0% found this document useful (0 votes)
1 views

CSS2024-COC4

The document outlines the Competency Based Learning Materials for the Computer Systems Servicing NC II qualification, focusing on maintaining and repairing computer systems and networks. It includes a structured approach to learning through various activities, assessment criteria, and methodologies to achieve competency in the field. The module emphasizes the importance of planning, diagnosing, rectifying faults, and ensuring safety in computer systems maintenance.

Uploaded by

Gerard busuego
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views

CSS2024-COC4

The document outlines the Competency Based Learning Materials for the Computer Systems Servicing NC II qualification, focusing on maintaining and repairing computer systems and networks. It includes a structured approach to learning through various activities, assessment criteria, and methodologies to achieve competency in the field. The module emphasizes the importance of planning, diagnosing, rectifying faults, and ensuring safety in computer systems maintenance.

Uploaded by

Gerard busuego
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 72

Competency Based Learning

Materials

Sector : ELECTRONICS

Qualification Title: COMPUTER SYSTEMS SERVICING NC II

Unit of Competency:
Maintain and Repair Computer Systems and Networks

Module Title:
Maintaining and Repairing Computer Systems and Networks

College for Research and Technology


COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 1 of 94
II CRT Technical
Group
Revision # 03

How to use this CBLM


Welcome to the Module “Maintaining and Repairing Computer Systems and
Networks”. This module contains training materials and activities for you to
complete.
The unit of competency “Maintain and Repair Computer Systems and
Networks” contains the knowledge, skills and attitudes required for
Computer Systems Servicing course required to obtain the National
Certificate (NC) level II.
You are required to go through a series of learning activities in order
to complete each of the learning outcomes of the module. In each learning
outcome there are Information Sheets, Job Sheets, Operation
Sheets, and Activity Sheets. Follow these activities on your own and
answer the Self-Check at the end of each learning activity.
If you have questions, do not hesitate to ask your teacher for
assistance.
Recognition of Prior Learning (RPL)
You have already some basic knowledge and skills covered in this
module. If you can demonstrate competence to your teacher in a
particular skill, talk to him/her so you did not have to undergo the same
training again. If you have a qualification or Certificate of Competency
from previous trainings show it to him/her. If the skills you required are
consistent with and relevant to this module, they become part of the
evidence. You can present these RPL. If you are not sure about your
competence skills, discuss this with your teacher.
After completing this module, ask your teacher to assess your
competence. Result of your assessment will be recorded in your
competency profile. All the learning activities are designed for you to
complete at your own pace.
In this module, you will find the activities for you to accomplish and
relevant information sheets for each learning outcome. Each learning
outcome may have more than one learning activity.

This module is prepared to help you achieve the required


competency in receiving and relaying information. This will be the source
of information that will enable you to acquire the knowledge and skills in
Computer Systems Servicing NC II independently at your own pace with
minimum supervision from your trainer.
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 2 of 94
II CRT Technical
Group
Revision # 03

Computer Systems Servicing NC II


COMPETENCY-BASED LEARNING MATERIALS

List of Competencies
No. Unit of Competency Module Title Code

1 Install and Installing and ELC724331


configure configuring
computer systems computer systems

2 Set-up Computer Setting-up ELC724332


Networks Computer
Networks

3 Set-up Computer Setting-up ELC724333


Servers Computer Servers

4 Maintain and Maintaining and ELC724334


Repair Repair
Computer Computer
Systems and Systems and
Networks Networks

COMPUTER July 2024 Document No. RIR-CSS04


SYSTEMS
SERVICING NC Issued by: Page 3 of 94
II CRT Technical
Group
Revision # 03

MODULE CONTENT

UNIT OF COMPETENCY :MAINTAIN AND REPAIR COMPUTER


SYSTEMS AND NETWORKS
MODULE TITLE :MAINTAINING AND REPAIRING COMPUTER
SYSTEMS AND NETWORKS

MODULE DESCRIPTOR : This module covers the knowledge, skills


and attitudes needed to maintain
and service computer systems and
networks.

NOMINAL DURATION : 40 hours

SUMMARY OF LEARNING OUTCOMES:

Upon completion of this module, the trainee/student

must be able to:

LO 1. Plan and prepare for maintenance and repair


LO 2. Maintain computer systems and networks
LO 3. Diagnose faults of computer systems and networks
LO 4. Rectify/correct defects in computer systems and networks
LO 5. Inspect and test the computer systems and networks

COMPUTER July 2024 Document No. RIR-CSS04


SYSTEMS
SERVICING NC Issued by: Page 4 of 94
II CRT Technical
Group
Revision # 03

LEARNING OUTCOME 1. Plan And Prepare For Maintenance And


Repair

ASSESSMENT CRITERIA:
1 Maintenance and/or Diagnosis of faults is planned and prepared in
line with job requirements.
2 Tools, equipment and testing devices needed for the maintenance are
obtained and checked for correct operation and safety
3 Materials necessary to complete the work are obtained in
accordance with established procedures and checked against
job requirements.
4 OHS policies and procedures are followed in line with job requirements.
5 Computer systems and networks for maintenance are checked against
job/service order or instructions and specifications.
CONTENTS:

Planning and preparing for maintenance


Computer systems maintenance procedures
o PC systems
o Computer operations
o Electronic fault findings
Use and operation of tools, instruments and testing
devices Established procedures and job requirements
Occupational health and safety policies and procedures
Job service order forms or checklist
Reading skills required to interpret work instructions
Communication skills needed to interpret and define work
procedures
Problem solving in emergency situation

CONDITIONS:

The students/trainees must be provided with the following:


Tools and materials
Computers and peripherals
Test instruments
Materials
PPE
Technical manuals
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 5 of 94
II CRT Technical
Group
Revision # 03

METHODOLOGIES:

Lecture/ Discussion
Demonstration/ Role playing
Film viewing

ASSESSMENT METHODS:
Written exam
Practical exam/ Demonstration
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 6 of 94
II CRT Technical
Group
Revision # 03

LEARNING OUTCOME 2. Maintain Computer Systems And


Networks (LO Title)

Assessment Criteria

1. Appropriate personal protective equipment is used in line with


standard procedure.
2. Normal function of computer systems and networks are checked in
accordance with manufacturer’s instructions.
3. Scheduled/periodic maintenance is performed in accordance with
manufacturer’s requirements.
4. Where necessary, needed repairs/replacements are made in
accordance with established procedures.
5. Unplanned events or conditions are responded to in accordance with
established procedures
CONTENTS:

Occupational health and safety


Personal Protective Equipment (PPE)
Computer system and network operation
Procedures in maintenance scheduling
Preventive maintenance of computer system and network o
Operating system update
o Back-up scheduling
o Creating restore point
o Guarding against virus
o Cleaning computer systems and networks
Problem solving in emergency situation

CONDITIONS:

The students/trainees must be provided with the following:

Hardware and software tools


Computers and peripherals
Test instruments
Materials and replacement components
PPE
Technical manuals
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 7 of 94
II CRT Technical
Group
Revision # 03

METHODOLOGIES:

Lecture/ Discussion
Demonstration/ Role playing
Film viewing

ASSESSMENT METHODS:

Written exam
Practical exam/ Demonstration
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 8 of 94
II CRT Technical
Group
Revision # 03

LEARNING OUTCOME 3. Diagnose Faults of Computer Systems

Assessment Criteria:
1. Appropriate personal protective equipment is used in line with
standard procedure. Faults or problems in the computer systems and
networks are diagnosed according to requirements and in line with
the standard procedures.
2. Fault and problems are recorded in accordance with standard
procedures
3. Appropriate measures are determined in accordance with established
procedures
4. Unplanned events or conditions are responded to in accordance with
established procedures
5. Documentation and reports are accomplished and submitted to
appropriate personnel in accordance with enterprise requirements.
CONTENTS:
• Personal Protective Equipment (PPE)
• Diagnostic procedures
• Problem solving in emergency situation
• Responding to unplanned/unexpected events
• Identifying and isolating faults/problems
o Diagnostic software utilities
o Gathering of information
• Accomplished forms
o Diagnostic reports
o Proposal reports
CONDITIONS:
The students/trainees must be provided with the following:
• Hardware and software tools and utilities
• Computers and peripherals
• Test instruments
• PPE
• Technical manuals
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 9 of 94
II CRT Technical
Group
Revision # 03

METHODOLOGIES:
• Lecture/ Discussion
• Demonstration/ Role playing
• Film viewing

ASSESSMENT METHODS:
• Written exam
• Practical exam/ Demonstration
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 10 of 94
II CRT Technical
Group
Revision # 03

LEARNING OUTCOME 4. Rectify/Correct Defects In Computer


Systems
Assessment Criteria:
1. Defective components or parts are replaced or corrected
without damage to the surrounding environment or services
2. Adjustments, if necessary are made in accordance with
established procedures
3. Appropriate measures are performed in accordance with
established procedures
4. Unplanned events or conditions are responded to in
accordance with established procedures.
5. Documentation and reports are accomplished and
submitted to appropriate personnel in accordance with
enterprise requirements
CONTENTS:
Personal Protective Equipment (PPE)
Defects in computer systems and networks
Troubleshooting and repair techniques
Problem solving in emergency situation
Corrective action
▪ Hardware configuration
▪ Software configuration
Accomplished forms
▪ Repair reports
▪ Corrective action reports
Documentation and making report
CONDITIONS:
The students/trainees must be provided with the following:
Hardware and software tools and utilities
Computers and peripherals
Test instruments
Materials and replacement components
PPE
Technical manuals
METHODOLOGIES:
Lecture/ Discussion
Demonstration/ Role playing
Film viewing
ASSESSMENT METHODS:

Written exam
Practical exam/ Demonstration
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 11 of 94
II CRT Technical
Group
Revision # 03

LEARNING OUTCOME 5. Inspect and Test the Computer Systems


and Networks
Assessment Criteria:
1. Final inspections are undertaken to ensure that the testing
conducted on the device conforms with the manufacturer’s
instruction/manual
2. Computer systems and networks are checked/tested to ensure safe
operation.
3. Work site is cleaned and cleared of all debris and left in safe
condition in accordance with company procedures
4. Report is prepared and completed according to company
requirements
5. 5S and 3Rs are followed according to environmental policies
CONTENTS:
Testing methods and procedures
5S and 3Rs environmental policies
Reports
o s t a tus report
o Final test report
Waste management
CONDITIONS:
The students/trainees must be provided with the following:
Hardware and software tools and utilities
Computers and peripherals
Test instruments
Materials and replacement components
PPE
Technical manuals

METHODOLOGIES:
Lecture/ discussion
Demonstration/ role playing
Film viewing

ASSESSMENT METHODS:

Written exam
Practical exam/ demonstration
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 12 of 94
II CRT Technical
Group
Revision # 03

Information Sheet 4.1-1


Plan and Prepare Maintenance Procedures
Introduction: Planning and preparing systematic maintenance procedure
save time, money and frustration. It is a good idea and opportunity to learn
the proper care and maintenance of your computer. PC maintenance is an
important topic for anyone who owns a PC. Looking after your PC properly
ensures you of trouble-free use. Regular PC maintenance also keeps the
machine’s performance optimal.
A. Plan Maintenance Procedures for Computer System and
Networking. 1. Design a systematic maintenance plan for hardware.
• Design a monitoring, evaluating and updating plan.
• Place your computer in a well-ventilated area.
• Schedule use of computer for its longer life.
• Move the computer only when it is turned off and unplugged.
• Treat your computer properly.
• Maintain your hard disk

2. Design a systematic maintenance plan for your software.


• Backup your files
• Install or secure passwords
• Delete temporary files
• Update anti-virus and spy ware

TYPES OF MAINTENANCE PROCEDURE:


(1) Hardware maintenance is the testing and cleaning of equipment.

(2) Information system maintenance is the routine updating of master files,


such as adding and deleting employees and customers and changing credit
limits and product prices.

(3) Software or program maintenance is the updating of application programs


in order to meet changing information requirements, such as adding new
functions and changing data formats. It also includes fixing bugs and adapting
the software to new hardware devices.
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 13 of 94
II CRT Technical
Group
Revision # 03

(4) Disk or file maintenance is the periodic reorganizing of disk files that have
become fragmented due to continuous updating.

Work place procedures


• Identify hazards and assess risk.
• Execution of OHS policies are carried out along with the task.

Following certain procedure is very important to perform a given operation or


evolution or in reaction to a given event. The table below shows different
elements and their corresponding performance criteria to be able to identify
occupational health and safety hazards, and assess risk, as well as follow
instructions and procedure in the workplace with minimal supervision. The
students will also be capable of participating and contributing to OHS
management issues.
risk control.
PERFORMANCE CRITERIA
ELEMENT

1.1 Identify hazards in the work area


and during the performance of
1. Identify hazards and assess risk.
workplace duties. 1.2 Assess level of
risk
2.1 Report hazards in the work area to
designated personnel according to
2. Follow procedures and strategies for workplace procedures
scope of responsibilities and
2.2 Follow workplace procedures and
competencies, follow workplace
work instructions for assessing and
procedures for dealing with hazards
controlling risks with minimal
and incidents, fire and/or other
supervision.
emergencies.

2.3 Whenever necessary, within the

COMPUTER July 2024 Document No. RIR-CSS04


SYSTEMS
SERVICING NC Issued by: Page 14 of 94
II CRT Technical
Group
Revision # 03

3. Contribute to OHS in the


workplace.
arrangement for OH&S management
in the workplace within organizational
procedures and the scope of
responsibilities and competencies
3.4 Provide feedback to supervisor on
hazards in work area in line with
organizational OH&S policies and
procedures
3.5 Provide support in implementing
procedures to control risks in

Examples of OHS issues which may


need to be raised by workers with
designated personnel may include:
3.1 Describe employee’s rights
regarding consultation on OH&S
matters

3.2 Raise task and/or job specific


OH&S issues with appropriate people
in accordance with workplace
procedures and relevant OH&S
legislative
requirements accordance with organizational
procedures
3.3 Contribute to participative

Identified Hazards
risks associated with hazards
Clarification on understanding of
OHS policies and procedures
Communication and consultation
processes
Follow up on reports and
feedback. Effectiveness of risk
controls in place Training
needs

Problems encountered in managing

COMPUTER July 2024 Document No. RIR-CSS04


SYSTEMS
SERVICING NC Issued by: Page 15 of 94
II CRT Technical
Group
Revision # 03

Materials, Tools, Equipment and Testing Devices. Programming Tools


(1) Programming tools are used for software development or system
maintenance. Virtually, any program or utility that helps programmers or
users develop applications or maintain their computers can be called a tool.
Examples of programming tools are compilers, interpreters, assemblers,
4GLs, editors, debuggers and application generators.

(2) Programming tools help the user analyze or search for data. For example,
query and report programs are often called query tools and report tools.

(3) An on-screen function in a graphics program; for example, line draw,


circle draw or brush tool.

(4) A software control panel for setting user preferences.


(5) Sometimes people will call any software a "tool." For example, the
phrase, "there aren't any tools to do that job" means that no application is
available to perform the required processing.
Equipment/Facilities Tools & Instruments Supplies & Materials
Server Computer Hubs Switches LAN iron/gun De-soldering
peripherals Desktop Cards Printers and tool Flashlight
computers OHS Scanners Routers USB Tweezers Mirrors
guidelines Phil. Flash Drives Antistatic wrist wrap
Environmental Protective eye wear LAN Tester Crimping
protection standards Wire stripper with tool Software installer
Monitors Motherboard cutter Pliers(Assorted) Work bench Magnifying
Power supply Network Screw drivers glass
device and cablings (Assorted) Soldering Floppy disk Compact Disk

COMPUTER July 2024 Document No. RIR-CSS04


SYSTEMS
SERVICING NC Issued by: Page 16 of 94
II CRT Technical
Group
Revision # 03

COC 4 - Maintain and Repair Computer


Systems and Networks
1. On server manager dashboard click Add roles and features, then click next until you
get into Features then click the checkbox of the Windows Server Backup then click
Next then click Install then click Close.
2. Click start button then type or search Windows Server Backup, then in Local
Backup Click Backup Once.

COMPUTER July 2024 Document No. RIR-CSS04


SYSTEMS
SERVICING NC Issued by: Page 17 of 94
II CRT Technical
Group
Revision # 03

3. On Backup Options select Different options then click next, on Select Backup
Configuration you can choose Full Server or Custom in Full Server backup you will
backup all the settings and files of the server but in custom you can only select
specific files or folders to backup, in this example we will choose custom, select
custom then click next.
4. On Select Items for backup click Add items, then expand Local Disk (C:) then
check the Users folder then click OK, then click Next.

5. On Specify Destination Type select Local Drives then click next


COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 18 of 94
II CRT Technical
Group
Revision # 03
6. On Select Backup Destination click the dropdown menu in Backup Destination then
select the other drive of the hard disk then click next. Then on confirmation click
Backup wait for it to finish the backup.

7. Perform the deletion of the Public folder on the user or delete the user folder.
Then on Window Server Backup click Recover.
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 19 of 94
II CRT Technical
Group
Revision # 03
8. On Getting Started select This Server then click next, on Select Backup Date just
click Next, then on Select Recovery Type select Files and Folders then click Next,
then on Select Items to Recover expand WIN- then expand Local Disk (C:), expand
Users then click Public (which you have deleted) then click Next.

9. On Specify Recovery Options select Original location and Overwrite the existing
versions with the recovered versions then click Next, on confirmation click Recover,
then wait for it to recover the files then check if you have successfully recover the
files.
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 20 of 94
II CRT Technical
Group
Revision # 03
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 21 of 94
II CRT Technical
Group
Revision # 03

OPERATION SHEET 4.1-1


Title: Plan and Prepare Maintenance Procedure

Performance Objective: Given (condition), you should be able to


(performance) following (standard).

Supplies/Materials :

Equipment :
Steps/Procedure:
1. Prepare/Design a daily maintenance plan for your
hardware, (time allotment: 1 week)
Clean computer case
Clean the keyboard
Clean the mouse
Clean the screen
Clean up hard drives
2. Design a systematic daily plan for your software, (
time allotment: 1 week)
Create an emergency diskette
Check for viruses
Back up files
Defragment hard drive
Scan hard drive for errors
3. Record the result of your maintenance process

Assessment Method:
Demonstration with oral interview

COMPUTER July 2024 Document No. RIR-CSS04


SYSTEMS
SERVICING NC Issued by: Page 22 of 94
II CRT Technical
Group
Revision # 03

INFORMATION SHEET 4.2-1


Personal Protective Equipment

Tools and equipment used to protect the user and the computer system.
Types of personal protective devices
1. Anti-static devices
2. Power surge protectors
3. Personal equipments

ESD (Electro Static Discharge) -A small amount of static electricity that


can destroy small parts of your computer. Anti-static devices Devices
designed to protect the computer from static electricity. Examples:
1. Anti-static wrist strap
2. Anti-static mat
3. Anti-static bag
4. Anti-static spray

Power surge protectors Devices designed to protect the computer from


sudden power surges from intermittent power sources. Examples:
1. AVR (Automatic Voltage Regulators)
2. UPS (Uninterrupted Power Supply)

Personal Equipment

1. Small paint brush

2. Screw drivers

3. Pliers and tweezers

4. Compressed air

5. Handheld vacuum

Periodic Maintenance Scheme Regular scheduled upkeep of your computer


will keep you and your computer in working smoothly. Daily Schedule

• Update virus and spyware definitions

• Do incremental backup – back up updated files for each date. •

Reboot upon crash- Reboot the computer to fix your pc upon crash.

Weekly
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 23 of 94
II CRT Technical
Group
Revision # 03

• Full virus and spyware scan

• Complete backup of files

• Patch up –Get latest software update for your operating system.


Monthly

• Clean your PC inside and out.


• Defrag your hard drive to speed up its operation.

Yearly

• Check your programs – clean up unused programs


• Reformat your hard drive and reinstall the operating system
• Make a full diagnostic check on hardware and software
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 24 of 94
II CRT Technical
Group
Revision # 03

Sample Maintenance Frequency


Maintenance Activity Auto?
scheme Preventive Recommended
systems for errors
Daily Yes
Scan hard disk file

Scan for viruses Daily Yes Back up data Daily No Clean


CRT screen Weekly No Defragment hard disks Monthly
Yes
Scan for hard disk read Weekly Yes
errors

Clean mouse Monthly No


Check for full hard disk Monthly No
volumes and remove
unnecessary files
Update virus definition files Monthly Sometimes Quarterly No
Check power protection
devices to ensure they are
still protecting the system
Check power supply fan for Quarterly No
ventilation and dirt buildup
and clean if necessary
Back up CMOS
information Quarterly No Quarterly No
Update emergency boot
floppies
Clean floppy disk Check processor ensure they are
drive internals temperature, working Check
and read/write inspect heat sink hard disk for
heads and fan to temperature and
vibration opened) No No
Quarterly
(depending on use)
Annually (or
Annually (or whenever case is No
whenever case is opened)

Clean exterior of case Annually No


Clean exterior of motherboard and
monitor Annually No Annually No
Check and clean interior,

COMPUTER July 2024 Document No. RIR-CSS04


SYSTEMS
SERVICING NC Issued by: Page 25 of 94
II CRT Technical
Group
Revision # 03

expansion cards if
necessary
Check internal Annually No
connections and cables

Clean keyboard Annually No


COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 26 of 94
II CRT Technical
Group
Revision # 03

Self- Check 4.2-3

Answer the following questions


1. For somebody who always works with computers, what personal
protective devices do you usually use? How often do you use
them?

2. Computers should be protected from static electricity to prevent


component malfunction. What anti-static devices can you utilize to
avoid such malfunction?
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 27 of 94
II CRT Technical
Group
Revision # 03

INFORMATION SHEET 4.2-2


Proper Cleaning of Devices

Cleaning the Mouse


1. Shut down the PC before cleaning
the mouse.
2. Roll the mouse over onto its back
and remove the ball access slide
cover.
3. Wash the mouse ball with water.
4. Inspect the mouse ball’s chamber,
for lint, dirt and threads and carefully
remove any you find with tweezers.
5. Blow out the mouse ball chamber with compressed air.
6. If needed, you can use isopropyl alcohol to clean the exterior of the
mouse.
7. Reconnect the mouse and restart the computer to give it a complete test
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 28 of 94
II CRT Technical
Group
Revision # 03

Cleaning the Monitor

1. Turn off the monitor and unplug it from the power source.
2. Using compressed air, clean away any dust on the top of the monitor’s
case.
3. Use a soft cloth and isopropyl alcohol to clean the outside of the monitor.

4. Use an antistatic cleaner to clean the glass of the monitor.

5. Reconnect the monitor and test the performance.


COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 29 of 94
II CRT Technical
Group
Revision # 03

Procedure in cleaning the keyboard


1. Shut down the computer and turn off the computer.

2. Disconnect the keyboard from the computer and lay it upside-down on a


flat, clean work surface.

3. Remove the screws that hold together the keyboard case.

4. Holding the case together, turn the keyboard over, and then remove the
top cover. Use the compressed gas and/or brush and vacuum to clean out
the keys.

5. Taking care not to dislodge any keys, remove the key assembly from the
case.

6. If the keyboard has a circuit card attached to the key assembly, remove it
and set it aside.

7. Remove the screws that hold the back metal plate to the key assembly.
Put the screws in a cup or another container so you won’t lose them.

8. Carefully lift off the metal plate. What you find underneath depends on the
design of the keyboard. Carefully lift and clean the contacts on the card with
the alcohol and cloth.

9. Probably, there will be some type of rubber pad between the printed
circuit and the back of the keys. Carefully lift this up and clean any spill
residue from the pad as well as the backs of the keys.

10. Reassemble the pads, printed circuit, circuit card and metal plate, and
then turn the assembly right-side up again.

11. It would be a good idea to remove the keys and clean them, as well.
They should pop off. Just don’t remove more than a few at a time, because
you’ll have a real nightmare to figure out which key go where. Clean under
them with the alcohol and cloth.
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 30 of 94
II CRT Technical
Group
Revision # 03
Printer Cleaning Inkjet Printer

1. Clean the print nozzle regularly. Most inkjet printers have a built-in utility
to clean or unclog the print head nozzles. You should do this regularly,
especially if the printer sits idle for a couple of weeks.

2. Never turn a printer off by pulling the plug from the power source. Always
use the printer’s power switch to turn it off. The printer has some built-in
functions, such as parking the print head that are tied to the power-off
function of the printer’s on/off switch.

3. Use inkjet quality paper.

4. Dust and paper scraps and bits can collect in the bottom of the paper path
in an inkjet printer. Remove the paper scraps and blow out any dust or paper
bits that have accumulated with compressed air.
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 31 of 94
II CRT Technical
Group
Revision # 03

Cleaning your system unit - Cleaning the system unit and its parts is not
really difficult to do; you just need the proper tools to clean it properly. Using
compressed air antistatic strap and a Phillips screw driver you can effectively
clean your unit. The parts that need cleaning are the ff:

1. Motherboard
2. Memory

3. Interface cards

4. Hard drives

5. Optical Drives

6. System Case
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 32 of 94
II CRT Technical
Group
Revision # 03

Self - Check 4.2-2


Write your answers on your answer sheet:
1. Enumerate the basic tools needed in cleaning your system unit.
2. Can we use anti-static glass cleaner when cleaning the monitor? Yes
or No. Why?

3. Is it safe to clean your printer when it is still on? Explain.

4. Why do we need to shut down our computer unit before we clean


and disassemble?
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 33 of 94
II CRT Technical
Group
Revision # 03

INFORMATION SHEET 4.2-3


Remove Viruses from Infected Machine

Computer Virus
A virus is a destructive executable program that
infects the other programs in the system and
spreads by replicating itself.
Such a program is designed to damage the
victim’s computer files.
Viruses are coded by malicious programmers in a
way that they can spread in the system without one's permission and
knowledge.

Virus Origins and History


People create viruses. A person has to write the code, test it to make sure it
spreads properly and then release the virus. A person also designs the
virus's attack phase, whether it's a silly message or destruction of a
hard disk. So why do people do it?
There are at least three reasons. The first is the same psychology that drives
vandals and arsonists. Why would someone want to bust the window on
someone else's car, or spray-paint signs on buildings or burn down a
beautiful forest? For some people, that seems to be a thrill. If that sort of
person happens to know computer programming, then he or she may
funnel energy into the creation of destructive viruses. The second reason
has to do with the thrill of watching things blow up. Many people have a
fascination with things like explosions and car wrecks. When you were
growing up, there was probably a kid in your neighborhood who learned
how to make gunpowder and then built bigger and bigger bombs until he
either got bored or did some serious damage to himself. Creating a virus
that spreads quickly is a little like that -- it creates a bomb inside a
computer, and the more computers that get infected the more "fun" the
explosion.
The third reason probably involves bragging rights, or the thrill of doing it.
Sort of like Mount Everest. The mountain is there, so someone is
compelled to climb it. If you are a certain type of programmer and you
see a security hole that could be exploited, you might simply be
compelled to exploit the hole yourself before someone else beats you to
it.
Traditional computer viruses were first widely seen in the late 1980s, and
they came about because of several factors. The first factor was the spread
of personal computers (PCs). Prior to the 1980s, home computers were
nearly non-existent or they were toys. Real computers were rare, and they
were locked away for use by "experts." During the 1980s, real
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 34 of 94
II CRT Technical
Group
Revision # 03

computers started to spread to businesses and homes because of the


popularity of the IBM PC (released in 1982) and the Apple Macintosh
(released in 1984). By the late 1980s, PCs were widespread in businesses,
homes and college campuses.
The second factor is the use of computer bulletin boards. People could dial up
a bulletin board with a modem and download programs of all types.
Games are extremely popular, and so are simple word processors,
spreadsheets, etc. Bulletin boards lead to the precursor of the virus
known as the Trojan horse. A Trojan horse is a program that sounds
really cool when you read about it. So you download it. When you run
the program, however, it does something uncool like erasing your disk.
So you think you are getting a neat game, but it wipes out your system.
Trojan horses only hit a small number of people because they are
discovered quickly. Either the bulletin board owner would erase the file
from the system or people would send out messages to warn one
another.
Different Aspects of Computer Virus
Finder- searches for the new uninfected files and the Replicator- actually
targets these files and infects it by multiplying itself. Types of virus
Resident Viruses This type of virus is a permanent which dwells in the
RAM memory. From there it can overcome and interrupt all of the
operations executed by the system: corrupting files and programs that
are opened, closed, copied, renamed etc. Examples include: Randex, CMJ,
Meve, and MrKlunky. Direct Action Viruses The main purpose of this
virus is to replicate and take action when it is executed. When a specific
condition is met, the virus will go into action and infect files in the
directory or folder that it is in and in directories that are specified in the
AUTOEXEC.BAT file PATH. This batch file is always located in the root
directory of the hard disk and carries out certain operations when the
computer is booted. Overwrite Viruses Virus of this kind is characterized
by the fact that it deletes the information contained in the files that it
infects, rendering them partially or totally useless once they have been
infected. The only way to clean a file infected by an overwrite virus is to
delete the file completely, thus losing the original content.
Examples of this virus include: Way, Trj.Reboot, Trivial.88.D.
Boot Virus This type of virus affects the boot sector of a floppy or hard
disk. This is a crucial part of a disk, in which information on the disk itself
is stored together with a program that makes it possible to boot (start)
the computer from the disk. The best way of avoiding boot viruses is to
ensure that floppy disks are write-protected and never start your
computer with an unknown floppy disk in the disk drive. Examples of boot
viruses include: Polyboot.B, AntiEXE.
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 35 of 94
II CRT Technical
Group
Revision # 03

Macro Virus Macro viruses infect files that are created using certain
applications or programs that contain macros. These mini-programs make
it possible to automate series of operations so that they are performed as
a single action, thereby saving the user from having to carry them out
one by one. Examples of macro viruses: Relax, Melissa.A, Bablas,
O97M/Y2K.

Directory Virus Directory viruses change the paths that indicate the location
of a file. By executing a program (file with the extension .EXE or .COM)
which has been infected by a virus, you are unknowingly running the virus
program, while the original file and program have been previously moved
by the virus. Once infected it becomes impossible to locate the original
files.
Polymorphic Virus Polymorphic viruses encrypt or encode themselves in a
different way (using different algorithms and encryption keys) every time
they infect a system. This makes it impossible for anti-viruses to find
them using string or signature searches (because they are different in
each encryption) and also enables them to create a large number of
copies of themselves. Examples include: Elkern, Marburg, Satan Bug, and
Tuareg.

File Infectors This type of virus infects programs or executable files (files
with an .EXE or .COM extension). When one of these programs is run,
directly or indirectly, the virus is activated, producing the damaging
effects it is programmed to carry out. The majority of existing viruses
belong to this category, and can be classified depending on the actions
that they carry out. Companion Viruses Companion viruses can be
considered file infector viruses like resident or direct action types. They
are known as companion viruses because once they get into the system
they "accompany" the other files that already exist. In other words, in
order to carry out their infection routines, companion viruses can wait in
memory until a program is run (resident viruses) or act immediately by
making copies of themselves (direct action viruses). Some examples
include: Stator, Asimov.1539, and Terrax.1069

Logic Bombs They are not considered viruses because they do not replicate.
They are not even programs in their own right but rather camouflaged
segments of other programs.
How do Virus Affect a System?
• It corrupts files
• It slows down the speed of the computer system
• It causes the system to hang frequently
• It deletes various files
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 36 of 94
II CRT Technical
Group
Revision # 03

Sources of Virus Infection


A virus can enter the system and infect it through various sources. Some of
the sources are
• Infected CDs, DVDs, pen drives, etc
• E-mail
• Browsing infected sites
• Downloading files from the internet

Steps to Remove Viruses


Removing viruses, though technical, is yet a very simple process if all the
required steps are properly followed. The basic steps are:
• Buy or download an antivirus software(AVG Anti-virus)
• Install the antivirus software
Update antivirus software with the latest virus definitions
Do a complete system scan
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 37 of 94
II CRT Technical
Group
Revision # 03

Methods of Eliminating Viruses Removing the virus – When the virus can
be easily identified and can be removed without affecting other files, then
the antivirus removes it from the host place. Quarantine – This is done
when the virus cannot be easily identified removed from the file and the
removal of virus means the removal of the complete file. In this method,
although the virus is not eliminated, it is rendered inactive by moving the
file into "quarantine" and renaming it.
Anti-virus Software Software is designed to cure virus infected machines.
An anti-virus is a program that searches for, identifies and removes
potential viruses existing in the computer system
Examples of Anti-virus
software

• Symantec Norton
antivirus
• AVG antivirus
• McAfee Scan
• Microsoft Antivirus
• Kaspersky
• Avast
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 38 of 94
II CRT Technical
Group
Revision # 03

INFORMATION SHEET 4.3-1


COMPUTER MAINTAINANCE

Here is a step by step guide on how to Maintain/Repair or


troubleshoot a Computer. This is the normal procedure used by most
Computer Technicians in Repairing or troubleshooting a PC. But it can
be done only after Planning and Preparing, this is only for future
reference:

Here are the steps to be made.

• Check if the power switch is turned on.


• Try to plug a lamp into the wall socket to make sure power is
available
• Check if the power cord properly connected to the wall outlet and
the computer power socket.
• Check if the cord looks OK and undamaged? If it looks damaged,
replace it.
• Open the system unit and push down on all the chips, Video Card,
Sound Card, Modem or LAN cards, Memory and the CPU to make
sure they are seated properly.

Ground Yourself to Avoid Static Electric Charges

But before going through with this process, you should turn your
Computer off and disconnect the power cord. It is also important to
ground yourself by touching the frame of the case before going through
the troubleshooting process. All of your PC’s components are sensitive to
static electric charges.
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 39 of 94
II CRT Technical
Group
Revision # 03

• Check the power connector from the power supply to the


motherboard…
• Pull out and reinsert all the cards; try placing them in different
slots.

Take out all non-essential parts so that only the basic part such as the
motherboard, power supply, display card, controller and drive are left.
You can pull-out the cards by removing the screw as shown in the screen
shot below.

• Replace each part one at a time, until the problem reoccurs. • When
you replace a part and the computer stops working, You know that
part is the reason for the problem, It can then be replaced. • If the
computer still doesn’t operate.
• Remove all the remaining cards including the display card and
floppy controller.
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 40 of 94
II CRT Technical
Group
Revision # 03

• Turn on the power and check if the power supply is running. If it


runs, one of the cards you just removed is bad.

HELP-FUL TIPS IN COMPUTER MAINTENANCE

• If you use your computer more than a few hours per day, we
suggest you not to turn off your computer at the end of the day.
Instead turn off only the monitor to save electricity. Daily power
up and down makes the components exposed to high and low
temperature cycles that are not good for the life-time of the
components, particularly the critical ones such as hard drives,
CPU, and memory. The temperature cycle would result in
expansion-shrinking cycle for the components. The life-time of
electronic components would be increased if they are run at
constant temperature with adequate ventilation.
• If your area experiences a few times of power outage per year, it is
necessary to use a UPS. Sudden power downs while the system
is running may cause severe damage to hard drives.
• A tape backup and a lock to make systems hard to move are
worthy investment for critical data.
• Use your hand to touch and feel the cover of your computer at
least once a week. The cover should be at room temperature. If it
feels warm there may be a problem! Check to make sure that the
cooling fans on the power supply and CPU are working properly.
Clean the air pathway on the back of the power supply on a
regular basis.

• Fragmented hard drive

Over time, your hard drive may become fragmented, thereby slowing down your
computer. You should therefore de-fragment your computer every few weeks or
so. Just go to the start menu - accessories - system tools - disk defragmenter.

• Overheating
Computers can generate a lot of heat, especially if they're left on for long periods
of time. A simple way to combat this is just to turn off your computer for a while
and give it time to 'cool off'. If overheating is a recurring issue, you might want to
look into investing in a larger cooling fan for your computer.
• A corrupted registry
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 41 of 94
II CRT Technical
Group
Revision # 03

• The most common computer problem BY FAR is a corrupted registry. In a nutshell,


the registry basically stores all the information of all your computer's settings and
configurations.
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 42 of 94
II CRT Technical
Group
Revision # 03

Self-Check 4.3-1

Instructions: Answer the following as indicated. Use answer sheet to be


provided by
your trainer.

A. Define the following on your own idea


1) UPS
2) HARDDRIVE
3) LAN
4) NETWORK
5) COMPUTER UNIT
6) ESD

B. Give Definition of the different parts of Computer system based on


your idea.
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 43 of 94
II CRT Technical
Group
Revision # 03

Answer key 4.3-1


Check your answers with the model answers below

A.

1) UPS – Interruptible Power Supply


2) HARDDRIVE – Serves as a Storage Media where OS is
installed 3) LAN – Local Area Network
4) NETWORK – Connection of two or more Computers
5) COMPUTER UNIT – Refer to System Unit or Whole Computer
Set 6) ESD – Electro-Static Discharge

B.

1. Monitor = Primary Output Device


2. Disk Drive = A CD-ROM or Optical Disk Driver where CD or DVD is
inserted

3. Floppy Disk = Diskette or Obsolete Storage Media

4. Laser Printer = A kind of printer in which laser toner is used to print or


give output

5. CD-ROM = Compact Disk – Read Only Memory

6. CD-ROM DRIVE = Compact Disk – Read Only Memory Drive

7. Keyboard = A primary input Device

8. Mouse = A Pointing Device

9. Modem = Modulator – Demodulator

10. Speaker = Use to give output for audio

11. Memory = A kind of device that can be used as temporary storage


COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 44 of 94
II CRT Technical
Group
Revision # 03

INFORMATION SHEET 4.3-2


Maintaining a Computer Network
No matter how you choose to use your computer network, performing
certain maintenance activities is essential to keep it running well. For
example, monitoring incoming network traffic and Web site visits helps
ensure safe Internet usage. Establishing a network backup system that
keeps safe copies of all of your digital data is also recommended.

3.3 Networking with Consumer Electronics


Consumer electronics devices like game consoles, personal hand-held
gadgets, home entertainment and home security systems can often be
connected to your home network and the Internet to increase their
usefulness.

3.4 Improving Network Performance


On the Internet, so-called speed tests measure the bandwidth of an
Internet connection. You can often employ various tweaks to your
computer and network setup to increase Internet performance. Other
tools and techniques exist to improve performance of local and wide area
networks and applications.

3.5 Using Internet Software Applications


Basic network software applications include Web browsers, email clients
and instant messaging clients. While these are all popular on the Internet,
private organizations also support them internally on their intranets. More
advanced Internet / intranet applications include FTP and VoIP. Being able
to install, configure and run these software applications greatly increases
a network's usefulness.

• Microsoft Internet Explorer


• Instant Messaging Systems
• FTP File Transfer
• VoIP (Voice over IP) Systems
• FoIP (Fax over IP)

3.6 Using P2P Networks


P2P (Peer to Peer) Internet file sharing systems use distributed network
techniques and specialized protocols to support large-scale online file
searching, sharing and messaging. Some P2P file sharing systems have
been heavily criticized for enabling the sharing of copyright material such
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 45 of 94
II CRT Technical
Group
Revision # 03

as commercial music and video files. Popular P2P file sharing applications
include BitTorrent and LimeWire.

3.7 Using Virtual Private Networks (VPN) and Remote Access

•A Virtual Private Network (VPN) supports local or long-distance


protected access to network resources by tunneling through shared
public links. While VPNs offer one type of remote access solution,
other remote access

3.8 Using Internet Proxy Servers


Proxy servers are Internet gateways that provide network firewall,
connection sharing, and caching technology for computers on a private
network. Public Web proxy servers are also available on the Internet as a
means to enable anonymous online surfing.

3.9 Using Storage Networks


Storage networking utilizes specialized devices designed to serve or back
up large amounts of data across local area networks. Two types of
storage network technology exist - SAN (Storage Area Network) and NAS
(Network Attached Storage). A SAN supports large-scale network data
storage, retrieval and replication typically for business networks. A NAS
utilizes one or more file serving devices connected as peers on a local
network.
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 46 of 94
II CRT Technical
Group
Revision # 03

Self-Check 4.3-2

Instructions: Answer the following as indicated. Use answer sheet to be


provided by
your trainer.
A. In Your Own Word, What is Computer Network?
B. What are the Example of P2P Network?
C. What is Proxy Servers?
D. What is Speedtest? When and Where it Use?

E. Define the Following:


7) HTTP
1) OSI
8) SAN
2) IPS
9) NAS
3) FTP
10)
4) VoIP
FoIP
5) P2P
6) VPN

F. Give the Name of the Computer Components Belong in this Network


Diagram
1)2)

3) 4)
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 47 of 94
II CRT Technical
Group
Revision # 03

Model Answers 1

Check your answers with the model answers below


A. A computer network is an interconnection of a group of computers.
Networks may be classified by what is called the network layer at
which they operate according to basic reference models considered
as standards in the industry such as the four-layer model is internet
protocol suite
B. 1) BitTorrent
2) Limewire
C. Proxy Servers are Internet gateways that provide network firewall,
sharing and caching technology for Computer over Private Network D.
Speed tests measure the bandwidth of an Internet connection that you
can if you have an internet access to make that your current speed can
satisfy your browsing and surfing access through Web Browsers.
1) OSI = Open System Interconnection
2) IPS = Internet Protocol Suite
3) FTP = File Transfer Protocol
4) VoIP = Voice Over Internet Protocol
5) P2P = Peer to Peer Networking
6) VPN = Virtual Private Networking
7) HTTP = Hyper Text Transfer Protocol
8) SAN = Storage Area Network
9) NAS = Network Attached Storage
10) FoIP = Fax Over Internet Protocol
E. Give the Name of the Computer Components Belong in this Network
Diagram
1) Network Printer
2) Network Server
3) Personal Computer (Tower Type)
4) Personal Computer (Desktop Type)

INFORMATION SHEET 4.3-3


COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 48 of 94
II CRT Technical
Group
Revision # 03

Checking Your Computer For Safety

• If you use your computer more than a few hours per day, we suggest you
not to turn off your computer at the end of the day. Instead turn off only
the monitor to save electricity. Daily power up and down makes the
components exposed to high and low temperature cycles that are not good
for the life-time of the components, particularly the critical ones such as
hard drives, CPU, and memory. The temperature cycle would result in
expansion-shrinking cycle for the components. The life-time of electronic
components would be increased if they are run at constant temperature
with adequate ventilation.

• If your area experiences a few times of power outage per year, it is


necessary to use a UPS. Sudden power downs while the system is running
may cause severe damage to hard drives.

• A tape backup and a lock to make systems hard to move are worthy
investment for critical data.

• Use your hand to touch and feel the cover of your computer at least once a
week. The cover should be at room temperature. If it feels warm there
may be a problem! Check to make sure that the cooling fans on the power
supply and CPU are working properly. Clean the air pathway on the back
of the power supply on a regular basis.

▪ To save yourself alot of money and unneedless trips to the computer shop
for repairs,there are a series of very simple steps you can take to keep
your new computer running fast and efficient. Myself,I have windows xp
home edition running on my computer. I find it to be the best system out
there at the moment.The choice is of course yours as to what operating
system you install on your machine. When you get your new computer
home and you configure an internet connection,the first thing I
recommend that you do is to get to the windows update site. The site will
automatically update your new operating system with files to prevent
people on other computers from accessing your data. Next step is to
install an anti-virus and spyware program on your computer.
▪ Before you do anything, make sure the computer is unplugged from the
outlet and is completely turned off! Next is to get a screwdriver for those
little round screws you will need to undo to get inside your case. When
both sides of the case are removed,you will need a can of compressed
air..you can buy this from any computer store. You then spray all the
areas inside the case..you will see the dust and dirt flyng off from the
places you sprayed. Doing this 4 times a year(every 3 months)Is a great
way to save a lot of money and keep your computer running like its brand
new.
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 49 of 94
II CRT Technical
Group
Revision # 03

Troubleshooting Technique for Networking


Maintenance

1. If you can't connect to a server or if Windows reports an error after you


double-click Network Neighborhood, try the following first: • Make sure
you're using the drivers that are on the drivers disk that ships with the network
interface card (NIC).
• Make sure the driver is loaded and the protocols are bound. Check the
Device Properties list for trouble indicators (an "X" or "!" symbol). • Test the
NIC adapter with the diagnostic utilities that often came with the driver
installation.
• Check with your LAN administrator - you may need to install additional
networking software.
2. If the problem persists, follow these guidelines:
• Make sure the cable is installed properly. The network cable must be
securely attached at both RJ45 connections (adapter and hub). The
maximum allowable distance from adapter to hub is 100 meters. If the
cable is attached and the distance is within acceptable limits but the
problem persists, try a different cable. If you're directly connecting two
computers without a hub or switch, use a crossover cable.
• Try another network cable.
• Check the LED Lights on the NIC. Before the LEDs can be used for
troubleshooting, the network interface card (NIC) must be connected to
the network and the network driver must be installed. Most NICs come
with LEDs near the connection. The meaning of the LED signals may be
different from one manufacturer to the other. Here is a common LED
description for 3COM 10/100BT dual speed NIC. Please consult your NIC
manual for any difference.

LE Description Flashing Steady Off


D (On)
10 Green: Link integrity Reversed Good 10BT No connection
LNK polarity connection between NIC & hub

100 Green: Link integrity Reversed Good 100BT No connection


LNK polarity connection between NIC & hub

ACT Yellow: Port traffic for Network traffic Heavy network No traffic
either speed present traffic

3. The computer hangs when the drivers are loaded.


• Change the PCI BIOS interrupt settings. See your NIC and system
manuals for more details.
• If you are using EMM386, it must be version 4.49 or newer.
4. Diagnostics pass, but the connection fails or errors occur. • At 100BT, use
Category 5 wiring and make sure that the network cable is securely
attached.
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 50 of 94
II CRT Technical
Group
Revision # 03

• At 100BT, connect to a 100BT hub/switch (not 100Base-T4).


• For NetWare, make sure you specify the correct frame type in your
NET.CFG file.
• Make sure the duplex mode setting on the adapter matches the setting on
the switch.
5. The LNK LED doesn't light.
• Make sure you've loaded the network drivers.
• Check all connections at the adapter and the hub/switch.
• Try another port on the hub/switch.
• Make sure the duplex mode setting on the adapter matches the setting on
the hub/switch.
• Make sure you have the correct type of cable between the adapter and the
hub. 100Base-TX requires two pairs. Some hubs require a crossover cable
while others require a straight-through cable.
6. The ACT LED doesn't light.
• Make sure you've loaded the correct network drivers.
• The network may be idle. Try accessing a server.
• The adapter isn't transmitting or receiving data. Try another adapter. •
Make sure you're using two-pair cable for TX wiring.
7. The adapter stopped working without apparent cause.
• Run the diagnostics program that came with the NIC.
• Try reseating the NIC in its slot, or try a different slot if necessary.
• The network driver files may be corrupt or missing. Remove the drivers
and then reinstall them.
8. The Wake on LAN (WOL) feature is not working.
• Make sure the WOL cable is attached and that power is being applied to
the computer.
• Check the BIOS for its WOL setting. Some computers may need to be
configured for WOL.
• Make sure the network cable is fully attached to the adapter.
9. Crossover cable troubleshooting tips. When you work with network cabling,
concentrators (hubs or switch), and NICs from different venders, it is possible to
connect everything and still have no communication between file servers and
workstations.
When there are several unknown variables, it is difficult to determine which
component is broken. Use these tips to isolate the problem.
• Determine whether your equipment complies with the 10Base-T or
100Base-TX standard. This is particularly important for hubs and
switches.
• Connect a straight-through cable from the PC to the hub. The hub
performs an internal crossover so that the signal can go from TD+ to RD+
and TD- to RD- (see How to Make Network Cables). When you look at an
RJ-45 connector from the front, pin 1 is identified on the left-hand side
when the metal contacts are facing up.
• Make sure that the TD+ and TD- wires are twisted together , and
that the RD+ and RD- wires are twisted together. Using wires from
opposing pairs can cause signals to be lost. For a 100Base-TX cable, pins
#1 and #2 , and #3 and #6 must be on the same twisted strand.
10. When there is doubt whether a hub is performing correctly, or if the
impedance settings are in question, a crossover cable can help you
isolate the failing component:
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 51 of 94
II CRT Technical
Group
Revision # 03

• Connect a file server and a client PC back to back with a crossover cable to
verify that the NIC and network operating system are properly configured. • To
make a crossover cable, simple connect TD+ to RD+ and TD- to RD-. The
cable performs the crossover that is usually performed by the hub.
Make sure that two twisted-pair wires are used. If the file server and client
PC function together as a small network, then either the existing cabling or
the hub is the problem.
• If there is a proper crossover, the appropriate LED comes on. If there is a
straight-through connection, the LED does not light. A blinking LED
indicates that there is a polarity mismatch (that is, TD+ to RD- instead of
TD+ to RD+).
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 52 of 94
II CRT Technical
Group
Revision # 03

Self Check 3

Instructions: Answer the following as indicated. Use answer sheet to be


provided by
your trainer.

A. What is the first to do when Repairing and maintaining


computers system and networks.

B. In Cleaning a Computer system what is correct time


interval or schedule that you can do in order
maintain your Computer?

C. What is the advantage of UPS?

D. Why Sudden power down affect or can cause your


computer to function improperly or malfunctions.
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 53 of 94
II CRT Technical
Group
Revision # 03

Answer Sheet 4 (Learning Activity 4)

A. Before you do anything, make sure the


computer is unplugged from the outlet and is
completely turned off! Use PPE or Personal
Protective Equipment, Apply the Occupational
Health and Safety Precautions.

B. Doing this 4 times a year(every 3 months)Is a


great way to save a lot of money and keep
your computer running like its brand new.
Have a maintenance schedule.

C. UPS or Uninterruptible Power Supply have a


capacity to save power even in the event of
brown-out so that you the opportunity to save
and safely turn-on your computer in a proper
way

D. Sudden lost of power or what we called power interruption can


cause PC malfunction and other power
equipment failure because they are compose of devices
that electronically made and they dependent to each
some devices need power to terminate himself in safety
move like for example the disk drive where they are have
head that when in time of power loss it can strike the disk
that can cause disk head crash.
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 54 of 94
II CRT Technical
Group
Revision # 03

INFORMATION SHEET 4.2-1


Common Faults And Problems Of Computer

Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to identify
Common Faults and Problems of Computer
Today's computers
have faster microprocessors, more memory and bigger hard drives. When
you think about the differences between a Pentium 4 and 386, you have
to conclude the improvement is astounding! But when error attacks our
computer we have to do something for the computers to survive. Here are
some of the common faults and problems that we may encounter:

1. Why computer becomes slow?

• You need more memory.

Don't overlook the obvious. Up until recently not having enough


memory wasn't a problem. With the price of RAM becoming very
affordable, most people were filling their computers with more than
enough memory to do the job. If your computer is slow and it has lower
capacity of RAM, you need to add more memory to speed it up.

• Spyware and viruses

Spyware. It is a software program that intentionally


installed on the computer by the user to monitor or spy on
what the other users of the same computer is doing.

you do realize for them to be effective, you have to keep


up to date. By up to date, it means up to the minute.
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 55 of 94
II CRT Technical
Group
Revision # 03

Virus. A software program, macro or script that has been designed to


infect, destroy, modify or cause other problems with computer or software
program.
• Background programs

When you install new software on your computer, often times you
install it to run in the background every time you start up. Most times you
do this without knowing it. Look at the bottom right hand side of your
screen.

If you see several icons there, you have extra programs running and
stealing resources. Right click on these and see if you have the option of
closing them. Many times, you can open the program and choose an
option to keep these programs from starting automatically.

• Corrupted registry

Any changes you make to your computer effects and actually, it


corrupts your registry even when you do something positive like remove
spyware and you end up with a corrupted registry.

After months of corrupting your registry, it will become good. This will,
in its early stages, cause your computer to slow down. In its advanced
stages, it will freeze and crash and do more mysterious and troublesome
things.

2. After I pressed the Power button...

Nothing happened

• Check mains plug switched on at


wall
• PSU may have its own power
switch -
check this is on
• Check PSU-to-Motherboard cable(s)
are correctly connected
• Check front panel power switch is
correctly connected
• Check Reset button is not stuck 'in'
• Check mains cable fuse

COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 56 of 94
II CRT Technical
Group
Revision # 03
There was a loud bang (possibly with smoke) at the back of the PC
Case

• PSUwas faulty or set to incorrect voltage for mains supply system.


Replace PSU

PC is on but monitor shows no display and a sequence of beeps


emits from the PC

• Check fitting of CPU, RAM, Video card, sound card etc. If necessary,
remove and refit these components
• Check the motherboard manual and perform a BIOS reset
procedure
• This may indicate a faulty motherboard

PC is on but monitor shows no display and one beep emits from


the PC

• Check monitor is switched on at the wall socket


• Check monitor power cable is connected correctly
• Check that the monitor's signal cable is connected correctly to both
the PC and Monitor
• Check that the monitor is switched on at its front panel
• This may indicate a faulty video card

PC is on but there are no power and/or HDD lights on the PC case


front panel

• Check correct connection of front panel connectors to the


motherboard (see motherboard manual)
• This 'may' indicate a faulty Motherboard

PC is on but HDD does not spin up

• Check power connector to HDD is properly connected


• Check IDE ribbon cable is correctly connected to both Motherboard
and HDD
• This may indicate a faulty Hard Drive

PC is on but CD-ROM shows no lights/will not eject tray

• Check power connector to CD-ROM is properly connected • Check


IDE ribbon cable is correctly connected to both Motherboard and
CD-ROM
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 57 of 94
II CRT Technical
Group
Revision # 03

• This may indicate a faulty CD-ROM Drive

PC is on but the CPU fan/fans do not spin

• Disconnect the power immediately to prevent damage to the CPU


from overheating
• Check fan power cables are correctly connected to the relevant
power connector (in most cases, a motherboard FAN connector or
one of the PSU power connectors)
• Disconnect the power and carefully spin the fan blades with a
finger. If there is any resistance to this movement, this may
indicate a faulty fan unit

On boot up, the monitor shows corrupted


display

• Check
seating of CPU, RAM, Video card,
sound card etc. If necessary, remove and refit
these components
• Check the motherboard manual and perform
a BIOS reset procedure
• This may indicate a faulty Motherboard or
Video card

On boot up, display shows incorrect CPU type/speed

• Check the motherboard manual for the appropriate CPU jumper


settings (where applicable)
• Check BIOS settings for CPU type (see Motherboard Manual) •
Perform a BIOS reset procedure
• Perform a BIOS update (with an updated BIOS, the Motherboard
may support your CPU)
• This may indicate a faulty/old motherboard

On boot up, display shows incorrect RAM total


• Check correct seating of Memory Modules in slots
• In cases of two or more modules, this may indicate a faulty module •
This may indicate a faulty/old motherboard
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 58 of 94
II CRT Technical
Group
Revision # 03

On boot up, display shows - FDD/Keyboard/Mouse not found (or


similar)

• Check correct connection of device described, In the case of the


FDD, check its ribbon and power connections
• Check that the BIOS is configured correctly for the device described •
This may indicate a fault with the described device or Motherboard

The monitor shows no picture

• Is the power light on?


• Are the cables plugged in?
• Check brightness and contrast settings.
• Swap the monitor with another one, reboot the machine and see if it
works. If the computer works the monitor has probably gone bad. If
it still fails to work, something in the CPU perhaps a video card has
gone bad.

Computer displays limited colors.

• Check display options for the monitor usually under control panel
under the display icon. Select at least 256 colors for standard
display. If you had 16 color selected, this may be why your screen
displays limited colors. Some programs such as Fast Cat require you
to set display settings to 256 colors.

Signs of Video Display Troubles

If your screen is completely white or gray and you hear buzzing


noises, this could indicate video card troubles. Before you panic, make
sure all cables are secured from monitor to CPU. Try using another power
cord for the monitor to see if this may be the problem.

If screen appears distorted around the edges and the color does not
look right, you may have incorrect display adapters. Select Start, Settings,
and Control Panel. Double click on System Icon and select Device
Manager. You will see a listing of devices. Double click on Display
adapters to view the type. If there is a yellow exclamation point next to
device, there is a conflict. To view conflicts for a certain device, click on
the device, select properties, and select the general tab. There should be
a description of the device and why it is not working properly.
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 59 of 94
II CRT Technical
Group
Revision # 03

Printer Does Not Print.

• Are all cables connected and is the printer turned on?


• Is the printer online?
• Is there paper in the tray?
• Is the printer an Inkjet/Deskjet or a LaserJet?
• If it's an inkjet, is the ink cartridge out of ink. Remove cartridge, hold
up to light or gently shake it to see if it is empty.

Things to Try...

Do you have correct print drivers installed? Find print drivers under
Device Manager.

• Check to be sure you have correct print drivers installed. Double click
on System Icon and select Device Manager. You will see a listing of
devices. Double click on the Ports button to view the type. If there
is a yellow exclamation point next to device, there is a conflict.
Self-Check 2.2-2
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 60 of 94
II CRT Technical
Group
Revision # 03

Multiple Choices: Select the best answer of the given choices: 1. It is a


software program that intentionally installed on the computer by the user
to monitor or spy on what the other users of the same computer is doing.
A. Spyware and Viruses
B. Utility Software
C. Application Software
D. All of the above
2. A software program, macro or script that has been designed to infect,
destroy, modify or cause other problems with computer or software
program.
A. Virus
B. Utility Software
C. Application Software
D. All of the above
3. Which of the following is not the solution if the printer not
responding. A. Check if the printer is online
B. Check if there is paper in the tray
C. Check the brightness and contrast settings
D. All of the above
4. Why computer becomes slow?
A. You need more memory
B. Spyware and viruses
C. Corrupted registry
D. All of the above
5. Which of the following is the troubleshooting procedure when PC is on
but monitor shows no display and one beep emits from the PC. A. Check
monitor is switched on at the wall socket
B. Check monitor power cable is connected correctly
C. Check that the monitor's signal cable is connected correctly to
both the PC and Monitor
D. All of the above
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 61 of 94
II CRT Technical
Group
Revision # 03

Answer Key

1. A
2. A
3. C
4. D
5. D
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 62 of 94
II CRT Technical
Group
Revision # 03

TASK SHEET 2.2-1

Title: Identifying Common Faults and Errors of Computer

Performance Objective : Given the necessary tools, materials and


equipment identify the common faults and errors of computer system.
Supplies, Tools & Equipment :

System Unit
Monitor
Keyboard
Mouse
Printer

Steps/ Procedure:
when you detached the following:
1. Prepare the necessary tools, equipment and
materials 2. Detached the following
Devices Port
- Keyboard - PS/2
- Mouse - PS/2
- Hard disk - IDE cable
- Floppy disk drive - IDE cable
- CD-Rom drive - IDE cable
- RAM chip - Memory slot
3. List the messages or errors it will prompt you.

Assessment Method:
Demonstration , Performance Criteria checklist

COMPUTER July 2024 Document No. RIR-CSS04


SYSTEMS
SERVICING NC Issued by: Page 63 of 94
II CRT Technical
Group
Revision # 03

PERFORMANCE CRITERIA CHECKLIST


CRITERIA Yes No
Did you…

• Observed safety precautions.

• Inspected all the peripherals properly.

• Strictly noted standard checking of different


peripherals.

• Observed Proper boot-up and shutdown of the


computer.
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 64 of 94
II CRT Technical
Group
Revision # 03

INFORMATION SHEET 4.4-3


Disk Maintenance Instructions for Windows 7
Background:
Performing routine disk maintenance keeps the hard drive and computer
overall performance optimized.
Before starting these procedures, ensure no other applications are running.
Also, turn off any screen savers.
Basic Steps: (see detailed instructions on the following pages).
1. Run Disk Cleanup.
2. Run Check Disk1.
Recommendations:
Nightly: Restart your computer when you leave

Once a week: perform Basic Steps 1 and 2

Once a month: Defrag is automatically set to run on its own once a


week
Conclusion:
Although performing these disk maintenance tasks will not eliminate all
problems you may have with your computer, they go a long way towards
minimizing performance problems that occur when these tasks are not
performed.
NOTE: If you must be away from your computer while running any of these
steps, please lock your computer by pressing (Ctrl+Alt+Del) and click on the
Lock this Computer option.

1. Disk Clean Up

Open the My Computer Icon or the Library Icon down in the Task Bar

Select the ‘Computer’ icon in the left pane


Right-click on the ‘Local Disk (C :)’ drive in the
right pane and select Properties
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 65 of 94
II CRT Technical
Group
Revision # 03

On the General Tab Click the Disk Cleanup


button to bring up Disk Cleanup selection dialog
box. DO NOT put a checkmark in Compress this
drive to save disk space option
(See Figure 1). This brings up the Cleanup
calculating window. Wait for the next window.

Select the appropriate file types so your screen matches below. You may see
other options in addition to the ones listed and it is safe to clean them, (See
Figure 2). After making your selection, click the OK button to begin Disk
Cleanup.

If you have more than one hard drive, repeat


this process for each.
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 66 of 94
II CRT Technical
Group
Revision # 03

2. Check Disk
Click on the Tools Tab. Click the Check Now… button to open the Check
Disk program, put a checkmark in the “Automatically fix file system
errors” option and click the Start Button to run it.
A window will tell you Windows cannot
check the disk while it is in use. Click the
Schedule disk check button. Your computer
will restart and Check Disk will run. If you
have more than one hard drive, repeat this
step for each.
Note: If you must be away from your
computer, while running any of these steps,
please lock your computer (Ctrl+Alt+Del)
and click on the Lock this Computer
option).
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 67 of 94
II CRT Technical
Group
Revision # 03

TASK SHEET 4.4-3


Title: Defragmentation and Check Disk

Performance Objective: Given a working pc, you should be able to


perform disk management as required.

Equipment : Working computer unit


Steps/Procedure: (Check Disk)
1. Turn on the computer unit
2. Make sure to observe proper boot procedure
3. Double click on computer icon
4. Right click on local disk c
5. Click on properties
6. Select tools
7. Click Check
8. Have your trainer evaluate your task
Steps/Procedure: (Defrag Hard Disk)
1. Double click on computer icon
2. Right click on local disk c
3. Click on properties
4. Select tools
5. Click Defrag
6. Have your trainer evaluate your task

Assessment Method:

COMPUTER July 2024 Document No. RIR-CSS04


SYSTEMS
SERVICING NC Issued by: Page 68 of 94
II CRT Technical
Group
Revision # 03

Performance Criteria Checklist 4.4-3


CRITERIA YES NO
Did you….

1. Obtain needed equipment

2. Observe OH&S policy


3. Perform proper boot procedure

4. Perform Hard disk check as required

5. Accomplish Hard disk defragmentation


as required

COMPUTER July 2024 Document No. RIR-CSS04


SYSTEMS
SERVICING NC Issued by: Page 69 of 94
II CRT Technical
Group
Revision # 03

INFORMATION SHEET 4.4-4


Backup and Disaster Recovery Procedures

Introduction

You all know that Active Directory Domain Services (ADDS) is a mission-critical
component in your Windows infrastructure. If Active Directory goes down, your
network is essentially useless. Consequently, your backup and recovery plans for
Active Directory are fundamental to security, business continuity, and regulatory
compliance. Windows Server 2008 brings many new features to Active
Directory®, two of which have a significant impact on your backup and recovery
plans: the new Windows Server Backup utility and the ability to take and work
with Volume Shadow Copy Service snapshots of Active Directory. In this article I
will describe everything you need to know about Active Directory backup and
disaster recovery.

System State Backup


Windows Server 2008 includes a new backup application named
Windows Server Backup. Windows Server Backup replaces the
good old NTBACKUP.EXE and is not installed by default. You
must install it by using the Add Features option in Server
Manager before you can use the Wbadmin.exe command-line
tool or Windows Server Backup on the Administrative Tools
menu. In Windows Server 2008, the system components that
make up system state data depend on the server roles that are
installed on the computer.

The system state data includes at least the following data, plus
additional data, depending on the server roles that are
installed: • Registry
• COM+ Class Registration database
• Boot files
• Active Directory Certificate Services (AD CS) database
• Active Directory database (Ntds.dit)
• SYSVOL directory Cluster service information
• Microsoft Internet Information Services (IIS) metadirectory
System files that are under Windows Resource Protection

When you use Windows Server Backup to back up the critical


volumes on a domain controller, the backup includes all data
that resides on the volumes that include the following:
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 70 of 94
II CRT Technical
Group
Revision # 03

• The volume that hosts the boot files, which consist of the Bootmgr
file and the Boot Configuration Data (BCD) store
• The volume that hosts the Windows operating system and the
registry
• The volume that hosts the SYSVOL tree
• The volume that hosts the Active Directory database (Ntds.dit) •
The volume that hosts the Active Directory database log files

Windows Server 2008 supports the following backup types:

• Manual backup A member of the Administrators group or the or


Backup Operators group can initiate a manual backup by using
Server Backup or the Wbadmin.exe command-line tool each time
that a backup is needed. If the target volume is not included in
the backup set, you can make manual backups on a remote
network share or on a volume on a local hard drive. Manual
backups made by web admin always create a new folder
containing the full system state backup. This means you need a
huge amount of disk space if you want to keep several versions of
your backup. The web engine creates a separate folder containing
a timestamp for each backup.

• Scheduled backup A member of the Administrators group can


use the Windows Server Backup or the Wbadmin.exe command
line tool to schedule backups. The scheduled backups must be
made on a local, physical drive that does not host any critical
volumes or on any remote share (even the system volume of
another server). Allowing backing up onto system critical volumes
can be forced using a registry key. Web admin scheduled backups
can have local disks as well as a remote share as backup target. A
scheduled backup to a server local share isn’t supported.

Versioning, target size and backup type Depending on the commands used
to schedule the backup job or the backup target location, backups are made
differently:

• When backing up to a local non-critical volume, backups are incremental,


only one backup target folder exists and versioning is enabled. The backup
target folder name contains the last backup date. The folder will be
automatically renamed with each backup.

• When backing up to a local critical volume, backups are always full, one
backup target folder created for each backup and versioning is enabled.
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 71 of 94
II CRT Technical
Group
Revision # 03

• When backing up to a remote shared storage, backups are always


overwritten, meaning that there are no versions and there is only one
backup target folder.

• The backup type, scheduled or manual backup hasn’t any influence upon
the versioning. It simply follows the above rules.

Active Directory Recycle Bin

Active Directory Recycle Bin helps minimize directory service downtime by


enhancing your ability to preserve and restore accidentally deleted Active
Directory objects without restoring Active Directory data from backups,
restarting Active Directory Domain Services (AD DS), or rebooting domain
controllers.

When you enable Active Directory Recycle Bin, all link-valued and non-link-valued
attributes of the deleted Active Directory objects are preserved and the objects
are restored in their entirety to the same consistent logical state that they were
in immediately before deletion. For example, restored user accounts
automatically regain all group memberships and corresponding access rights
that they had immediately before deletion, within and across domains.

By default, Active Directory Recycle Bin in Windows Server 2008 R2 is disabled.


After you enable Active Directory Recycle Bin in your environment, you cannot
disable it.
When Active Directory Recycle Bin has not been enabled, objects are stripped
down and marked Tombstoned. The Garbage collection process will delete these
objects when the Tombstone Life Time has been expired.

Fig.:1 without Recycle Bin

When the Active Directory Recycle Bin has been enabled,


deleted object are no longer tombstoned but they receive a
“Deleted” status. In this status, all attributes are preserved.
Objects are in the Recycled status when the deleted life time
expires. In this
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 72 of 94
II CRT Technical
Group
Revision # 03

status, most of the attributes are stripped of and lost. This is


the equivalent state of a tombstoned object in Windows 2003.
The garbage collection process physically deletes the object
from the AD database when the Recycled Life Time has been
expired.

Both life time parameters are configurable.

Fig.:2 with Recycle Bin


COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 73 of 94
II CRT Technical
Group
Revision # 03

INFORMATION SHEET 4.5-1


Installing and Configuring Backup

System State Backup


The Windows Server 2008R2 Backup features are not installed by
default.

Remarks:
• When backing up SystemState backup through an UNC path, the
backup will be overwritten, there is no way to get an older
version.
• By default, SystemState Backup onto the local system will not
accept the system partition as backup target. A remote target
through UNC can be stored on any partition. This protection can
be disabled by changing the AllowSSBToAnyVolume parameter
in the registry.

To install the Windows Backup features:


• Logon to the system with at least domain controller local
administrator privileges
• From the Power Shell prompt, execute the following commands:

Import-module servermanager [enter]


add-windowsfeature backup –includeallsubfeature [enter]

To schedule the System State Backups:


• Logon to the system with at least domain controller local
administrator privileges
• From the command prompt, execute the following command:

Wbadmin enable backup -addtarget:<target> -schedule:21:00


–systemstate –quiet

• Enter both: the account (at least BackupOperator rights) and


password used to run the scheduled task with it.

To create a manual one shot System State Backup: • Logon to


the system with at least domain controller local administrator
privileges
• From the command prompt, execute the following command:
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 74 of 94
II CRT Technical
Group
Revision # 03

Wbadmin start systemstatebackup –backuptarget:<drive> -


quiet
To find out all System State Backups stored on your domain
controller:
• Logon to the system with at least domain controller local
administrator privileges
• From the command prompt, execute the following command:

Wbadmin get versions

To get the status or a view of the running System State


Backup:
• Logon to the system with at least domain controller local
administrator privileges
• From the command prompt, execute the following command:

Wbadmin get status

Snapshot Backups
Active Directory Snapshots are made through NTDSUtil. NTDSUtil can
be used to create a one-time Snapshot backup of your Active
Directory as well as a scheduled Snapshot backup mechanism.

Manual Snapshots
To manually create and view Active Directory Snapshots: Logon to
the system with at least domain controller local administrator
privileges
From the command prompt, start NTDSUtil
To activate the current instance of NTDS, type: Activate Instance
NTDS
Enter: snapshot to change to the snapshot part of NTDSUtil
Enter: create to create a snapshot
Enter: list all to view all current snapshots. This command does not
only list the snapshots made by NTDSUtil, but all snapshots, those
made by your system state backups too.
Scheduled Snapshots
NTDSUtil can be used in an automated way of working by putting all
commands on one single command line. This command line can be
scheduled through the Windows OS build-in scheduling service.
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 75 of 94
II CRT Technical
Group
Revision # 03

To launch a snapshot with a one step, one line command:


Logon to the system with at least domain controller local
administrator privileges
From the command prompt, initiate the following command:

ntdsutil snapshot “activate instance ntds” create quit quit

When to Restore
When an object is deleted in Windows 2008R2, the DC from which
the object was deleted informs the other DCs in the environment
about the deletion by replicating what is known as a tombstone(if the
recycle bin isn’t enabled) or Deleted (with recycle bin). A tombstone
or deleted object is a representation of an object that has been
deleted from the directory. The tombstone object is removed by the
garbage collection processes, based on the tombstone lifetime
setting, which by default is set to 180 days by default in Windows
2008R2. A Deleted object will be recycled after the “Recycle object
lifetime”, which is by default equal to the tombstone lifetime, or 180
days in Windows 2008R2.
A backup older than the tombstone lifetime set in Active Directory is
not considered to be a good backup.
Active Directory protects itself from restoring data older than the
tombstone lifetime. For example, let’s assume that we have a user
object that is backed up. If after the backup the object is deleted, a
replication operation is performed to the other DCs and the object is
replicated in the form of a tombstone. After 180 days, all the DCs
remove the tombstone as part of the garbage collection process. This
is a process routinely performed by DCs to clean up their copy of the
database.
If you attempt to restore the deleted object after 180 days, the
object cannot be replicated to the other DCs in the domain because
it has a USN that is older than the level required to trigger
replication. And the other DCs cannot inform the restored DC that
the object was deleted, so the result is an inconsistent directory.

Where to restore

Never restore a system state from ServerA on hardware ServerB


while ServerA is still up and running. The system state restore will
restore the registry from the original server which causes duplicate
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 76 of 94
II CRT Technical
Group
Revision # 03

names on the network. Moreover, you’ll end-up with a domain with


two identical domain controllers, same names, same GUIDs and
same connection objects. This causes the NTDS service to exclude
both, the original and the restored server, from AD replication.
Since the system state contains drivers for network and Raid
controller hardware, never restore a system state backup on servers
with other hardware than the original server.
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 77 of 94
II CRT Technical
Group
Revision # 03

INFORMATION SHEET 4.3-6


Change the Active Directory Restore Mode (DSRM) Administrator
Password

Change Directory Services Restore Mode Administrator password if


you don’t know it. Every domain administrator can change the DSRM
Administrator Password. This account and password can only be used
on a Domain Controller booted in the “Active Directory Restore
mode”.

To change the password:


• Start, on the command prompt, ntdsutil
• Type, without the quotes: “set dsrm password” and press return
to enter the DSRM part of ntdsutil.
• Type: “Reset Password on server <servername>”, where
servername is the name of the Domain Controller on which we
have to perform an AD recovery operation.
• Enter the new administrator password.
• Confirm the new administrator password.
• Close ntdsutil.

Verification of a Successful Restore


To verify the success of a restore, use the following basic tests:
Reboot in normal mode. If the domain controller is able to
successfully boot into normal mode, it means that the directory is
able to successfully initialize. Especially if it wasn’t able to do so
before it was rebooted.
• Check if both, the NETLOGON and SYSVOL share are created. If
so, the SYSVOL was successfully published to the other domain
controllers.
• Check the Directory Service Event log for any messages. • Check
if the domain controller is able to replicate with its neighbors.
• Check if the domain controller is able to authenticate with its
neighbors.

The only circumstances in which you should have to recover the


content of the directory is when someone, accidentally or on
purpose, deleted parts from the directory or when a failing
procedure made incorrect changes.
There are five Replication Naming Contexts in Active Directory:
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 78 of 94
II CRT Technical
Group
Revision # 03

1. Domain naming context


2. Configuration Naming Context
3. Schema Naming Context
4. Global Catalog
5. Application Partition

Domain, Configuration and Application Partitions replication context


are restorable through the System State restore and Snap Shot
restore. Global Catalog recovery is possible by restoring the AD, but
not really necessary. It’s not possible to restore the Schema Naming
Context unless you destroy your entire forest and restore one
domain controller of the root domain, deletes all other domain
controllers and restage them ad additional domain controller in your
restored forest. When restoring AD, two possible types of restore
exist:
• Authoritative restore
• Non-Authoritative

Authoritative Restore
An authoritative restore is, in essence, an extension of the non
authoritative restore process. That is, it requires all the steps of a
non-authoritative restore before it can be initiated. The authoritative
restore distinguishing characteristic is that it increments the version
number of an entire directory, a sub tree, or individual objects
(provided that they are leaf objects) to mark them as authoritative in
the directory.

As with a non-authoritative restore, once a DC is back online, it


contacts its replication partner(s) to see what has changed since the
last backup. But because the version number of the object(s)
restored is higher than the existing instances of those objects held
on replication partner(s), the objects on the restored DC appear to
be more recent and, therefore, must be replicated out to the rest of
the DCs within the environment. (By default, version numbers are
incremented by 100,000 under the authoritative restore process.)
Because of this, the authoritative restoration method is typically used
when human error is involved, such as when an administrator has
accidentally deleted an OU.

Unlike a non-authoritative restore, an authoritative restore requires


the use of a separate application: NTDSUTIL.
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 79 of 94
II CRT Technical
Group
Revision # 03

An authoritative restore does not overwrite new objects created after


the backup occurred. An authoritative restore can be carried out only
on objects from the configuration and domain contexts. The
authoritative restore of schema components is not supported.

Non-Authoritative Restore
Non-authoritative restore is the default method for the restoration of
Active Directory, and is used for the majority of restore operations.
Using this method, the settings and entries that existed in the
Domain, Schema, Configuration, and (optionally) Global Catalog
naming contexts maintain the version number they had at the time
of backup.

After a non-authoritative restore, the DC is updated using normal


replication techniques. That is, if the version number of an object is
less than the same object’s version number stored by its replication
partner(s) (indicating the object has changed since it was last backed
up), the object on the restored server is updated. This ensures an up
to-date version of the database.
Keep in mind that when a non-authoritative restore restores an
object that has been deleted in the time between the backup and
the restore, the object will be restored but deleted again by the
replication once the restored domain controller becomes online. This
because the deleted object is not physically deleted, but marked as
being deleted on all remaining domain controllers.

Recovery through System State Backup

Restore your Backups files to restore from


Backups are created using Windows Backup and stored locally on the
domain controller. Offsite backups of these Windows Backup backup
files should be made as well, for DRP reasons.
Imagine that you have only one domain controller, which is not
preferable, on which you make Windows Backup based system state
backups stored on a local hard drive. This hard drive, in turn, has
been backed up with a third party product (think about BackupExec
or Tivoli …) to maintain backups of our VSS backup volume offsite.

Some disaster happens and you install a new server hardware to be


restored as the original domain controller somewhere on another
location. How should you proceed when you recovered your backup
COMPUTER July 2024 Document No. RIR-CSS04
SYSTEMS
SERVICING NC Issued by: Page 80 of 94
II CRT Technical
Group
Revision # 03

You might also like