Computer System Servicing: Quarter 4 - Week 5-8
Computer System Servicing: Quarter 4 - Week 5-8
COMPUTER SYSTEM
SERVICING
Quarter 4 – Week 5-8
Learning Activity Sheets (LAS)
Republic Act 8293, section 176 states that: No copyright shall subsist in any work of the
Government of the Philippines. However, prior approval of the government agency or office
wherein the work is created shall be necessary for exploitation of such work for profit. Such
agency or office may, among other things, impose as a condition the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names, trademarks,
etc.) included in this book are owned by their respective copyright holders. Every effort has
been exerted to locate and seek permission to use these materials from their respective
copyright owners. The publisher and authors do not represent nor claim ownership over them.
2
Week
5 Maintain Network Systems
Objectives:
Network inspection procedures
DIRECTIONS: Read the statement carefully and write your answers in the space provided.
3. ____________ A checklist that will confirm if the maintenance activities have been
performed in order to prolong the life of this particular equipment.
4. ____________ must check the network cables to ensure that they are installed properly
and that they will not create a fire hazard.
The following are the procedures on how to maintain computer system and networks:
1. Duct Systems
Networks are sometimes installed in duct systems. There is a concern that the network
cables might become damaged during construction, so the ducts must be built away from
planned future road construction and utilities, according to the International
Telecommunication Union. The manholes placed in the roads must be kept away from
intersections so that the network installation and repair workers are not at risk of being hit
by a vehicle.
Optical Lasers
Networks that use optical lasers uses invisible radiation that is emitted by these lasers.
Before installing the laser, the laser operation manual and safety guide must be read,
according to Net Ap. No one should stare inside the optical ports from where the lasers emit
their light or else blindness could result. When working with the laser, safety goggles must
always be worn.
Falling
Many networks are run along utility poles, which are wooden poles that have network cables
raised high above the ground. When installing these cables, falling can be disastrous given
the height of the utility poles. Therefore, network installers should wear safety harnesses to
ensure that they do not fall.
4
De-Energize
Some networks have cables that are electrically charged. These cables must be de-energized
and tests should be used to ensure that the cables do not have any remaining electricity in
them. The tools that are used for repairing the cables are insulated so that electricity does
not travel through them and into the hands of the line repairer.
Cable Safety Standards
Network cables must have certain characteristics to be legally used for networks. The cables
must not produce flames that can ignite anything. They must not have halogen. They must
not produce acidic fumes. They must be resistant to ionizing radiation. Cables must be
coded so that those working with the cables can identify what they are.
Cable Inspection
Networks must only be installed by licensed professionals. Building inspectors must check
the network cables to ensure that they are installed properly and that they will not create a
fire hazard. These building inspections are especially important when the property
containing the network cables is sold.
General Safety
Safe working conditions help prevent injury to people and damage to computer equipment.
A safe work space is clean, organized, and properly lighted. Everyone must understand and
follow safety procedures.
Follow the basic safety guidelines to prevent cuts, burns, electrical shock, and damage to
eyesight. As a best practice, make sure that a fire extinguisher and first-aid kit are available
in case of fire or injury. Poorly placed or unsecured cables can cause tripping hazards in a
network installation. Cables should be installed in conduit or cable trays to prevent
hazards.
These are some of the basic safety precautions to observe when working on a computer:
Remove your watch and jewelry and secure loose clothing.
Turn off the power and unplug equipment before performing service.
Cover sharp edges inside the computer case with tape.
Never open a power supply or a CRT monitor.
Do not touch areas in printers that are hot or that use high voltage.
Know where the fire extinguisher is located and how to use it.
Keep food and drinks out of your work space.
Keep your work space clean and free of clutter.
Bend your knees when lifting heavy objects to avoid injuring your back.
Electrical Safety
Follow electrical safety guidelines to prevent electrical fires, injuries, and fatalities in the
home and the workplace. Power supplies and CRT monitors contain high voltage.
CAUTION
Only experienced technicians should attempt to repair power supplies and CRT monitors.
Some printer parts become hot during use, and other parts might contain high voltage.
Check the printer manual for the location of high-voltage components. Some components
retain a high voltage even after the printer is turned off. Make sure that the printer has had
time to cool before making the repair.
Electrical devices have certain power requirements. For example, AC adapters are
manufactured for specific laptops. Exchanging power cords with a different type of laptop or
device may cause damage to both the AC adapter and the laptop.
Follow fire safety guidelines to protect lives, structures, and equipment. To avoid an
electrical shock and to prevent damage to the computer, turn off and unplug the computer
before beginning a repair.
The following are general information on electrical safety:
5
Electrical equipment that is plugged into a power source should NEVER be handled if
your hands or feet are wet.
Do not allow cables and plugs to get wet. Thus, keep liquids away from electrical
equipment.
Unplug equipment by pulling on the plug, not the cord.
Damaged electrical equipment that constitute an electrical hazard are not to be used
until properly repaired or replaced.
Never connect electrical cords in series.
All electrical circuit disconnects or panels must not be blocked.
Ground pins on the plugs and the devices plugged into the receptacles must be intact.
Do not store flammable liquids near electrical equipment.
Fire Safety
Fire can spread rapidly and can be very costly. Proper use of a fire extinguisher can prevent
a small fire from getting out of control. When working with computer components, be aware
of the possibility of an accidental fire and know how to react. Be alert to notice odors being
emitted from computers and electronic devices. When electronic components overheat or
short out, they emit a burning odor. If there is a fire, follow these safety procedures:
Types of Fires
Not all fires are the same. Different fuels create different fires and require different types of
fire extinguishing agents.
Class A
Class B
Class B fires are fires in flammable liquids such as gasoline, petroleum oil
and paint. Class B fires also include flammable gases such as propane and
butane. Class B fires do not include fires involving cooking oils and grease.
Class C
Class C fires are fires involving energized electical equipment such as
motors, transformers, and appliances. Remove the power and the Class C fire
becomes one of the other classes of fire.
Class D
Class D fires are fires in combustible metals such as potassium, sodium,
aluminum, and magnesium.
6
Class K
Class K fires are fires in cooking oils and greases such as animals fats and
vegetable fats.
DIRECTIONS: Read the statement carefully, write True if the statement is correct and write
False if the statement is wrong in the space provided.
________ 1. Carbon Dioxide fire extinguishers snuff fire by taking away the oxygen
7
element of the fire triangle and also be removing the heat with a very cold
discharge.
________ 2. Power supplies and CRT monitors contain normal voltage.
________ 3. When working with computer components, be aware of the possibility of an
accidental fire and know how to react.
DIRECTIONS: Read the statement carefully and incircle the letter of the correct answer:
DIRECTIONS: Read the statement carefully and write your answers in the space provided.
3. ____________ must check the network cables to ensure that they are installed properly
and that they will not create a fire hazard.
5. ____________ A checklist that will confirm if the maintenance activities have been
performed in order to prolong the life of this particular equipment.
8
Answers Key:
Activity 1: Activity 3:
Answers may vary 1. D
Activity 2: 2. B
1. True 3. D
2. False
3. True
References:
https://www.slideshare.net/livedeped/em-tech-tgacadv5112316
https://www.slideshare.net/livedeped/em-tech-readerv6111816
https://www.slideshare.net/markjhonoxillo/empowerment-technologies-ict-as-platform-for-
change
https://www.slideshare.net/grayzon21/ict-as-a-platform-for-change-91254179
https://www.theafricareport.com/24698/top-10-coronavirus-fake-news-items/
9
Week
6 Burn-In Testing
Objectives:
Network inspection procedures
1. This script performs a non-detailed test of most hardware components, excluding those
components that require user input (keyboard, mouse, sound, and video)?
A. full.tst B. input.txt C. noinput.tst D. quick.tst
2. This section shows the following tests conducted against What? DMA Controller Tests,
System Timer Tests, Interrupt Test, Keyboard Controller Tests, PCI Bus Tests, and
CMOS RAM/Clock Tests.
A. CMOS B. Motherboard C. Processor D. Video
3. This script performs a series of tests that require the user to interact with the test
software. These tests are faster than the full.tst but they are less thorough?
A. Input Device B. Multimedia C. noinput.tst D. quick.tst
4. The compare test is used to determine the machine ID for the system. This test is not
available for the Sun Blade X6275 server module?
A. ATAPI Devices B. Hard disk C. Hardware ID D. Processor
5. What will be the name of the output file when you run the continuous burn-in test?
A. PCCHECK.BRN B. PCCHECK.JNL C. PCCHECK.HII D. PCCHECK.xxx
Burn-in testing enables you to run test scripts and to create new scripts. The
Diagnostics main menu provides two burn-in selections, Immediate Burn-In Testing and
Deferred Burn-In Testing.
A. Immediate Burn-In enables you to run an existing script and to select configuration
options. Deferred Burn-In enables you to create a new script.
Standard Scripts
Sun provides three ready-made scripts designed to test the general health of the
devices on your system. These scripts include:
B. quick.tst
This script performs a series of tests that require the user to interact with the test
software. When they require a user interaction, they stop and do not time out. These tests
are faster than the full.tst but they are less thorough. For example, they do not run all the
tests associated with a DIMM.
C. noinput.tst
10
This script performs a non-detailed test of most hardware components, excluding those
components that require user input (keyboard, mouse, sound, and video). This test does not
require user input. It is normally the first test performed for hardware-related problems.
D. full.tst
This script performs a detailed and comprehensive test on all hardware components,
including those that require user input. It includes external port tests and requires loopback
connectors on COM ports, parallel ports, and USB ports. You must interact with the test
utility to progress through these interactive tests.
Selecting show results summary on the diagnostics main menu displays the tests that have
been run and lists the results, which can be Pass, Fail, or Not Applicable.
E. Processor
This section shows the following tests conducted against the processor: Core Processor
Tests, AMD 64-Bit Core Tests, Math Co-Processor Tests - Pentium Class FDIV and Pentium
Class FIST, MMX Operation, 3DNow! Operation, SSE Instruction Set, SSE2 Instruction Set,
and MP Symmetry.
F. Motherboard
This section shows the following tests conducted against the motherboard: DMA
Controller Tests, System Timer Tests, Interrupt Test, Keyboard Controller Tests, PCI Bus
Tests, and CMOS RAM/Clock Tests.
H. Input Device
This section shows the following tests conducted against the input device: Verify
Device, Keyboard Repeat, and Keyboard LEDs.
I. Mouse
This section shows the following tests conducted against the mouse: Buttons,
Ballistics, Text Mode Positioning, Text Mode Area Redefine, Graphics Mode Positions,
Graphics Area Redefine, and Graphics Cursor Redefine.
J. Video
This section shows the following tests conducted against the video: Color Purity Test,
True Color Test, Alignment Test, LCD Test, and Test Cord Test.
K. Multimedia
This section shows the following tests conducted against the multimedia components:
Internal Speaker Test, FM Synthesizer Test, PCM Sample Test, CD/DVD Drive Read Test,
CD/DVD Transfer (KB/Sec), CD/DVD Transfer Rating, CD/DVD Drive Seek Test, CD/DVD
Seek Time (ms), CD/DVD Test Disk Read, and CD/DVD Tray Test.
L. ATAPI Devices
This section shows the following tests conducted against ATAPI devices: Linear Read
Test, Non-Destructive Write, and Random Read/Write Test.
M. Hard Disk
This section shows the following tests conducted against the hard disk: Read Test,
Read Verify Test, Non-Destructive Write Test, Destructive Write Test, Mechanics Stress Test,
and Internal Cache Test.
N. USB
This section shows the following tests conducted against the USB: Controller Tests and
Functional Tests.
O. Hardware ID
12
The compare test is used to determine the machine ID for the system. This test is not
available for the Sun Blade X6275 server module.
Exit
The Exit option exits the PC-Check software and reboots the server module.
PC-Check Filenames
When you run a test, the header of the screen where you invoke the test shows you the
name of the output file. For example, when you run the continuous burn-in test, the name
of the output file is PCCHECK.BRN, as you can see in the following figure.
When you know the name of the output file, you can use the text file editor to view the file.
1. Select the System Information Menu option on the PC-Check Main Menu and press
Enter.
13
FIGURE 178. PC-Check System Information Menu
1. Select the Text File Editor and press Enter. You are prompted for a file name.
3. Type in the file name (for example, PCCHECK.JNL) and press Enter.
The editor opens with the file displayed, as shown here:
_________ 1. The Diagnostics main menu provides two burn-in selections, Immediate Burn-
In Testing and Deferred Burn-In Testing.
_________ 2. Burn-in is a type of test where a computer device or component is run for an
extended length of time in order to identify any potential problem.
_________ 3. A processor (CPU) processes the basic instructions that drive a computer. It
is the main and most crucial integrated circuitry (IC) chip in a computer, as it
is responsible for interpreting most of computer commands.
14
DIRECTIONS: Read the statement carefully and write your answers in the space provided.
1. ______________ By deleting the temporary files on your computer, it will enhance its
speed and will create more disk space for your files.
2. ______________ Protecting your files means creating backups, storing your file backups
on your hard drive or any removable storage device regularly.
3. ______________ Regularly update your anti-virus for your computer protection against
viruses.
1. This script performs a series of tests that require the user to interact with the test
software. These tests are faster than the full.tst but they are less thorough?
A. Input Device B. Multimedia C. noinput.tst D. quick.tst
2. This script performs a non-detailed test of most hardware components, excluding those
components that require user input (keyboard, mouse, sound, and video)?
A. full.tst B. input.txt C. noinput.tst D. quick.tst
3. What will be the name of the output file when you run the continuous burn-in test?
A. PCCHECK.BRN B. PCCHECK.JNL C. PCCHECK.HII D. PCCHECK.xxx
4. This section shows the following tests conducted against What? DMA Controller Tests,
System Timer Tests, Interrupt Test, Keyboard Controller Tests, PCI Bus Tests, and
CMOS RAM/Clock Tests.
A. CMOS B. Motherboard C. Processor D. Video
5. The compare test is used to determine the machine ID for the system. This test is not
available for the Sun Blade X6275 server module?
A. ATAPI Devices B. Hard disk C. Hardware ID D. Processor
15
Answers Key:
References:
https://www.slideshare.net/livedeped/em-tech-tgacadv5112316
https://www.slideshare.net/livedeped/em-tech-readerv6111816
https://www.slideshare.net/markjhonoxillo/empowerment-technologies-ict-as-platform-for-
change
https://www.slideshare.net/grayzon21/ict-as-a-platform-for-change-91254179
https://www.theafricareport.com/24698/top-10-coronavirus-fake-news-items/
16
Week 7
-8 Maintenance of the Computer Systems and Networks
Objectives:
Network inspection procedures
DIRECTIONS: Read the statement carefully, write the correct answer in the space provided.
17
gateway, but it will also test out the DNS and Firewall. Moreover, Network Diagnostic Tool
can also run an Internet connection validation test, in the interest of discovering the
underlying problems and gathering all the information you may need with a minimal level
of effort for you.
The program will assist you during the troubleshooting operation, enabling you to save
significant amounts of time by sparing you from finding the causes of your network
problems by yourself. There are free available network diagnostic tools that can be
download online, such as Wireshark and TCP dump. It will help you monitor your
network performance and highlight discrepancies that might point to underlying malicious
activity.
Testing Demonstration:
To check the vulnerability or stability of your network connection, go to the internet and
download a free network diagnostic tool.
Go to any search engine and type – network diagnostic tool.
After downloading the application, run the setup file of the program and install it into
your computer.
If the program was already installed, run the application. Take note of the diagnosis.
Do some action if there are problems or errors encountered.
System Restore
System Information maintains a history of device drivers that are installed on your
computer. If you are unsure of a computer's recent history, you can use System Information
to better understand what has happened in the past. If a device does not work correctly, and
its history indicates a recent upgrade to a new driver, replace that driver with the original
driver, and test to see if doing so resolves the issue.
System Information also provides access to tools you can use for troubleshooting your
computer.
If you install an update from the Windows Update Web site, and it fails to meet your
expectations, restore the original files by running the Update Wizard Uninstall from the
Tools menu in the System Information tool. If your computer worked fine yesterday, but is
not working properly today, try restoring yesterday's configuration files by running the
System Restore utility from the Tools menu in the System Information tool.
18
Figure 180. System Restore Window
Click Next button, then it will prompt you to restore your computer to the state it was
working properly. Tick on Show More Restore Points then check the box below to
display other possible options you can choose.
After doing the performed task, you will be assessed using the following criteria:
CRITERIA Excellent Good Poor
19
3 2 1
1. Sequence of steps is followed.
2. Safety precaution is observed.
3. Speed (Worked in a fast manner)
Network Monitoring
Network monitoring refers to the practice of overseeing the operation of a computer network
using specialized management software tools. Network monitoring systems are used to
ensure availability and overall performance of computers (hosts) and network services.
1. Open the Command Prompt or Terminal. Every operating system has a command line
interface that will allow you to run the Ping command. The Ping command operates
virtually and identically on all systems. If using Windows, open the Command Prompt.
Click the Start button and enter "cmd" into the Search field. Windows 8 users can type
"cmd" while on the Start screen. Press Enter to launch the Command Prompt.
2. Type ping followed by an IP address or a website address then press Enter key to execute
the command. Here is a brief explanation of commonly used ping commands:
ping 127.0.0.1 (This is a "loopback ping" - your computer trying to talk to itself. If the
loopback step fails, it might be because the TCP drivers are corrupted, the network
adapter might not be working, or another service is interfering with IP.)
ping <IP address> (This will ping the IP address of a device like a local computer,
remote server or any client that receives an IP address to verify that it is reachable
and that you can communicate with it properly.) Example: ping 192.168.1.1 (this is
the default IP address of NETGEAR routers)
ping<website address> (This command will test for the Internet connectivity and DNS
functionality.) Example: ping www.netgear.com, ping google.com
The first arrow shows the computer we are trying to reach is responding. (The DNS
20
address "www.netgear.com" is displayed into the Figure Command Prompt Window
equivalent IP address, 10.1.1.86.) This also shows that the computer is online and it has
Internet access.
The second arrow shows that all of the sent packets are received showing that there
is 0% loss. This means that the connection is available and stable.
The third arrow shows the average time it took to answer. "Average = 0ms" is the
best possible result. This kind of result is usually received if the device you tried to reach
is within the same network.
If the message is "Reply From < IP address >: Destination Host Unreachable,"
then the routing problem occurred at a remote router, whose address is indicated
by the "< IP address >" field. Use the appropriate utility or facility to check the IP
routing table of the router assigned the IP address of < IP address >.
If you pinged using an IP address, retry it with a host name to ensure that
the IP address you tried is correct.
Network Checking
Direction: Check the network status by using the ping command. Make a status
report on the results.
1. Ping a website.
2. Ping the router.
3. Ping a terminal/computer.
Computer Communications
Although computers communicate on many different levels and there is a great deal of
21
variation between the different types of computer systems involved, the basic
communication process is relatively uniform and standardized. Essentially, computers
communicate with one another over networks that are connected via wire or wireless
communication methods. There are many different types of networks, and there are many
different types of network-connection methods as well.
As mentioned before, there are many types of networks. From smallest to biggest, the
most common network types are personal area network, local area network, campus area
network, metropolitan area network, wide area network, global area network and
internetwork. The basic difference between these network types is their size (how many
remote computer systems are connected to them) and their method of connection
For the different computers to be able to distinguish between each other, every
computer has a unique ID called MAC-address (Media Access Control Address). This
address is not only unique on your network but unique for all devices that can be hooked
up to a network. The MAC-address is tied to the hardware and has nothing to do with IP-
addresses. Since all computers on the network receive everything that is sent out from all
other computers, the MAC-address is primarily used by computers to filter out incoming
network traffic that is addressed to the individual computer.
When a computer communicates with another computer on the network, it sends out
both the other computer’s MAC-address and the MAC- address of its own. In that way the
receiving computer will not only recognize that this packet is for it but also who sent this
data packet so a return response can be sent to the sender.
In an Ethernet network as described here, all computers hear all network traffic since
they are connected to the same bus. This network structure is called multi-drop.
One problem with this network structure is that when you have, let say ten (10)
computers on a network and they communicate frequently and due to that they send out
data packets randomly, collisions occur when two or more computers sends data at the
same time. When that happens, data gets corrupted and has to be resent. On a network
that is heavy loaded, even the resent packets collide with other packets and have to be
resent. In reality this soon becomes a bandwidth problem. If several computers
communicate with each other at high speed they may not be able to utilize more than 25%
of the total network bandwidth since the rest of the bandwidth is used for resending
previously corrupted packets.
The way to minimize this problem is to use network switches.
1. These are the two leading companies when it comes to manufacturing processors.
A. Acer And Asus C. Epson And Canon
B. Amd And Intel D. Hp And Dell
2. It is a free open source operating system.
A. Chrome Os C. Mac Os
B. Linux D. Microsoft Windows
3. A cabling is used to connect your wired network adapters to a router or network switch.
A. Coaxial C. Fiber Optic
B. Ethernet D. Internet
1. It is an efficient and reliable tool to help you determine and identify the possible
network issues that prevent you from using your computer to the fullest.
A. Burn-In B. Hardware Software Tool
B. Diagnostic Software Tool D. Network Diagnostic Tool
24
2. A glue that holds your home network together
A. Dsl B. Ethernet Cable C. Hub D. Router
3. Routers have two types of ports available at the back. Which is not part of it?
A. LAN B. MAN C. WAN D. WLAN
4. The standard transfer speed of your wireless connection is __________.
A. 802.11ac B. 801.11g C. 802.11j D. 802.11m
5. It refers to any kind of malicious codes, objects or content that infiltrates your
computer, resulting in damage and causing your system to act in an undesirable
manner.
A. Firmware B. Malware C. Software D. Spyware
Answers Key:
References:
https://www.slideshare.net/livedeped/em-tech-tgacadv5112316
https://www.slideshare.net/livedeped/em-tech-readerv6111816
https://www.slideshare.net/markjhonoxillo/empowerment-technologies-ict-as-platform-for-
change
https://www.slideshare.net/grayzon21/ict-as-a-platform-for-change-91254179
https://www.theafricareport.com/24698/top-10-coronavirus-fake-news-items/
25