0% found this document useful (0 votes)
326 views

Institutional Assessment Tools CSS

The document outlines the requirements and procedures for maintaining and diagnosing faults in computer systems and networks. It lists tasks like preparing tools and materials, checking for updates, backing up files, cleaning components, diagnosing and isolating faults, replacing defective parts, and submitting a report.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
326 views

Institutional Assessment Tools CSS

The document outlines the requirements and procedures for maintaining and diagnosing faults in computer systems and networks. It lists tasks like preparing tools and materials, checking for updates, backing up files, cleaning components, diagnosing and isolating faults, replacing defective parts, and submitting a report.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

INSTITUTIONAL ASSESSMENT TOOLS

Candidate name:

The evidence must show that the trainee…

Demonstratio
Written Test

n&
 Maintenance and/or Diagnosis of faults is planned and
prepared in line with job requirements.
 Tools, equipment and testing devices needed for the
maintenance are obtained and checked for correct
operation and safety.
 Materials necessary to complete the work are obtained in
accordance with established procedures and checked
against job requirements.
 OHS policies and procedures are followed in line with
job requirements.
 Computer systems and networks for maintenance are
checked against job/service order or instructions and
specifications.
 Appropriate personal protective equipment is used in
line with standard procedures.
 Normal function of computer systems and networks are
checked in accordance with manufacturer’s instructions.
 Scheduled/periodic maintenance is performed in
accordance with manufacturer’s requirements.
 Where necessary, needed repairs/ replacements are made
in accordance with established procedures.
 Unplanned events or conditions are responded to in
accordance with established procedures.
 Appropriate personal protective equipment is used in line
with standard procedures.
 *Faults or problems in the computer systems and
networks are diagnosed according to requirements and in
line with the standard procedures.
 Contingency measures are managed and implemented in
accordance with established procedures.
 Unplanned events or conditions are responded to in
accordance with established procedures.
 Appropriate personal protective equipment is used in line
with standard procedures.
 *Defective components or parts are replaced or corrected
without damage to the surrounding environment or
services.
 Adjustments, if necessary are made in accordance with
established procedures.
 Unplanned events or conditions are responded to in
accordance with established procedures.
 Final inspections are undertaken to ensure that the
testing conducted on the device conforms with the
manufacturer’s instruction/manual.
 Computer systems and networks are checked/tested to
ensure safe operation.
 OHS standards and 5S principles are followed according
to enterprise policies.
 Work site is cleaned and cleared of all debris and left in
safe condition in accordance with company procedures.
 Excess components and materials are disposed of based
on WEEE directives and 3Rs waste management
program.
 Report is prepared and completed according to company
requirements.
NOTE: *Critical aspects of competency
Written Test

I. True or False: Write TRUE if the statement is correct and FALSE if it


is wrong. Write your answers on a separate sheet of paper.

1. Spyware refers to any kind of malicious codes, objects or content that


infiltrates your computer, resulting in damage and causing your
system to act in an undesirable manner.
2. Firmware is used to identify problems on a computer or piece of
equipment.
3. Disk cleanup tool rearranges fragmented data so your disks and
drives can work more efficiently.
4. Registry is a system-defined database which is used by an Operating
System to store all the information needed to configure the Windows
settings.
5. System Restore is an application that checks the computer’s hard
drive for errors and bad sectors.
6. Scan Disk is a computer maintenance utility that is included in the
Microsoft Windows operating system and it is designed to free up
space on the hard drive.

7. It is advisable to use cloth in cleaning computer peripherals such as


RAM and motherboard.

8. Always ground or discharge yourself before touching any part of the


computer.

9. Having your firewall turned on will protect you against viruses and
other malwares.

10. Worms can do damage to your computer system.


II. Multiple Choice: Choose the best answer for each of the questions
that follow.

1. You need to add a second hard drive and add more memory to a
computer. What should you do first?
A. Back up all the data.
B. Determine the amount of RAM that is in the system.
C. Run scandisk on the current hard drive.
D. Flash the BIOS with the newest version.
2. You decide to do some preventive maintenance on a computer system,
including blowing out dust and dirt. When you perform the preventive
maintenance, what should you also be doing?
A. Make sure the system has the newest security patches.
B. Replace all the cables.
C. Replace the CMOS battery.
D.Check the conditions of the environment, such as space around the
case for air flow.
3. When the memory test is completed onscreen, you get one short beep.
What is the problem?
A. There is a memory failure.
B. There is a video card failure.
C. There is a loose cable.
D. There is no problem.
4. You have a system that has one short beep with nothing on the screen.
What is most likely the problem?
A. There is a faulty processor.
B. There is a video card failure.
C. There is a loose cable.
D. There is no problem.
5. You have been called to an office where a computer is not functioning
properly. After they tell you the problem, what is the first thing you
should do in troubleshooting the problem?
A. Gather data from the customer.
B. Verify the obvious issues.
C. Isolate the problem.
D. Eliminate possibilities.
E. Document your findings and solutions.
6. After you gather information from the customer, what is the next thing
you should try?
A. Verify the obvious issues.
B. Gather information from the computer.
C. Evaluate the problem and implement the solution.
D. Test the solution.

7. You are called into an office where the user complains that the monitor
is blank. Of these answers, which of the following will you not do?
A. Determine whether the monitor is on.
B. Determine whether the computer is on.
C. Determine whether the contrast and brightness is turned down.
D. Determine the type of computer it is.

8. You have a computer that has been turned on, but the monitor is blank
and none of the fans are spinning. What is the most likely cause of the
problem?
A. The computer is unplugged.
B. The monitor is off.
C. The power supply is bad.
D. The processor is bad.
9. Which of the following can cause a computer to reboot often?
A. An overheating processor
B. A power outage
C. A software upgrade
D. A RAM upgrade
10. You have a client that often shows the incorrect date and time when the
computer is first turned on. Which of the following should fix the
problem?
A. Replace the BIOS chip.
B. Replace the CMOS battery.
C. Replace the hard drive.
D. Reinstall Windows.
Answer Key

I. True or False
1. FALSE

2. FALSE

3. FALSE

4. TRUE

5. FALSE

6. FALSE

7. FALSE

8. TRUE

9. FALSE

10. TRUE

II. Multiple Choice


1. A

2. D

3. D

4. B

5. A

6. A

7. D

8. A

9. A

10. B
Performance Test

Specific Instruction for the Candidate

General Instruction:

Given the necessary tools, materials and equipment, you are required to
install and configure computer systems in accordance with the
accepted institutional/industry standards. (Allotted time: 4
Hours)

Specific Instructions:

1. Prepare tools, supplies, materials & equipment needed to


perform this activity.

2. The trainer will ask you to do the following:


 Check for windows update
 System and file Back-up
 Create restore point
 Update Antivirus software
 Observe OH & S guidelines
 Clean computer components such as mouse, keyboard,
computer case, monitor using appropriate tools.
 Diagnose and isolate computer system and network for
any faults/ problems.
 Accomplished diagnostic and proposal report.
 Troubleshoot and repair if problems occur.
 Replace or correct the defective part.
 Inspect and do the final testing.
 Perform 5S and 3R
 Submit the report to appropriate personnel.

The trainer may conduct oral questioning during and or after your
demonstration.
QUESTIONING TOOL
Satisfactory
Questions to probe the candidate’s underpinning knowledge
response
Extension/Reflection Questions Yes No
1. What is the main reason why we need to maintain computer
systems and networks?  
Answer: to assure the readiness of the equipment.
2. Will it be possible to remove unnecessary advertisements
that are popping up in browsers?
Answer: Yes, by downloading “adblock/ adblock plus” it is an  
extension that is free on google chrome browser. It will disable
annoying ads.
3. Does windows backup utility supports backing up directly
using optical disc such as CD/DVD?
Answer: No, it does not support. It requires a third-party  
software to do that.
4. What is the first thing to do if you experience BSOD or Blue
Screen of Death?
Answer: Find a clue in the error message mostly it is a driver  
that causes the system to crash.
Safety Questions
5. Why do we need to use an Antistatic wristrap?  
Answer: Because it protects our computer components against
Electro-Static Discharge.
6. If the computer system without an antivirus software is  
already being infected with malware, is it ok to just install
antivirus software to remove it?
Answer: No, because it will just infect your recently installed
antivirus software. The best way to remove it is to find an online
scanner in the web or download and run the virus removal tool
available in Kaspersky lab website.
7. Differentiate computer viruses from computer worms?  
Answer: Computer viruses depends to a host program in order to
propagate while computer worms are standalone don not require
a host program or a human help to propagate.
8. What is the purpose of using tagging-out system?  
Answer: This will help the trainees and other personnel to
identify whether a certain equipment needs to left alone or to
operate with extra care.
Contingency Questions
9. How to get rid of electro-static discharge without using  
antistatic wrist wrap or antistatic mat?
Answer: Electro-static discharge or ESD can be released by
touching the non-painted part of the metal case (system unit).
10. No supply of cable ties or zip ties and still there are power  
cords and connectors that needs to be tie together to look neat
and clean, what will be the other option.
Answer: Wires inside the UTP cable are also good for fastening
cords and connectors.
11. Dedicated graphics card is diagnosed to be defective what  
will be the necessary action in order to make the computer
system functional again without spending money?
Answer: the alternative way to make it functional again is to use
the on-board graphics that is built in to the motherboard.
12. The computer system is running slow due to insufficient  
RAM capacity, to increase its performance what is the most
economical way to do it?
Answer: By using Virtual memory you can increase the
performance of the computer system. Instead of buying RAM
which is more expensive you can use your hard disk drive.
System will assign some of the hard disk drive space as virtual
memory in order to speed up the computer system.
Job Role/Environment Questions  
13. Should OH & S needs to observed in maintaining and  
repairing computer systems and networks?
Answer: Yes, because it is designed to prevent accidents and
occupational diseases.
14. Is it ok to use magnetic screwdrivers when maintaining and  
repairing computer system, particularly on hard disk drive?
Answer: Yes, because magnetic field that is generated by the tip
of screwdrivers is not powerful enough to make a damage to the
hard disk drive.
15. Is it required to have Automatic Voltage Regulator(AVR)  
when the computer system have already Uninterruptible
Power Supply (UPS)?
Answer: No, it is because most of the UPS today are already
equipped with surge protection feature.
16. In what way windows firewall protects the computer system  
and its user?
Answer: Windows firewall helps prevent hackers and some
types of malware from getting to your PC through a network or
the Internet. It does this by checking the info that’s coming from
the Internet or a network and then either blocking it or allowing
it to pass through to your PC.
Rules and Regulations  
17. What are the consequences of using pirated software?  
Answer: Companies can be held liable under both civil and
criminal law if caught installing or purchasing unauthorised
software copies - even if the company's executives didn't know
an employee had done so. Illegal software is also a primary
source of computer viruses, which can destroy valuable data or
create serious company downtime.
18. Will the warranty of a laptop void if the user will upgrade  
its RAM?
Answer: No, just make sure that there is no damage to other
components during the process of upgrading.
19. Is it possible for computers in the same network to have the  
same IP address?
Answer: No, that scenario is what we call IP conflict. An IP
address is the computer’s unique identifier. IP conflicts, most
likely happens in a network with a static IP address, wherein
the IP addresses are manually assign by a network
administrator.
20. What is EULA?  
Answer: EULA or End User License Agreement is the contract
between the licensor and purchaser, establishing the
purchaser's right to use the software.
The candidate’s underpinning  Satisfactory  Not
knowledge was: Satisfactory

You might also like