Professional Documents
Culture Documents
Computer Lab Manager Training Course: Zambia Pacific Trust
Computer Lab Manager Training Course: Zambia Pacific Trust
Acknowledgements
The Computer Lab Manager Training Course resource books were made possible
due to the efforts and encouragement provided by a variety of people around the
world. Special thanks are due to two pioneering organizations working on
computers in education in Zambia who provided advice and materials: Computers
for Zambian Schools and Crescent Future Kids. Three international development
aid organizations: Camara, VVOB and IICD, also deserve special recognition for
their contributions to this document and the efforts they are making to use ICT as
a tool for development and education in Zambia and elsewhere. Many individuals
also contributed their time, expertise and advice to the crafting of this module.
Key among them are Bornwell Mwewa, Anne Johnson, Nick Lew, Rachel Muchenje,
Lumai Mubanga and Annel Silungwe. In addition, none of Zambia Pacific Trusts
work toward improving computer education at schools in Lusaka, Zambia would
have been possible without the support, advice and equipment provided by Seattle
Academy in Seattle, Washington, USA.
The five pictures found in section 5.7.3 are used with permission of
FonerBooks.com.
Licensing
This work is licensed under the Creative Commons Attribution-NoncommercialShare Alike 3.0 United States License. To view a copy of this license, visit
http://creativecommons.org/licenses/by-nc-sa/3.0/us/ or send a letter to Creative
Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA.
Zambia Pacific Trust welcomes and encourages organizations to use any of the
modules of the Computer Lab Manager Training Course in a manner they deem
appropriate, excluding making a profit from the sale or distribution of the material.
Organizations are welcome to use portions of these modules in other documents,
2
but they should attribute the material that is used to Zambia Pacific Trust. Zambia
Pacific Trust also appreciates knowing who is benefiting from this material, and
requests that individuals and organizations please email Bornwell Mwewa
(bornwellmwewa@gmail.com), Heidi Neff (heidi.h.neff@gmail.com) and Zambia
Pacific Trust (info@zptrust.org) and describe how the material is being used.
Module 1 Text
1. Introduction
1.1.
1:
2:
3:
4:
The target audience for this training course is adult learners who
already have intermediate computer user skills and significant experience
using computers. Ideally, participants are already employed as computer lab
managers, computer project coordinators or Internet caf managers. While
the course is tailored to those working in educational or community
organizations, the course is still valuable for those working in a similar
capacity in the private sector.
These learning materials are also valuable for people who are not
involved in a formal course, but instead are studying independently to
become computer lab managers or improve their skills as computer lab
managers. Learners who are using these materials for self study are
5
1.3.
1.5.3.
Assessment: Computer User Skills. Discuss your computer user
skills with your instructor, and demonstrate your skills by performing a
practical activity that your instructor develops. For example, he or she
might ask you to type and format a small document using a word
processing program, or enter some information into a spreadsheet and do
some simple calculations using that data. If you do not have an
instructor, find an IT literate individual in your community who can assess
your skills. You can also perform a self assessment by attempting
suggested activities in an IT user skills curriculum that is available in your
area. You can also download sample test papers for the ICDL/ECDL
certification (International/European Computer Driving License) from
www.icdl.org.
1.5.4.
Self Study: Computer User Skills. Discuss with your instructor to
determine the best course of study for you to continue to improve your
computer user skills. If you do not have an instructor, find an appropriate
IT curriculum that you can work through on your own. Many community
computer projects will have access to the Microsoft Unlimited Potential or
Microsoft Digital Literacy learning materials. You can also study the
Microsoft Digital Literacy course and other IT courses online for free
through http://alison.com.
1.5.5.
Assessment: English Reading and Writing. Discuss your English
reading and writing skills with your instructor, and demonstrate your skills
by performing practical activities that your instructor develops. For
example, he or she might ask you to read and explain a short document
or write a professional letter. Alternatively, you can take an online
business English test at http://alison.com/courses/Business-English-Test-LTE. A simpler English test can be taken at www.busuu.com/quiz. The
English-Online website (http://www.english-online.org.uk/course.htm)
provides a variety of tests to help users asses their level of English
understanding.
1.5.6.
Self Study: English Reading and Writing. Discuss with your
instructor to determine the best course of study for you to continue to
improve your English reading and writing skills. If you do not have an
instructor, there are some free online options to help you improve your
English including basic online courses and tutorials through
www.busuu.com and www.gcflearnfree.org. Some intermediate level
courses are available online through http://alison.com. Some more
advanced quizzes and activities (but not full courses) are available
through www.bbc.co.uk/worldservice/learningenglish/, http://a4esl.org,
www.usingenglish.com, www.englishlearner.com and
www.englishcafe.com. The last site also provides opportunities to
practice and learn through conversation. For all English learners, the
most important thing to do is practice your skills. Read, write and speak
English as frequently as is possible.
Table of Contents
8
Input
Processing
Storage
Via keyboard,
mouse or
microphone
The information is
digitized, becoming a
simple code that the
computer can store
The information is
stored as a part of
the computers
memory
Output
Further
Processing
used in the photos, but all of this equipment is also found (in a more
compact arrangement) in a laptop computer.
Case. The computer case (also called a tower or housing) is the box that
encloses many of the parts shown below. It has attachment points, slots
and screws that allow these parts to be fitted onto the case. The case is
also sometimes called the CPU, since it houses the CPU (central
processing unit or processor), but this designation can lead to confusion.
Please see the description of the processor, below.
Power Supply. The power supply is used to connect all of the parts of
the computer described below to electrical power. It is usually is found at
the back of the computer case.
Fan. A fan is needed to disperse the significant amount of heat that is
generated by the electrically powered parts in a computer. It is important
for preventing overheating of the various electronic components. Some
computers will also have a heat sink (a piece of fluted metal) located near
the processor to absorb heat from the processor.
Motherboard. The motherboard is a large electronic board that is used
to connect the power supply to various other electronic parts, and to hold
these parts in place on the computer. The computers memory (RAM,
described below) and processor are attached to the motherboard. Also
found on the motherboard is the BIOS (Basic Input and Output System)
chip that is responsible for some fundamental operations of the computer,
such as linking hardware and software. The motherboard also contains a
small battery (that looks like a watch battery) and the chips that work
with it to store the system time and some other computer settings.
Drives. A computers drives are the devices used for long term storage
of information. The main storage area for a computer is its internal hard
drive (also called a hard disk). The computer should also have disk
drives for some sort of removable storage media. A floppy disk drive
was very common until recent years, and is still found on many older desk
top computers. It was replaced by CD-ROM and DVD drives, which have
higher storage capacities. The current standard is a DVD-RW drive,
which can both read and write information using both CD and DVD disks.
The USB ports (described later) on a computer can also be used to
connect other storage devices such as flash drives and external hard
10
drives.
Power
Supply
Drive
s
Fan Housing.
The processor
is underneath
on the
motherboard.
RAM
Cards
Cards. This term is used to describe important tools that allow your
computer to connect and communicate with various input and output
devices. The term card is used because these items are relatively flat in
order to fit into the slots provided in the computer case. A computer will
probably have a sound card, a video card, a network card and a modem.
RAM. RAM is the abbreviation for random access memory. This is the
short term memory that is used to store documents while they are being
processed. The amount of RAM in a computer is one of the factors that
affect the speed of a computer. RAM attaches to the motherboard via
some specific slots. It is important to have the right type of RAM for a
specific computer, as RAM has changed over the years.
11
12
Serial Port
(left)
Parallel Port
(right)
PS/2 Ports
USB
Ports
VGA Port
TRS (minijack) Ports
Software
13
2.3.1.
Software Types and Categories
As mentioned in section 2.1, computer software is the term used for
the instructions that have been programmed to allow a computer to process
information. Software comes in three main categories, described below:
Operating Systems. These are the basic software programs that are
needed to for a computer to work. They give a computer the basic
information needed for it to process and store information. Currently all
common operating systems are also graphical user interfaces (GUIs)
which means they use graphics to help the user to easily input
instructions, and open other programs. The most common operating
systems (OS) are the Windows family of operating systems, from
Microsoft. A computer lab manager is likely to encounter Windows 2000,
Windows XP, Windows Vista and Windows 7 (the most recent Microsoft
OS) in a computer lab. Other operating systems are described in the next
section.
Utility Software. This is a broad category of programs that allow a
computer to perform tasks that arent a part of the operating system, but
are still practical and useful. For example, a utility might instruct a
computer on how to copy (burn) information to a CD-ROM disk, or it might
be an anti-virus program (see section 3.3).
Productivity Software. This is one term used to describe the type of
software used to perform standard office computer tasks. Word
processing, presentation, spreadsheet and database software are all
common examples of productivity programs. The most common set of
productivity programs is Microsoft Office, offered by the Microsoft
Corporation.
2.3.2.
Proprietary Software vs. Open Source Software
The Microsoft operating system and productivity software packages
mentioned above are very common and used around the world in business
and education. The Apple Corporation also has very popular and successful
operating systems used for their Macintosh computers. Despite the success
of these software products, they arent the best choices for everyone. They
are proprietary, which means that their use and modification are restricted.
They can be quite costly to buy licenses for, and they are not adaptable to
meet local needs. Some users, particularly in developing countries, illegally
use unlicensed (also known as pirate) copies of this software. This is legally
unwise, and can also keep the user from accessing important software
updates.
Users who cannot afford proprietary software or prefer software that
can be locally modified, can choose to use open source (often called free and
open source or FOSS) software. For most of the standard computer uses, an
14
open source software option is available. This includes the Linux family of
operating systems (which includes Ubuntu, a common operating system in
African countries) and the OpenOffice.org productivity programs. The Source
Forge website (www.sourceforge.net) is a good resource for finding and
downloading open source programs. While open source software often does
not come with professional support available, there are user groups found on
the Internet who can offer assistance to puzzled users. This training module
does describe how to perform some tasks using the Ubuntu operating
system, but does not provide thorough coverage. Further assistance with
Ubuntu is available through the website: http://help.ubuntu.com.
When first setting up a computer lab, the steering committee for a
computer project should discuss the benefits of both proprietary and open
source software and make an informed and intentional choice on which way
to go. The computer lab manager should then make sure that he or she is
aware of all policies related to software choices.
It is possible that a computer project will choose to use proprietary
software for some purposes and open source software for others. For
example, a project might be able to obtain used computers that have a
Windows operating system legally installed (such as through a Microsoft
Authorized Refurbisher) but these computers do not include other Microsoft
programs. In this case the organization might choose to continue to run
Windows on its computers, but choose open source options for all utility and
productivity software.
2.4.
Assignments/Activities
Please Note: Throughout this module there are assignments that require a
learner to have access to computers and the Internet. Students who are not
already working as computer lab managers may find performing these
assignments to be difficult. These learners are encouraged to consult with
the staff of a local computer project or Internet caf to gain access to
equipment and the Internet. It is even possible that short term internships
could be arranged that would be beneficial to both the learner and the
computer project.
2.4.1.
Study the exterior of a particular computer. See if you can
identify the power supply, the drives, and all of the ports described in this
chapter.
2.4.2.
Find a broken or disused desktop computer. Figure out how to
open up the case. Identify all of the hardware components that have
been described in this chapter.
2.4.3.
What type of software is used on the computer you use most
frequently? Identify the operating system, the productivity software, the
Internet browser and the anti-virus software. For each of these also state
whether they are proprietary or open source. If you are having trouble
15
finding out information about some of your programs, here are some tips:
To find out about your computers operating system, right click on the
Computer or My Computer icon from your desktop or Start menu. Choose
Properties. To find out about a productivity program, open that program
and then find a menu that includes the word About. To find the About
screen in Microsoft Office 2007, click on the Microsoft Office Button, then
click on Options Resources About.
2.4.4.
How much RAM does the computer you use most frequently
have? Also how fast is the processor on this computer? To find this
information, right click on the Computer or My Computer icon from your
desktop or Start menu. Choose Properties.
2.4.5.
Have a discussion with a manager of a local computer lab about
computer operating systems. What operating systems are being used in
that computer lab and why? What factors went into the decision to
choose an operating system?
2.4.6.
Workshop Activity: In a group, observe the exterior of computer.
How many ports and hardware devices can your group identify? Ask the
instructor for assistance with any items that cannot be identified.
2.4.7.
Workshop Activity: In a group, open up the case of a computer.
Identify all of the hardware components that have been described in this
chapter.
2.4.8.
Workshop Activity: Participate in a group discussion or a debate
on the advantages and disadvantages of using open source software.
2.4.9.
Workshop Activity: Experiment with an operating system that
you are not familiar with. See if you can figure out how to change the
background, open and close windows, open and close programs, and
perform any other computer tasks that you frequently perform with other
operating systems.
Table of Contents
3. Computer Maintenance
3.1.
Why Maintain?
Think of a computer as being like a human body. We are advised to
perform certain tasks to keep our body in good shape. These maintenance
tasks such as eating well, avoiding some harmful activities and getting
exercise keep our body in good condition. If we dont maintain our bodies,
we might end up in the hospital with problems that result from the abuse
such as high blood pressure from eating too much salt, obesity from not
exercising or lung problems from smoking. Similarly, if we allow our
computers to intake harmful materials (such as dust) and programs (such as
viruses) and we dont keep our software in good condition (updated) then the
computer may also end up with significant problems that are then harder to
deal with. Proper maintenance of a computer, on the other hand, can keep it
16
running smoothly for years and years. Some of the different categories of
computer maintenance are described below.
3.2.
Updating Software
Software programmers gradually develop updates for their software
packages as they discover problems with the software and design tools to
address or fix these problems. This can be true for any of the types of
software described in section 2.3, but is typically most common and
important for operating systems. It is important for a computer user to find
and install software updates in order to have well performing computers.
Updating software can be done in a variety of ways, described below.
Automatic Updates. If a computer is on a reasonably fast Internet
connection, the easiest way to keep it up to date is to allow the
programs to automatically check for updates and download and install
them as needed. When setting up a new computer with Microsoft
Windows, this is the choice that the software recommends. It does not
require any action on the part of the user, and results in a computer
system that is current. To turn on automatic updates for a Windows
operating system, find the Systems and Maintenance options in the
Control Panel.
Automatic Alerts for Updates. If a computer is connected to the
Internet, but the connection is slow at some times of the day, another
option is to have the computer automatically check for updates but not
download or install them until the user elects to do so. For Microsoft
Windows computers, if this option is selected, an alert appears in the
computers system tray stating that there are updates waiting, and
then the user can wait until the Internet is faster to install these
updates.
Manual Updating. A computer user can also turn off all automatic
update checking and choose to manually check for updates. For a
computer that is rarely connected to the Internet, this would be a good
option as long as the user remembered to check when connecting to
the Internet. Also some programs do not have automatic update
options, and can only be updated in this manner. A program usually
has a menu item titled check for updates that a user can click on
when connected to the Internet.
Offline Updating. If a computer is in a location that never has access
to the Internet, a computer lab manager will need to download updates
from a computer that is connected to the Internet and then transfer
them (via a disk or flash drive) to the computer in question to be
installed. This option is also useful if a computer lab has several
computers that all need the same update. Instead of having each
computer download the update separately, one computer could
download the update and then it could be shared amongst all of the
computers. Offline updates for operating systems can easily be found
17
3.4.
Make sure that the appropriate procedure for shutting down the
projector is used, and inform all projector users about the procedure.
For most projectors, the proper shut down procedure includes not
unplugging the projector until the cooling process is complete. This is
indicated by a status light changing color, or a fan turning itself off. It
is important to allow the projector bulb to cool completely in order to
extend the life of the bulb.
It is particularly important to note that the projector bulb, which is the most
expensive part in a projector, will wear out and need to be replaced
eventually. Projector bulbs can cost half the price of buying a new projector!
A computer project will need to make a plan for bulb replacement, ideally
even keeping a spare bulb on hand.
Efficient Use of a Printer. Most computer labs will have at least one
printer for the use of the computer lab manager and selected computer lab
users. Printers are a great resource, but if not controlled well they can be
overused. This puts unnecessary wear on the printer, and also uses up
expensive ink and paper. It would be wise for a computer lab manager to
have in place some policies about what sort of material can be printed, and
when color ink use is allowed. Users should also be instructed to preview
their work before printing, to avoid printing unnecessary pages. In addition,
many printers have different printing settings that control the quality of the
printouts and thus the amount of ink used. Inkjet printers, for example,
usually have an option for draft or fast printing that uses significantly
less ink, but still looks reasonably good. To find this option when printing a
document, select Print from the File menu (or the Office Button in MS Word
2007). When the print menu opens, there will be a Properties button next
to the selected printer. Clicking here will bring up choices such as the print
quality and whether the printout should be in color or black and white.
3.6.
Assignments/Activities
3.6.1.
Find and open the anti-virus software on a computer. Check to
see if the virus database is up to date. If it isnt, update the software and
also see if there is an option to setup the program to automatically look
for updates. Also see if there is an option that allows you to schedule
regular (daily) scans.
3.6.2.
Go to a local computer lab and ask the computer lab manager
about maintenance tasks. What tasks does he or she do to keep the
computers in good condition, and how often are these tasks performed
(daily, weekly, monthly or yearly)? If the computer lab manger does not
have any maintenance systems in place, instead report your
recommendations for computer maintenance.
3.6.3.
Open the case of a computer and observe the dust inside. What
tools do you have at hand that could be used to safely remove that dust
without damaging the equipment? Experiment with the equipment that is
available to you and report your findings.
21
3.6.4.
Figure out how to set up a printer so that the default print
settings are black and white (not color) and draft or fast printing.
3.6.5.
Workshop Activity: Observe a demonstration on how to properly
set up and shut down an LCD projector. Make sure that you have an
opportunity to practice these techniques yourself sometime during the
workshop.
3.6.6.
Workshop Activity: Using provided tools, find and tighten all of
the screws on a laptop computer.
3.6.7.
Workshop Activity: Participate in a role play (and follow up
discussion) in which a lab manager tries to convince a person with a home
computer to bring it in to the lab for updates.
Table of Contents
4.3.
arrangement for newer computers, but older computers may boot first from
the floppy drive. After installing the new operating system, the lab manger
needs to be sure to change this back again to the standard boot order.
Details on how to change the boot order and how to install an operating
system are shown in the tip box here.
Tips for Installing an Operating System
1. Make sure that the computer is set to boot first from the CD/DVD
drive. To do this, enter the BIOS Setup program when starting up the
computer. This will require pressing a key during startup. The key
(often one of the function keys or the delete key) is specified at the
bottom of the first screen during boot up. When the BIOS Setup
program opens, scroll down (using the down arrow) to the First Boot
Device line, and then use the onscreen instructions to select CDROM
and save the change.
2. Shut down the computer, put the operating system CD or DVD into
the drive, and then start the computer again.
3. The installation will automatically start, and you will be guided
through the process by on screen tips and questions. Make sure you
read each screen!
4. You will be asked for your preferences in regards to installation
language, time and currency formats and keyboard layouts. Please
note that the more common keyboard layout in your country might
be United States English, even for those using the British English
language.
5. When prompted, enter the product key (for Microsoft Windows
operating systems). This is an important step for affirming the
legality of your copy, and will allow your computer full access to
online updates. Make sure, however, that you know how many
computers your product license is good for, and then do not load the
operating system onto too many computers.
6. When prompted, choose the location (which partition) for installing
the operating system. You may also be given the option of creating
new partitions at this step. If so, the partition created for the
operating system should be at least 20 GB, preferably 30 GB. Make
4.4.
25
computer user not to keep files that are no longer needed. Files that have
been stored in a users documents folder that are no longer needed (such as
extra photos or older versions of documents) are best deleted individually by
the user. A computer lab manager should also have a policy and procedure
for regularly deleting old files created by computer lab users on shared
computers. In an educational lab, for example, the lab manager could
announce that student files are deleted at the end of every term, unless the
student makes special arrangements to preserve his or her work.
Sometimes there are other files, such as temporary Internet files, that
are stored on a computer without the user knowing it. To delete these sorts
of files, perform both of the following techniques:
Disk Cleanup. In a Windows computer the Disk Cleanup utility is
found in Start All Programs Accessories System Tools. It
scans a hard disk for unnecessary files, and then (with the users
permission) removes these files.
Deleting Browsing History. When using the Internet, the browser
stores the recent history of the web pages that the user has viewed, in
order to make it easier to find and load these web pages again. The
browser also stores other small bits of information such as data
entered into forms and usernames or passwords if a user has asked a
web page to remember me (although this is not a good idea for
shared computers). This stored information can be easily deleted. In
Mozilla Firefox, choose Clear Recent History from the Tools menu.
In Internet Explorer, choose Delete Browsing History from the Tools
menu.
5.1.3.
Excess/Unused Software
Excess software, particularly if it is software that loads when the
computer is booting up, can certainly slow performance. If a user is certain
that a particular program is not used and is not needed for the computer to
function properly, then this software can and should be deleted, as described
in section 4.4. It is also possible to stop some software from automatically
starting up when the computer boots. For computers running Windows
operating systems, the System Configuration Utility can be used to perform
this task. From the Start menu choose Run then type in MSCONFIG (for
Windows Vista users, find the Run command line from Start All
Programs Accessories Run). From the window that appears, choose
the Startup tab, and then unselect any programs that do not need to be
enabled during computer start up.
5.1.4.
Hard Disk Faults
Most computers come installed with a program that allows a user to
scan the hard disk for faults and even repair them if possible. On many
Windows computers there is a program called Scandisk, found in Start All
29
Insufficient RAM
30
32
includes some steps to take to identify and address some common causes.
Tips for Troubleshooting a Dead Computer
1. Evaluate the situation more fully. Are the computer and the monitor plugged
in to a functioning surge protector or UPS? Is the surge protector or UPS
plugged into a functioning outlet on a circuit that has not blown or tripped?
If you arent sure, try to plug something else that you know works into the
same outlet. If that item works, try swapping the power cable with one from
a functioning computer.
2. For desktop computers, has the computer supply been set to the wrong
voltage? Check and make sure that the switch on the power supply is set to
the proper voltage for your country (230V in Zambia). If it wasnt set
properly, switch it and try again, although the power supply may now be
damaged. Also make sure that the on/off switch on the power supply is in
the on position. If there are still no lights visible on the computer, try
replacing the power supply (see section 5.7.3).
3. If there are lights on, but the computer is still not starting, you can try
booting from a different drive (see section 5.6.5).
4. If the computer produces a series of beeps when you attempt to boot it,
there is a problem with the memory. Try reseating or replacing the memory
(see section 5.7.3 for information).
5. If a desktop computer is producing all of the usual startup sounds and lights,
but the monitor is not displaying any information, perhaps there is a problem
with the monitor. Make sure that it is connected to a power source, and also
that the VGA cable is connected to the computer. If there is still no image,
try pressing the Fn key and the function key for monitor choices a few times.
5.3.
34
computer, sound problems would not be a specific enough search. The lab
manager would be better trying sound problem Dell D600 or sound failure
Dell D600. If the lab manager knows that the problem is due to the device
driver, an even better search would be sound device driver problem Dell
D600.
5.5.
5.6.
Fixing Software Problems
5.6.1.
Using Safe Mode
36
manager should make sure that all computer data has been backed up
before taking this action.
5.6.4.
Using System Restore
System Restore is a utility program that is found with most versions of
the Microsoft Windows operating system. It periodically (when major
software changes are made or at scheduled times) takes images of the
computers operating system and other software. These images, called
restore points, are saved so that the user can reset the computer system
to that restore point and thus avoid problems that were caused by later
changes. If a computer is reset to an earlier restore point, however, any
software (whether it was problematic or not) that was installed after the
restore point will be uninstalled. To access the System Restore utility on a
Windows computer, go to Start All Programs Accessories System
Tools System Restore.
5.6.5.
Booting from a Different Device
During typical use a computer boots (starts) from information and
instructions that are in its internal hard drive. A computer can also be
booted, however, from other devices such as floppy disks, CD/DVD disks,
flash drives or external hard drives. Booting from these devices is the only
option if the software on the hard drive has been corrupted to the point that
it will not start the computer. The standard boot order for a computer (the
order in which the computer looks for startup files) starts with the floppy
drive (for older computers), then is followed by the CD or DVD drives and
then the internal hard drive. This means that any time the computer starts
up it will first read any disk in the floppy drive to see if startup files are
contained there, and then moves on to the CD/DVD drive if startup files are
not found. This order can be changed by following the steps in the tip box in
section 4.3 of this module.
In order to boot from a disk, the computer user must have a boot disk
or recovery disk for that computer. Boot disks contain only critical startup
files, and they are best prepared and used by experienced computer
technicians. They can also be used as a part of the reimaging process,
described below. Recovery disks used to come standard with all new
computers. In recent years, however, the computer manufacturers have
instead set up systems for users to create their own recovery disks when first
using a new computer. If a computer lab manager has recently received new
computers, he or she would be wise to create recovery disks before putting
the computers into general use.
5.6.6.
Reimaging Computers
One very handy tool for a computer lab manager to have for
managing software problems is disk reimaging (also known as cloning). The
idea here is that a lab manager can create a complete copy of a computers
38
onto a bootable CD ROM disk. Therefore one option is to boot the computers
from the Clonezilla Live CD. The image that is created then can be easily
stored on a flash drive or external hard drive, using the USB port. For
complete instructions on using Clonezilla Live, please see the
www.clonezilla.org website.
Once an image has been created, it can be stored until needed to
reimage the computer it was created from or any other computer with
identical hardware. This is very useful for a computer lab that received a
donation of ten identical computers, for example. If using the image to
reimage another computer in a computer lab, however, there are some
important points that the computer lab manager needs to keep in mind. The
first is computer identity. Any cloned computers will have the same name
and Security Identification (SID). The computer lab manager should change
the name of the computer after reimaging by right clicking on the Computer
(or My Computer) icon or menu item and then selecting Properties. The
computer SID can remain unchanged.
The second important point is that the software license keys will be the
same for all cloned computers. If the computers are running proprietary
software, the computer lab manager needs to be aware of how many
computers are permitted to run on a single license. If a license is only for an
individual computer, the computer lab manager will need to buy additional
license keys for the software in question and enter the proper license keys
into the computer.
5.7.
Fixing Hardware Problems
5.7.1.
Tools and Safe Repair Practices
What tools will a computer lab manager need to perform basic
hardware repair? This will depend on the type of computers being worked
on, and also on what tools are locally available. However, good quality
screwdrivers in different sizes will be on every labs equipment list. The
majority of the screws encountered in computers are of the Phillips type (the
screw head has an X shape on the top), but flat head and hex head screws
may also occur. A computer lab manager can look and see what types of
screws are in use in the lab before making a purchase. Magnetic tip
screwdrivers can be very useful since the screws will stay magnetically
attached to the screwdriver while the lab manager locates the screw hole.
However it is very important to avoid touching the tips of magnetic
screwdrivers to RAM or hard drives, since the magnetic storage on those
devices could be damaged. A pair of needle nose pliers may also be useful
to assist when working in narrow spaces.
For cleaning computer parts, a computer lab manager will need some
method for blowing dust out of computer hardware. If an electric blower is
available, this is a very good option. Otherwise a hand operated blower (with
40
2. Open up the computer case. The method varies with the brand and
model of computer, but often involves laying the case on its side and
opening up the side panel. Some computer cases use screws and
others have buttons to press that release one side panel.
3. Find and unscrew all of the screws attaching the power supply to the
back of the case. Usually there will be four screws, located just outside
the cut out in the case (or
along the mesh grid) where
the power supply is found.
Do not disconnect the various
cables yet. Move the dead
power supply as far out of the
way as the cables will allow.
You may be able to set the
power supply on top of the
case (see photo).
4. Install the new power supply
and screw in all screws.
5. One by one, detach the
cables from the old power
Figure 3 - Replacing a Power Supply
supply to the various
For the complete procedure see
computer components, and
http://www.fonerbooks.com/r_power.htm
replace them with the cables
from the new power supply. Doing this one by one will help make sure
that no components are missed. There will be power supply
connectors for the motherboard and all drives. When removing the
cables, keep an eye out for latches that need to be depressed to
release the connector. All of the connectors should only fit in one
direction, and with little force. If a connector does not attach easily,
make sure that it is properly aligned before pushing harder.
Replacing a Hard Drive. Replacing a faulty hard drive is not a
difficult task, but a lab manager should have done some investigative work
first to determine if the hard drive is faulty. This could include running the
Chkdsk utility, as described in section 5.1.4, listening for unusual noises
coming from the hard drive and also checking to make sure the cables to the
hard drive are still fully connected. The computer may also present error
codes during start up that indicate a problem with the hard drive. Before
replacing a hard drive, it is worth trying to reset the BIOS to the default
settings to see if this fixes the problem. To do this, enter the BIOS during
computer start up (as described in section 4.3) and choose the default
settings. Then save the new settings and exit. The onscreen instructions in
the BIOS program will guide the computer lab manager through these steps.
43
Once it has been determined that a hard drive problem is likely, the
computer lab manager should follow the steps below to replace the hard
drive with a known working hard drive.
1. Disconnect the computer case from electricity and then open the
computer case (as described above).
2. Locate the hard drive. It will
likely be found in a metal
case or cage near the front of
the computer case, below the
other drives. It could be
mounted directly on the cage
or it could be mounted on
rails that will slide out of the
case (see photo).
3. Unscrew the hard drive from
the cage or slide the rails out
and unscrew the hard drive
from the rails.
4. Remove the long ribbon cable
Figure 4 - Removing a Hard Drive
from hard drive. There may
have been a small amount of For the complete procedure see
http://www.fonerbooks.com/r_hard.htm
glue used to hold the ribbon
in place that will also need to be removed. Then remove the smaller
power cable. If it is difficult to remove, gently wiggle the connector
back and forth along its long axis as you pull. Note the orientation of
the connector (which end is the red wire on?) to make sure that the
new hard drive is connected in the same manner.
5. If there are two hard drives in a computer, one is called the master and
the other the slave. On older hard drives, an electrical connection
needs to be changed to indicate whether the hard drive is a master or
a slave. If the hard drive being installed has not been used before, it
will be correctly set as a master (or also on the acceptable Cable
Select setting, used when the ribbon cable has two connectors one
for a master and one for a slave). If the hard drive has been previously
used as a slave, however, it will need to be changed to a master. To do
this, look for a diagram on the hard drive that shows the pattern for
connecting (jumping) two of the eight pins located between the two
cable connectors on the front end of the hard drive. Then using needle
nose pliers, pull off the jumper that is connecting two of the pins and
replace it to connect the proper pair.
6. Connect the cables to the new hard drive. Then screw the hard drive
back on to the rails and slide the rails into position (or screw the hard
drive directly to the cage if there are no rails). Make sure that all of the
other ribbons and cables are as they were found. Close the case and
the repair is complete. Note that if any new noises or problems appear
44
loose from its housing and need to be reseated. If a lab manager has
decided that a computer needs new or additional RAM, it is important to
make sure that the RAM used is compatible with the computer system.
There are several online RAM sales companies that will identify the
appropriate RAM if a user inputs the computer make and model. Two
example companies are Corsair (www.corsairmemory.com) and Crucial
(www.crucial.com). Once the RAM has been obtained, the lab manager
should follow the steps below to replace the RAM. Please Note: RAM is
very easily damaged by electrostatic charges, so it is very important for the
user to be grounded before picking up RAM. Also RAM should only be
handled by the edges.
1. Open the computer case as previously described. Find the RAM slots
(long parallel connectors). Note which slots are occupied and if the
slots are numbered (at the ends). If the slots are not numbered, the
slots closest to the processor are probably the lower numbered slots
and should be filled first.
2. Simultaneously push down and out
on both retaining clips (on each
end) of a RAM slot to remove the
old RAM. Note the orientation of
the RAM so that the replacement
RAM can be put in facing the same
direction. There should be some
notches on the bottom edge of the
RAM that can be used as a guide.
3. Gently place the new RAM in the
socket and press down firmly on
the top of the RAM at both ends
(see photo). When the RAM
module is correctly seated, the
Figure 6 - Installing RAM
retaining clips will automatically
For the complete procedure see
close.
http://www.fonerbooks.com/r_ram.htm
4. Close the computer case as
previously described.
Replacing Laptop RAM. Laptop computers have a compartment on
the back side designed for accessing RAM. When the screws for this
compartment are removed (but dont forget to remove the laptop battery
first for safety reasons!), the RAM should be visible. For some laptops,
however, only the slot for expansion (extra) RAM is visible. In these cases
the rest of the RAM is can be accessed by removing the keyboard, a more
difficult task (discussed below). Laptop RAM rests horizontally, with the slot
on one end. To install RAM, hold the RAM by its edges, and bring it up
towards its slot at about a 30 degree angle (see photo). Then gently push
the RAM in while flattening out the angle.
46
47
5.9.
Managing E-Waste
In concluding this module, it is important to recognize that not all
computer problems can or should be fixed. Sometimes computers become
too old or obsolete to make the effort of repairing them worthwhile, and
some repairs (such as repairs to CRT computer monitors) are not advisable
except by experts. Due to these realities, computer labs often have a
collection of old and broken computers and peripheral equipment that
develops and increases over the years. This equipment is collectively known
as electronic waste or e-waste. In many developing countries e-waste is a
problem because the equipment can contain hazardous materials and there
often are not recycling or waste facilities that are capable of managing these
hazardous materials properly.
The first step in managing e-waste is to try to reduce the amount of it
that is produced by a computer lab. A lab manager can do this by avoiding
accepting donations of equipment that is already very old or obsolete, since
this equipment will not remain useful for long. A lab manager can also make
sure that existing equipment is maintained well so that it remains useful for a
longer period of time. The computer lab manager should also work with any
organizations donating computers to discuss the e-waste problem and
strategize how the computers will be disposed of properly when they are no
longer useful.
48
49
5.10.9.
Practice starting a computer in Safe Mode. Take note of which
features of your computer function in Safe Mode and which have been
disabled.
5.10.10. Workshop Activity: As a team, set up a computer perfectly so
that it is ready to produce an image or clone. Then participate in the
process of preparing an image and using it to reimage another computer.
5.10.11. Workshop Activity: Practice troubleshooting malfunctioning
computers. The instructor may intentionally produce malfunctions in
computers in order to provide you with practice
5.10.12. Workshop Activity: Replace the hard drive in a desk top
computer.
5.10.13. Workshop Activity: Take apart a laptop computer, including
accessing all RAM, the keyboard and screen. Then put the laptop back
together!
Table of Contents
6. Overall Assignments/Activities
6.1.
Revisit and reflect on your own skill level after having completed this
module:
6.1.1.
What skills do you still feel you need in the categories covered by
this module? Make a plan for gaining those skills and (if appropriate)
discuss the plan with your supervisor.
6.1.2.
What skills do you still feel you need in the self-study areas
(English reading/writing, touch typing and computer user skills) presented
at the beginning of this module? Make a plan for gaining those skills and
(if appropriate) discuss it with your supervisor.
6.1.3.
Consider the topics covered in Modules 2, 3, and 4 of this course
(as described in the introduction to this module). Do you think that taking
those courses (or studying the learning materials for those courses
independently) will help you meet your career goals? Discuss this with
your instructor and your supervisor (if appropriate) and consider your next
steps.
6.2.
If you work in a project that uses Microsoft or other types of proprietary
software, consider making a shift over to an entirely open source
environment. What would the benefits and drawbacks of such a shift be?
Make a list of all the FOSS software you would need, including the names of
specific programs if possible. Also what training would need to occur if you
made this switch?
6.3.
Workshop Activity: Participate in a team project to overhaul an old
computer. Clean the components, add RAM to the computer, install an
appropriate operating system and install all other necessary software.
6.4.
Workshop Activity: Participate in a workshop evaluation process.
50
Table of Contents
Table of Contents
8. Bibliography
Bit. (2010). In Wikipedia, The Free Encyclopedia. Retrieved January 26, 2010, from:
http://en.wikipedia.org/w/index.php?title=Bit&oldid=339499368
Blue Screen of Death (2010). In Wikipedia, The Free Encyclopedia. Retrieved
January 26, 2010, from: http://en.wikipedia.org/w/index.php?
title=Blue_Screen_of_Death&oldid=336735006
Computer. (2010). In Wikipedia, The Free Encyclopedia. Retrieved January 26,
2010, from: http://en.wikipedia.org/w/index.php?
title=Computer&oldid=339667990
Computer Ports (Hardware). (2010). In Wikipedia, The Free Encyclopedia. Retrieved
January 26, 2010, from: http://en.wikipedia.org/w/index.php?
title=Computer_port_(hardware)&oldid=338140393
Computers for Zambian Schools. (2008). Basic Computer Maintenance and
Troubleshooting. Lusaka, Zambia.
PCTechBytes. (2009). Computer Troubleshooting Zone. Retrieved January 26, 2010,
from PCTechBytes: http://www.pctechbytes.com/troubleshooting/
Rosenthal, M. (2009). Replacing Laptop Hard Drives. Retrieved January 26, 2010,
from Foner Books: http://www.fonerbooks.com/laptop_1.htm
Rosenthal, M. (2008). Replacing PC Parts. Retrieved January 26, 2010, from
http://www.fonerbooks.com/replace.htm
Rosenthal, M. (2009). Upgrading Laptop Memory. Retrieved January 26, 2010, from
Foner Books: http://www.fonerbooks.com/laptop_2.htm
Yarnold, S. (2008). Upgrading and Fixing a PC, Second Edition. Warwickshire,
United Kingdom: In Easy Steps Limited.
Table of Contents
About Zambia Pacific Trust
52
There are many challenges for schools and community organizations in Zambia to
consider when starting or maintaining computer projects. Sourcing good quality
computers is just the beginning. The organizations also need to consider
infrastructure issues, staff training, computer education curricula, and internet
connectivity. Zambia Pacific Trust (ZPT) helps institutions address these challenges
through advice, training, and a cost-sharing grant process. ZPT currently works
with five schools in the Lusaka area, but has plans to add other organizations in the
future. For more information please contact info@zptrust.org.
53