0% found this document useful (0 votes)
44 views

Uc4 Lo1-Css CBLM

Uploaded by

christiandayo74
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views

Uc4 Lo1-Css CBLM

Uploaded by

christiandayo74
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 60

COMPETENCY BASED LEARNING

MATERIALS

Sector:
ELECTRONICS

Qualification:
COMPUTER SYSTEMS SERVICING NCII

Unit of Competency:
MAINTAIN AND REPAIR COMPUTER SYSTEMS AND NETWORKS

Module Title:
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS

JCEP COLLEGE TECHNOLOGY INTERNATIONAL INC.


Purok 2B, Jcep Village, Bago Gallera, Talomo, Davao City Philippines
COMPUTER SYSTEMS SERVICING NC II

Table of Contents
Module of Instruction ....................................................................................iii
List of Competencies .....................................................................................iv
Module Content ............................................................................................v
Learning Outcome – Core Competencies
LO1 – Plan and Prepare for Maintenance and Repair .....................................1
Learning Experiences ....................................................................................2
Information Sheet 4.1 – 1: Procedures in planning and conducting
maintenance ……………………………………….........4
Self-Check 4.1 – 1..........................................................................................15
Answer Key 4.1 – 1 ........................................................................................16
Task Sheet 4.1 – 1 .........................................................................................17
Performance Criteria Checklist 4.1 – 1 ...........................................................19
Information Sheet 4.1 – 2: Tools, equipment and testing devices ....................20
Self-Check 4.1 – 2...........................................................................................25
Answer Key 4.1 – 2 .........................................................................................26
Task Sheet 4.1 – 2 ..........................................................................................27
Performance Criteria Checklist 4.1 – 2.............................................................28
Information Sheet 4.1 – 3: Personal Computer System and Specification .........29
Self-Check 4.1 – 3............................................................................................33
Answer Key 4.1 – 3 ..........................................................................................34
Task Sheet 4.1 – 3 ...........................................................................................35
Performance Criteria Checklist 4.1 – 3..............................................................36
Information Sheet 4.1 – 4: Occupational health and safety procedures .............37

Date Prepared: Document No. JCEP-CSS-2024


COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA ii of vii
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01
Self-Check 4.1 – 4.............................................................................................38
Answer Key 4.1 – 4 ...........................................................................................39
Task Sheet 4.1 – 4 ............................................................................................40
Performance Criteria Checklist 4.1 – 4...............................................................41
Information Sheet 4.1 – 5: Network maintenance task .......................................42
Self-Check 4.1 – 5..............................................................................................47
Answer Key 4.1 – 5 ............................................................................................48
Task Sheet 4.1 – 5 .............................................................................................49
Performance Criteria Checklist 4.1 – 5................................................................50
References .........................................................................................................51

Date Prepared: Document No. JCEP-CSS-2024


COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA iii of vii
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01
HOW TO USE THIS COMPETENCY BASED LEARNING
MATERIAL

Welcome!

The unit of competency "Maintain and Repair Computer


Systems and Networks", is one of the competencies of Computer
Systems Servicing NC II, a course which comprises the knowledge,
skills and attitude required for a TVET trainer to possess.

The module, Maintaining and repairing computer systems and


networks, contains training materials and activities related to Plan
and prepare for maintenance and repair, maintain computer systems
and networks, diagnose faults of computer systems and networks,
rectify/correct defects in computer systems and networks, and
inspect and test computer systems for you to complete.

In this module, you are required to go through a series of


learning activities in order to complete each learning outcome. In each
learning outcome are Information Sheets, Self-checks, Task
Sheets and Operation Sheets. Follow these activities on your own. If
you have questions, don‘t hesitate to ask your facilitator for assistance.

Remember to:

1. Read information sheets and complete the self-checks.


Suggested references are included to supplement the
materials provided in this module.
2. Perform the Task Sheets and Operation Sheets until you
are confident that your outputs conform to the Performance
Criteria Checklist that follows the sheets.
3. Submit outputs of the task sheets and job sheets to your
facilitator for evaluation and recording in the
Accomplishment Chart. Outputs shall serve as your
portfolio during the Institutional Competency Evaluation.
When you feel confident that you have had sufficient
practice, ask your trainer to evaluate you. The results of
your assessment will be recorded in your Progress Chart
and Accomplishment Chart.

You must pass the Institutional Competency Evaluation for this


competency before moving to another competency. A Certificate of
Achievement will be awarded to you after passing the evaluation.

You need to complete this module to be called competent.


COMPUTER SYTEMS SERVICING NC II

Date Prepared: Document No. JCEP-CSS-2024


COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA iv of vii
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01
COMPETENCY – BASED LEARNING MATERIALS LIST OF
COMPETENCIES

No. Unit of Competency Module Title Code

1. Install and configure Installing and configuring ELC724331


computer systems computer systems

2. Set-up computer Setting-up ELC724332


networks computer networks

3. Set-up computer Setting-up ELC724333


servers
computer servers

4. Maintain and repair Maintaining and ELC724334


computer systems repairing computer
and networks systems and networks
Date Prepared: Document No. JCEP-CSS-2024
COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA v of vii
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01

MODULE CONTENT

UNIT OF Maintain and Repair Computer And


COMPETENCY Systems Networks
MODULE TITLE Maintaining and Repairing And
Systems Networks

MODULE DESCRIPTOR This unit covers the knowledge, skills


and
attitudes needed to maintain and repair
computer systems and networks

NOMINAL DURATION 40 hours

LEARNING OUTCOMES:
At the end of this module you MUST be able to:
1. Plan and prepare for maintenance and repair
2. Maintain computer systems and networks
3. Diagnose faults of computer systems and networks
4. Rectify/correct defects in computer systems and
networks
5. Inspect and test configured computer systems and
networks

ASSESSMENT CRITERIA:
1. Maintenance and/or Diagnosis of faults is planned and
prepared in line with job requirements.
2. Tools, equipment and testing devices needed for the
maintenance are obtained and checked for correct
operation and safety.
3. Materials necessary to complete the work are obtained in
accordance with established procedures and checked against
job requirements
4. OHS policies and procedures are followed in line with job
requirements.
5. Computer systems and networks for maintenance are
checked against job/service order or instructions and
specifications.
6. Appropriate personal protective equipment is used in line
with standard procedures.
7. Normal function of computer systems and networks are
checked in accordance with manufacturer‘s instructions.
Date Prepared: Document No. JCEP-CSS-2024
COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA vi of vii
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01

8. Scheduled/periodic maintenance is performed in accordance with


manufacturer‘s requirements.
9. Where necessary, needed repairs/replacements are made in
accordance with established procedures.
10. Unplanned events or conditions are responded to in
accordance with established procedures.
11. Faults or problems in the computer systems and networks are
diagnosed according to requirements and in line with the
standard procedures.
12. Contingency measures are managed and implemented in
accordance with established procedures.
13. Defective components or parts are replaced or corrected
without damage to the surrounding environment or
services.
14. Adjustments, if necessary are made in accordance with
established procedures.
15. Final inspections are undertaken to ensure that the testing
conducted on the device conforms with the manufacturer‘s
instruction/manual
16. Computer systems and networks are checked/tested to
ensure safe operation.
17. OHS standards and 5S principles are followed according to
enterprise policies.
18. Work site is cleaned and cleared of all debris and left in
safe condition in accordance with company procedures.
19. Excess components and materials are disposed of based
on WEEE directives and 3Rs waste management program.
20. Report is prepared and completed according to company
requirements.
Date Prepared: Document No. JCEP-CSS-2024
COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA vii of vii
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01

LEARNING OUTCOME NO.1 PLAN AND PREPARE FOR MAINTENANCE AND


REPAIR

Contents:

1. Procedures in Planning and Conducting Maintenance


2. Tools and Equipment and their Function
3. Personal Computer System Specification
4. Occupational Health and Safety Procedures
5. Network Maintenance Task

Assessment Criteria

1. Maintenance and/or Diagnosis of faults is planned and


prepared in line with job requirements.
2. Tools, equipment and testing devices needed for the
maintenance are obtained and checked for correct
operation and safety
3. Materials necessary to complete the work are obtained in
accordance with established procedures and checked against
job requirements.
4. OHS policies and procedures are followed in line with job
requirements.
5. Computer systems and networks for maintenance are
checked against job/service order or instructions and
specifications.

Conditions

The students/trainees must be provided with the following:

1. OH & S policies and procedures


a) Manuals
2. Tools
a) Pliers
b) Philips screw driver
3. Equipment/testing devices
a) Computer
Assessment Method:

a. Observation with oral Questioning


b. Interview
c. Portfolio

Date Prepared: Document No. JCEP-CSS-2024


COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA 1 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01

Learning Experiences

LEARNING OUTCOME NO. 1

Plan and Prepare For Maintenance and Repair


Learning Activities Special Instructions

Read Information Sheet 4.1-1


This learning outcome deals with the
on Procedures in Planning and
development of the institutional
Conduction Maintenance
competency evaluation tool which
Answer Self Check 4.1-1, trainers us in evaluating their
compare answer with the trainees after finishing a
answer key 4.1-1 competency of the qualification
Perform Task Sheet 4.1-1 on Go through the learning activities
Procedures in Planning and outlined for you on the left column
Conduction Maintenance to gain the necessary information or
Read Information Sheet 4.1-2 knowledge before doing the task to
on practice making the parts of the
Tools, Equipment and Testing evaluation tool
devices
Answer Self Check 4.1-2, The output of this LO is a complete
compare answer with the Institutional competency evaluation
answer key 4.1-2 package for one competency of your
Perform Task Sheet 4.1-2 on qualification
Tools, Equipment and Testing Your output shall serve as one of
devices your portfolio for your Institutional
Read Information Sheet 4.1-3 on competency evaluation for plan
Personal Computer System and training sessions
Specification Feel free to show your outputs to
your trainer for guidance and
Answer Self Check 4.1-3,
evaluation of your output
compare answer with the
answer key 4.1-3
Perform Task Sheet 4.1-3 on
Personal Computer System
and
Specification
Date Prepared: Document No. JCEP-CSS-2024
Read Information Sheet 4.1-4
COMPUTER OCTOBER 2024 Issued by:
on JCEP COLLEGE
SYSTEMS Page
Occupational Health and Safety Prepared by: TECHNOLOGY
SERVICING NCII
Procedures INTERNATIONA 2 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01

Answer Self Check 4.1-4,


compare answer with the answer
key 4.1-4
Perform Task Sheet 4.1-4 on
Occupational Health and Safety
Procedures
Read Information Sheet 4.1-5 on
Network maintenance task
Answer Self Check 4.1-5,
compare answer with the answer
key 4.1-5
Perform Task Sheet 4.1-5 on
Network maintenance task
After performing the activities of
LO1
you may proceed to LO2

Date Prepared: Document No. JCEP-CSS-2024


COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA 3 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01

Information Sheet 4.1-1


PROCEDURES IN PLANNING AND CONDUCTING
MAINTENANCE

Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Identify the different maintenance procedures in taking
care of computers;
2. Diagnose a Faulty Computer and Network System.

Preventive Maintenance

Preventive maintenance can be described as maintenance of


equipment or systems before fault occurs. It can be divided into two
subgroups: Planned Maintenance and Conditioned-Based
Maintenance.

Planned Maintenance (PM) is any variety of scheduled


maintenance to an object or item of equipment. Specifically, PM is a
scheduled service visit carried out by a competent and suitable agent,
to ensure that an item of equipment is operating correctly to avoid
any unscheduled breakdown and downtime of equipment.

Condition Based Maintenance (CBM) is a maintenance strategy


that uses the actual condition of the asset to decide what
maintenance needs to be done. CBM dictates that maintenance
should only be performed when certain indicators show decreasing
performance or upcoming failure. Checking a machine for these
indicators may include non-invasive measurements, visual inspection,
performance data and scheduled tests. Condition data can be
gathered at certain intervals, or continuously.

The purpose of systematic inspection, detection and correction of


existing future problems is very important to maintain equipment
facilities in satisfactory condition before it may cause major problem.

Maintenance, including tests, measurements, adjustments, and


parts replacement, performed specifically to prevent faults from
occurring. Maintenance is divided into two (2) general types.
Preventive maintenance is
Date Prepared: Document No. JCEP-CSS-2024
COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA 4 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01

given for maintaining equipment and facilities in satisfactory operating


condition to extend the life of the equipment. Corrective maintenance is
task performed to identify, isolate and rectify a fault so that the failed
equipment or system can be restored to an operational condition within
the tolerances or limits.

Common methods of determining what preventive (or other)


failure management policies should be applied are: Original
Equipment Manufacturer (OEM) recommendations, requirements of
codes and legislation within a jurisdiction, what an "expert" thinks
ought to be done, or the maintenance that is already done to similar
equipment, and most important measured values and performance
indications

Maintenance Procedures

In preparing maintenance procedure, you also have to consider


designing a systematic plan for both for hardware and software. This
saves time, money and frustration and ensures safe conditions to
prevent injury to people and damage to computer equipment.

Planning Maintenance Procedures for Computer System and Networking:


A. Design a systematic maintenance plan for hardware.
1. Design a monitoring, evaluating and updating plan
2. Place your computer in a well-ventilated area.
3. Schedule the use of computer for its longer life.
4. Move the computer only when it is turned off and unplugged.
5. Treat your computer properly.

B. Design a systematic maintenance plan for your software.


1. Backup your files.
2. Install or secure passwords.
3. Delete temporary files.
4. Update anti-virus and spyware.

Date Prepared: Document No. JCEP-CSS-2024


COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA 5 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01
Do systematic maintenance plan for your computer hardware.

The goal of systematic maintenance is to reduce downtime by


continuously checking that your machines are working optimally. With
systematic maintenance, you have the opportunity to minimize errors
and breakdowns and thereby ensure a longer service life of your
machines.

1. Place your computer in a well-


ventilated area.

 This will allow proper circulation of


air inside the computer unit.

2. Schedule the use of


computer for its longer life.

 This will help lessen the attacks of


viruses and increases the life span
of your computer.

3. Move the computer only


when it is turned off and
unplugged.

 To avoid damage to the computer


unit always turn off and unplug it
when transferring the computer to
another location.

4. Treat your computer properly.

 This means taking care of your


computer. PCs and laptops should
be properly turned off.

Date Prepared: Document No. JCEP-CSS-2024


COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA 6 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01
Do systematic maintenance plan for your computer software.

The goal of systematic maintenance is to reduce downtime by


continuously checking that your machines are working optimally. With
systematic maintenance, you have the opportunity to minimize errors
and breakdowns and thereby ensure a longer service life of your
machines.

1. Back-up your files


 Protecting your files means
creating backups, storing your
file backups on your hard drive
or any removable storage device
regularly.

2. Install or secure passwords.


 Installing passwords makes
your files more secure.

3. Delete temporary files.


 Deleting the temporary files on
your computer will enhance its
speed and will create more disk
space for your files.

4. Update anti-virus and spy ware.


 Updating anti-virus and spy ware
will protect your computer from
viruses and other types of
malwares, such as ransom ware
and spyware.

Date Prepared: Document No. JCEP-CSS-2024


COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA 7 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01

Diagnoses and Identification of Faulty Computer and Network


Systems

The following topics will familiarize you with planning and


preparing for installation; installing equipment and devices; and
conducting test on the installed computer system. Read carefully all
the topics and apply the skills you have gained from the lessons
provided in this module.

A. Preventing Computer Systems Failure

Computers, in general, are pretty stable, and you can usually


rely on them to not fail you. However, if you develop some basic
habits, you can postpone serious computer problems, if not avoiding
them entirely.

1. Computer issues.
Know that your computer is going to fail.
You need to treat your computer as if it were a
doomed failure. Always assume that failure is
imminent.

A fatal error results in data loss, damage to your


computer and/or its ability to function, hardware
failure, or other serious issues.

Signs of imminent failure might include regular poor


performance, frequent errors and/or pop-ups, unknown programs
being installed, frequent power loss (the computer shuts down
automatically frequently), frequent crashes, or certain parts not
working.

2. Dust issues. Preventing failure means


making sure your computer is physically
clean in its operations. Make sure that there
is not too much dust inside, especially on
the fans. Dust can reduce performance and
cause overheating.

3. RAM issues. Know your computer's


specifications and its limits. RAM runs even
the PC is running idly. It consumes RAM
storages capacity making you difficult to
open a program if RAM storage had been
consumed.

Date Prepared: Document No. JCEP-CSS-2024


COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA 8 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01
4. Malware issues. Make sure that your
anti- virus software is updated to be able to
scan unnecessary files that enter your PC.
Do not install programs that you‘re not
familiar with or if do not fully trust.

5. Hardware issues. When something is


not working properly, either diagnose the
problem yourself and fix it, to prevent further
damage or contact a professional and have
them look at it for you. Take advantage of
warranties on parts if they fail.

6. Warning issues. If the same error


message shows up every time you log in, be
sure to investigate it. Although unlikely, these
errors could be important.

7. Usage issues. Give your computer a


break. Believe it or not, your computer likes
rest, too. Leaving it on all of the time wears
out hardware, and puts unnecessary wear
and tear on the hardware. Giving your
computer a break also saves you money
(electrical bills).

Date Prepared: Document No. JCEP-CSS- 2024


COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA 9 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01
8. Warranty issues. Always take
advantage of warranties. Get a warranty to
protect your hardware, so it can be
replaced in case of failure.

9. Backup issues. Back-up everything.


Run regular backup of your important files
to other disks, computers, or an online
backup service.

10. Error message issues. If your PC fails


to function, diagnose the problem. Write
down the necessary info such as error
messages or things don‘t work properly. If
you know how to fix it, do it, to avoid
further damage but if not then seek for
professional help.

Date Prepared: Document No. JCEP-CSS-2024


COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA 10 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01

Network Problems
When you suddenly cannot connect to the Internet, any of several
things could be wrong. Use this checklist to find and solve common
Internet connection problems.

1. Unplugged Network Cable


Unplugged or loose network cables are one of the most
common reasons why you might suddenly find yourself unable to
connect to the Internet. That's a problem on wireless networks, but
on most laptops the wireless-fidelity (Wi-Fi) radio can be
inadvertently shut off instead. On home networks, it's also
possible that someone unplugged the router.

Action: Ensure your wired or wireless network hardware is switched on


and plugged in.

2. Website Temporarily Offline


What may seem to be a network problem connecting to the
Internet is sometimes simply a Web site (or whatever server is on
the other end of the connection) being temporarily offline.

Action: Before assuming your Internet connection is faulty, try


visiting several popular Web sites rather than just one.

3. IP Address Conflicts
If your computer and another on the network both have the
same IP address, the conflict between them will prevent either from
working properly online.

Action: To resolve an IP conflict, follow these instructions to release


and renew your IP address. If your network uses static IP
addresses, manually change your IP to a different number.

Windows 10 to 11

Step 1: Press windows + R to run the dialog


box Step 2: Type CMD. Then press [enter]
Step 3: Type the ipconfig/release in the Command Prompt
windows.
Then press [enter]
Step 4: Type ipconfig/renew. Then press [enter]

Date Prepared: Document No. JCEP-CSS-2024


COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page 4.
SERVICING NCII Prepared by: TECHNOLOGY C
INTERNATIONA 11 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01

omputer Firewall Malfunctions


Firewall software running on most computers is intended to
prevent unwanted network traffic from disrupting its operation.
Unfortunately, these software firewalls can malfunction and start
blocking valid Internet traffic. When two software firewalls, such
as Windows Firewall plus a third-party product, are installed on
the same computer, contention between the two can also
incorrectly block traffic.

Action: If you have recently installed or upgraded software firewalls on


your computer, temporarily disable them to determine
whether it may be the cause of Internet connection problems.

5. Outside Wireless Signal Range


The performance of Wi-Fi network connections depends on
distance between the device and the wireless access point. The
farther away a Wi- Fi device is, the slower the local connection
generally runs, until it breaks altogether. Wireless signal
interference in the area can also limit the effective range of a Wi-
Fi connection. Whenever you are unable to reach the access
point, you also cannot connect to the Internet, obviously.

Action: Use one of the options written below to measure the


strength of your wireless signal and try these ideas to expand
the range of your Wi-Fi.

 Place the router at a height in some central location and away


from other cordless devices.
 Make sure that the router is not placed near something metallic
(like an almirah or window grills) as that will weaken the
wireless signals.
 Avoid mirrors as they can reflect the wireless signals away from
the desired direction.
 Wireless routers generally ship with omni-directional antennas
but you can replace them with more powerful uni-directional
antennas and that will keep the signal from getting broadcast in
all directions.

Date Prepared: Document No. JCEP-CSS-2024


COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA 12 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01
1. Wireless Network Configuration
Wi-Fi networks with encryption options like WPA or WEP
turned on require computers to use matching security keys when
connecting. If someone changes the encryption keys or
password on the access point, devices that worked before will
suddenly be unable to establish sessions and Internet
connections. Likewise (though less likely), if the access point
settings are changed to require using a specific Wi-Fi channel
number, some computers may be unable to discover it.

Action: Confirm that the Wi-Fi channel number and encryption


keys on your router have not recently changed (check with
the network administrator if necessary). When using a
hotspot, follow the provider's instructors for signing in
carefully.

2. Broadband Router or Access Point Malfunctions


Home networks that use broadband routers are easier to
manage than those without one, but technical glitches with the
router can also prevent computers from connecting to the
Internet. Router failures are caused by overheating, excessive
traffic, or simply a faulty unit. Typical symptoms of a flaky router
include computers on the network not being able to obtain IP
addresses, or the router console not responding to requests.

Action: Check the router's lights and console if possible to ensure


it is running and responding properly. Troubleshoot and
reset the router if necessary. Change the old router if
necessary.

3. Blocked By Your Service Provider


Internet Service Providers (ISPs) can choose to block access
from your account if you fail to make payment or otherwise
violate the provider's Terms of Service. Especially when using
paid hotspots that charge by the hour or day, sometimes people
forget to keep their subscription updated. Other common reasons
an ISP might block your account include exceeding bandwidth caps,
sending spam e-mail, and downloading illegal or inappropriate
content.

Action: Contact your ISP if you suspect your account has been
blocked.

Date Prepared: Document No. JCEP-CSS-2024


COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
TECHNOLOGY 6.
SERVICING NCII Prepared by: C
INTERNATIONA 13 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01
omputer Glitches
Computers suffer from technical glitches or malfunctions.
Although relatively uncommon nowadays, a computer's network
adapter hardware might suddenly fail due to overheating or age.
Failures in the operating system software that control the adapter,
on the other hand, can occur frequently especially with computers
that are heavily used. Viruses and worms also may disable or block
a computer's network interfaces from functioning properly. If using
a laptop or other mobile device, transporting it from one location
to another can corrupt the state of its network.

Action: Check the computer and remove any malware that you will
find. On Windows computers, try resetting the network
connection. Reboot the computer if necessary.

7. Network Downtime
Those using satellite Internet service may notice they
cannot connect to the Internet during periods of very bad weather.
Providers in dense urban areas (including cellular Internet carriers)
sometimes are unable to support peaks in network traffic that
causes sporadic outages for some customers. Finally, those who
subscribe to newer or more complex forms of Internet services
(such as fixed wireless broadband) may experience more downtime
than others as providers encounter more issues with relatively
less mature equipment.

Action: If all else fails, contact your Internet provider to verify


whether they are experiencing an outage. Some providers
also give advice on troubleshooting problems connecting to
their network.

Date Prepared: Document No. JCEP-CSS-2024


COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA 14 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01
SELF CHECK 4.1-1

Enumeration: Read the given details and identify the issues being
described.

1. Preventing failures means making sure our


computer is physically clean in its operations. Make sure that there is
not too much unwanted particles inside, especially on the fans. These
unwanted particles reduce performance and cause overheating.

2. When something is not working properly, either


diagnose the problem yourself and fix it, to prevent further damage
or contact a professional and have them look at it for you. Take
advantage of warranties on parts if they fail.
3. Make sure that your ant-virus software is updated
to e able to scan unnecessary files that enter your PC. Do not install
programs that you‘re not familiar with or if do not fully trust.

4. Know your computer‘s specifications and its limits.


Memory device runs even the PC is running idly. It consumes memory
storages capacity making you difficult to open a program if memory
storage had been consumed.
5. If your PC fails to function, diagnose the problem.
Write down the necessary info such as error messages or things don‘t
work properly. If you know how fix it, do it, to avoid further damage but if
not then seek for professional help.

6. Save everything. Run regular saving on removable


drives of your important files or unto other disks, computers, or an
online service.
7. Always take advantage of free replacement or repair
from the store owner. Get a replacement or repair from the store
owner to protect your Hardware, so it can be replaced in case of
failure.

8 .Give your computer a break. Believe it or not, your


computer likes rest, too. Leaving it on all of the time wears out
hardware, and puts unnecessary wear and tear on the hardware.
Giving your computer a break also saves you money (electrical bills).
9. If the same error message shows up every time
you log in, be sure to investigate it. Although unlikely, these errors
could be important.

10. Know that your computer is going to fail. You


need to treat your computer as if it were a doomed failure. Always
assume that failure is imminent.

Date Prepared: Document No. JCEP-CSS-2024


COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA 15 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01
ANSWER KEY 4.1-1

1. Dust Issues
2. Hardware issues
3. Malware Issues
4. Ram Issues
5. Error Message Issues
6. Backup issues
7. Warranty issues
8. Usage issues
9. Warning Issues
10. Computer Issues.

Date Prepared: Document No. JCEP-CSS-2024


COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA 16 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01

TASK SHEET 4.11


Title : Procedures in Planning and
Conducting Maintenance
Performance Objective : Be able to remove the malware from the
computer
Supplies/Materials : Malware software
Steps/Procedure:
You log onto your computer and it takes forever to boot. When it
finally does, a few unfamiliar applications litter your desktop, and
your browser immediately sends you to an ad for hair loss products.

Sounds like your PC has a problem with

malware. So what should you do?

1. Computer acting suspect? Do a little digging and check for


symptoms.

Look for issues characteristic of a malware infection:

● Does your web browser freeze or become unresponsive?


● Do you get redirected to web pages other than the ones you
are trying to visit?
● Are you bombarded with pop-up messages?
● Does your computer run slower than usual?
● Do you see new icons on your desktop that you don‘t recognize?

Unfortunately, even if you see nothing wrong with your


computer, there may be trouble brewing under the surface,
sneaking around and screwing with your files undetected. So
it‘s a safe bet to move on to Step 2 even if you can‘t find a
symptom.

2. Use protection: Enter safe mode.

● Remove CDs and DVDs, and unplug USB drives from your
computer. Then shut down.
● When you restart, press the F8 key repeatedly. This should
bring up the Advanced Boot Options menu.
● Select Safe Mode with Networking and press Enter.

Date Prepared: Document No. JCEP-CSS-2024


COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA 17 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01

3. Back up your files.

● This includes documents, photos, and videos. Especially cat


videos.
● Do not back up program files, as those are where infections
like to hide. You can always download these programs again
if files are lost.

4. Download an on-demand malware scanner such as


Malwarebytes.

 If you had no trouble connecting to the Internet before you


suspected the infection, you can leave Safe Mode after
having backed up your files and return to using your
―normal‖ system.
● Follow set-up instructions and install the program.

5. Run the scan.

● Directly go to the scan. If you do have an infection, you‘re


on-demand scanner should let you know that your computer
is at risk. A list of scan results tells you what malware was
found and removed.

6. Restart your computer.

● Properly reboot/restart your computer.

7. Update your operating system, browser, and applications.

● If there‘s an update available on any of your software, go


ahead and do it. Some of the most dangerous forms of
malware are delivered by exploits that take advantage of out-
of-date software.

8. Reset all of your passwords.

 Before being deleted, malware could have captured your


passwords and forwarded them to criminals. Change each and
every password you can think of, and make sure they‘re
strong.
Assessment Method: Direct Observation

Date Prepared: Document No. JCEP-CSS-2024


COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page P
Prepared by: TECHNOLOGY e
SERVICING NCII
INTERNATIONA 18 of 51
Maintain and Repair
L
r
Computer System and CHRISTIAN RICK f
Networks DAYO
Revision # 01 o
r
mance Criteria Checklist 4.1.1
CRITERIA YES NO

1. Computer acting suspect?

2. Enter safe mode.

3. Back files.

4. Download a malware scanner.

5. Run the scanner

6. Restart the computer

7. Update operating system,


browser and application.

8. Reset all the password

Date Prepared: Document No. JCEP-CSS-2024


COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA 19 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01

Information Sheet 4.1-2


TOOLS, EQUIPMENT AND TESTING DEVICES

Learning Objectives:

After reading this INFORMATION SHEET, YOU MUST be able to:


1. Identify the different tools, equipment and their uses;
2. Clean a computer system;
3. Appreciate the usage of each tool in computer system.

Hand Tools

A hand tool is a device for performing work on a material or a


physical system using only hands. Hand tools can be used manually or
electrically powered, using electrical current. Examples of Hand Tools
are as follows:

Table 1. Hand Tools

Hand Tools Descripti


on

Flat Head Screwdriver

 Used to loosen or tighten slotted


screws.

Philips Head Screwdriver

 Used to loosen or tighten cross-


head screws.

Date Prepared: Document No. JCEP-CSS-2024


COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA 20 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01
Hand Tools Descriptio
n

Torx Screwdriver

 Used to loosen or tighten screws that


have a star-like depression on the
top, a feature that is mainly found on
laptop.

Hex Driver

 Sometimes called a nut driver, is


used to tighten nuts in the same
way that a screwdriver tightens
screws.

Needle-Nose Pliers

 Used to hold small parts.

Wire Cutter

 Used to strip and cut wires.

Tweezers

 Used to manipulate small parts.

Date Prepared: Document No. JCEP-CSS-2024


COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA 21 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01

Hand Tools Descriptio


n

Part Retriever

 Used to retrieve parts from location


that is too small for your hand to fit.

Flashlight

 Used to light up areas that you


cannot see well.

Crimper

 Used to attach connectors to wires.

Wire stripper
 Used to remove the insulation from
wire so that it can be twisted to
other wires or crimped to connectors
to make a cable.

Punch-down tool
 Used to terminate wire into
termination blocks. Some cable
connectors must be connected to
cables using a punch down tool.

Date Prepared: Document No. JCEP-CSS-2024


COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA 22 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01

Cleaning Tools
Having the appropriate cleaning tools is essential when
maintaining or repairing computers. Using these tools ensures that
computer components are not damaged during cleaning. Examples:

Table 2. Cleaning Tools

Cleaning Tools Descripti


on

Lint-free Cloth

 Used to clean different computer


components without scratching or
leaving debris.

Compressed Air
 Used to blow away dust and debris
from different computer parts
without touching the components.

Cable Ties

 Used to bundle cables neatly


inside and outside of a computer.

Parts Organizer

 Used to hold screw, jumpers,


fasteners and other small parts and
prevents them from getting mixed
together.

Date Prepared: Document No. JCEP-CSS-2024


COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA 23 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01

Diagnostic Tools

Computers are easier to use and more dependable with each


new generation of hardware and operating system update, but that
does not mean they are problem-free. Here are the most popular tools
for diagnosing your computer problems:

Table 3. Diagnostic tools

Diagnostic Tools Descripti


on

Multimeter
 Used to test the integrity of circuits
and the quality of electricity in
computer components.

Loopback Adapter
 Used to test the functionality of
computer ports.

Date Prepared: Document No. JCEP-CSS-2024


COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA 24 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01

Self-Check 4.1-2

A. Multiple Choices: Choose the best answer. Write the letter of your
choice on your answer sheet.
1. Where does compressed air belong?
a. Cleaning tool
b. Hand tool
c. Diagnostic tool
2. Used to bundle cables neatly inside and outside of a
computer.
a. Tweezers
b. Cable ties
c. Compressed air
3. is a device that can take many types of measurements
a. needle nose pliers
b. digital multimeter
c. Philips head screwdriver
4. Is used to remove the insulation from wire so that it can be
twisted to other wires or crimped to connectors to make a
cable.
a. crimper
b. Punch down tool
c. wire stripper
5. Used to tighten or loosen cross-headed screws.
a. Philips head screwdriver
b. Flat head screwdriver
c. Soft cloth
B. Direction: Identify the appropriate term describe in each sentence.

1. It is a hand tools that used to retrieve parts from


location that is too small for your hand to fit.
2. Used to test the functionality of computer ports.
3. It is a tool that used to loosen or tighten screws that
have a star-like depression on the top, a feature that is mainly found
on laptop.
4. Used to test the integrity of circuits and the
quality of electricity in computer components.
5. Used to clean different computer components
without scratching or leaving debris.

Date Prepared: Document No. JCEP-CSS-2024


COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA 25 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01

Answer Key 4.1-2

A.
1. A.
2. B.
3. B.
4. C.
5. A.

B.

1. Part Retriever
2. Loopback Adapter
3. Torx Screwdriver
4. Multimeter
5. Lint-free Cloth

Date Prepared: Document No. JCEP-CSS-2024


COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA 26 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01

TASK SHEET 4.1-2


Title : Tools, equipment and testing devices
Performance Objective: Be able to clean the computer to improve the
computer
performance
Supplies/Materials : Dry clean cloth
Brush
Philips screw driver
Steps/Procedure:
1. Prepare the materials needed like Philips screw driver,
soft cloth, soft paint brush and soft eraser.
2. Turn off the computer if the computer is turned on and
unplug
3. Open the system unit by removing the cover at the side.
4. Remove all the cables inside the system unit, like the floppy
cable, SATA cable, IDE cable, the connector to the front
panel, and the cables from the power supply.
5. Remove the hard drive, CD or DVD rom, expansion cards
and the power supply
6. Remove the motherboard from the case by removing the
screws
7. Remove the memory, CPU fan and the processor
8. Clean the inside of the computer case using a brush,
compressed air or a blower and wipe it w/ a clean dry cloth
9. Brush the motherboard properly
10. Place the Processor in the CPU socket
11. Clean the CPU fan using a brush and place it above the
processor
12. Brush the memory and clean the lower edge of the
memory using a eraser and place it in the memory slot in
the motherboard.
13. Place the motherboard inside the computer case and lock it
inside the case using a screws
14. Clean the cords/cable of the power supply using the
cloth and brush the inside of the power supply
15. Place the power supply inside the case tightly by screwing it
16. Place the expansion slots to the motherboard,
17. Clean the hard drive and the cd/dvd rom and place the
hard drive and the cd/dvd rom inside the case
18. Connect the power cord of the power supply to the
motherboard, hard drive and the cd/dvd rom
19. Connect the front panel connector
20. Close the side case and connect the power cable
21. Connect it to the monitor.
Assessment Method: Direct Observation

Date Prepared: Document No. JCEP-CSS-2024


COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA 27 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01
Performance Criteria Checklist 4.1.2

CRITERIA YES NO
1. Prepare the materials needed like Philips screw
driver,soft cloth, soft paint brush and soft eraser.
2. Turn off the computer if the computer is turned on
and unplug
3. Open the system unit by removing the cover at the
side.
4. Remove all the cables inside the system unit, like
the floppy cable, SATA cable, IDE cable, the
connector to the front panel, and the cables from the
power supply.
5. Remove the hard drive, CD or DVD ROM,
expansion cards and the power supply
6. Remove the motherboard from the case by removing
the screws
7. Remove the memory, CPU fan and the processor
8. Clean the inside of the computer case using a
brush, compressed air or a blower and wipe it w/ a
clean dry cloth
9. Brush the motherboard properly
10. Place the Processor in the CPU socket
11. Clean the CPU fan using a brush and place it above
the processor
12. Brush the memory and clean the lower edge of the
memory using a eraser and place it in the memory
slot in the motherboard.
13. Place the motherboard inside the computer case
and lock it inside the case using a screws
14. Clean the cords/cable of the power supply using
the cloth and brush the inside of the power supply
15. Place the power supply inside the case tightly by
screwing it
16. Place the expansion slots to the motherboard
17. Clean the hard drive and the CD/DVD ROM and
place the hard drive and the CD/DVD ROM inside
thecase
18. Connect the power cord of the power supply to
the motherboard, hard drive and the CD/DVD ROM
19. Clean the IDE cable and SATA cable and connect it
to the hard drive and CD/DVD ROM
20. Connect the front panel connector
21. Close the side case and connect the power cable

Date Prepared: Document No. JCEP-CSS-2024


COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA 28 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01
Information Sheet 4.1-3
Personal Computer System and Specification
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Identify the different computer specification of each
device.

What is Specification?
The specification or spec‘ is a list of the key components that make
up the computer. It is provided by retailers to help buyers decide which
PC, and which combination of features, they need. When buying a PC
you start by deciding what you want your PC to do. This tells the
specification you actually need.
When reviewing a computer specification, the most important
component to take are the processor, the size of RAM and the size of
the hard drive as these are central to the overall capability of the
system. If it is planned to use specialized programs for students with
special needs, it is advisable to purchase a suitable specification
computer to meet the system requirements for these programs.

Understanding a Specification
Sample specification for a certain desktop computers:
PC Specification
Processor Information
Intel or AMD Processor The processor is the ―brain‖ of the
Model No computer and controls most of the work done.
Memory Information
8 GB DRAM DRAM (Dynamic Random Access Memory) is
a working memory and a type of RAM that
works well with computing-intensive
application.
Storage Information
500 GB Hard Drive /
Is a central storage area for the programs
Solid-State Drive
being run and the documents or assets
created
17‘‘ Flat Screen Color
Other Information
Monitor
Includes the information about the sound and
Integrated Graphics
Card graphics capability of the computer, as well
Microsoft Windows 10 as details of the monitor, operating system
and software that come with the computer

Date Prepared: Document No. JCEP-CSS-2024


COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA 29 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01
Processors
Two companies - Intel Inc. and AMD Inc. – are the manufacturers
of most of today‘s PC processors and both offer a range that balances
price and performance. Processors are generally defined by their
speed, in megahertz (MHz) or in gigahertz (GHz), and this relates to
the number of operations they can perform per second. The higher
the value, the faster the PC will perform and the more expensive it is.
More recent and more powerful processors use 64 Bit architecture,
rather than the previous 32 Bit models.
Memory (RAM)
Entry- level processor Mid-range processor High-end processor

 Office applications  Education software  Processor


IDEAL FOR

 Internet browsing  Office applications intensive


 Basic  General multimedia
graphics multimedia creation
programs applications application, eg. 3D
 Home computing  Internet browsing graphics and video
editing
 Office applications
 Internet browsing

 Intel Core i3  Intel Core i5 and i7  Intel Core i9


TYPES
PROCES

 AMD Ryzen 3  AMD Ryzen 5  AMD Ryzen 9 7950x


R

The main working memory in a computer is called random


access memory or RAM. The processor uses this memory to run
programs. RAM is measured in megabytes (MB). Most modern
computers use DDR4 SDRAM. A minimum of 8192 MB (8GB) of RAM is
recommended for casual usage and internet browsing. 16384 MB
(16GB) is for spreadsheets and other office programs, and 32768 MB
(32GB) for gamers and multimedia creators.

Storage
The Hard Drive The hard drive is the computer‘s primary storage
area. It stores the applications and programs that run on the PC, as
well as any work created by users. From a school‘s perspective, the
capacity of the hard drive, measured in gigabytes (GB), is a key
criterion and should be given due consideration when reviewing PC
specifications.
Date Prepared: Document No. JCEP-CSS-2024
COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA 30 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01

Some of the most common storage drive capacities include the following:
 16 GB, 32 GB and 64 GB. This range is among the lowest for
HDD storage space and is typically found in older and smaller
devices.
 120 GB and 256 GB. This range is generally considered an entry
point for HDD devices such as laptops or computers.
 500 GB, 1 TB and 2 TB. Around 500 GB and above of HDD storage
is typically considered decent for an average user. Users can
most likely store all their music, photos, videos and other files with
this much space. Individuals with games that take up a lot of
space should find 1 TB to 2 TB of HDD space suitable.
 More than 2 TB. Anything over 2 TB of HDD space is suitable
for users who work with high-resolution files, who need to store
or house a large amount of data, or who want to use that space
for backup and redundancy.

OtherSpecificatio

ns Monitors
 The older Cathode Ray Tube (CRT) has been largely replaced by
Liquid Crystal Display (LCD) and Light Emitting Diode (LED) flat-
screens. A 15‖ LCD/LED has the same viewing area as the older
17‖ CRT.
 Average entry-level PCs usually come with a 17‖ flat-screen and this
is adequate for most general purpose applications.
 Larger 19‖ flat-screens are available and may be appropriate if
video editing and advanced graphics work is being carried out.
 Teachers of students with special needs may want to consider using
larger monitors with their students.

Optical Drives
CD R/W drives are standard on PCs and allow the information on
a compact disc (either data or audio) to be read and written to by the
PC. It is defined by its speed (i.e., 48x or 48 speed).
DVD drives can read both CDs and DVDs. Standard on entry level
computers are 48x DVD-ROM/CD_RW drives and allows you to copy
blank CDs. High performance computer use 52x DVD-RWs.
Educational software is being developed in both DVD and CD formats,
but a DVD can hold over 25 times more data than a CD.

Date Prepared: Document No. JCEP-CSS-2024


COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA 31 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01

Graphics and Sound Cards


These cards are installed inside a PC and are responsible for
determining the quality of the audio and visuals (graphics and video)
output by the computer. They hold their own memory (in MB), which
is why they add to a computer‘s capability. An integrated graphics
card with 256MB of memory is recommended for general purpose
PCs. Computers running high-end applications generally require a
separate 256MB graphics card. A sound card generally comes as
standard in most PCs purchased today. If students intend to work
extensively with digital music, the school should consider getting a
high- end sound card as this will create greater depth, complexity and
realism of sound.

Speakers and Headphones


Most computers come with either built-in or external speakers.
Schools may also consider buying headphones to control sound levels
within a classroom or computer room. Cheap ‗headphone splitters‘
can also be purchased — these enable two sets of headphones to be
used per computer.

Network Interface Card (NIC)


It is recommended that all PCs be purchased with a suitable
network interface card (NIC). A network card allows a computer to be
connected to a network. A 10/100/1000 Mbps (Megabits per second)
card is the standard network card today. Few school networks
currently operate at speeds higher than 100Mbps.

Operating Systems (OS)


PCs are generally purchased with an operating system pre-installed.
It is worth checking that your existing software will still work with the
operating system of any new systems being purchased. It may be
possible to choose a particular operating system and, if so, this may help
standardize new machines with existing school PCs. At present,
Microsoft‘s newer OS is Windows 11.
Microsoft‘s Windows is the most widely used computer operating
system in the world, accounting for 70.68 percent share of the
desktop, tablet, and console OS market in August 2022. Apple‘s
macOS and iOS rank as the next most widely used operating
systems, with the latter was being the standard installation on all iPad
devices. Linux OS versions serve as the primary option for users who
prefer open-source software and intend to avoid the influence of
major OS developers.
Date Prepared: Document No. JCEP-CSS-2024
COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA 32 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01
Self-Check 4.1-3

Multiple Choice: Choose the best answer. Write the letter of your
choice on your answer sheet.

1. What is the computer primary storage device?


a. Hard Drive b. RAM c. Optical Drive
2. What are two Manufacturer of the Processor?
a. BMI and Intel b. Intle and BMI c. Intel and AMD
3. DVD drives stand for?
a. Digital Versatile Disk
b. Disk Video Digital
c. Data Video Digital
4. DVD drives can read both CD and ?
a. CDR b. DVD c. Optical Disk
5. These cards are installed inside a PC and are responsible for
determining the quality of the audio and visuals output by the
computer?
a. Speaker
b. NIC
c. Graphics and Sound Cards
6. It essentially displays a signal sent by the computer in a visual format
a. Speaker b. Monitor c. Microphone
7. It is the main memory of the computer
a. Hard drive b. DVD c. RAM
8. What was the first monitor called?
a. Liquid Crystal Display
b. Cathode-ray tube
c. Light Emitting Diode
9. These cards are installed inside a PC and are responsible for
determining the quality of the audio and visuals output by the
computer.
a. Speaker
b. NIC
c. Graphics and Sound Cards
10. A card allows a computer to be connected to a network.
a. Memory Card
b. Network Interface Card (NIC)
c. Graphics and Sound Cards

Date Prepared: Document No. JCEP-CSS-2024


COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA 33 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01
Answer Key 4.1-3

1. a
2. c
3. a
4. b
5. c
6. b
7. c
8. b
9. c
10. b

Date Prepared: Document No. JCEP-CSS-2024


COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA 34 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01
TASK SHEET 4.1-3
Title : Personal Computer System and Specification
Performance Objective :Be able to know the specification and
comparison of personal computer

Supplies/Materials : Pen, paper and computer system

Directions: Make a market study on components, its brand,


functionality and cost. You can ask computer vendors of the price
lists and inquire of its specifications. Choose two brands then make
comparisons. Be ready on oral presentation.

COMPONENTS BRAND NO1. COST STRENGHT WEAKNESS


Processor
Motherboard
Memory
Graphic Card
Sound Card

COMPONENTS BRAND NO2. COST STRENGHT WEAKNESS


Processor
Motherboard
Memory
Graphic Card
Sound Card

Assessment Method: Direct Observation

Date Prepared: Document No. JCEP-CSS-2024


COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA 35 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01
Performance Criteria Checklist 4.1.3

Detail Points

Brand model is precisely given

Cost is based on the market selling price

Strength/weakness are accurate

Presentation skills (Clarity of the voice)

Score Reference:
0= Some facts are clearly inconsistent with source
material
1= Some facts are questionable/unrealistic
2= All facts seem accurate
Date Prepared: Document No. JCEP-CSS-2024
COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA 36 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01

Information Sheet 4.1-4


OCCUPATIONAL HEALTH AND SAFETY PROCEDURES

Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Enumerate OHS policies and procedures;
2. Perform the OHS procedure.

OHS policies and procedures:

1. Always ground or discharge yourself before touching any part


of the computer.
2. Do not work alone so that there is someone who can take care
of you in case of accident or emergency.
3. Be careful with the tools that may cause short circuit.
4. Always pull the cable connector on the handle and not hold on
the cable itself.
5. Use only rubber shoes when standing on the ground or in a concrete
floor.
6. Make sure that the pins are properly aligned when connecting
a cable connector.
7. Always power off and unplug the computer before working on it.
8. Take away any liquid such as mineral water or soft drinks near
your working area or near computers to avoid getting
electrocuted or accidentally damaging computer parts.
9. Contingency measures during workplace accidents, fire, and
other emergencies are recognized.
10. Always wear personal protective equipment (PPE) in
accordance with the organization‘s OHS procedures and
practices.
11. Hazard/risks in the workplace and their corresponding indicators are
identified to minimize or eliminate risk to co‐workers,
workplace, and environment.
12. Take necessary precautions to protect the component of the
computer from damaged caused by Electrostatic Discharge
(ESD).
13. Hold the components by edges and do not touch the
Integrated Circuit (IC) parts.
14. Read and follow instructions on the manual carefully.
15. Do not use excessive force if things do not quite slip into place.

Date Prepared: Document No. JCEP-CSS-2024


COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page S
Prepared by: TECHNOLOGY
SERVICING NCII E
INTERNATIONA 37 of 51
Maintain and Repair L
L
Computer System and CHRISTIAN RICK
Networks DAYO F
Revision # 01

CHECK 4.1-4

Multiple Choice: Choose the best answer. Write the letter of your
choice on your answer sheet.

1. Measures during workplace accidents, fire and other


emergencies are recognized.
a. Contingency b. Excessive force c. Discharge
2. Is not used if things don‘t quite slip into place.
a. Contingency b. Excessive force c. Discharge
3. Always done before touching a computer
a. Contingency b. Excessive force c. Discharge
4. Are correctly used in accordance with organization OHS
procedures and practices
a. Personal protective equipment
b. Protective personal equipment
c. Procedures and practices of equipment

5. It should be worn when standing on the ground or in a concrete


floor.
a. Sandals b. Slippers c. Rubber shoes

6. Refers to the legislation, policies, procedures and activities


that aim to, protect the health, safety and welfare of all
people at the workplace.
a. PPE b. OHS c. DVD

7. Do not work alone so that there‘s someone who can take care
of you in case of emergency.
a. True b. False c. Maybe

8. Always wear PPE in accordance with the organization‘s OHS


procedures and practices.
a. True b. False c. Maybe

9. Always power off the computer and unplug the computer before
working on it.
a. True b. False c. Maybe

10. Clean the area before and after using it to maintain sanitation
and prevent accidents.
a. True b. False c. Maybe
Date Prepared: Document No. JCEP-CSS-2024
COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA 38 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01

ANSWER KEY 4.1-4

1. a
2. b
3. c
4. a
5. c
6. b
7. a
8. a
9. a
10. a
Date Prepared: Document No. JCEP-CSS-2024
COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA 39 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01

TASK SHEET 4.1-4


Title : Occupational Health and Safety Procedures
Performance Objective : To ensure safety and prevent static
electricity of
the body to the computer
Tools/Materials : Anti static wrist
Anti static mat
Anti static bag
Protective
goggle
Equipment : Computer

Steps/Procedure:

1. Always ground yourself before touching any part of the


computer by touching a no power metallic object
2. Keep away any liquid fluids that might be spilled on
the computer to avoid grounding
3. Prepare the things needed like anti-static mat, and
anti-static wrist strap
4. Be careful with tools that may cause short circuit
5. Replace only fuses with those proper ratings
6. Wear safety glasses for protection against sparks
and metal fragmented
7. Use only grounded plugs and receptacles
8. Working area should have ventilations, trash can,
fire exit and capable of being disinfect.
9. Keep one hand in your pocket when working live circuit.
10. Wear rubber sole shoes when standing on the
ground or in a Concrete floor
11. Always power off and unplug the computer before
working on it.
12. Do not use excessive force if things don‘t quite slip into
place.
13. Take necessary precautions to protect the
component of the computer from damaged cause
by Electrostatic discharge.

Assessment Method: Lecture and Practical Observation


Date Prepared: Document No. JCEP-CSS-2024
COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page P
Prepared by: TECHNOLOGY e
SERVICING NCII
INTERNATIONA 40 of 51
Maintain and Repair
L
r
Computer System and CHRISTIAN RICK f
Networks DAYO
Revision # 01 o
r
mance Criteria Checklist 4.1.4

CRITERIA YES NO

1. Always ground yourself before touching any


part of the computer by touching a no power
metallic object
2. Keep away any liquid fluids that might be
spilled on the computer to avoid grounding
3. Prepare the things needed like anti static
mat, and anti static wrist strap
4. Be careful with tools that may cause short
circuit
5. Replace only fuses with those proper ratings
6. Wear safety glasses for protection against
sparks and metal fragmented
7. Use only grounded plugs and receptacles
8. Working area should have ventilations,
trash can, fire exit and capable of being
disinfect.
9. Keep one hand in your pocket when working
live circuit.
10. Wear rubber sole shoes when standing on
the ground or in a concrete floor
11. Always power off and unplug the computer
before working on it
12. Do not use excessive force if things don‘t
quite slip into place.
13. Take necessary precautions to protect the
component of the computer from damaged
cause by Electrostatic discharge.
Date Prepared: Document No. JCEP-CSS-2024
COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA 41 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01

Information Sheet 4.1-5 NETWORK


MAINTENANCE TASK

Learning Objectives:

After reading this information sheet, you must be able to:


1. Computer systems and networks for maintenance are checked
against job/service order or instructions and specifications

Network Maintenance Tasks


Network maintenance tasks are those tasks which network
administrators perform on a day-to-day basis, allowing for the up keep
of the network. Some of the more common network maintenance
tasks include, but are not limited to, the following general activities:

1. Installing, replacing or upgrading both hardware and software


2. Monitoring, tuning and optimizing the network
3. Documenting the network and maintaining network
documentation
4. Securing the network from both internal and external threats
5. Planning for network upgrades, expansions, or enhancements
6. Scheduling backups and restoring services or the network
from backups
7. Ensuring compliance with legal regulations and corporate policies
8. Troubleshooting problem reports
9. Maintaining and updating device configurations

Installing, replacing or upgrading both hardware and software


Hardware and software installation, replacement and upgrades are
very common network maintenance tasks. In a Cisco internetwork,
this may include replacing older or failed hardware, such as switch
line cards and supervisor modules in Catalyst 4500 and 6500 series
switches, for example, as well as upgrading the Cisco IOS images to
current revision or patch levels for routers and switches alike.
Date Prepared: Document No. JCEP-CSS-2024
COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA 42 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01

Monitoring, tuning and optimizing the network


One of the core facilitators of an effective network maintenance solution
or strategy is proactive monitoring. Proactive monitoring allows potential
problems to be detected and remedied before they cause an outage or
affect operation. Event logging and network monitoring can be used to
proactively react to network or system alerts and be used to do the
following:

1. Verify the performance of the network and all internetwork


devices in the network
2. Baseline the performance of the network itself
3. Understand the amount of direction and traffic flows in the
network
4. Identify and troubleshoot potential network issues
Documenting the network and maintaining network documentation
While most network engineers consider documentation a rather
mundane and even lowly task, it is important to understand that
documentation is a critical component of network maintenance as well
as troubleshooting and support. It is important to understand that
different organizations have different standards for acceptable levels of
documentation.

There are several guidelines or recommendations that you should


follow when documenting the network:
1. Determine the scope of responsibility
2. Understanding the objective
3. Maintain documentation consistency
4. Make sure that the documentation is easily accessible
5. Maintain the documentation
The first guideline is ensuring that you understand your scope of
responsibility. That is, it is important to understand what it is that you
are responsible for. For example, you may be working in an
organization that has a voice, security, and storage and network team
all under the Information Technology (IT) department umbrella. Rather
than attempting to create documentation for all the teams, you should
make sure you should only document those networks and devices that
are within your administrative responsibility.

It is important to understand what the documentation will be used for. A


common mistake that is made by network engineers is either including
too little
Date Prepared: Document No. JCEP-CSS-2024
COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA 43 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01

or too much information within the documentation. Take time to fully


understand what the document you are creating will be used for and take
into consideration the audience the document is targeted to and what
information would be useful or excessive for that particular group. Over-
documentation makes documented information hard to understand. On the
other hand, under- documentation makes network support and
troubleshooting difficult to perform.

Consistency when creating network documentation is a key


component that should be adhered to as much as possible. In most
organizations, design and documentation templates are available for
reference when creating new documentation. Maintaining consistency
increases the usability of those documents and makes them easier to
understand for everyone else.

No matter how great the documentation that is created is, it helps


no one if the documentation cannot be accessed by those that may need
it to support troubleshooting or support functions.

Where possible, documentation should be stored in a location that


is readily and easily accessible to all those that may use it, such as on
a secure network location or share. In some cases, depending on the
organization, it may be necessary for documentation to be stored in a
secured, offsite location for disaster recovery and business continuity
purposes.

And finally, once the documentation has been created, it is


important to ensure that it is always maintained and up-to-date.
Network diagrams from years ago may contain misleading and incorrect
information that may hamper troubleshooting information. Network
documentation should be considered living documentation that
changes at the same rate as the network. Following the completion of
each network project, existing documentation should be updated to
reflect the changes that were made to the network.

Although there are no standards that determine what information


should and should not be included in network documentation, most
organizations and businesses have their own standards for what should
be included in the network documentation. It is important to adhere to
these standards and guidelines when creating documentation.

From a best practices perspective, network documentation should


include the following information at a minimum:
Date Prepared Document No. JCEP-CSS-2024
COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA 44 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01

1. Information about the interconnects between devices for LAN and WAN
connections
2. IP addressing and VLAN information
3. A physical topology diagram of the network
4. A logical topology diagram of the network
5. An inventory of all internetwork devices, components and modules
6. A revision control section detailing changes to the topology
7. Configuration information
8. Any original or additional design documentation and notes
9. Data or traffic flow patterns
Securing the network from both internal and external threats
Network security is an integral component of network operation and
maintenance. It is also very important that consideration be given to
both internal and external threats. While most organizations have a
dedicated security team, monitoring and a structured maintenance
approach can also be used to discover vulnerabilities or potential
security threats which can then allow for the appropriate action to be
taken before an incident occurs.

Planning for network upgrades, expansions, or enhancements


Using network monitoring, you can identify potential issues before
they arise as well as plan for possible network upgrades or
expansions, i.e. capacity planning, based on the identified potential
issues. Effective planning can be used to define the maintenance
tasks required on the network and then prioritize those tasks and the
order in which they will be implemented.
Date Prepared Document No. JCEP-CSS-2024
COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONA 45 of 51
Maintain and Repair
L
Computer System and CHRISTIAN RICK
Networks DAYO
Revision # 01

Scheduling backups and restoring services or the network from


backups

Backups are a routine maintenance task that is usually given a


very low priority. However, it is important to understand the important of
backups – especially when attempting to recover from a serious or
critical failure of the network. Backups should therefore be considered a
core common network maintenance task, and should be allocated a
high priority. It is important to ensure that backups of core network
components and devices are scheduled, monitored and verified at all
times. Having up-to-date backups of core devices can assist in the
faster recovery of the network or individual network components
following hardware or software failures, or even data (configuration) loss.

Ensuring compliance with legal regulations and corporate policies


A structured network maintenance methodology also ensures that
the network is compliant with both legal obligations as well as corporate
policies. Regulatory policies, which are mandatory enforcements of
compliance with industry regulations and laws, will differ for
businesses. Regardless of the
industry and the requirements, it is important to ensure the business
is following the industry standards as regulated by the law. Unlike
legal regulations, corporate policies will vary on a business-by-
business basis; however, it is still important to ensure that the
network adheres to these policies and can provide the required
functions.

Troubleshooting problem reports


Troubleshooting problem reports is core network maintenance
function. While troubleshooting methodologies are described in detail
later in this guide, troubleshooting is simplified by a structure network
maintenance approach, which includes documentation, backups, and
some form of proactive monitoring system.

Maintaining and updating device configurations

Configuration changes are common because of the day-to-day


moves, additions, or changes (MACs) within organizations. Device
configurations may also change due to scheduled maintenance tasks
and planned changes to the network. For this reason, maintain and
updating device configurations is considered a core network
management function. Each time configurations on devices change, they
should not only be documented, but should be saved both on the
device and to an alternate backup location, e.g. an FTP or TFTP server
(if one is available).

Date Prepared Document No. JCEP-CSS-2024


COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page S
Prepared by: TECHNOLOGY
SERVICING NCII E
INTERNATIONA 46 of 51
Maintain and Repair L
L
Computer System and CHRISTIAN RICK
Networks DAYO F
Revision # 01

CHECK 4.1-5

Written Test: Identify the answer of each question.

1. Allows potential problems to be detected and remedied before


they cause an outage or affect operation.

2. An integral component of network operation and maintenance. It


is also very important that consideration be given to both internal
and external threats.

3. A routine maintenance task that is usually given a very low


priority. However, it is important to understand the important
of backups – especially when attempting to recover from a
serious or critical failure of the network.

4. Tasks which network administrators perform on a day-to-day


basis, allowing for the upkeep of the network.

5. Can identify potential issues before they arise as well as plan for
possible network upgrades or expansions, i.e. capacity planning,
based on the identified potential issues.
Date Prepared Document No. JCEP-CSS-2024
COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page A
Prepared by: TECHNOLOGY n
SERVICING NCII
INTERNATIONAL 47 of 51
Maintain and Repair s
Computer System and CHRISTIAN RICK w
Networks DAYO Revision # 01
e
r
Key 4.1-5

1. PROACTIVE MONITORING
2. NETWORK SECURITY
3. BACKUPS
4. NETWORK MAINTENANCE TASKS
5. NETWORK MONITORING
Date Prepared Document No. JCEP-CSS-2024
COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONAL 48 of 51
Maintain and Repair
Computer System and CHRISTIAN RICK
Networks DAYO Revision # 01

TASK SHEET 4.1-5

Title : Network Maintenance Task


Performance Objective : Be able to back- up the files of the
computer system
Supplies/Materials : Computer software.
Steps/Procedure:
1. Find an appropriate storage device. You will need a device which is
capable of storing all of the data you need to back up. This should
be at least twice the size of the hard drive you are trying to back
up. An external hard drive is the best option, and these are easy to
find.
2. You have to find the Windows 7 back-up program. Press the
Windows‘ button on the left-hand side of the taskbar and type in
backup‘ in the search box that appears.
Alternatively, press the Windows‘ button and click Control Panel in
the right- hand column then click Back up your computer on the
‗System and Security‘ menu.
3. No matter which route you took to get there, you should now
have arrived on a page headed ‗Back up or restore your files‘. Click
Set up backup.
4. The first page is ‗Select where you want to save your backup‘.
This is where you‘ll tell the computer to send copies of all your
files and programs/applications.
You‘re given a number of choices, depending on which back-up
method you‘ve set up. Here the choices are: to send copies to a
DVD in the DVD drive; or, as Microsoft recommends, to send them
to an external hard drive.
Click on the option that suits you and then click Next.
5. You‘ll now see the What do you want to back up?‘ page. Here you
can choose what Windows recommends – that is, a combination of a
system copy and back- ups of all your data files – or you can opt for
Let me choose‘ and pick only those items you want Windows to copy.
Make your choice and then click Next.
6. You‘ve now reached the ‗How often do you want to back up?‘ page,
where you can set up a schedule for regular back-ups. This is highly
recommended – it‘s very easy to forget to do a back-up!
Make your choices and then click OK.
Assessment Method: Direct Observation

Date Prepared Document No. JCEP-CSS-2024


COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page P
Prepared by: TECHNOLOGY e
SERVICING NCII
INTERNATIONAL 49 of 51
Maintain and Repair r
Computer System and CHRISTIAN RICK f
Networks DAYO Revision # 01
o
r
mance Criteria Checklist 4.1.5

CRITERIA YES NO
1. Find appropriate device for back up.

2. You have to find the Windows 7 back-up


program. Press the Windows‘ button on the
left-hand side of the taskbar and type in
backup‘ in the search box that appears or press
the Control Panel.
3. Click Set the Back up
4. Select where you want to save the back-up files.

5. Choose what do you want to back – up files

6. Choose how often you want to back-up your


files.
Date Prepared: Document No. JCEP-CSS-2024
COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONAL 50 of 51
Maintain and Repair
Computer System and CHRISTIAN RICK
Networks DAYO Revision # 01

References:

 https://www.slideshare.net/AlvinGabejan/1-procedures-in-
planning- and-conducting-maintenance
 http://www.ciscopress.com/articles/article.asp?
p=2086239&seqNum
=7
 http://www.ncte.ie/documents/advicesheets/
02PCspecificationsNov 08.pdf
 http://www.the12list.com/2014/06/12-ohs-
procedures-for- computer-hardware.html
 https://www.howtonetwork.org/tshoot/module-1/
network- maintenance-tasks/
 https://www.scribd.com/document/346444834/CHS- Module
 http://www.adrc.com/sm/maintaining_system.html
 http://www.ciscopress.com/articles/article.asp?p=2273070
 https://leapfrogservices.com/16-common-computer-
problems-how- to-tell-if-theyre-hardware-or-software/
 http://techblog.cosmobc.com/2012/05/06/top-10-
common- computer-problems/
 https://www.slideshare.net/ynlcadapan/ict-9-module-4-
lesson-23- techniques-for-diagnosing-computer-systems
 https://www.howtogeek.com/howto/windows-vista/using-
windows- vista-system-restore/
 https://www.digitalunite.com/guides/using-a-computer/
how-back- up-your-computer
 https://www.google.com
 https://www.umass.edu/it/support/hardware/
recommended- minimum-computer-configurations-
windows
 https://www.techtarget.com/searchstorage/definition/
hard-disk- drive
 https://www.statista.com/statistics/268237/global-market-
share- held-by-operating-systems-since-
2009/#:~:text=Microsoft's%20Windows%20is%20the%20most,OS
%20 market%20in%20August%202022.
Date Prepared: Document No. JCEP-CSS-2024
COMPUTER OCTOBER 2024 Issued by:
SYSTEMS JCEP COLLEGE Page
Prepared by: TECHNOLOGY
SERVICING NCII
INTERNATIONAL 51 of 51
Maintain and Repair
Computer System and CHRISTIAN RICK
Networks DAYO Revision # 01

You might also like