Fill me!

DIRECTIONS: Read the statement carefully and write your answers in the space provided.

1. ____________ made to guide the personnel in the proper maintenance procedure.

2. ____________ fires involving energized electical equipment such as motors, transformers,


and appliances.

3. ____________ A checklist that will confirm if the maintenance activities have been
performed in order to prolong the life of this particular equipment.

4. ____________ must check the network cables to ensure that they are installed properly
and that they will not create a fire hazard.

5. ____________ called a Networks that are sometimes installed.

Maintain Network Systems


Maintaining computer system and network increases efficiency and saves you from the
hassle and expense associated with major repairs. However, it is essential to understand
how to schedule maintenance plans and implement it accordingly. By learning when
maintenance is practical and developing a scheduling strategy, you can set up maintenance
strategies that are beneficial to your computer system and network.

The following are the procedures on how to maintain computer system and networks:

Create an Equipment Maintenance Schedule


In order to perform the maintenance of your computer efficiently, a maintenance schedule is
made to guide the personnel in the proper maintenance procedure. This will help them
remember the maintenance task that needs to be done in order to improve the functionality
of the computer system and networks.

Create a Maintenance Checklist


To determine if the maintenance program is implemented according to what is planned, an
assessment must be done. The result of the assessment will then be recorded and reported
to the proper authorities for immediate action.
The assessment is through regular inspections which assure that the maintenance activities
are done on the date and time they were was planned and that the performance levels
adhered to the defined standard.
Below is a sample Maintenance Inspection Checklist. This checklist will confirm if the
maintenance activities have been performed in order to prolong the life of this particular
3
equipment. The inspection items are stated in question form as these serve as the criteria or
standards of maintenance.

Perform the computer maintenance task regularly.


Just knowing all the basics of computer maintenance task schedule clearly will not be
enough. Find time to apply all of the maintenance procedure regularly and frequently. Make
computer maintenance activities a regular practice, so that you always have a fine tuned
computer with good performance.
Perform Network Maintenance Procedures
Networks are used to transmit information and electricity through cables. When installing
these networks, at most care must be applied to protect the network installers from injury.
Procedures must also be followed to ensure that those around the network cables do not
become the victims of electrical fires or other hazards.

1. Duct Systems

Networks are sometimes installed in duct systems. There is a concern that the network
cables might become damaged during construction, so the ducts must be built away from
planned future road construction and utilities, according to the International
Telecommunication Union. The manholes placed in the roads must be kept away from
intersections so that the network installation and repair workers are not at risk of being hit
by a vehicle.

Optical Lasers
Networks that use optical lasers uses invisible radiation that is emitted by these lasers.
Before installing the laser, the laser operation manual and safety guide must be read,
according to Net Ap. No one should stare inside the optical ports from where the lasers emit
their light or else blindness could result. When working with the laser, safety goggles must
always be worn.

Falling
Many networks are run along utility poles, which are wooden poles that have network cables
raised high above the ground. When installing these cables, falling can be disastrous given
the height of the utility poles. Therefore, network installers should wear safety harnesses to
ensure that they do not fall.

4
De-Energize
Some networks have cables that are electrically charged. These cables must be de-energized
and tests should be used to ensure that the cables do not have any remaining electricity in
them. The tools that are used for repairing the cables are insulated so that electricity does
not travel through them and into the hands of the line repairer.
Cable Safety Standards
Network cables must have certain characteristics to be legally used for networks. The cables
must not produce flames that can ignite anything. They must not have halogen. They must
not produce acidic fumes. They must be resistant to ionizing radiation. Cables must be
coded so that those working with the cables can identify what they are.
Cable Inspection
Networks must only be installed by licensed professionals. Building inspectors must check
the network cables to ensure that they are installed properly and that they will not create a
fire hazard. These building inspections are especially important when the property
containing the network cables is sold.

General Safety
Safe working conditions help prevent injury to people and damage to computer equipment.
A safe work space is clean, organized, and properly lighted. Everyone must understand and
follow safety procedures.
Follow the basic safety guidelines to prevent cuts, burns, electrical shock, and damage to
eyesight. As a best practice, make sure that a fire extinguisher and first-aid kit are available
in case of fire or injury. Poorly placed or unsecured cables can cause tripping hazards in a
network installation. Cables should be installed in conduit or cable trays to prevent
hazards.
These are some of the basic safety precautions to observe when working on a computer:
 Remove your watch and jewelry and secure loose clothing.
 Turn off the power and unplug equipment before performing service.
 Cover sharp edges inside the computer case with tape.
 Never open a power supply or a CRT monitor.
 Do not touch areas in printers that are hot or that use high voltage.
 Know where the fire extinguisher is located and how to use it.
 Keep food and drinks out of your work space.
 Keep your work space clean and free of clutter.
 Bend your knees when lifting heavy objects to avoid injuring your back.

Electrical Safety
Follow electrical safety guidelines to prevent electrical fires, injuries, and fatalities in the
home and the workplace. Power supplies and CRT monitors contain high voltage.
CAUTION
Only experienced technicians should attempt to repair power supplies and CRT monitors.
Some printer parts become hot during use, and other parts might contain high voltage.
Check the printer manual for the location of high-voltage components. Some components
retain a high voltage even after the printer is turned off. Make sure that the printer has had
time to cool before making the repair.
Electrical devices have certain power requirements. For example, AC adapters are
manufactured for specific laptops. Exchanging power cords with a different type of laptop or
device may cause damage to both the AC adapter and the laptop.
Follow fire safety guidelines to protect lives, structures, and equipment. To avoid an
electrical shock and to prevent damage to the computer, turn off and unplug the computer
before beginning a repair.
The following are general information on electrical safety:

5
 Electrical equipment that is plugged into a power source should NEVER be handled if
your hands or feet are wet.
 Do not allow cables and plugs to get wet. Thus, keep liquids away from electrical
equipment.
 Unplug equipment by pulling on the plug, not the cord.
 Damaged electrical equipment that constitute an electrical hazard are not to be used
until properly repaired or replaced.
 Never connect electrical cords in series.
 All electrical circuit disconnects or panels must not be blocked.
 Ground pins on the plugs and the devices plugged into the receptacles must be intact.
 Do not store flammable liquids near electrical equipment.

Fire Safety
Fire can spread rapidly and can be very costly. Proper use of a fire extinguisher can prevent
a small fire from getting out of control. When working with computer components, be aware
of the possibility of an accidental fire and know how to react. Be alert to notice odors being
emitted from computers and electronic devices. When electronic components overheat or
short out, they emit a burning odor. If there is a fire, follow these safety procedures:

A. Never fight a fire that is out of control or not contained.


B. Always have a planned fire escape route before beginning any work.
C. Get out of the building quickly.
D. Contact emergency services for help.
E. Locate and read the instructions on the fire extinguishers in your workplace before you
use them.
Be familiar with the types of fire extinguishers used in your country or region. Each
type of fire extinguisher has specific chemicals to fight different types of fire.

Types of Fires
Not all fires are the same. Different fuels create different fires and require different types of
fire extinguishing agents.

Class A

Class A fires are fires in ordinary combustibles such as wood, paper,


cloth, trash, and plastics.

Class B
Class B fires are fires in flammable liquids such as gasoline, petroleum oil
and paint. Class B fires also include flammable gases such as propane and
butane. Class B fires do not include fires involving cooking oils and grease.

Class C
Class C fires are fires involving energized electical equipment such as
motors, transformers, and appliances. Remove the power and the Class C fire
becomes one of the other classes of fire.

Class D
Class D fires are fires in combustible metals such as potassium, sodium,
aluminum, and magnesium.
6
Class K
Class K fires are fires in cooking oils and greases such as animals fats and
vegetable fats.

Some types of fire extinguishing agents can be used on more than


one class of fire. Others have warnings where it would be dangerous for the operator to use
a particular fire extinguishing agent.
Different types of fire extinguishers are designed to fight different classes of fire. The
three most common types of fire extinguishers are: Water (APW), Carbon Dioxide (CO2), Dry
Chemical (ABC,BC,DC).
Water and Foam fire extinguishers snuff the fire by taking away the heat element of the fire
triangle. Foam agents also separate the oxygen element from the other elements.
Water extinguishers are for Class A fires only - they should not be used on Class B or C
fires. The discharge stream could spread the flammable liquid in a Class B fire or could
create a shock hazard on a Class C fire.
Carbon Dioxide fire extinguishers snuff fire by taking away the oxygen element of the fire
triangle and also be removing the heat with a very cold discharge.
Carbon dioxide can be used on Class B & C fires. They are usually ineffective on Class A
fires.
Dry Chemical fire extinguishers extinguish the fire primarily by interrupting the chemical
reaction of the fire triangle. Today's most widely used type of fire extinguisher is the
multipurpose dry chemical that is effective on Class A, B, and C fires. This agent also works
by creating a barrier between the oxygen element and the fuel element on Class A fires.
It is important to know how to use a fire extinguisher. Use the memory aid P-A-S-S to
remember the basic rules of fire extinguisher operation:
F. P: Pull the pin.
G. A: Aim at the base of the fire, not at the flames.
H. S: Squeeze the lever.
I. S: Sweep the nozzle from side to side.

Activity 1: Video Tutorial


Directions:
Watch the video on http://www.youtube.com/watch?v=cMCCLKDHXqI and make an outline
of steps on maintenance procedure or the action taken shown in the video.

CRITERIA Percentage Score


1. Originality of format and layout 40%
2. Content of the report 40%
3. Proper use of equipment and materials is
10%
observed.
10%
4. Observance of Safety Precautions
PERFORMANCE RATING

Activity 2: True or False!

DIRECTIONS: Read the statement carefully, write True if the statement is correct and write
False if the statement is wrong in the space provided.

________ 1. Carbon Dioxide fire extinguishers snuff fire by taking away the oxygen
7
element of the fire triangle and also be removing the heat with a very cold
discharge.
________ 2. Power supplies and CRT monitors contain normal voltage.
________ 3. When working with computer components, be aware of the possibility of an
accidental fire and know how to react.

Activity 3: Choose me!

DIRECTIONS: Read the statement carefully and incircle the letter of the correct answer:

1. It refers to a list of the key components that make up the computer.


A. Brand B. Checklist C. Manufactures D. Specs
2. It is an efficient and reliable tool to help you determine and identify the possible network
issues that prevent you from using your computer to the fullest.
A. Burn-in C. Hardware Software tool
B. Diagnostic Software tool D. Network Diagnostic tool
3. It is a computer maintenance utility that is included in the Microsoft Windows operating
system and it is designed to free up space on the hard drive.
A. Data Backup C. Network software tool
B. Disk Cleanup D. Scan Disk

POST TEST: Fill me!

DIRECTIONS: Read the statement carefully and write your answers in the space provided.

1. ____________ called a Networks that are sometimes installed.

2. ____________ made to guide the personnel in the proper maintenance procedure.

3. ____________ must check the network cables to ensure that they are installed properly
and that they will not create a fire hazard.

4. ____________ fires involving energized electical equipment such as motors, transformers,


and appliances.

5. ____________ A checklist that will confirm if the maintenance activities have been
performed in order to prolong the life of this particular equipment.

8
Answers Key:

Pretest Post test


1. Maintenance Schedule 1. Duct System
2. Class C fires 2. Maintenance Schedule
3. Maintenance Inspection 3. Building Inspectors
Checklist 4. Class C fires
4. Building Inspectors 5. Maintenance Inspection
5. Duct System Checklist
1.

Activity 1: Activity 3:
Answers may vary 1. D
Activity 2: 2. B
1. True 3. D
2. False
3. True

References:
https://www.slideshare.net/livedeped/em-tech-tgacadv5112316
https://www.slideshare.net/livedeped/em-tech-readerv6111816
https://www.slideshare.net/markjhonoxillo/empowerment-technologies-ict-as-platform-for-
change
https://www.slideshare.net/grayzon21/ict-as-a-platform-for-change-91254179
https://www.theafricareport.com/24698/top-10-coronavirus-fake-news-items/

9
Week
6 Burn-In Testing

Name: _____________________________________ Section: _____________

Objectives:
Network inspection procedures

Code: TLE_IACSS9- 12SUCN-IIf-j-36


Time Allotment: 1 Week

PRE - TEST: Choose me!


DIRECTIONS: Read the statement carefully and incircle the letter of the correct answer:

1. This script performs a non-detailed test of most hardware components, excluding those
components that require user input (keyboard, mouse, sound, and video)?
A. full.tst B. input.txt C. noinput.tst D. quick.tst
2. This section shows the following tests conducted against What? DMA Controller Tests,
System Timer Tests, Interrupt Test, Keyboard Controller Tests, PCI Bus Tests, and
CMOS RAM/Clock Tests.
A. CMOS B. Motherboard C. Processor D. Video
3. This script performs a series of tests that require the user to interact with the test
software. These tests are faster than the full.tst but they are less thorough?
A. Input Device B. Multimedia C. noinput.tst D. quick.tst
4. The compare test is used to determine the machine ID for the system. This test is not
available for the Sun Blade X6275 server module?
A. ATAPI Devices B. Hard disk C. Hardware ID D. Processor
5. What will be the name of the output file when you run the continuous burn-in test?
A. PCCHECK.BRN B. PCCHECK.JNL C. PCCHECK.HII D. PCCHECK.xxx

Burn-in testing enables you to run test scripts and to create new scripts. The
Diagnostics main menu provides two burn-in selections, Immediate Burn-In Testing and
Deferred Burn-In Testing.

A. Immediate Burn-In enables you to run an existing script and to select configuration
options. Deferred Burn-In enables you to create a new script.

Standard Scripts
Sun provides three ready-made scripts designed to test the general health of the
devices on your system. These scripts include:

B. quick.tst

This script performs a series of tests that require the user to interact with the test
software. When they require a user interaction, they stop and do not time out. These tests
are faster than the full.tst but they are less thorough. For example, they do not run all the
tests associated with a DIMM.

C. noinput.tst

10
This script performs a non-detailed test of most hardware components, excluding those
components that require user input (keyboard, mouse, sound, and video). This test does not
require user input. It is normally the first test performed for hardware-related problems.
D. full.tst

This script performs a detailed and comprehensive test on all hardware components,
including those that require user input. It includes external port tests and requires loopback
connectors on COM ports, parallel ports, and USB ports. You must interact with the test
utility to progress through these interactive tests.

Performing Immediate Burn-In Testing

Use Immediate Burn-In Testing to run test scripts.


To Perform Immediate Burn-In Testing
1. From the Diagnostics main menu, select Immediate Burn-In Testing. The screen
displays a list of settings shown in TABLE 6-3 and a Burn-In menu.
2. From the menu, select Load Burn-In Script.A text box appears.
3. Type the name of the script you want to run, for example quick.tst, noinput.tst, or
full.tst.
4. To change any of the options, select Change Options at the bottom of the screen.
This opens the Burn-In Options menu, which enables you to modify the options listed
in TABLE 6-3 for the currently loaded test script.
5. Select Perform Burn-In Tests.
The diagnostics software executes the test script as configured.
TABLE 6-3 Continuous Burn-In Testing Options
Option Default - Default using All Possible
General quick.tst, Choices
noinput.tst,orfu
ll.tst Script
Pass Control Overall Time Overall Passes Individual
Passes, Overall
Passes, or
Overall Time
Duration 01:00 1 Enter any
number to
choose the time
duration of the
test
Script File N/A quick.tst, quick.tst,
noinput.tst, or noiniput.tst, or
full.tst full.tst
Report File None None User defined
Journal File None D:\ User defined
noinput.jrl,D:\
quick.jrl, or D:\
full.jrl
Journal Options Failed Tests All Tests, Absent Failed Tests, All
Devices, and Tests, Absent
Test Summary Devices, and
Test Summary
Pause on Fail N N Y or N
Screen Display Control Panel Control Panel Control Panel or
Running Tests
POST Card N N Y or N
Beep Codes N N Y or N
11
Maximum Fails Disabled Disabled 1-9999

Show Results Summary

Selecting show results summary on the diagnostics main menu displays the tests that have
been run and lists the results, which can be Pass, Fail, or Not Applicable.

E. Processor
This section shows the following tests conducted against the processor: Core Processor
Tests, AMD 64-Bit Core Tests, Math Co-Processor Tests - Pentium Class FDIV and Pentium
Class FIST, MMX Operation, 3DNow! Operation, SSE Instruction Set, SSE2 Instruction Set,
and MP Symmetry.

F. Motherboard
This section shows the following tests conducted against the motherboard: DMA
Controller Tests, System Timer Tests, Interrupt Test, Keyboard Controller Tests, PCI Bus
Tests, and CMOS RAM/Clock Tests.

G. Memory, Cache Memory, and Video Memory


This section shows the following tests conducted against the various types of memory:
Inversion Test Tree, Progressive Inversion Test, Chaotic Addressing Test, and Block Rotation
Test.

H. Input Device
This section shows the following tests conducted against the input device: Verify
Device, Keyboard Repeat, and Keyboard LEDs.

I. Mouse
This section shows the following tests conducted against the mouse: Buttons,
Ballistics, Text Mode Positioning, Text Mode Area Redefine, Graphics Mode Positions,
Graphics Area Redefine, and Graphics Cursor Redefine.

J. Video
This section shows the following tests conducted against the video: Color Purity Test,
True Color Test, Alignment Test, LCD Test, and Test Cord Test.

K. Multimedia
This section shows the following tests conducted against the multimedia components:
Internal Speaker Test, FM Synthesizer Test, PCM Sample Test, CD/DVD Drive Read Test,
CD/DVD Transfer (KB/Sec), CD/DVD Transfer Rating, CD/DVD Drive Seek Test, CD/DVD
Seek Time (ms), CD/DVD Test Disk Read, and CD/DVD Tray Test.

L. ATAPI Devices
This section shows the following tests conducted against ATAPI devices: Linear Read
Test, Non-Destructive Write, and Random Read/Write Test.

M. Hard Disk
This section shows the following tests conducted against the hard disk: Read Test,
Read Verify Test, Non-Destructive Write Test, Destructive Write Test, Mechanics Stress Test,
and Internal Cache Test.
N. USB
This section shows the following tests conducted against the USB: Controller Tests and
Functional Tests.
O. Hardware ID
12
The compare test is used to determine the machine ID for the system. This test is not
available for the Sun Blade X6275 server module.

Print Results Report


The Print Results Report option enables you to print results of the diagnosis of your
server if it is connected to a printer through a parallel port.

Exit
The Exit option exits the PC-Check software and reboots the server module.

Viewing the PC-Check Results


You can use the text file editor to view the results when you run PC-Check manually.
To do this, you need to know the name of the file or files produced by the tests.

PC-Check Filenames
When you run a test, the header of the screen where you invoke the test shows you the
name of the output file. For example, when you run the continuous burn-in test, the name
of the output file is PCCHECK.BRN, as you can see in the following figure.

FIGURE 177. PC-Check Continuous Burn-in Testing

Other files are named PCCHECK.xxx, for example, PCCHECK.JNL or PCCHECK.HII.


The .HII file is especially important because it shows the entire host configuration at the
time of failure.

Viewing PC-Check Files with the Text File Editor

When you know the name of the output file, you can use the text file editor to view the file.
1. Select the System Information Menu option on the PC-Check Main Menu and press
Enter.

The System Information Menu appears, as shown here:

13
FIGURE 178. PC-Check System Information Menu
1. Select the Text File Editor and press Enter. You are prompted for a file name.
3. Type in the file name (for example, PCCHECK.JNL) and press Enter.
The editor opens with the file displayed, as shown here:

FIGURE 179. PC-Check Journal File in Text Editor


Activity 1: True or False!
DIRECTIONS: Read the statement carefully, write True if the statement is correct and write
False if the statement is wrong in the space provided.

_________ 1. The Diagnostics main menu provides two burn-in selections, Immediate Burn-
In Testing and Deferred Burn-In Testing.
_________ 2. Burn-in is a type of test where a computer device or component is run for an
extended length of time in order to identify any potential problem.
_________ 3. A processor (CPU) processes the basic instructions that drive a computer. It
is the main and most crucial integrated circuitry (IC) chip in a computer, as it
is responsible for interpreting most of computer commands.

Activity 2: Choose me!


DIRECTIONS: Read the statement carefully and incircle the letter of the correct answer:

1. It is a system-defined database which is used by an Operating System to store all the


information needed to configure the Windows settings.
A. Registry B. Register C. Registration D. Registering
2. A windows utility that can check the integrity of your hard disk and can fix various file
system errors.
A. Check disk B. Data Check C. Scandisk D. System Backup
3. Disk ________ rearranges fragmented data so your disks and drives can work more
efficiently.
A. Defrag B. Defragmenter C. Fragmenter D. Software

Activity 3: Fill me!

14
DIRECTIONS: Read the statement carefully and write your answers in the space provided.

1. ______________ By deleting the temporary files on your computer, it will enhance its
speed and will create more disk space for your files.
2. ______________ Protecting your files means creating backups, storing your file backups
on your hard drive or any removable storage device regularly.
3. ______________ Regularly update your anti-virus for your computer protection against
viruses.

POST TEST: Choose me!


DIRECTIONS: Read the statement carefully and incircle the letter of the correct answer:

1. This script performs a series of tests that require the user to interact with the test
software. These tests are faster than the full.tst but they are less thorough?
A. Input Device B. Multimedia C. noinput.tst D. quick.tst
2. This script performs a non-detailed test of most hardware components, excluding those
components that require user input (keyboard, mouse, sound, and video)?
A. full.tst B. input.txt C. noinput.tst D. quick.tst
3. What will be the name of the output file when you run the continuous burn-in test?
A. PCCHECK.BRN B. PCCHECK.JNL C. PCCHECK.HII D. PCCHECK.xxx
4. This section shows the following tests conducted against What? DMA Controller Tests,
System Timer Tests, Interrupt Test, Keyboard Controller Tests, PCI Bus Tests, and
CMOS RAM/Clock Tests.
A. CMOS B. Motherboard C. Processor D. Video
5. The compare test is used to determine the machine ID for the system. This test is not
available for the Sun Blade X6275 server module?
A. ATAPI Devices B. Hard disk C. Hardware ID D. Processor

15
Answers Key:

Activity 1: Activity 2: Activity 3:


Pretest: Post test:
1. True 1. A 1. Disk Cleanup
1. C 1. C
2. True 2. A 2. Data Backup
2. B 2. B
3. True 3. B 3. Computer
3. D 3. D
4. C 4. C Protection
5. A 5. A

References:
https://www.slideshare.net/livedeped/em-tech-tgacadv5112316
https://www.slideshare.net/livedeped/em-tech-readerv6111816
https://www.slideshare.net/markjhonoxillo/empowerment-technologies-ict-as-platform-for-
change
https://www.slideshare.net/grayzon21/ict-as-a-platform-for-change-91254179
https://www.theafricareport.com/24698/top-10-coronavirus-fake-news-items/

16
Week 7
-8 Maintenance of the Computer Systems and Networks

Name: _____________________________________ Section: _____________

Objectives:
Network inspection procedures

Code: TLE_IACSS9- 12SUCN-IIf-j-36


Time Allotment: 2 Weeks

PRE - TEST: Choose me!

DIRECTIONS: Read the statement carefully, write the correct answer in the space provided.

1. A glue that holds your home network together


A. Dsl B. Ethernet Cable C. Hub D. Router
2. The standard transfer speed of your wireless connection is __________.
A. 802.11ac B. 801.11g C. 802.11j D. 802.11m
3. Routers have two types of ports available at the back. Which is not part of it?
A. LAN B. MAN C. WAN D. WLAN
4. It refers to any kind of malicious codes, objects or content that infiltrates your
computer, resulting in damage and causing your system to act in an undesirable
manner.
A. Firmware B. Malware C. Software D. Spyware
5. It is an efficient and reliable tool to help you determine and identify the possible
network issues that prevent you from using your computer to the fullest.
A. Burn-In B. Hardware Software Tool
B. Diagnostic Software Tool D. Network Diagnostic Tool

Diagnostic Software for Network


Network Diagnostic Tool is an efficient and reliable tool to help you determine and identify
the possible network issues that prevent you from using your computer to the fullest. With
Network Diagnostic Tool, you can quickly identify the problems you may be having, which
sometimes occur with home computers that are connected to the web via cable or DSL
modems. The Network Diagnostic Tool is a utility that analyzes your system and performs
a wide range of tests to determine the cause of your connectivity issues by investigating all
your network-related services and programs, looking into your IP configuration and default

17
gateway, but it will also test out the DNS and Firewall. Moreover, Network Diagnostic Tool
can also run an Internet connection validation test, in the interest of discovering the
underlying problems and gathering all the information you may need with a minimal level
of effort for you.
The program will assist you during the troubleshooting operation, enabling you to save
significant amounts of time by sparing you from finding the causes of your network
problems by yourself. There are free available network diagnostic tools that can be
download online, such as Wireshark and TCP dump. It will help you monitor your
network performance and highlight discrepancies that might point to underlying malicious
activity.

Testing Demonstration:

To check the vulnerability or stability of your network connection, go to the internet and
download a free network diagnostic tool.
 Go to any search engine and type – network diagnostic tool.
 After downloading the application, run the setup file of the program and install it into
your computer.
 If the program was already installed, run the application. Take note of the diagnosis.
Do some action if there are problems or errors encountered.

Schedule and Techniques in Maintaining Systems


Regular maintenance is essential to keep a network running well. You should also be
prepared to upgrade equipment and software periodically to take advantage of improving
technology.

System Restore
System Information maintains a history of device drivers that are installed on your
computer. If you are unsure of a computer's recent history, you can use System Information
to better understand what has happened in the past. If a device does not work correctly, and
its history indicates a recent upgrade to a new driver, replace that driver with the original
driver, and test to see if doing so resolves the issue.
System Information also provides access to tools you can use for troubleshooting your
computer.
If you install an update from the Windows Update Web site, and it fails to meet your
expectations, restore the original files by running the Update Wizard Uninstall from the
Tools menu in the System Information tool. If your computer worked fine yesterday, but is
not working properly today, try restoring yesterday's configuration files by running the
System Restore utility from the Tools menu in the System Information tool.

To start Microsoft System Information, use either of the following methods:


 Click Start, point to Programs, point to Accessories, point to System Tools, and then
click System Information.
 Click Start, click Run, type msinfo32.exe in the Open box, and then click OK. To start
System Restore
 Click Start, point to Programs, point to Accessories, point to System Tools, and then
click System Restore; or
 Click Start, click Run, type System Restore in the Open box, and then press Enter key.
Then, it will prompt you to the dialogue box shown below:

18
Figure 180. System Restore Window

 Click Next button, then it will prompt you to restore your computer to the state it was
working properly. Tick on Show More Restore Points then check the box below to
display other possible options you can choose.

Figure 181. System Restore Window with More Restore


 Choose a Restore Point given on the list and select Next.
 Finally, choose Finish button to proceed with the process. Wait for the computer to
automatically restart as it undergoes system restore

Figure 182. Confirm Restore Point Window

After doing the performed task, you will be assessed using the following criteria:
CRITERIA Excellent Good Poor
19
3 2 1
1. Sequence of steps is followed.
2. Safety precaution is observed.
3. Speed (Worked in a fast manner)

Network Monitoring
Network monitoring refers to the practice of overseeing the operation of a computer network
using specialized management software tools. Network monitoring systems are used to
ensure availability and overall performance of computers (hosts) and network services.

Network Monitoring Software Tools


The ping program is one example of a basic network monitoring program. Ping is a network
administration utility or tool used to test connectivity on an Internet Protocol (IP) network. It
also measures the latency or delay between two computers. Ping is a software tool available
on most computers that sends Internet Protocol (IP) test messages between two hosts.
Anyone on the network can run these basic ping tests to verify the connection between two
computers is working and also measure the current connection performance.

Testing Network Connection with Ping Symptoms:


 wants to test the network using Ping
 wants to test the latency of the network

1. Open the Command Prompt or Terminal. Every operating system has a command line
interface that will allow you to run the Ping command. The Ping command operates
virtually and identically on all systems. If using Windows, open the Command Prompt.
Click the Start button and enter "cmd" into the Search field. Windows 8 users can type
"cmd" while on the Start screen. Press Enter to launch the Command Prompt.
2. Type ping followed by an IP address or a website address then press Enter key to execute
the command. Here is a brief explanation of commonly used ping commands:
 ping 127.0.0.1 (This is a "loopback ping" - your computer trying to talk to itself. If the
loopback step fails, it might be because the TCP drivers are corrupted, the network
adapter might not be working, or another service is interfering with IP.)
 ping <IP address> (This will ping the IP address of a device like a local computer,
remote server or any client that receives an IP address to verify that it is reachable
and that you can communicate with it properly.) Example: ping 192.168.1.1 (this is
the default IP address of NETGEAR routers)
 ping<website address> (This command will test for the Internet connectivity and DNS
functionality.) Example: ping www.netgear.com, ping google.com

Here is a screenshot of a successful ping test:

Figure 183. Command Prompt with Ping command

The first arrow shows the computer we are trying to reach is responding. (The DNS
20
address "www.netgear.com" is displayed into the Figure Command Prompt Window
equivalent IP address, 10.1.1.86.) This also shows that the computer is online and it has
Internet access.
The second arrow shows that all of the sent packets are received showing that there
is 0% loss. This means that the connection is available and stable.
The third arrow shows the average time it took to answer. "Average = 0ms" is the
best possible result. This kind of result is usually received if the device you tried to reach
is within the same network.

Common Ping Test Problems


1. Request Timed Out. This message indicates that no reply messages were received
within the default time of 1 second. This can be due to many different causes; the
most common causes are network congestion, failure of the ARP request, packet
filtering, routing error, or a silent discard. Most often, it means that a route back to
the sending host has failed. This might be because the destination host does not
know the route back to the sending host, or one of the intermediary routers does
not know the route back, or even that the destination host's default gateway does
not know the route back. Check the routing table of the destination host to see
whether it has a route to the sending host before checking tables at the routers.
2. Unknown Host
This error message indicates that the requested host name cannot be resolved to its
IP address; check that the name is entered correctly and that the DNS servers can
resolve it.
3. Destination Host Unreachable
This message indicates one of two problems: either the local system has no route to
the desired destination, or a remote router reports that it has no route to the
destination. The two problems can be distinguished by the form of the message. If
the message is simply "Destination Host Unreachable," then there is no route from
the local system, and the packets to be sent were never put on the wire. Use the
Route utility to check the local routing table.

If the message is "Reply From < IP address >: Destination Host Unreachable,"
then the routing problem occurred at a remote router, whose address is indicated
by the "< IP address >" field. Use the appropriate utility or facility to check the IP
routing table of the router assigned the IP address of < IP address >.
If you pinged using an IP address, retry it with a host name to ensure that
the IP address you tried is correct.

Practicing TCP/IP Networking Skills


While connected to the Internet or another TCP/IP network, answer these questions:
1. What is your current IP address?
2. Release and renew your IP address. What is your new IP address?
3. Are you using dynamic or static IP addressing? How do you know?
4. What is your adapter address for this connection?
5. What is your default gateway IP address?

Network Checking
Direction: Check the network status by using the ping command. Make a status
report on the results.
1. Ping a website.
2. Ping the router.
3. Ping a terminal/computer.

Computer Communications
Although computers communicate on many different levels and there is a great deal of
21
variation between the different types of computer systems involved, the basic
communication process is relatively uniform and standardized. Essentially, computers
communicate with one another over networks that are connected via wire or wireless
communication methods. There are many different types of networks, and there are many
different types of network-connection methods as well.
As mentioned before, there are many types of networks. From smallest to biggest, the
most common network types are personal area network, local area network, campus area
network, metropolitan area network, wide area network, global area network and
internetwork. The basic difference between these network types is their size (how many
remote computer systems are connected to them) and their method of connection

Methods of Connection Commonly Used


There are many different types of connection media that are used in contemporary
society to connect computer networks to one another. In terms of wired connections, there
is coaxial cable, fiber-optic cable, USB cable and traditional telephone lines. These are the
most common network connections. Wireless technologies differ hugely from one another,
but the most popular kinds are Bluetooth and WiFi.

How network works - Computers in network


General Network Techniques - When computers communicate on a network, they send
out data packets without knowing if anyone is listening. Computers in a network all have a
connection to the network and that is called to be connected to a network bus. What one
computer sends out will reach all the other computers on the local network.

Figure 184. General Network

For the different computers to be able to distinguish between each other, every
computer has a unique ID called MAC-address (Media Access Control Address). This
address is not only unique on your network but unique for all devices that can be hooked
up to a network. The MAC-address is tied to the hardware and has nothing to do with IP-
addresses. Since all computers on the network receive everything that is sent out from all
other computers, the MAC-address is primarily used by computers to filter out incoming
network traffic that is addressed to the individual computer.
When a computer communicates with another computer on the network, it sends out
both the other computer’s MAC-address and the MAC- address of its own. In that way the
receiving computer will not only recognize that this packet is for it but also who sent this
data packet so a return response can be sent to the sender.
In an Ethernet network as described here, all computers hear all network traffic since
they are connected to the same bus. This network structure is called multi-drop.
One problem with this network structure is that when you have, let say ten (10)
computers on a network and they communicate frequently and due to that they send out
data packets randomly, collisions occur when two or more computers sends data at the
same time. When that happens, data gets corrupted and has to be resent. On a network
that is heavy loaded, even the resent packets collide with other packets and have to be
resent. In reality this soon becomes a bandwidth problem. If several computers
communicate with each other at high speed they may not be able to utilize more than 25%
of the total network bandwidth since the rest of the bandwidth is used for resending
previously corrupted packets.
The way to minimize this problem is to use network switches.

Set up a DSL or cable connection


To set up a Digital Subscriber Line (DSL) or cable connection, you first
need an account with an Internet Service Provider (ISP). For DSL, the ISP is usually a phone
22
company; for cable, it is usually a cable TV provider.
You will also need a modem, a router, or a device that combines the two. When you
have your modem and router or your combination device, follow the corresponding steps
below.

FIGURE 185. Combined Modem and Route

How to plug in a combined modem and router properly


1. Plug the device into an electrical outlet.
2. Plug one end of a phone cord or cable into the wide area network (WAN) port of the
device, and then plug the other end into the wall jack. The WAN port should be labeled
"WAN." (DSL users: Do not use a DSL filter on the phone line.)
3. Plug one end of an Ethernet cable into the local area network (LAN) port on the device,
and then plug the other end into the networking port of the computer that you want to
connect to the Internet. The LAN port should be labeled "LAN." (If you are connecting
wirelessly, skip this step.)
4. Start ( or restart) the computer.
5. Open the connect to the Internet wizard by clicking the Start button, clicking Control
Panel, click Network and Internet, click Network and Sharing Center, click Set up a
connection or network, and then click Connect to the Internet.

FIGURE 186. Modem and Router properly

How to plug in modem and router properly


1. Plug the modem into an electrical outlet.
2. Plug one end of a phone cord or cable into the modem, and plug the other
end into the wall jack. (DSL users: Do not use a DSL filter on the phone line.)
3. Plug one end of an Ethernet cable into the modem, and plug the other end
into the wide area network (WAN) port on the router.
4. Plug the router into an electrical outlet.
5. Plug one end of an Ethernet cable into the local area network (LAN) port on
the router, and plug the other end into the networking port on the computer
23
that you want to connect to the Internet. (If you are connecting wirelessly,
skip this step.)
6. Start (or restart) the computer.
7. Open the connect to the Internet wizard by clicking the Start button , clicking
Control Panel, clicking Network and Internet, clicking Network and Sharing
Center, clicking Set up a connection or network, and then clicking Connect to
the Internet.

Activity 1: Network Diagnostics for Windows XP tool


Directions: Visit the link on http://support.microsoft.com/kb/914440. Follow the
instructions given and apply them to your computer. You are to be rated
according to the rubric below.

Rubric for your Performance Test


CRITERIA Excellent Good Fair Poor
4 3 2 1
Adherence to the sequence of setup
-Followed carefully the given
instructions.
Workmanship -Had organized
materials and tools while
accomplishing the task and has
time management.
Quality of work -Presented a neat
final output.

Activity 2: Fill me!


DIRECTIONS: Read the statement carefully and write your answers in the space provided.

1. ____________ Installing passwords makes your files more secure.


2. __________ Maintenance of equipment or systems before fault occurs.
3. __________ This will allow proper circulation of air inside the computer unit.

Activity 3: Multiple Choice:


DIRECTIONS: Read the statement carefully, choose and encircle the letter of the correct
answers.

1. These are the two leading companies when it comes to manufacturing processors.
A. Acer And Asus C. Epson And Canon
B. Amd And Intel D. Hp And Dell
2. It is a free open source operating system.
A. Chrome Os C. Mac Os
B. Linux D. Microsoft Windows
3. A cabling is used to connect your wired network adapters to a router or network switch.
A. Coaxial C. Fiber Optic
B. Ethernet D. Internet

POST TEST: Choose me!


DIRECTIONS: Read the statement carefully, write the correct answer in the space provided.

1. It is an efficient and reliable tool to help you determine and identify the possible
network issues that prevent you from using your computer to the fullest.
A. Burn-In B. Hardware Software Tool
B. Diagnostic Software Tool D. Network Diagnostic Tool
24
2. A glue that holds your home network together
A. Dsl B. Ethernet Cable C. Hub D. Router
3. Routers have two types of ports available at the back. Which is not part of it?
A. LAN B. MAN C. WAN D. WLAN
4. The standard transfer speed of your wireless connection is __________.
A. 802.11ac B. 801.11g C. 802.11j D. 802.11m
5. It refers to any kind of malicious codes, objects or content that infiltrates your
computer, resulting in damage and causing your system to act in an undesirable
manner.
A. Firmware B. Malware C. Software D. Spyware

Answers Key:

Pre test: Post test: Activity 1:


1. D 1. D Answers may vary Activity 3:
2. A 2. D Activity 2: 1. B
3. B 3. B 1. Data Protection 2. B
4. B 4. A 2. Preventive 3. B
5. D 5. B Maintenance
3. Cooling

References:
https://www.slideshare.net/livedeped/em-tech-tgacadv5112316
https://www.slideshare.net/livedeped/em-tech-readerv6111816
https://www.slideshare.net/markjhonoxillo/empowerment-technologies-ict-as-platform-for-
change
https://www.slideshare.net/grayzon21/ict-as-a-platform-for-change-91254179
https://www.theafricareport.com/24698/top-10-coronavirus-fake-news-items/

25

You might also like