Download as pdf or txt
Download as pdf or txt
You are on page 1of 115

CORE UNIT 4

SAINT JAMES ACADEMY OF SKILLS TECHNOLOGY, INC.


Brgy. Hika, Poblacion, Compostela, Cebu
Philippines

SECTOR : ELECTRONICS SECTOR


QUALIFICATION TITLE : COMPUTER SYSTEMS SERVICING NC II
UNIT OF COMPETENCY : MAINTAIN AND REPAIR COMPUTER SYSTEMS AND
NETWORKS
MODULE TITLE : MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND
NETWORKS

LEARNING OUTCOME NO. 1: PLAN AND PREPARE FOR MAINTENANCE AND REPAIR
LEARNING OUTCOME NO.2: MAINTAIN COMPUTER SYSTEMS & NETWORKS
LEARNING OUTCOME NO.3: DIAGNOSE FAULTS OF COMPUTER SYSTEMS AND
NETWORKS
LEARNING OUTCOME NO. 4: RECTIFY/CORRECT DEFECTS IN COMPUTER SYSTEMS AND
NETWORKS
LEARNING OUTCOME NO. 5: INSPECT AND TEST THE COMPUTER SYSTEMS AND
NETWORKS

1
Information Sheet 4.1-1
TOOLS, EQUIPMENT AND TESTING DEVICES

Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to be
1. Familiar with the following Tools, Equipment and Testing Devices
and its functions.

Introduction:

I. TOOLS for cutting, shaping, drilling, threading, tapping, finishing,


dismantling, and assembling.

 Pliers are a hand tool used to hold


objects firmly, possibly developed from
tongs used to handle hot metal in
Bronze Age Europe. They are also
useful for bending and compressing a
wide range of materials.

 Screwdriver, tool, usually hand-


operated, for turning screws with
slotted heads. For screws with one
straight diametric slot cut across the
head, standard screwdrivers with flat
blade tips and in a variety of sizes are
used.

 Soldering iron is a hand tool used in


soldering. It supplies heat to
melt solder so that it can flow into the
joint between two work pieces.
A soldering iron is composed of a
heated metal tip and an insulated
handle.

2
 A wrench is a tool used to provide grip
and mechanical advantage in applying
torque to turn objects—usually rotary
fasteners, such as nuts and bolts—or
keep them from turning.

 A wire stripper is a small, hand-held


device used to strip the electrical
insulation from electric wires.

 A crimping tool is a device used to


conjoin two pieces of metal by
deforming one or both of them in a way
that causes them to hold each other.
The result of the tool's work is called
a crimp. A good example of crimping
is the process of affixing a connector to
the end of a cable.

II. EQUIPMENT

 A power supply is an electronic device


that supplies electric energy to
an electrical load. The primary function
of a power supply is to convert one form
of electrical energy to another and, as a
result, power supplies are sometimes
referred to as electric power converters.

3
III. TESTING DEVICES

 A multi-meter or a multi-tester, also


known as a VOM (Volt-Ohm Meter), is
an electronic measuring instrument that
combines several measurement
functions in one unit. A typical multi-
meter can measure voltage, current,
and resistance.

 A LAN cable tester is used to verify that


all of the intended connections exist and
that there are no unintended
connections in the cable being tested.
 When an intended connection is missing
it is said to be "open".
 When an unintended connection exists
it is said to be a "short" (a short circuit).
 If a connection "goes to the wrong place"
it is said to be "miswired".

IV. MATERIALS

 A compact disc [sometimes


spelled disk] (CD) is a small, portable,
round medium made of molded polymer
for electronically recording, storing, and
playing back audio, video, text, and
other information in digital form.

4
 An electrical connector is an electro-
mechanical device for joining electrical
circuits as an interface using a
mechanical
assembly. Connectors consist of plugs
(male-ended) and jacks (female-ended).

 Computer Storage Media are


composed in different many forms. Most
internal drives are regular IDE hard
drives that come with the computer. A
removable drive is another popular
storage device that is usually connected
by firewire, USB, or CD/DVD drives.

Self-Check 4.1-1
Matching Type
Instruction: Match Column A with Column B that correspond to the correct
answer. Write the letter of the correct answer on the space provided.
Column A Column B

_________1. A device used to conjoin two pieces A.


of metal by deforming one or both
of them in a way that causes them
to hold each other
_________2. An electro-mechanical device for B.
joining electrical circuits as an
interface using a mechanical assembly
_________3. A tool, usually hand-operated, C.
for turning screws with slotted heads
_________4. Composed in different many forms.
Most internal drives are regular IDE D.
hard drives that come with the computer.
A removable drive is another popular
storage device.
_________5. It supplies heat to melt solder so that E.
it can flow into the joint between two
work pieces.
_________6. Is used to verify that all of the F.
intended connections exist and that
there are no unintended connections
in the cable being tested.
5
_________7. Is a tool used to provide grip and G.
mechanical advantage in applying
torque to turn objects.
_________8. A hand tool used to hold objects firmly. H.
They are also useful for bending and
compressing a wide range of materials.
_________9. A small, hand-held device used to I.
strip the electrical insulation from
electric wires.
________10. A device used to conjoin two pieces J.
of metal by deforming one or both of
them in a way that causes them to
hold each other.
Information Sheet 4.1-2
OCCUPATIONAL HEALTH AND SAFETY

Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to be:
1. Familiar with the Occupational Health and Safety Procedures for
Computer Systems Servicing NC II.

Introduction:
Occupational Health and Safety during Disassembling of PC
1. Observe ESD (Electrostatic Discharge).
2. Always use an anti-static wrist strap.
3. Document everything.
4. Switch off the computer.
5. Remove the cables from the back of the case.
6. Be sure to have a container to keep the screws.
7. Place all components when remove in anti-static bags or anti-static mat.
8. Make sure you have all the tools, resource material, drivers or software that you
need.
9. Do a full System Backup.
10. Use common
sense.

Electro-static Discharge
• It is the transfer of
an
electrostatic charge between two objects. This is a very rapid event that happens
when two objects of different potentials come into direct contact with each other.
• is one of the few things an individual can do to damage or destroy his or her
computer or hardware components
• ESD can occur when working in your computer and will
cause components you touch to no longer work
properly.
Anti-static Wrist Strap

6
• The antistatic wrist strap prevents static electricity from building up. Static electricity
can electronically destroy many of the delicate components inside the computer.
• An antistatic wrist strap should be worn any time work is being done inside the
computer.
Anti-static Bag
• A bag that has been specially designed to help
prevent static electricity inside the bag.
• It is important to remember that only the inside
of an antistatic bag is protected, placing a
hardware device on top of the bag and not
inside of the bag will not protect it. In fact it is
often more harmful to place an electrostatic
sensitive device on top of the bag.
Anti-static Mat
• Also known as a grounding mat.
• It is a floor or table mat used to help reduce the risk
of electrostatic discharge while working on a
computer or other electrostatic sensitive object.
How to help prevent ESD
The best method of preventing ESD is to use an ESD wrist
strap and/or use a grounding mat. However, because most
users do not have access to such items, there are steps to
help reduce the chances of ESD as much as possible.
1. Zero Potential - Most importantly, make sure you and the computer are at Zero
Potential by continuously touching an un-painted metal surface of the chassis or
the computer power supply case.
2. Standing - It is also very important that you are standing at all times when working
on the computer. Setting on a chair can generated more electrostatic.
3. Cords - Make sure everything is removed from the back of the computer (power
cord, mouse, keyboard, etc.).
4. Weather - Electrical storms can increase the ESD risk; unless absolutely necessary,
try not to work on a computer during an electrical storm.
5. Accessories - To help reduce ESD and help prevent other problem, it is also a good
idea to remove all jewellery.

Self-Check 4.1-2

True or False
Instruction: Identify if the following statements are True or False. Write T if
the statement is True and F otherwise, on the space provided.
1. ESD can occur when working in your computer and will
cause components you touch to no longer work properly.
2. Static electricity may not electronically destroy many of the
delicate components inside the computer.
3. Setting on a chair does not generate more electrostatic. So it
is fine take a seat at all times when working on the
computer.
4. Electrical storms can increase the ESD risk.

7
5. The outside of an antistatic bag is also protected, so placing
a hardware device on top of the bag can also protect it.
6. To help reduce ESD and help prevent other problem, it is
also a good idea to remove all jewellery.
7. It is fine not to document everything as long as you
remember the tasks you have been doing.
8. An antistatic wrist strap may not be worn any time work is
being done inside the computer. Provided steps to reduce
ESD are observed.
9. Make sure everything is removed from the back of the
computer (power cord, mouse, keyboard, etc.).
10. Zero Potential can be done by continuously touching the
painted metal surface of the chassis or the computer power
supply case.

Information Sheet 4.1-3


COMPUTER SYSTEMS AND NETWORK MAINTENANCE

Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to be:
1. Familiar with the different Computer Systems and Network
Procedures for Computer Systems Servicing NC II.
2.
Introduction:

Essential Computer Maintenance Tips & Checklist


Help Your Hardware
1. Clean your computer and keyboard
Static electricity makes computers a magnet for dust, dirt, and debris. With all the
crevices that come with keyboards and processing units, dust can be tough to reach,
and it may gather for months before you even notice a problem. These particles aren’t
just unsanitary; they also clog up your cooling fans and keyboard, two of the most
important moving parts of your machine.
2. Clean your monitor
Hopefully, you don’t ever touch your screen, and you encourage others to keep their
hands off your monitor too. Fingers always have oil and dirt on them, and leave nasty
smudges on computer screens. Even if you, your friends, and your family treat your
screen right, monitors always find a way to gather dust nonetheless.
3. Organize your cords
Printers, scanners, speakers, microphones, and cameras just keep contributing to cord
clutter. Eventually, you’ll have a huge pile behind your computer, and it’ll be ugly,
restrictive, and dangerous.
To truly get a handle on this wire wreckage, set aside ten or fifteen minutes to shut
down and unplug everything. Separate all of the cords, and you’ll probably find one or
two that you don’t even use. Group them all based on which direction they run, and
bind the cords together. You can use a twist-tie or rubber band, but I prefer cable
housings that are split along their length.
8
Software Solutions
4. Do a full scan for viruses and spyware
Software maintenance can get complicated, but one of the easiest ways to take care of
your system is to run conventional virus protection and spyware detection software.
Mainstream programs will safely run as background processes, protecting your
computer whenever you have it on. Every two to four weeks (more frequently if you’re
extra-vigilant), you should open up your virus protection software and manually run a
full scan for viruses and spyware.
5. Uninstall any programs that you don’t use
If you’re fortunate enough to keep your personal computer running for many years,
you’ll gather all sorts of programs that you may have needed at one time or another.
Sometimes you may not remember or even realize that you’ve installed them.
Eventually, you’ll find that you do not even recognize, let alone use, all of the programs
installed on your computer. Each one of them, however, is taking up memory and
processing time, so cleaning out your system will make some room for new programs
and speed up your computer too.

6. Check for updates on all of your programs


Now that you’ve narrowed down your list of installed programs, you can benefit from
getting the latest versions of the ones you kept. Especially for programs you use
frequently, click the “About” menu item or go to the manufacturer’s website to get the
latest downloadable patch to upgrade each program. From your main operating system
to your everyday office software, the new versions will have beefed up security as well
as major and minor bug fixes that can improve processing times. If you’re a Microsoft
user, for example, you can go to the Windows Update site to scan your system and
install updates.
System Server Maintenance
Preventive maintenance saves time and money, improves performance, and helps to
safeguard important data files.
Daily
1. Review event and audit logs – Check the event logs for warning and error messages,
including application and database errors. Error logs can include errors for both
software and hardware failures that need to be addressed before they become big
problems.
2. Backup Server – Perform a backup of the server, either locally or off-site in the event
of a server failure. This will reduce cost and downtime to your business. Run and/or
verify that backups of systems and data files completed successfully.
3. Keep track of server’s system events – Run “Windows Event Viewer” to record
system, security and application-related issues. If Active Directory is installed, look
at the “Directory Logs”.
4. Server Security – Make sure the Windows Firewall is running to prevent network
intrusions.
5. Prevent Virus Infections – Ensure that your server has a proper virus protection.
Protecting your server can help protect your network and your client computers.
6. Monitor System performance, activity, and hard-drive space – Make sure that there
is sufficient RAM (memory) and CPU resources and hard drive space to adequately

9
run your server. Low resources can cause slow performance and possible corruption
of files and applications. Take appropriate actions as needed.
7. Physical checks of the systems hardware and connections – Visually check the
equipment for any alarms, inoperative lights, and other malfunctions that could
inhibit proper performance.
8. Protect Files against possible deletion – Activate “Shadow Copies of Shared Folders”
to automate the retention and protection of files on a server. This service restores
files that have been deleted or overwritten preventing you from having to reload
backup copies.
Weekly
1. Keep the server system updated – Download and install the “Windows Server
Updated Services.” This service downloads security and performance updates. It
also allows you to manage, test, distribute and install these updates.
2. Keep User Rights Updated – Run the “Active Directory Certificate Services” role to
configure, maintain and manage user access rights as needed. This is important if
you frequently have employment turnover.
3. Perform and/or verify weekly backups.
4. Update anti-virus signature files to keep current protection.
5. Run anti-virus scan to detect and remove any malware that may have been
transmitted to the server.
6. Run file system integrity diagnostics to detect any system problems and repair them
before a shutdown becomes necessary.
7. Check for unnecessary services that are running and may cause server interruption.
Cables / Connectors Maintenance
One of the most common causes of computer problems is that a connector comes loose. In
order to troubleshoot, check all the cables on the outside of the computer. If you find all of
those in place, you may want to check the cables on the inside of your computer.
Two types of cables are inside the console: power and data. Some devices, like disk drives,
require both.
To ensure that cables are properly attached, follow these steps:
1. Taking Inventory of Your Components
2. Open the console.
3. Locate the spot where the cable attaches.
4. Give the cable a little tug.
5. If the cable is loose, it falls out. If it does, reattach it.
6. Gently press the cable so that it’s snugly attached.
7. Cables have two ends. You need to check both ends

Self-Check 4.1-3
Part I. Multiple Choice
Instruction: Read the questions below carefully. Encircle the correct letter
which represents the best answer
1. Composed in different many forms. Most internal drives are regular IDE hard
drives that come with the computer. A removable drive is another popular
storage device.
a. Electrical Connector b. Compact Disc
10
c. Crimping Tool d. Computer Storage Media
2. It is a tool used to provide grip and mechanical advantage in applying torque to
turn objects.
a. Wrench c. Screwdriver
b. Pliers d. Wire Strip

3. A hand tool used to hold objects firmly. They are also useful for bending and
compressing a wide range of materials.
a. Wrench c. Screwdriver
b. Pliers d. Crimping Tool

4. A bag that has been specially designed to help prevent static electricity inside the
bag.
a. Anti-static Mat c. Anti-static Bag
b. Anti-static Pouch d. Electro-static Discharge

5. It is an electronic device that supplies electric energy to an electrical load.


a. Power Generator c. Electric Outlet
b. Electro-static Discharge d. Power Supply

6. It is a floor or table mat used to help reduce the risk of electrostatic discharge
while working on a computer or other electrostatic sensitive object.
a. Anti-static Floor c. Anti-static Room
b. Anti-static Mat d. Anti-static Table

7. It is the transfer of an electrostatic charge between two objects.


a. Electro-static Charge c. Electro-static Discharge
b. Electro-static Current d. Electro-static Fl

8. It supplies heat to melt solder so that it can flow into the joint between two work
pieces.
a. Electronic Stand c. Soldering Lead
b. Soldering Metal d. Soldering Iron

9. A tool, usually hand-operated, for turning screws with slotted heads.


a. Screwdriver c. Crimping Tool
b. Pliers d. Wire Stripper

10. A device used to conjoin two pieces of metal by deforming one or both of them in
a way that causes them to hold each other.
a. Wire Stripper c. Pliers
b. Crimping Tool d. LAN Cable Tester

11. Is used to verify that all of the intended connections exist and that there are no
unintended connections in the cable being tested.
a. Crimping Tool c. Wire Stripper
b. Computer Storage Media d. LAN Cable Tester

12. An electro-mechanical device for joining electrical circuits as an interface using a


mechanical assembly.
11
a. LAN Cable c. Electrical Connector
b. Power Cable d. Computer Storage Media

13. A small, hand-held device used to strip the electrical insulation from electric
wires.
a. Electrical Connector c. Soldering Iron
b. Crimping Tool d. Wire Stripper

14. It is a small, portable, round medium used electronically for recording, storing,
and playing back audio, video, text, and other information in digital form.
a. Compact Disc c. USB Flash Drive
b. Computer Storage Media d. Tape Recorde

15. Is an electronic measuring instrument that combines several measure functions in


one unit?
a. LAN Cable Tester
b. Oscilloscope
C. Multi-Meter Tester
d.Digital Pattern Generator

12
Part II. Enumeration
Instruction: Give the 10 Occupational Health and Safety Procedures to be
followed when disassembling PC.
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.

Part III. True or False


Instruction: Identify if the following statements are True or False. Write T if
the statement is True and F otherwise, on the space provided.
__________ 1. Make sure everything is removed from the back of the
computer (power cord, mouse, keyboard, etc.).
__________ 2. An antistatic wrist strap may not be worn any time work is
being done inside the computer. Provided steps to reduce
ESD are observed.
__________ 3. It is fine not to document everything as long as you remember
the tasks you have been doing.
__________ 4. ESD can occur when working in your computer and will
cause components you touch to no longer work properly.
__________ 5. To help reduce ESD and help prevent other problem, it is also
a good idea to remove all jewelry.
__________ 6. Zero Potential can be done by continuously touching the
painted metal surface of the chassis or the computer power
supply case.
__________ 7. Setting on a chair does not generate more electrostatic. So it
is fine take a seat at all times when working on the computer.
__________ 8. Electrical storms can increase the ESD risk.
__________ 9. The outside of an antistatic bag is also protected, so placing a
hardware device on top of the bag can also protect it.
__________ 10. Static electricity may not electronically destroy many of the
delicate components inside the computer.

13
Part IV. Modified True or False
Instruction: Identify if the underlined words are True or False. Write T if the
statement is True, otherwise write the correct answer, on the space
provided.

_______________ 1. Warning logs can include errors for both software and
hardware failures that need to be addressed before they
become big problems.
_______________ 2. Shadow Copies of Shared Folders service restores files
that have been deleted or overwritten preventing you
from having to reload backup copies.
_______________ 3. To truly get a handle on wire wreckage, set aside ten or
fifteen minutes to shut down and plug everything.
_______________ 4. Be sure to check for unnecessary services that are
running and may cause server interruption.
_______________ 5. Preventive maintenance saves time and money,
improves performance, and helps to safeguard
important data files.
_______________ 6. Each program that you have installed, but eventually
did not use, does not take up memory and processing
time, so cleaning out your system will make some room
for new programs and speed up your computer.
_______________ 7. If you are a Microsoft user, you can go to Windows
Update site to scan your system and install updates.
_______________ 8. Even if you, your friends, and your family treat your
screen right, monitors sometimes find a way to gather
dust nonetheless.
_______________ 9. Electro-static discharge makes computers a magnet for
dust, dirt, and debris. Thus, cleaning the computer and
keyboard is necessary.
_______________ 10. One of the most common causes of computer problems
is that a connector comes tight.
_______________ 11. Make sure that there is sufficient RAM and CPU
resources and hard drive space to adequately run your
server.
_______________ 12. Run anti-virus scan to detect and remove any malware
that may have been transmitted to the server.
_______________ 13. Make sure that Windows Firemail is running to prevent
network intrusions.
_______________ 14. Mainstream programs will safely run as background
processes, protecting your computer whenever you have
it on.
_______________ 15. Windows Server Changed Services downloads security
and performance updates. It allows you to manage,
test, distribute and install these updates.

14
Information Sheet 4.2-1
PROCEDURES IN MAINTAINING NETWORK SYSTEMS

Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Maintain network systems.

INTRODUCTION

Procedures in Maintaining Network Systems


If you have a computer network setup in your home or office, it is important that you
maintain the network to keep the connection running smoothly. With continued computer
use, disk space is filled and new programs are added, causing the computers to gradually
slow down. To maintain your computer networking, you also need to monitor and maintain
your computers.

1. Reset the modem the Internet has slowed down. Do the same to your router
(if in use). The "Reset" button is usually located at the back of the modem or router. Reboot
all the computers in the network.
2. Use the “Disk Defragmenter” feature in Windows. This feature is designed to
rearrange and organize files in your computer. To do this, navigate to the “Start” menu and
then select “All Programs.” Click on “Accessories” and choose “System Tools” from the
options. Select “Disk Defragmenter” and click on the computer drive to commence the
process.
3. Perform a “Disk Cleanup.” Navigate again to “System Tools” (see Step 2), but
this time choose “Disk Cleanup.” Select the drive you want to clean up and then click “OK.”
If the computer has several drives, repeat the process until all drives are cleaned.
4. Clean the registry. Because the registry is a delicate and essential part of the
operating system, you will need third party software to perform this procedure. Download a
registry cleaner such as “Wise Registry Cleaner” or “Abexo Free Registry Cleaner.” Install the
software to the computer and proceed to the cleaning process.
5. Delete temporary files and browsing history that you no longer need,
because they eat much of the disk space when not deleted. To do this, open your web
browser and delete your Internet history by accessing the “Tools” menu and then “Internet
Options” or “Options.”
6. Scan the computers for viruses using a trusted and reliable anti-virus
software such as Norton, AVG or McAfee. Delete, heal or quarantine viruses that may be
hindering the computer from performing to its optimum level.
7. Inspect the Ethernet cables that connect the computers to the network. If
one computer cannot detect an Internet connection, it may be because of malfunctioning or
faulty cables.

15
Self-Check 4.2-1

Directions:

Identify at least 5 Procedures in Maintaining Network Systems

1.

2.

3.

4.

5.

Did the Trainee overall performance meet the required


evidence/standard?
Yes No

Information Sheet 4.2-2

SAFETY MEASURES

Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Observe safety measures.
2. Know the classifications of Safety Measures.

Introduction:

These Safety Measures apply to anyone who accesses, uses, or controls University
computer and data resources, including, but not limited to faculty, administrators, staff,
students, those working on behalf of the University, guests, tenants, contractors,
consultants, visitors, and/or individuals authorized by affiliated institutions and
organizations.
Scope of these Measures
These Measures are applicable to a wide variety of IT resources which are connected
to NYU-NET or are used for any NYU business purpose. A system (see "Definitions," below)

16
may be any IT resource to which the safeguards outlined in these Safety Measures may be
applied. Examples of systems include, but are not limited to:
• Desktop, laptop, or server computers running general purpose operating
systems such as Windows, Mac OS, and Unix
• Mobile devices, such as PDAs and cell phones, to the extent that they interact
with NYU resources, such as E-mail
• Network server applications, such as an FTP-server application
• Web applications, such as a wiki
• Databases
All of the above systems may perform their own authentication and authorization,
logging and auditing, and have their own configurations which must be managed, and each
of them are a considered a compliance object to be safeguarded.
A. Basic System Safety Measures
These Basic System Safety Measures apply to all systems at NYU, regardless of the level of
their System Classification (see "Definitions," below). It is a baseline, which all systems
must meet. Note that for most personal workstations, these are the only measures that
apply. The requirements are:
1. Password Protection: All accounts and resources must be protected by passwords which
meet the following requirements, which must be automatically enforced by the system:
a. Must be at least eight characters long.
b. Must NOT be dictionary or common slang words in any language, or be
readily guessable.
c. Must include at least three of the following four characteristics, in any order:
upper case letters, lower case letters, numbers, and special characters, such
as *!@#$%^&*.
d. Must be changed at least once per year.
2. Software Updates: Systems must be configured to automatically update operating
system software, server applications (webserver, mailserver, database server, etc.),
client software (web browsers, mail clients, office suites, etc.), and malware protection
software (antivirus, anti-spyware, etc). For Medium or High Availability systems, a plan
to manually apply new updates within a documented time period is an acceptable
alternative.
3. Firewall: Systems must be protected by a firewall that allows only those incoming
connections necessary to fulfill the business need of that system. Client systems which
have no business need to provide network services must deny all incoming connections.
Systems that provide network services must limit access to those services to the smallest
reasonably manageable group of hosts that need to reach them.
4. Malware Protection: Systems running Microsoft or Apple operating systems must have
antivirus and anti-spyware software installed and it must be configured to automatically
scan and update.
B. Intermediate System Safety Measures
These Intermediate System Safety Measures define the security measures that must be
applied to Medium Criticality and High Criticality systems. Note that except under special
circumstances, they do not apply to desktop and laptop computers. The requirements are:
1. Authentication and Authorization

17
a. Remove or disable accounts upon loss of eligibility: Accounts which are no
longer needed must be disabled in a timely fashion using an automated or
documented procedure.
b. Separate user and administrator accounts: Administrator accounts must not
be used for non-administrative purposes. System administrators must be
provisioned with non-administrator accounts for end-user activities, and a
separate administrator account that is used only for system-administration
purposes.
c. Use unique passwords for administrator accounts: Privileged accounts must
use unique passwords that are not shared among multiple systems.
Credentials which are managed centrally, such as the NetID/password
combination, are considered a single account, regardless of how many
systems they provide access to.
d. Throttle repeated unsuccessful login-attempts: A maximum rate for
unsuccessful login attempts must be enforced. Account lockout is not
required, but the rate of unsuccessful logins must be limited.
e. Enable session timeout: Sessions must be locked or closed after some
reasonable period.
f. Enforce least privilege: Non-administrative accounts must be used whenever
possible. User accounts and server processes must be granted the least-
possible level of privilege that allows them to perform their function.
2. Audit and Accountability
g. Synchronize system clock: The system clock must be synchronized to an
authoritative time server run by NYU (currently tick.nyu.edu and
tock.nyu.edu) at least once per day.
h. Enable system logging and auditing: The facilities required to automatically
generate, retain, and expire system logs must be enabled.
i. Follow an appropriate log retention schedule: System logs must be retained
for 30-90 days and then destroyed unless further retention is necessary due
to legal, regulatory, or contractual requirements.
j. Audit successful logins: Generate a log message whenever a user successfully
logs in.
k. Audit failed login attempts: Generate a log message whenever a user
attempts to log in without success.
l. Audit when a system service is started or stopped: Generate a log message
when a system service is started or stopped.
m. Audit serious or unusual errors: Generate a log message when a serious or
unusual error occurs, such as crashes.
n. Audit resource exhaustion errors: Generate a log message when a resource
exhaustion error occurs, such as an out-of-memory error or an out-of-disk
error.
o. Audit failed access attempts: Generate a log message when an attempt to
access a file or resource is denied due to insufficient privilege.
p. Audit permissions changes: Generate a log message when the permissions of
a user or group are changed.
q. Include appropriate correlation data in audit events: For each audit event
logged be sure to include sufficient information to investigate the event,

18
including related IP address, timestamp, hostname, username, application
name, and/or other details as appropriate.
3. Configuration and Maintenance
a. Security partitioning: Systems may share hardware and resources only with
other systems that have similar security requirements, regardless of
their Criticality classification. Systems which share similar security
requirements have user communities of similar size and character, similar
firewall profiles, and similar technical requirements. For example:
i. Multiple systems of the same Criticality may be aggregated together
to share hardware and resources provided they have similar security
requirements.
ii. Medium Criticality systems may share hardware and resources
with Low Criticality systems provided that all systems meet
these Intermediate Systems Safety Measures, and share similar
security requirements.
b. Follow vendor hardening guidelines: This document cannot be
comprehensive for all systems available. Follow basic vendor
recommendations to harden and secure systems.
c. Disable vendor default accounts and passwords: Many systems come with
default accounts which are publicly known. These accounts should be
disabled.
d. Disable all unnecessary network services: Processes and services which are
not necessary to complete the function of a system must be disabled.
4. Additional Requirements
a. Report potential security incidents: Potential security incidents must be
reported to ITS Technology Security Services: security@nyu.edu.
b. Security review: During the design of the technical architecture, a review of
the system must be requested from ITS Technology Security Services.
c. Vulnerability assessment: Before system deployment, a vulnerability
assessment must be requested from ITS Technology Security Services.
d. Physical access: The system must reside in a locked facility, to which only
authorized personnel have access.
e. Documentation: Create and maintain documentation summarizing the
business process, major system components, and network communications
associated with a system.
C. Advanced System Security Measures
These Advanced System Security Measures define the security measures that must be
applied to High Criticality systems. The requirements are:
1. Audit and Accountability
a. Enable process auditing or accounting: Enable process auditing or
accounting, which generates log information about the creation of new
processes and their system activity.
b. Audit privilege escalation or change in privilege: Generate a log message
whenever a user changes their level of privilege.
c. Audit firewall denial: Generate a log message when the host-based firewall
denies a network connection.
d. Audit all significant application events: Log all significant application events.

19
e. Write audit events to a separate system: System logs must be written to a
remote system in such a way that they cannot be altered by any user on the
system being logged.
2. Configuration and Maintenance
a. Follow advanced vendor security recommendations: This document cannot
be comprehensive for all systems and applications available. Conform to best
practices and recommendations outlined in vendor security whitepapers and
documentation.
b. Host-based and network-based firewalls: Systems must be protected by
both a host-based and a network-based firewall that allows only those
incoming connections necessary to fulfill the business need of that system.
c. Configuration management process: Configuration changes must be
regulated by a documented configuration and change management process.
d. Partitioning: Systems may share hardware and resources only with other
systems that have similar security requirements, regardless of
their Criticality classification. Systems which share similar security
requirements have user communities of similar size and character, similar
firewall profiles, and similar technical requirements. For example:
i. Multiple systems of the same Criticality may be aggregated together
to share hardware and resources provided they have similar security
requirements.
ii. High Criticality systems may share hardware and resources
with Medium and Low Criticality systems provided that all systems
meet these Advanced Systems Security Measures, and share similar
security requirements.
3. Additional Requirements
Physical access: The system must reside in a secured, managed data center.
D. Data Handling Security Measures
These Data Handling Security Measures define the minimum security requirements
that must be applied to the data types defined in the Reference for Data and System
Classification(www.nyu.edu/its/policies/sec_ref.html). Some data elements, such as credit
card numbers and patient health records, have additional security requirements defined
in external standards. In addition, access and use of University data is covered by
the University Data Management Policy (www.nyu.edu/its/policies/datamgmt.html).
Please be sure to consult all appropriate documents when determining the appropriate
measure to safeguard your data.
The best way to safeguard sensitive data is not to handle it at all, and business
processes that can be amended to reduce or eliminate dependence on restricted data
should be corrected. For example, the University ID number can often be substituted for a
social security number and poses much less risk if accidentally disclosed.
1. Requirements for Handling Confidential Data
a. Access control: Access to confidential data must be provided on a least-
privilege basis. No person or system should be given access to the data unless
required by business process. In such cases where access is required,
permission to use the data must be granted by the Data Steward (see
"Definitions," below).

20
b. Sharing: Confidential data may be shared among the NYU community. It may
be released publicly only according to well-defined business processes, and
with the permission of the data steward.
c. Retention: Confidential data should only be stored for as long as is necessary
to accomplish the documented business process.
2. Requirements for Handling Protected Data
a. Access control: Access to protected data must be provided on a least-privilege basis.
No person or system should be given access to the data unless required by business
process. In such cases where access is required, permission to use the data must be
granted by the Data Steward.
b. Sharing: Protected data may be shared among the among University employees
according to well-defined business process approved by the Data Steward. It may be
released publicly only according to well-defined business processes, and with the
permission of the Data Steward.
c. Retention: Protected data should only be stored for as long as is necessary to
accomplish the documented business process.
d. Incident Notification: If there is a potential security incident that may place
protected data at risk of unauthorized access, ITS Technology Security Services must
be notified.
3. Requirements for Handling Restricted Data
a. Collection: Restricted data should only be collected when all of the following
conditions are met:
i. The data is not available from another authoritative source;
ii. The data is required by business process; and
iii. You have permission to collect the data from the appropriate Data
Steward.
b. Access control: Individuals must be granted access to restricted data on a
least-privilege basis. No person or system may access the data unless
required by a documented business process. In such cases where access is
required, permission to use the data must be granted by the Data Steward.
c. Access auditing: Enable file access auditing to log access to files containing
restricted data.
d. Labeling: Portable media containing restricted data should be clearly marked.
e. Sharing: Access to restricted data can be granted only by a Data Steward. No
individual may share restricted data with another individual who has not
been granted access by a Data Steward.
f. Idle access: Devices which can be used to access restricted data must
automatically lock after some period of inactivity, through the use of
screensaver passwords, automatic logout, or similar controls.
g. Transit encryption: Restricted data must be encrypted during transmission
with a method that meets the following requirements.
i. Cryptographic algorithm(s) are listed in FIPS 140-2 Annex A, the list of
approved security functions.
ii. Cryptographic key lengths meet best practices for length, given
current computer processing capabilities.
iii. Both the source and destination of the transmission must be verified.

21
h. Storage encryption: Restricted data must be encrypted using strong, public
cryptographic algorithms and reasonable key lengths given current computer
processing capabilities. Keys must be stored securely, and access to them
provided on a least-privilege basis (see ISO 11568 for recommendations on
securing keys). If one-way hashing is used in lieu of reversible encryption,
salted hashes must be used. Possible encryption scenarios are:
i.
i. Encrypt files containing restricted data using different keys or
passwords than those used for system login.
ii. Encrypt data stored in databases at the column-level.
iii. In addition to file and/or database encryption, implement full-disk
encryption on portable devices containing restricted data.
j. Retention: Restricted data should only be stored for as long as is necessary to
accomplish the documented business process.
k. Destruction: When restricted data is no longer needed it should be destroyed
using methods that are resistant to data recovery attempts such as
cryptographic data destruction utilities, on-site physical device destruction,
or NAID certified data destruction service.
l. Incident notification: If there is a potential security incident which may place
restricted data at risk of unauthorized access, ITS Technology Security
Services must be notified: security@nyu.edu.
Definitions
Data Classification Table: Classifies data types that are commonly used at NYU
according to the impact to the University if they are disclosed without authorization.
Data Steward: Data Stewards are typically operational managers in a functional
area with day-to-day responsibilities for managing business processes and establishing the
business rules for the production transaction systems and are appointed by the respective
Data Trustees. The Data Steward will be responsible for developing an overall data access
plan following the categorization in the Reference for Data and System Classification.
Personal workstations: Personal workstations are typically accessed by a single
person at a time, and do not offer services to multiple account holders. These may be
laptops, desktops, or other portable computing devices, such as PDAs or smart phones.
Server: Servers are systems typically accessed by many remote users concurrently,
via the network services they provide, such as an e-mail server.
System: An information technology resource that can be classified and to which
security controls listed in a Security Measure may be applied. A system may be a
workstation, laptop, server, web application, database, or similar.
System classification: A framework for classifying the relative importance of NYU
systems based on their data processing and availability requirements.

Self-Check 4.2-2

A. Multiple Choice
Direction: Choose the best answer of the given choices. Use a separate sheet of
paper in answering.
22
1. Password characters must be at least
A. 12
B. 8
C. 10
D. 9
2. Create and maintain summary of the business process, major system components, and
network communications associated with a system.
A. Documentation
B. Summarization
C. Communication
D. Association
3. Defines the security measures that must be applied to High Criticality systems.
A. Intermediate System Safety Measures
B. Basic System Safety Measures
C. Advanced System Safety Measures
D. Low-end System Safety Measures
4. Portable media containing restricted data should be clearly marked.
A. Labeling
B. Tagging
C. Marking
D. Naming
5. Systems typically accessed by many remote users concurrently, via the network services
they provide, such as an e-mail server.
A. Netbook
B. Tablet
C. Work Station
D. Server
6. A framework for classifying the relative importance of NYU systems based on their data
processing and availability requirements.
A. Personal Workstations
B. Data Classification
C. System Classification
D. Security Measure
7. Are typically operational managers in a functional area with day-to-day responsibilities for
managing business processes?
A. Data Steward
B. Data Trustees
C. Processor
D. Registrar
8. A notification if there is a potential security incident which may place restricted data at
risk of unauthorized access, ITS Technology Security Services
A. Excess Notification
B. Telegram
C. Mail
D. Incident Notification
9. Define the minimum security requirements that must be applied to the data types
A. Low-end System Safety Measures
B. Basic System Safety Measures
23
C. Data Handling Safety Measures
D. Advanced System Safety Measures
10. Protection that allows only those incoming connections necessary to fulfill the business
need of that system.
A. Password
B. Firewall
C. Anti-virus
D. Workstation

Information Sheet 4.2-3

DIAGNOSE AND IDENTIFY FAULTY SYSTEMS AND CABLES

Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Identify and diagnosefaulty systems and cables.

Introduction:
Many of these suggestions are common-sense answers, rather than complex technical
procedures. Don't overlook them; otherwise you can spend hours tracing a circuit or trying to find a
bad connection just because somebody has unplugged a cable.
Remember that a problem that appears in your network might really be located on one of
the computers or other devices connected to the network. In many cases, you will want to look for
problems in the Windows, Macintosh, or Linux/Unix operating system as well as on the network
itself.
Steps on how to diagnose and identify faulty systems and cables:
1. Define the problem
The first step in solving a problem should be to identify the symptoms. Remember that
computers and networks don't break down completely at random. Every piece of information you
can find about a problem can help you isolate and solve it. Is the problem a failure to connect to a
particular computer through the network, or an error message, or a file transfer that takes longer
than usual? Is it limited to a single computer, or does it appear all over the network? Have any of the
lights on your network router, switch, or modem changed color or gone dark? Does the problem
occur when you are using a particular program or only when a certain desk lamp (or vacuum cleaner
24
or any other electrical device) is turned on? As you identify symptoms, make a list—either on paper
or in your mind.
If you see an error message, copy the exact text onto a piece of paper. You might have to
restart the computer or go to another computer to search for information, and you will need the
specific wording of the message. Don't ignore the cryptic code numbers or other apparently
unintelligible information. Even if the message means nothing to you, it could be the key to finding
the help you need.
Sometimes you can identify a pattern in the symptoms. When more than one user reports
the same problem, ask yourself what those users have in common: Are they all trying to use the
printer or connect to the Internet at the same time? Are they connected to the network by Ethernet
cables or Wi-Fi? Does the problem happen at the same time every day?
If you're lucky, defining the problem can tell you enough to fix it. For example, if the Power
LED indicator light on your modem is off, that's a good indication that the power cable is unplugged,
either at the wall outlet or on the modem itself. If everybody has trouble connecting to the Internet
during a rainstorm, maybe water is leaking into the telephone cable that carries your Internet
connection from the utility pole to your house.
More often, your list of symptoms will be a starting point that you can use to search for
more information. As you analyze the problem, ask yourself these questions:

What caused the problem? Did it occur when you or another user ran a specific program or
tried to connect? Does the problem seem to be related to some other action? If you try the same
action again, does the same problem occur? Did it first appear when you turned on a computer?
What has changed? Have you installed new hardware on the network or loaded new
software on the server or another computer? Did you recently update the router's firmware? Have
you made any other change to the network or another connected computer, even if the change
seems unrelated to the problem?
What else happened? Have you noticed any other problems or unexpected events? Has
another network user experienced a similar problem at about the same time?
Is this a new problem? Have you ever experienced this problem or something similar
before?
2. Look for simple solutions first
Look for easy solutions before you start to tear apart hardware or run complex
software diagnostic routines. Nothing is more aggravating than spending several hours running
detailed troubleshooting procedures, only to discover that restarting a computer or flipping a switch
is all that was needed to fix the problem.
Restart everything
The first thing to try when an otherwise unexplainable problem occurs is to turn off each
network component—one at a time—wait a few seconds, and then turn it back on again. Sometimes
that's all you need to do to clear a program or a chunk of memory that is stuck on the wrong setting
and return it to the correct value. If possible, use the operating system's shut-down process to turn
off the computer in an orderly manner; don't use the power switch or reset button unless the
computer won't respond to a mouse or keyboard command.
NOTE: Don't turn off your computer until you have copied the text of any error messages on
the screen. Sometimes the same problem will produce a different message after you restart (or none
at all), and the text of the original message might be a useful troubleshooting tool.

25
When you restart a computer, don't use the Restart option; that can leave some settings at
the same values rather than resetting them to the default startup configuration. You should turn off
the computer completely, count to ten, and then turn it back on.
If the problem continues after you restart the computer, try restarting the modem, Wi-Fi
access point, or network router. If a device doesn't have an on/off switch, disconnect the power
cable, wait a few seconds, and plug it back in. After you restart each device, check to find out if the
problem still exists. If the problem still occurs, move on to the next device.
3. Check the plugs and cables
If a single computer can't connect to the network, confirm that the physical cables providing
those connections are not unplugged. Be sure to check both ends of each cable. If the whole
network can't find the Internet, check the cables connected to the modem. If possible, examine the
cable itself to make sure it hasn't been cut someplace in the middle.
Almost all routers, switches, modems, and network adapters have LED indicators that light
when they detect a live connection. If one or more of these LEDs has gone dark, check the
connection.
Most data plugs and sockets maintain solid connections, but it's possible that a plug might
have come loose without separating itself from the socket, or a wire inside the plug might have a
bad contact. If you suspect a loose connection, try wiggling the cable while you watch the LED
indicator that corresponds to that socket. If the LED lights and goes dark as you shake the cable, try a
different cable.
If you can't connect through a newly installed wall outlet, make sure the wires inside the
outlet are connected to the correct terminals at both ends of the cable inside the wall (at the outlet
and at the data center).
To quickly confirm that data is passing through the network to and from each computer, use
the tools supplied with the computer's operating system to display network activity. If the computer
reports that no link is available, a cable is disconnected or the network adapter or hub has a
problem.
4. Check the AC power
Every device connected to the network probably has an LED indicator that lights when the
device is connected to AC power. When a connection fails, look at the front of each device to
confirm the power light is on. If it's not, check the device's power switch (if it has one) and both the
plug at the back of the device and the plug or power supply that plugs into the AC outlet.
If you use a power strip or an uninterruptible power supply, make sure that the master
power switch is turned on and the power unit is plugged into an AC outlet.
If the network fails but your computer still works, a fuse or circuit breaker might have blown
in the room containing the network switch, router, or other control device.
5. Check the settings and options
Look for other switches and settings that might interfere with a device's operation. For
example, make sure that the network printer is online and that no Error LED indicators or messages
are visible in the control panel. Or if you're having trouble with a Wi-Fi connection, make sure your
computer hasn't associated itself with the "wrong" base station and connected to one of your
neighbors' networks instead of your own.
6. Isolate the problem
If your search for simple solutions to a network problem or failure doesn't produce an
answer, the next step is to identify the physical location where the problem is occurring. Although
it's easy (and often appropriate) to think about a network as an amorphous cloud that exists

26
everywhere at the same time, when you're looking for a specific point of failure, you must replace
that cloud with a detailed map that shows every component and connection. If you don't already
have a network diagram in your files, consider drawing one now.
Most problems offer some kind of hint about their location: If just one computer's
connection to the network has failed, but all the others work properly, the problem is probably in
that computer or its network link. But if nobody on the network can connect to any other computer
or to the Internet, the problem is probably in a server, router, or other central device. Start
searching for the source of a problem in the most logical device.
If you have a hardware problem, it's often effective to isolate the problem by replacing
individual components and cables one at a time until the problem goes away. If the problem
disappears when you install a replacement, that's a good indication that the original part was the
source of the problem. If the replacement is a relatively expensive item like a router or a printer, you
might want to send it back to the manufacturer for replacement or repair, especially if it's under
warranty. But if you replace a cheap part like a cable or a network interface card, it's often easier to
just throw it away and buy a new one.
Similar techniques can work with software. If a computer connection fails, try shutting down
each program running on that computer, one at a time, and then try to reestablish the connection. If
you recently installed a new program, driver, or update, try uninstalling the new software and test
the connection again. If the connection works, the conflict is between the new software and your
network connection or device driver. In Windows, try restarting the computer in Safe Mode and re-
establishing the connection; if it works in Safe Mode, you know that the Windows operating system
is not the source of the problem.

7. Retrace your steps

Even if a network problem appears without warning, the problem was probably caused by
something that has changed within the hardware or software. Therefore repeating your steps can
often help identify and solve it.
8. Keep notes
As you try to identify and solve a problem, keep a record of what you have done. Describe
each problem you encounter and what you did to fix it in a simple log or notebook. Note
configuration settings, websites that provide useful information, and the exact location of any
options or control programs that caused the problem or helped solve it. Keep this on paper, rather
than in a text file stored on the computer, so you will be able to access it if the computer breaks
down again.
If the same problem appears again, your log will tell you exactly what you did to fix it the
first time; rather than stepping through all the same unproductive troubleshooting techniques again,
you can go directly to the correct solution.
One excellent approach is to keep a network notebook in a loose-leaf binder. Among other
things, your notebook should include the following:
 The configuration settings and passwords for each modem, router, Wi-Fi access point, and
other device connected to the network.
 The numeric IP addresses for your Internet connection, DNS servers, default gateway, and
subnet mask.
 The numeric addresses used by your LAN.
 The make, model, serial number, and MAC address (if you can find them) of each hub,
switch, router, modem, Wi-Fi access point, network adapter, and other network device.
 A list of channel numbers, SSIDs, and passwords for your Wi-Fi network.
 The telephone numbers and other contact information for your ISP and the telephone
company or cable service that supplies your physical Internet connection.
27
 Instruction manuals for each modem, router, access point, or other network device.
 A list of your network's users, including names, telephone numbers, and logins.
 A diagram that shows how each computer and other device connects to the network.
 Passwords for each network server.
 Account names and passwords for your email service.
 A list of rooms that have wall-mounted network outlets and the label on the other end of
each cable.
 A log of adds, moves, changes, and deletions to your network.
 A log of repairs, including:

o The date and time each problem appeared.


o A description of each problem.
 What you did to fix the problem.
 The time and date of each call to a technical support center.
 The name and telephone number of each technical support person you talk to.
 The trouble ticket number or case number assigned to the problem by each support center.

Self-Check 4.2-3

ENUMERATION:

Direction: Enumerate at least 5 steps on how to diagnose and identify faulty systems and cables.

1.

2.

3.

4.

5.

28
Did the Trainee overall performance meet the required
evidence/standard?
Yes No

Information Sheet 4.2-4


DIAGNOSTICS SOFTWARE

Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Know and run diagnostics software.

Introduction:
Network troubleshooting tools are a necessity for every network administrator.
When getting started in the networking field, it is important to amass a number of tools that
can be used to troubleshoot a variety of different network conditions.
While it is true that the use of specific tools can be subjective and at the discretion of
the engineer, the selection of tools in this article has been made based on their generality
and common use. This article reviews the top 10 basic tools that can help you troubleshoot
most networking issues.
Ping
The most commonly used network tool is the ping utility. This utility is used to
provide a basic connectivity test between the requesting host and a destination host. This is
done by using the Internet Control Message Protocol (ICMP) which has the ability to send an
echo packet to a destination host and a mechanism to listen for a response from this host.
Simply stated, if the requesting host receives a response from the destination host, this host
is reachable. This utility is commonly used to provide a basic picture of where a specific
networking problem may exist. For example, if an Internet connection is down at an office,
the ping utility can be used to figure out whether the problem exists within the office or
within the network of the Internet provider. Figure 1 below shows an example of the ping
utility being used to obtain the reachability status of the locally connected router.

Figure 1: Ping utility


Tracert/traceroute
Typically, once the ping utility has been used to determine basic connectivity, the
tracert/traceroute utility can used to determine more specific information about the path to
29
the destination host including the route the packet takes and the response time of these
intermediate hosts. Figure 2 below shows an example of the tracert utility being used to find
the path from a host inside an office to www.google.com. The tracert utility and traceroute
utilities perform the same function but operate on different operating systems, Tracert for
Windows machines and traceroute for Linux/*nix based machines.

Figure 2: Tracert/traceroute utility


Ipconfig/ifconfig
One of the most important things that must be completed when troubleshooting a
networking issue is to find out the specific IP configuration of the variously affected hosts.
Sometimes this information is already known when addressing is configured statically, but
when a dynamic addressing method is used, the IP address of each host can potentially
change often. The utilities that can be used to find out this IP configuration information
include the ipconfig utility on Windows machines and the ifconfig utility on Linux/*nix based
machines. Figure 3 below shows an example of the ifconfig utility showing the IP
configuration information of a queries host.

Figure 3: Ifconfig utility


Nslookup
Some of the most common networking issues revolve around issues with Dynamic
Name System (DNS) address resolution issues. DNS is used by everyone using the Internet to
resolve commonly known domain names (i.e. google.com) to commonly unknown IP
addresses (i.e. 74.125.115.147). When this system does not work, most of the functionality
that people are used to goes away, as there is no way to resolve this information. The
nslookup utility can be used to lookup the specific IP address (es) associated with a domain
name. If this utility is unable to resolve this information, there is a DNS issue. Along with
simple lookup, the nslookup utility is able to query specific DNS servers to determine an

30
issue with the default DNS servers configured on a host. Figure 4 below shows an example
of how the nslookup utility can be used to query the associated IP address information.

Figure 4: Nslookup utility


Netstat
Often, one of the things that are required to be figured out is the current state of the
active network connections on a host. This is very important information to find for a variety
of reasons. For example, when verifying the status of a listening port on a host or to check
and see what remote hosts are connected to a local host on a specific port. It is also possible
to use the netstat utility to determine which services on a host that is associated with
specific active ports. Figure 5 below shows an example of the netstat utility being used to
display the currently active ports on a Linux machine.

Figure 5: Netstat utility


PuTTY/Tera Term
When connecting to a variety of different types of equipment, a telnet, SSH or serial
client is required; when this is required both the puTTY and Tera Term programs are able to
provide these functionalities. The selection of one over the other is strictly a personal
preference. Figures 6 and 7 below show both puTTY and Tera Term being used to connect to
a host via SSH.

31
Figure 6: PuTTY

Figure 7: Tera Term


Subnet and IP Calculator
One of the most important tools in the belt of a junior network engineer is an IP
network calculator. These can be used to unsure a correct IP address selection and with this
a correct IP address configuration. While this type of tool is used by senior level network
engineers, much of the information obtained from the tool becomes simpler to calculate the
longer and more experience you have in the field. Two of the more commonly used free IP
calculators include Wildpackets (Bitcricket) Network Calculator and Solarwinds Advanced
Subnet Calculator which can be found at the links below.

32
Figure 8: Subnet calculator

Speedtest.net/pingtest.net
A very easy test that can be used to both determine the Internet bandwidth
available to a specific host and to determine the quality of an Internet connection is the use
of the tools available at the speedtest.net and pingtest.net websites. The speedtest.net site
provides the ability to determine the amount of bandwidth that is available to a specific
host at a specific point in time; this is often a good tool to use when measuring how long it is
going to take to upload or download information from a local to remote host. This
measurement can also be used to determine whether the connection is offering the amount
of bandwidth that was purchased from the Internet provider; keep in mind however that
some amount of bandwidth difference is expected between the quoted bandwidth
purchased and the measured bandwidth. The pingtest.net website is used to determine the
quality of the connection by measuring the ping response times and jitter amounts over a
short period of time. This information can be used to determine a likelihood of how well the
measured connection will deal with certain types of high demand traffic like Voice over IP
(VoIP) or gaming. Figure 9 and 10 below show example output from both of these sites.

33
Figure 9: Speedtest

Figure 10: Pingtest

Pathping/mtr
In an effort to take advantage of the benefits of both the ping and tracert/traceroute
commands, the pathping and mtr utilities were developed. Both of these tools take the
functionality and information that can be obtained from these types of tools and provide a
more detailed single picture of the path characteristics from a specific host to a specific
destination. Figure 11 and 12 below show examples of these two tools and what
information they provide.

34
Figure 11: Pat

Figure 12: Mtr

35
Route
The last of the tools covered in this article is the route utility. This utility is used to
display the current status of the routing table on a host. While the use of the route utility is
limited in common situations where the host only has a single IP address with a single
gateway, it is vital in other situations where multiple IP address and multiple gateways are
available. Figure 13 below shows an example of the route utility being used on a Windows
machine.

Figure 13: Route Utility

Summary
As with any job, the type of tools that are quickly available can greatly influence the
amount of time that it takes to complete a job. When troubleshooting a networking issue,
the amount of time that it takes to find and fix a problem directly affect the wasted costs
that it causes to any system relying on the network. This article has taken a look at the 10
most commonly used tools that can help in ensuring that the time that it takes to find and
fix a problem is as short as possible. I hope the information in this article can be helpful in
future troubleshooting.

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 36 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
Self-Check 4.2-4
True or False:
1. DNS is used by everyone using the Internet to resolve commonly known
domain names to commonly unknown IP addresses
2. One of the most important tools in the belt of a junior network engineer is
an IP network calculator.
3. The most commonly used network tool is the ping utility.
4. In an effort to take advantage of the benefits of both the ping and
tracer/traceroute commands, the pathping and mtr utilities were
developed.
5. ICMP means Internet Control Message Protocol

Information Sheet 4.2-5

REPAIR OR REPLACE FAULTY SYSTEMS AND CABLES

Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Repair or replace faulty systems and cables.
2. Know the specific softwares and hardwares needed.

Introduction:
SOFTWARES
Looking for some network utilities? There are plenty of options, but don't waste time on the
bulky and more heavyweight contenders, unless you really need them - our Tiny Tools may
provide all you need.

If you'd like to find out what software is installed across your network, for instance, you
could install some expensive commercial solution, complete with database, analytical tools and
more. But we've found a 160KB program which will scan all your network PCs for no cost at all.

And capturing network traffic normally involves installing complex utilities, and a supporting
library or two. But if you can get by with raw sockets then the 20KB RawCap will get you started
in seconds.

This is just the start, though. Other tools in the list will help with performance issues,
network management, security, file sharing and more. And they're all free, and very lightweight:
even installing all ten will use less than 7MB hard drive space.\

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 37 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
1. Network Stuff 3.0.9 - 1.34 MB

Figuring out what's happening on your network normally involves a whole library of tools,
yet somehow Network Stuff has managed to cram them all into a single portable application.
It's strong on the basics, for instance: the program can display your IP addresses (both local
and external), scan your network for other systems, reveal MAC addresses and run graphical ping
or traceroutes to the addresses you specify.
But Network Stuff can also display all the currently open network and internet connections;
use built-in Whois and DNS tools to get more information on IP addresses; remotely wake up or
shut down other systems on your network, and the list goes on.
The only problem here is complexity, as there's a lot to explore. If you get lost, though, check
the author's website for some helpful guidance.
2. DNS Jumper 1.0.5 - 812KB

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 38 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
Changing your DNS settings can improve your online security, perhaps give you access to
sites you couldn't reach otherwise, and improve your browsing speed. Windows doesn't exactly
make this easy, but that's where DNS Jumper comes in.
This tiny tool comes with a lengthy list of DNS alternatives. If you're not sure which is best
then it can test them all to find the fastest. When you're happy, it's able to apply your preferred
DNS settings in a click, and the program can even backup and restore your original settings to
avoid the chance of any problems.
3. RawCap 0.1.4.0 - 20KB

Packet sniffing - capturing network traffic for later analysis - can be an invaluable way to
diagnose tricky network problems, both hardware and software. And there are few easier ways
to get the job done than with the super-lightweight RawCap.
The program is a command line tool, but it's also straightforward to run from Explorer. Just
double-click the file, choose your network interface, enter an output file name, and that's it - the
program will capture raw packets and save them in a .pcap file.
Unsurprisingly for a 20KB tool, there's no help here to analyse the finished results. Just
opening the file in Notepad may be enough, though if you're looking for plain text. And there's
no doubting RawCap's simplicity: it doesn't need any other components or DLLs beyond the .NET
Framework 2.0.
4. Fast Software Audit 1.0.0 - 160 KB

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 39 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
If you manage a PC network then you'll know it's important to keep track of the software
your users are installing. You could check this manually, or invest in some big corporate
inventory tool, but the ultra-compact Fast Software Audit - portable and only 160KB - could be
enough. Just enter the network names of the computers you'd like to audit and it'll quickly scan
them, revealing the list of installed applications. (Though please note your systems will need the
Remote Registry service to be running for this to work.)

5. CloseTheDoor 0.2.1 portable - 484 KB

When you want to secure your network it's important to understand which processes are
listening for connections, and the portable Close The Door will tell you everything you want to
know: the network interface, ports, protocols, process, related Windows services and a whole lot
more.

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 40 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
All this information can seem baffling at first, but Close The Door can help. Right-click
something and you'll find options to search the web for useful information on the process, port
and how it's generally used.
And if you do identify malware then Close The Door can even shut down that process,
though be careful - if you accidentally terminate something important then you might crash your
PC.

6. Blue Life Hosts Editor 1.0 - 388KB

The HOSTS file can be used to tell Windows the IP address of various network or Internet
resources, so improving performance or allowing you to block some sites or resources entirely.
Windows doesn't make it particularly easy to access HOSTS, unfortunately, but the Blue Life
Hosts Editor probably provides everything you'll need. Just launch the program to view your
current HOSTS file, then add or remove entries to suit your needs, and save the results when
you're finished: easy.
Beware, though, if you try to block a site you've just visited then it'll appear not to work, as
Windows will cache the previous IP address. Save the new file, click "Flush DNS" and everything
should now work just as you expect.

7. Network Activity Indicator 1.6 -1.03 MB

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 41 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
We often miss the old Windows XP network icon, where the monitors flashed to show
network activity. But now there's an easy way to get it back. Install Network Activity
Indicator and it'll immediately restore the same icon to your system tray. (Although Windows
Vista/Windows 7 will often hide it again: click the arrow to the left of the system tray area, click
Customize and set "Network Activity Indicator" to "Show icon and notifications to bring it back.)
This isn't just a cosmetic tool, though. You can also customize the program to flash only for
particular network traffic (TCP, UDP, ICMP), or on specific network interfaces. And it's even able
to provide details on network traffic (MB's uploaded and downloaded), and a host of useful
statistics (open connections, failed connection attempts, errors received, more).
8. Remote Reboot X 2012 - 428KB

Network management can be easier than you think. If you've got a copy of Remote Reboot X to
hand, anyway.
Add the names of your network computers to the program, and in click or two you can then
remotely shut them down or wake them up again, all from the comfort of your own PC.

You can even automate the process, for example having a PC woken up just after lunch so it's
ready and waiting when you return.
And there are even system information options to, say, retrieve the free C: drive space on one of
the systems, or its list of automatic but stopped services (very useful for troubleshooting). Not
bad at all for a portable tool under 500KB in size
9. HFS 2.2f - 560KB

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 42 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
When you want others on the network to be able to access your files then you'll probably
start by sharing folders. But if you can't get that working as you like then setting up a web server
with HFS could be a simpler approach.
There's no complex configuration involved, for instance - just run the program and it's ready
to go.
Drag and drop the files you'd like to share and they'll be accessible within seconds.
And yet there are plenty more advanced options, if you need them. Worried about the
program taking up all your bandwidth, for instance? Just limit the download speed to suit your
requirements - it's all very easy.

10. Simple IP Config 2.3 - 1.32MB

If you regularly use a laptop on a couple of networks - home and work, say - then the chances
are you probably waste a lot of time manually adjusting a host of low-level network settings. But
it doesn't have to be that way.
Simple IP Config allows you to create separate network profiles for home, work, and anywhere
else you like. Each of these can be used to store your IP Address, Subnet Mask, Gateway, DNS
Server, and so on. And switching from one profile to another is as simple as selecting it, and
clicking "Apply" - no messing around in Control Panel is required at all.

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 43 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
HARDWARES

 UTP CABLE

UTP, or Unshielded Twisted Pair, is a type of cable


used in telecommunications and computer networks.
It consists of different numbers of copper wire that
have been twisted into matching pair. It differs from
screened and shielded twisted pair, in that the
individual pair are not protected with additional
protection from interference. Each copper wire is
insulated, and the groups of twisted pair have a
sheathing holding them together, but no additional
insulation is provided. UTP comes in many different types and sizes, and is primarily used as node
cabling, meaning it runs from a backbone unit to the individual components on the network.

 RJ-45
RJ45 is a standard type of connector for network cables. RJ45
connectors are most commonly seen with Ethernet cables and
networks.

RJ45 connectors feature eight pins to which the wire strands


of a cable interface electrically. Standard RJ-45 pinouts define
the arrangement of the individual wires needed when
attaching connectors to a cable.

Several other kinds of connectors closely resemble RJ45 and can be easily confused for each other.
The RJ-11 connectors used with telephone cables, for example, are only slightly smaller (narrower)
than RJ-45 connectors.

 CRIMPING TOOL
A crimping tool is a tool designed to crimp or connect a
connector to the end of a cable. For example, network
cables and phone cables are created using a crimping tool
to connect the RJ-45 and RJ-11 connectors to the end of
the cable. In the example picture below, this crimper is
capable of crimping a RJ-11 (6-Pin) and RJ-45 (8-Pin)
connectors and also includes a wire cutter near the
handles that can be used to cut phone or CAT5 cable.

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 44 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
To use this crimping tool, each wire is first placed into the connector. Once all the wires are in the
jack, the connector with wires are placed into the crimping tool, and the handles are squeezed
together. Crimping makes the plastic connector puncture and hold each of the wires, which prevents
the wires from falling out and for data to be transmitted from the connector to each of the wires.

 LAN TESTER

The LAN Tester assists in the installation and control of networks.


This LAN Tester can be used in the workplace and is ideal for
technical service professionals and network administrators. The LAN
Tester determines the IP address, identifies polarity, identifies
connected port and link connectivity. Furthermore, the LAN Tester
can test fibre optic cables. This LAN Tester shows cable break points,
incorrect connections in fibre optic lines. One LAN Tester is in a
large pen design. With the LAN Tester you can test the state of LAN
connections to hubs and switches and can analyze the traffic of a network and which IP it
generates.

 LAN CARD
The LAN (Local Area Network) card is a 'door' to the network
from a computer. Any type of network activity requires a LAN
card: the Internet, network printer, connecting computers
together, and so on. Today many devices contain a network
card, including televisions for their Internet apps, Blu-ray
players, mobile phones, VoIP, desk phones, and even
refrigerators. LAN cards are hardware devices that can be added to a computer, or they can be
integrated into the main hardware of the computer.

 HUB, SWITCH HUB

Short for port-switching hub, a special type of hub that


forwards packets to the appropriate port based on the
packet's address. Conventional hubs simply rebroadcast
every packet to every port. Since switching hubs forward
each packet only to the required port, they provide much
better performance. Most switching hubs also support load
balancing, so that ports are dynamically reassigned to
different LAN segments based on traffic patterns.

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 45 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
Some newer switching hubs support both traditional Ethernet (10 Mbps) and Fast Ethernet (100
Mbps) ports. This enables the administrator to establish a dedicated, Fast Ethernet channel for high-
traffic devices such as servers.

 ROUTER
Routers are small physical devices that join multiple networks
together. Technically, a router is a Layer 3 gateway device,
meaning that it connects two or more networks and that the
router operates at the network layer of the OSI model.

Home networks typically use a wireless or wired Internet


Protocol (IP) router, IP being the most common OSI network
layer protocol. An IP router such as a DSL or cable modem
broadband router joins the home's local area network (LAN) to the wide-area network (WAN) of the
Internet

TYPES OF UTP CABLE PINOUT AND COLOR CODING

Straight Cable
You usually use straight cable to connect different type of devices. This type of cable will be used
most of the time and can be used to:
1) Connect a computer to a switch/hub's normal port.
2) Connect a computer to a cable/DSL modem's LAN port.
3) Connect a router's WAN port to a cable/DSL modem's LAN port.
4) Connect a router's LAN port to a switch/hub's uplink port. (normally used for expanding network)
5) Connect 2 switches/hubs with one of the switch/hub using an uplink port and the other one using
normal port

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 46 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
Crossover Cable
Sometimes you will use crossover cable, it's usually used to connect same type of devices. A
crossover cable can be used to:
1) Connect 2 computers directly.
2) Connect a router's LAN port to a switch/hub's normal port. (normally used for expanding network)
3) Connect 2 switches/hubs by using normal port in both switches/hubs.

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 47 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
HOW TO CRIMP:

RJ-45 connectors are normally used in telephone and network cables. Occasionally they are
used for serial network connections. When the RJ-45 connectors first came into use, they were
primarily used for telephones. The great advances in technology created a need for another size
connector and the RJ-45 was adapted to fit. Today there are 2 different RJ-45 connector sizes
available, 1 for Cat 5 cable and 1 for Cat 6 cable. The user has to make sure they have the one suited
to their job. The easiest way to tell them apart is to compare them side by side. The Cat 6 connector
is larger than the Cat 5 connector. Below are instructions for crimping RJ-45 connectors to a cable.
1. Purchase your cable and your RJ-45
connectors. Most ethernet cable is sold on spools of
varying lengths, so you might have to measure and cut
the amount you need when you get home.

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 48 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
2. Strip 1 to 2 inches (2.5 to 5.1 cm) of the outer
skin at the end of the cable wire by making a shallow
cut in the skin with a utility knife. Run the knife
around the cable, and the jacket should slide off easily.
There will be 4 pairs of twisted wires exposed, each of
them a different color or color combination.

 Orange-white striped and solid orange

 Green-white striped and solid green

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 49 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
 Blue-white striped and solid blue

 Brown-white striped and solid brown

3. Fold each pair of wires backwards to expose the


core of the cable.

4. Cut off the core and discard.

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 50 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
5. Straighten the twisted wires using 2
pair of tweezers. Grasp a wire beneath a
bend with 1 pair of tweezers, and use the
other pair to gently straighten the bend. The
straighter your wires, the easier your job will
be.

6. Arrange the untwisted wires in a


row, placing them into the position,
running from right to left, in which they will
go into the RJ-45 connector:

 Orange with a white stripe

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 51 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
 Orange

 Green with a white stripe

 Blue

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 52 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
 Blue with a white strip

 Green

 Brown with a white stripe

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 53 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
 Brown

7. Trim the untwisted wires to a suitable


length by holding the RJ-45 connector next to
the wires. The insulation on the cable should
be just inside the bottom of the RJ-45
connector. The wires should be trimmed so
that they line up evenly with the top of the RJ-
45 connector.

 Trim the wires in small increments,

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 54 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
checking frequently to ensure a correct fit. It's better to cut the untwisted wires a few times
than have to go back and start all over again because you trimmed off too much.

8. Insert the wires into the RJ-45 connector, making


sure that they stay aligned and each color goes into
its appropriate channel. Make sure that each wire
goes all the way to the top of the RJ-45 connector. If
you don't make these checks, you will find that your
newly crimped RJ-45 connector is useless.

9. Use the crimping tool to crimp the RJ-45


connector to the cable by pressing the jacket and
cable into the connector so that the wedge at the
bottom of the connector is pressed into the jacket.
Recrimp the cable once more to ensure proper
connection
10. Follow the instructions above to crimp an RJ-45
connector to the opposite end of the cable.

11. Use a cable tester to assure that your


cable is working properly when both ends are
crimped.

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 55 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
Self-Check 4.2-5
True or False
1. Routers are small physical devices that join multiple networks
together.
2. UTP means Unshielded Twisted Protocol
3. The LAN (Local Area Network) card is a ‘window' to the network from a
computer.
4. The LAN Tester determines the IP address, identifies polarity, and
identifies connected port and link connectivity.
5. Crossover Cable is use to connect 2 computers directly.
A. Multiple Choices
Direction: Choose the best answer of the given choices. Use a separate sheet of paper in
answering.
1. A tool designed to crimp or connect a connector to the end of a cable.
A. RJ 45
B. Crimping Tool
C. Routing Tool
D. LAN Card
2. RJ 45 is also known as
A. Routing Jump 45
B. Routing Jack 45
C. Registered James 45
D. Registered Jack 45
3. Short for port-switching hub
A. Hub
B. Router
C. Modem
D. Crimper
4. Are hardware devices that can be added to a computer, or they can be integrated into the
main hardware of the computer.
A. LAN Tester
B. LAN Card
C. LAN Device
D. LAN Router
5. Connect a computer to a switch/hub's normal port.
A. Crossover Cable
B. Routing Cable
C. Straight Cable
D. Computer
CBLM on CSS NC II Date Developed: Document No.
JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 56 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
Information Sheet 4.2-6
BURN-IN OR TEST REPAIRED OR
REPLACED NETWORK SYSTEM

Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Test repaired or replaced network system
2. Learn how to burn-in

Introduction:

BURN-IN
Burn-in is a test in which a system or component is made to run for an extended
period of time to detect problems.
Burn-in may be conducted to ensure that a device or system functions properly
before it leaves the manufacturing plant or may be part of a repair or maintenance routine.
An end user may use a burn-in process to ensure that new equipment is functioning
properly, for example, running a new computer for several days before committing it to
serious use. If any of the components are defective the problem will usually show up within
this initial testing time frame.
When a faulty device or system is brought into a repair facility, the malfunction
might not occur until the hardware has been warmed or cooled to a certain temperature.
Humidity may also be a factor. Under these circumstances, a burn-in must be performed and
environmental parameters varied until the problem is found. The equipment is powered-up
and then left to run continuously for hours (or sometimes for days) until the malfunction is
observed and can be diagnosed.
PassMark BurnInTest is a software tool that allows all the major sub-systems of a
computer to be simultaneously stress tested for endurance, reliability and stability.
 Assists in PC Troubleshooting and diagnostics.
 Avoid delivering dead on arrival and faulty hardware to your
customers.
• Dramatically reduce your test times with simultaneous testing.
• Build your image as a supplier of quality systems.
• Avoid costly downtime, system rebuilds and lost data.
• Test the stability of a system after configuration changes or hardware
upgrades (critical for overclocking and system upgrades).
• The hottest, fastest CPU Burn In tool around! (Heat testing)
Configuration files
What are configuration files?

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 57 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
A configuration file contains all the parameters available in the test duty cycles and
test preferences windows. That is to say it contains information about which tests to
perform, the duty cycle setting for each test and other preferences, such as drive letters and
device names.

Configuration files end in the extension „bitcfg. For example the current
configuration is stored automatically in the file „LastUsed.bitcfg‟, which is located in the
BurnInTest installation directory. Configuration files aid with the automation of the testing
process and also allow the maintenance of several different test configurations. For example
a configuration file could be created for each different model ofcomputer to be tested.
By saving a particular configuration to a file, you can avoid resetting all the
parameters each time BurnInTest is used.
How are configuration files created
A configuration file can be created by first selecting all the required settings in the
test duty cycles and testpreferences windows, then use the menu option, „Save Test
Configuration As‟. This will create a newconfiguration file in the location selected by the
user.
After the configuration files have been created they can be transferred between
computers where BurnInTestis installed.
How are configuration files used
Files can be used in three ways
1. They can be loaded from the command line.
2. They can be loaded by using the menu option, „Load Test Configuration‟.
3. They can be loaded by a BurnInTest script file. A script file can load multiple
test configurationsduring the one test run.
CBLM on CSS NC II Date Developed: Document No.
JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 58 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
For the purpose of test automation options 2 and 3 are of most interest.
Selecting a test configuration
It is possible to adjust a wide range of values from the „test duty cycles‟ and “test
preferences‟ windows. The following general tips can be used to help select the right
combination of tests to perform and their intensity level.
 Only turn on tests for which there is some corresponding hardware. For example,
there is obviously no point in turning on the tape drive test if there is no tape drive
installed.
 If the disk drive has a fairly large capacity, you will probably need to set the duty
cycle for the disk test to 100% in order to make sure the maximum amount of disk
surface is tested over several cycles.
 Monitor the CPU utilization during the 1st couple of test runs. If the CPU is not
running at 100% all the time, raise the duty cycle of one or more tests. Conversely, if
the CPU consistently runs at 100%, lower the duty cycle of one or more tests.
 If the machine has booted to Windows there is a reasonable chance that the CPU is
working reasonably reliably. Give preference to the RAM test over the CPU test when
setting the duty cycle. RAM tends to fail more often than a CPU.
 Don’t be scared of pushing the machine too hard. It’s better that it fails on the
production line than after you have shipped it to your customer.
You should test for at least a few hours. An absolute minimum is one complete cycle of the
disk test. Leaving BurnInTest to run on the PC overnight should give the machine a good
work out.
Carrying out tasks before the test run

From the Pre-Test tab in the preferences window, BurnInTest allows the user to
select the option of running an external application before the test run proper starts. For
instance you may want to launch a report of the previous test run before beginning the
current one. The test run proper will not begin until the external application is exited.
Carrying out tasks after the test run
CBLM on CSS NC II Date Developed: Document No.
JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 59 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
From the Timers tab in the preferences window, it is possible to define certain actions to
take on successful or unsuccessful test completion. In each case (successful or unsuccessful
completion), there are three options.
1. Stop the tests normally (this is the default behavior).
2. Stop the tests, Close BurnInTest and run a specified external application. This
could be used, for example, to call an application or batch file that would clean
up the hard disk after the completion of testing.
3. Reboot the PC using the current Reboot options. This option uses the PassMark
Rebooter application to perform the reboot. If used in conjunction with a startup
shortcut to BurnInTest, it’s possible to create a reboot cycle. See the „Rebooter‟
section below for more details.

As each environment will be different, the function of an external batch file will vary
between companies.Some possibilities are described below.
Example Autostop actions
 Copy the log files (see below) to a network drive
 Call an external program to sound an audible alarm
 Start another test program to run a sequence of tests
 Call a batch file to clean up the hard disk of the machine
Report information - (Machine identification)
General report information
The identity of the machine can be entered in to the „Machine Identity‟ window,
(accessible from the Edit menu in BurnInTest).

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 60 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
Certificate report information
The fields in this section allow the entry of customer specific information for the
system under test. This information is used in the Customer Test Certificate report.

This information can be saved to a file using the „Save as Defaults‟ button. The name
of the file is always “machineid.dat‟. This file will be saved in the BurnInTest installation
directory.Each time BurnInTest starts it checks to see if this file exists on the disk and loads
the contents of the file.
Test reporting - logging to disk
BurnInTest can create report files automatically. Using the setting in the preferences dialog
the user can select:
 If logging to disk is on or off.
 The log file directory and base file name. Note: Log files are prefixed as described
below and suffixed with the created date and time.
 The required detail level of the log file. Either a Results Summary or Normal
(recommended).
 Whether a very detailed activity trace log is produced and the level. It is
recommended that No trace log be specified under normal circumstances.
 The approximate size of the log (and trace) files.
 The format of the log file. Plain ASCII text, HTML web page or HTML Customer
certificate..
 A prefix to the log file name, including a number of system Environment variables.
 Whether to clear all log files at the start of each test run, or to accumulate the log
files over test runs.
Note: Log entries are written to disk in real time. You can also log periodic interim result
reports.
The log file format can be ASCII (plain text), HTML (for the web) or an HTML
Customer certificate (1 page HTML report for your customer). Log files can be opened in a
text editor or a word processor application. See the example reports Appendix 1. HTML files
CBLM on CSS NC II Date Developed: Document No.
JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 61 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
can be opened in a browser and posted on the web. Both formats can be attached to E-Mail
messages.

New log/trace files will be created when BurnInTest is started and logging is turned
on, or any logging options are changed (eg. Turned on, Log directory changed, format
changed). If BurnInTest is restarted with scripting commands of REBOOT or REBOOTEND,
entries will be concatenated to the previous log file (ie. That relate to the same script being
run).
BurnInTest will automatically modify the file name selected to include the current
date and time, e.g. If you use the file c:\temp\logfile.txt as your log directory then
BurnInTest will create files like,
c:\temp\logfile_081209_113751.log
or
c:\temp\logfile_081209_113751.trace (for a trace file)
051209 is the date (in Year Month Day format), the 9th of December 2008 in this case.
113751 is the time (in Hour Minute Second format)
Logging to disk may be useful if your system is unstable. You could create a log, and
then even if the computer crashed, you would have a record of how much testing was
completed before the crash. Logging can also be used as a method of keeping quality
assurance records in a manufacturing environment.
Installation and execution options
There are several different ways to install and run BurnInTest. Some of them are more
suited to a mass production environment.

Standard Install
This is what happens when the standard package is installed. The files are expanded from
the compressed archive and the install program is run to prompt the user for various

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 62 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
information, like the installation directory. Files are then copied from the archive to the
installation directory and some information is written to the registry to support the security
software used to protect BurnInTest and the uninstallation of the package. After a standard
install, uninstallation should be done from the Add / Remove programs icon in the Windows
control panel. In a mass production environment this option can be time consuming.
Run from a removable drive or network drive
The installation step can be avoided entirely by running BurnInTest directly from a CD,
USB drive or Network drive. There are some issues with each method that bear
consideration.
 Running from a CD
Normally BurnInTest uses the BurnInTest installation directory to store log files and
configuration settings. Running BurnInTest from a read only CD will mean that it will not be
possible to create / update these files. To run BurnInTest from a CD when no Operating
System is installed, please see the section on “Running BurnInTest from a bootable CD”
 Running from a USB Key drive
This method is recommended over running BurnInTest from CD as configuration and log files
can be saved.
 Running from a Network drive
This can be a viable option but if multiple instances of BurnInTest are started from the same
network directory at the same time, there is a risk that configuration and log files will be
overwritten by the various different instances. BurnInTest also uses a custom driver for
certain purposes, such as accessing Parallel ports. BurnInTest will not have sufficient
privileges to install the driver from a network.
 Running from a Floppy disk
From V5.0, BurnInTest is too large to run be from a floppy.
Examples
Example 1: Use the following process to run BurnInTest from a CD or USB key drive.
It is possible to install BurnInTest Professional onto a USB drive or CD/DVD/BD such that no
installation is required on the test system. This can be useful in a number of scenarios, such
as field staff testing PC's without installing BurnInTest on the test system.
When running BurnInTest this way, there will be no files left on the PC after BurnInTest has
finished. The procedure is the same for optical disks, but as it is not writeable for log files,
logging should be either turned off or specified to be on a writeable drive . You can also get
more sophisticated by having multiple test configurations, there is some information about
this in the help file.
When BurnInTest is run from a removable drive when installed in this way, the
default directory for the users files (like reports and the configuration file) is the BurnInTest
directory, rather than the normal default directory of the users Documents directory. The
command line parameter "/p" required in V5.x in this scenario is now turned on
automatically, and is no longer required for a USB drive installation.
Installing BurnInTest to a USB drivePassMark™
This installation process can be performed for a USB drive installation (any writable drive)
using the menu option "File"->"Install BurnInTest to a USB drive". This option was added to

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 63 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
the normal BurnInTest Professional V6.0.1002 package (and the "zip" build as required in
V5.x is no longer required or available).
From the "Install BurnInTest to a USB drive" Window, you need to specify:
1) The USB drive and directory you want to install BurnInTest to. For example,
"F:\BurnInTest". BurnInTest will create the directory if it does not exist.
2) The type of installation. If you have a license key, then select Licensed,
otherwise select Evaluation for a trial period.
3) If you selected a "Licensed" installation type, then enter the Username/Key.
When you select install, BurnInTest will create the directory on the USB drive
(e.g. F:\BurnInTest), copy all of the files from the BurnInTest directory (e.g.
C:\Program Files\BurnInTest) to the USB drive (e.g. F:\BurnInTest) and install the
license information onto the USB drive.
When you select install, BurnInTest will create the directory on the USB drive (e.g.
F:\BurnInTest), copy all of the files from the BurnInTest directory (e.g. C:\Program
Files\BurnInTest) to the USB drive (e.g. F:\BurnInTest) and install the license information
onto the USB drive.
Installing BurnInTest to an optical disk
To install BurnInTest on an optical disk (CD/DVD/BD) follow the process above, but specify a
writable temporary directory in step 1 (e.g. C:\BurnInTest). On completing the installation to
the temporary directory, burn the created directory to the optical disk.
Example 2: An alternate example of running BurnInTest from a CD is provided below.This
example assumes the following.
 That log files need to be kept
 That each PC to be tested has a CD drive (Drive F), a USB key drive (Drive G) and no
networkconnection.
 That the machine needs to be left in a clean state.
1. Create the required configuration files
From within BurnInTest, select the settings that suit your specific test requirements from the
test duty cycle window and the test preferences window. Save this configuration, using the
„Save Config As‟ menu option. This can be repeated several times if several test
configurations are required.
For this example we assume the following…
 The default „Stop Tests‟ on testing Passed and „Stop Tests‟ on testing Failed options
are selected from the Post-test tab of the preferences window.
 Automatic logging is turned ON from the Logging tab of the preferences window.
The log file directory is, c:\burnintest
The name of the log file is, ‘bitlogfile.txt’
 The name of the saved configuration file is, ‘heavyload.bitcfg’
2. Create the required batch file
Using Notepad or another text editor, create an installation batch file (“startburn.bat‟), eg.
mkdir c:\burnintest
copy f:\*.* c:\burnintest
c:\burnintest\bit.exe /r /p heavyload.bitcfg

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 64 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
copy c:\burnintest\bitlogfile*.* g:\
copy c:\burnintest\error*.* g:\
del c:\burnintest\*.*
rmdir c:\burnintest
This batch file installs BurnInTest then runs the software with the configuration file that was
prepared in advance. It then saves the log files to a USB Key drive and cleans up.
3. Create a fast install CD
Follow the steps given above to create a CD (in section „Installation and execution options‟),
but when burning the CD include the configuration files and batch file created above.
Optionally a machine identification file, „machineid.dat‟, (see above), could also be included
on the CD.
4. Run the tests
To run the tests insert the CD in a machine to be tested and run the batch file.
5. Collect the results
If the test is completed without error there will be a number of log files on the USB Key
drive. These can then be transferred to a central data store (along with the serial number of
the machine). If the test is completed with at least one error you will see something that
looks like the following.

Example 3: Other examples of using command line arguments

There are a number of different ways to specify command line arguments and this can
depend on what you are trying to achieve. The most common options for specifying a
command line argument are:

1) You can create a shortcut to bit.exe and then specify the command line in the shortcut
target.

Example 3.1: Start BurnInTest from a shortcut and run tests automatically.

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 65 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
Right click on the bit.exe file and select Create Shortcut.
Right click on the new shortcut file and select Properties and specify a Target with
the command line argument.
"C:\BurnInTest\bit.exe" -r
Now to run BurnInTest with these command line parameters, just double click the
BurnInTest shortcut. You could also copy the shortcut to the Windows Startup folder to run
BurnInTest automatically with thecurrent default settings after Windows has booted.
2) You can open a command window, Start-R, "Cmd". This will open a command window
where you can type commands directly, such as shown below.
Example 3.2: Start BurnInTest from a command window and run a pre-defined script
of tests
Select Windows Start-R, "Cmd"
Once the Windows command window is open, type in the commands:
cd C:\Program Files\BurnInTest
bit.exe -s MyScript.bits
3) You can write a batch file to execute BurnInTest with Command line arguments.
Example 3.3: Start BurnInTest from a batch file with a pre-defined configuration file
Create a file with an text editor (like Notepad) called Test.bat and include the lines in the
file
c:
cd "\program files\BurnInTest"
bit.exe –c “heavyload.bitcfg”
Running BurnInTest on a System without an operating system
A bootable CD can be created with Microsoft Windows XP and BurnInTest 6.0 Professional
using Bart Preinstall Environment. Many BurnInTest users can benefit from testing PC
hardware when there is no Operating system installed, or the Operating System is
inoperable. This can be useful for testing PC hardware:
1. In a production line environment,
2. That is to be shipped with Linux,
3. In a known virus free environment and
4. To try to determine the cause of corruption of an Operating System.
A document (http://passmark.com/ftp/BIT_BartPE_v6.0.pdf) has been produced to assist
people in setting up an environment that allows PassMark BurnInTest to be used in these
situations.
Restricting a user from changing the tests selected
In a production line environment, it may be required to remove the ability of the tester to
modify which tests are to be used, either to force the use of pre-defined test configurations
or simply to stop tests being removed from the test setup. The option to select and de-select
tests in the BurnInTest “Test setup and duty cycles” window can be disabled per test. To do
this a file “BITaccess.txt” needs to be included in the BurnInTest directory to specify which
checkboxes in the setup window will be disabled. Please email us to request a sample
“BITaccess.txt” file.
Rebooter

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 66 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
PassMark Rebooter is a small freeware application, which is distributed with BurnInTest. It
offers various options, to provide automated rebooting of computers.

The “Reboot options‟ section allows the selection of Reboot types (Reboot, Shutdown,
Power Off, Logoff), Force shutdown behavior (Ask to close, Force to close, Force if hung),
the Delay once Rebooter is triggered before rebooting and the number of Maximum
Reboots, used for during reboot cycling (see below). The „Auto-login‟ section provides the
option of setting the system to auto login on restart. If Rebooter is run without any
command line options, it launches the configuration window as above. If the command line
option –reboot is used, Rebooter will automatically carry out the currently saved reboot
option.
e.g.

rebooter.exe –reboot
Reboot cycling
BurnInTest can be setup so that the PC will reboot itself in a cycle, with test runs occurring
between each reboot. BurnInTest uses another software utility called Rebooter to reboot /
restart a PC. Rebooter can be used from within BurnInTest or it can be run by itself (look for
the executable called, rebooter.exe in the BurnInTest installation directory).
To use Rebooter from within BurnInTest, go to the BurnInTest Preferences window and then
select the "Post-Test" tab. Clicking on the „Reboot options‟ button will open the Rebooter
configuration window. You can get additional help about Rebooter options by clicking on the
help button in the Rebooter configuration window.
Here is a brief description of how a BurnInTest can be set-up to reboot itself in a cycle.
Step1 – Select and save Rebooter settings
Set the “Maximum Reboots‟ value to the number of cycles required.
Set the other parameters in Rebooter. (Reboot type, Delay, etc). Don‟t set the delay value to
be too short, as you want BurnInTest to fully stop before rebooting. 20 Seconds is a good
value.
Save the settings, with the „Save Options‟ button. Then close the Window.
CBLM on CSS NC II Date Developed: Document No.
JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 67 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
Step2 – Configure the settings you want in BurnInTest
From the Preferences and Duty Cycle windows enter all the settings that you want for your
test runs. When you close these windows, the settings are saved to disk and will become the
new default values. Alternatively a separate configuration file could be created (using the
„Save As Config‟ menu option) and used on the command line.
Make sure you
- Set a test period with the Auto-Stop option in the preferences window.
- Select „Exit & reboot PC‟ in the Action after Auto-Stop check boxes.
- Have the log file accumulation option set in the Logging section of the preferences window
Step3 – Create an auto run shortcut
Create an auto run short cut that points to the BurnInTest executable. You need to do this
manually in Windows. The command line in the shortcut should use the „/r‟ option. This will
start tests executing in BurnInTest automatically. The command line for the shortcut should
be something like C:\Program Files\BurnInTest\bit.exe /r
The Rebooter help file (Rebooter.hlp ) also contains more details about how to start
programs automatically with Windows.
Step4 – Start the cycle
Start the 1st test run from within BurnInTest, with the "Start Tests" button. At the end of the
test period you have entered the PC will reboot according to the settings in Rebooter and
after the reboot, BurnInTest will automatically re-start and do another test run, then Reboot
again.
Note:
When Rebooter is started from BurnInTest, the Rebooter setting of "Auto load Rebooter at
startup" is not applied. This allows BurnInTest to be setup as the auto restart program, and
avoids the conflict of both BurnInTest and Rebooter autostarting after a reboot. This means
that only a single reboot will be performed when rebooter is run from BurnInTest. To
perform multiple reboots from within BurnInTest a script should beused with multiple
REBOOT commands.
More about Rebooter
Rebooter is a small utility program developed by Pass Mark Software to help automate the
PC hardware testing process. It has been designed to work with Pass Mark BurnIn Test but
will also work with 3rd party application. Rebooter allows you to
 Shutdown, Reboot or Logout of a PC.
 Reboot a PC from the command line
 Set a timer so that the PC will reboot after a certain amount of time
 Setup a reboot loop, to reboot a PC over and over again in a cycle.
 Force a shutdown or request a shutdown.
 Enable and disable the Windows auto-login feature. (Windows 2000, XP and later)
 Include reboots into your hardware stress testing plan, (when used with
BurnInTest).
Sleeper
Pass Mark Sleeper is a small freeware application, which allows the user to put their system
into various states of sleep and hibernation. Sleeper can be called from BurnInTest using the

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 68 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
„Close BurnInTest and run external file‟ option from the Post test tab of the BurnInTest
preferences window.

If Sleeper is called without any command line, the configuration screen above is displayed
allowing the user to select options such as the Sleep state to enter, the duration of the sleep
or hibernation etc. It is then possible to begin the sleep by clicking the Sleep Now button.
All settings can also be specified from the command line. See the Sleeper online help for
more details on command line options.
Like Rebooter, Sleeper can be called from within BurnInTest by specifying the required
command line from within the Pre-Test and/or Timers tabs on the preferences window.
Test hardware - Loopback plugs
The BurnInTest optical drive test provides the best test when used with PassMark CD/DVD
test set as this provides pre-defined test data selected for the specific purpose of testing
optical drives and that BurnInTest can better validate.
The following BurnInTest tests use loopback plugs or cables.
 Serial Port test
 Parallel Port test
 Audio test
 USB test. Pass Mark USB 2.0 Loopback plug: Used to test USB 1.x and 2.0 ports.
Supports testing of Full Speed (12Mb/s) and High Speed (480Mb/s). USB 2.0 ports
will be tested at the faster High Speed.
It is recommended that you have at least one plug per port on the machine under test. For
example, if the computer being tested has two COM ports, then having two serial loopback
plugs will halve the amount of time you must spend testing.

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 69 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
When testing BurnInTest with the BurnInTest Firewire Plugin, a 3rd part Firewire plug is
recommended (Kangaru FireFlash).
Testing specialized hardware
If you have specialized hardware that BurnInTest does not test, you can write your own test
and integrate it with BurnInTest (V5.0 and later).
Up to 5 Plugins can be specified. PassMark has developed Plugins for the following tests:
 Modem testing, using PassMark's ModemTest software;
 Keyboard testing, using PassMark's KeyboardTest software,
 Firewire port testing, using a PassMark developed Plugin and a "Kanguru FireFlash"
drive.
Sample software in C and C++ is also available to assist developing a Plugin for your specific
hardware.
As well as demonstrating how to develop and integrate a test Plugin, these samples also
provide examples of how to run pre-test applications and post test applications, and how to
pass some information, such as pre-test configuration and post-test results, between
BurnInTest and other applications.
Un-installer command line arguments
The BurnInTest uninstaller executable can be found in the BurnInTest installation directory.
It is called, “unins000.exe”. Running this file will uninstall BurnInTest. There is also a
command line option for the
uninstaller.
/silent
When specified, the uninstaller will not ask the user any questions or display a message
stating that uninstall is complete. Shared files that are no longer in use are deleted
automatically without prompting. Any critical error messages will still be shown on the
screen.

Self-Check 4.2-6

Directions:

TRUE OR FALSE

Tell whether the given statement is true or false. Write (T) if the statement is True and (F) if
the statement is False. Write your answer to a separate sheet.

1. Burn-in is a test in which a system or component is made to run


for an extended period of time to detect problems.

2. PassMark BurnInTest is a software tool that allows all the major sub-systems of a
computer to be simultaneously stress tested for endurance, reliability and stability.

3. First step in Reboot cycling is the “Select and save Rebooter settings”

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 70 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
4. Rebooter is a small utility program developed by PassMark Software to help
automate the PC hardware testing process.

5. Burn-in may be conducted to ensure that a device or system do not function


properly before it leaves the manufacturing plant or may be part of a repair or
maintenance routine
Information Sheet 4.3-1
DIFFERENT TYPES OF COMPUTER SYSTEM ERRORS

Learning Objectives
After reading the INFORMATION SHEET, YOU MUST be able to:
1. Identify the different types of computer system error
2. Recognize the procedure in diagnosing a computer

Introduction:

Has your computer ever stopped working for no apparent reason? The
frustration brought on by technological advancements can cause any sane
person to yank the plug right out of the wall. Luckily, there's a better way.
Learn what to do when your computer freezes, facts about different kinds of
computer failure, the various ways torestart Macs and PCs, and how to
prevent future freezes.

Types of computer failures

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 71 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
The three main types of computer failures are system errors, freezing,
and applications quitting. Simply put, Mac system errors warn you with the
dreaded bomb Alert box. A system error occurs when there is a conflict
between the operating system and one or more applications, like Microsoft
Word or Internet Explorer. The next type of computer failure is freezing,
also known as crashing or hanging. In this case, the computer locks up
and the mouse and keyboard become useless accessories. Freezing exists
both at the individual program level and on a system wide basis. An
application suddenly quitting is the third type of computer failure and
probably the most common. This means that only one program is effected
rather than the whole system. All three types of computer failures are
frustrating if you do not know what to do, but by following these steps you
will learn how to properly unfreeze your computer.

How to restart a PC
After any common computer failure follow these steps. Simultaneously
hold down the Control key, the Alt key, and the Delete key. A dialogue box
will ask you if you want to exit the current program. Click the Task List

button. An End Task window appears and lists the programs you are
currently running. Select the program you were in when your computer
froze. For instance, if you were workingwithMicrosoft Word, but went to
check your e-mail in Netscape, and then the computer crashed, you would
CBLM on CSS NC II Date Developed: Document No.
JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 72 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
select Netscape in the End Task window. After selecting the correct
program, hit the End Task button. Hopefully, the program will unlock at
this point. You should then restart yourcomputer by going to the Start
menu and selecting Shut Down. In the Shut Down window, click the
Restart button and OK, and the computerwill reboot.

How to prevent future freezes


Knowing how to restart a computer is crucial, but it is also important to
know measures to take to prevent future freezes. The most useful steps are
rebuilding your desktop, emptying your trash, deleting excess e-mails, and
cleaning out
temporary
files and histories.

System error 5 -
Access is denied
This is a
permission
issue. If the net
view command
fails with a "System
error 5 has
occurred. Access is
denied." message, 1)
make sure you
are logged on
using an account that has permission to view the shares on the remote
computer. 2) Need to cache credential: logon the same username and

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 73 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
password on both computers or use net use \\computername
/user:username command. 3) Make sure the Netlogon service is running.
System error 8 - Not enough storage is available to process
thiscommand or System error 234 - More data is available.

Symptoms: If you attempt to start the server service manually,


thefollowing errors may be displayed: System error 234 has occurred. More
data is available. Or system error 8 has occurred. Not enough storage is
available to process this command. The event viewer shows "Event ID: 7023.
Description: The Server service terminated with the following error: More
data is available. Or Event ID: 7001. Description: The Net Logon service
depends on the Server service which failed to start because of the following
error: More data is available.
Resolution:
1. Make sure you type the correct computer name or sharedname.
2. Make sure the Workstation service is running on the local computer
while Server service is running on the remote computer.More
troubleshooting here System error 67 has occurred

System error 85 has occurred. The local device name is already in use
Cause: net use /persistent: yesis default settings for NT and win2000/XP.If
you have mapped some network drives and check the reconnect at logon, or
your network uses logon script to map network drives, the mapped network
drives may show red Xs. If you enable echo and pause the logon script or if
using net use to map the same drive manually, you may get "System error
85 has occurred. The local device name is already in use." One thing you
may want to try is using net use /persistent: no, for example, net use i:
\\servername\folder /persistent: no.

System error 1219 has occurred - The credentials supplied conflict withan
existing set of credentials

Symptoms:
1) When you log on to a domain from w2k client;
2) Whenattempting to join a domain, you may receive the following error
message: The credentials supplied conflict with an existing set of
credentials.

Resolutions: This may cause because of attempting to make two or


moreconnections to the same server using two or more sets of credentials

1. Go to windows explorer and disconnect all network drives. Then re-logon.

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 74 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
2. Delete the profile or copy another profile. Note: you may lose all settings
and data in My Documents when deleting or copying profile.

3. If solution 1 and 2 doesn't work, try this:


1) Log on as an administrator at any workstation and run regedt32.
2) Select HKEY_USERS, but do not open.
3) From the Registry menu, click Load Hive.
4) This will bring up a Load Hive dialog box. Locate the Ntuser.dat file
for the user with the errors. Select the Ntuser.dat and click Open. You
may enter any string for the Key Name. Use TEST for ease of use
pertaining to the remainder of this article.
5) Locate the Username value under the following key in the registry:
HKEY_USERS\TEST\Network\Username.
6) Delete the string for Username (leaving it blank is sufficient).
7) Select the TEST hive that you previously loaded, click the Registry
menu, and then click Unload Hive.
4. If you get this message when joining the domain, make sure 1) you have
delete the computer from AD; 2) delete it from DNS; 3) delete it from WINS.

System error 1231 has occurred. The network location cannot bereached.
Symptom: When using net view\\computername,you may receiveSystem
error 1231.
Resolutions: 1) make sure Client for MS Networks is enabled, 2) makesure
you have permission to access it.
System Error 1240 - The account is not authorized to login from this
Station.
Symptoms:
1. You may get the system error 1240 when using net
view\\remotecomputer'

2. “Workgroup_name is not accessible… Account is Not Authorized to Log In


to this Station” when attempting to browse the workgroup from a networking
computer.

Resolutions:
1. Use Regedit to enable unencrypted (plain text)passwords for the SMB
client.
2. Enable Send Unencrypted Password to Connect to 3rd Party SMB Servers
under Local Security Policy.
3. Set the following policies as showing: Digitally sign client communications

(always)-disabledDigitally signservercommunications(always)-disabled

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 75 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
Digitally sign server communications (when possible) - disabled LAN
Manager Authentication Level set to Send LM and NTLM - use NTLMv2
session security if negotiated - (default) send LM & NTLM responses Secure
channel: Digitally encrypt or sign secure channel data (always) - disabled
Secure channel: Require strong (Windows 2000 or later) session key -
disabled
4. Contact the third-party SMB server manufacturer if you have a third-
party SMB server, such as DEC Pathworks, Samba or Linux.

5. If you are running Windows 9x, you may want to re-configure


windowsauthentication for network logons.

System error 1311 - There are currently no logon servers available


toservice the logon request
Symptoms: The primary purpose of logging on with cached credentials isto
enable you to access the local workstation. However, if you have logged on
by cached credentials, you may be unable to access network resources
because you have not been authenticated. For example 1) after you log on to
a w2k/xp laptop by using cached credentials, you may be unable to access
the network resources. This issue is commonlyexperienced by laptop users
whose computer resides in a Windows Server domain and who log on to the
computer by using cached credentials prior to being able to establish a
remote access connection. 2) You log on to a w2k/xp laptop with a domain
logon option in a workgroup network. After you establish the connection and
you try to map the network drives, the operation may be unsuccessful, and
you may receive the following error message: "System Error: (1311) There are
currently no logon servers available to service the logon request."
Resolutions: To authenticate the cached credentials, 1) if it is w2k/xp, use
net command, for example, net use \\servername\sharename
/user:username. 2) if xp, open Windows Explorer>Tools>Map Network Drive.
Click Connect using a different user name, enter the username and
password.

System error 1326 has occurred - Logon failure: unknown user name orbad
password.

Symptom: when using net use to map a network drive, you may
receive"System error 1326 has occurred. Logon failure: unknown user name
or bad password." message.

Resolutions:
1) create a user account on remote computer;
2) need toenable the guest account;
CBLM on CSS NC II Date Developed: Document No.
JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 76 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
3) make sure the remote computer doesn't use auto-logon and blank
password;
4) make sure you have a folder or drive shared on the remote computer.
5) use net use \\servername /user: username command. Make sure you
type correct command (e.g. use net use \\servername \user: username will
get this error too)

System error 1331 has occurred - Logon failure: account current disable

Symptom: When using net use\\computernamecommand,you mayreceive


above error message.

Resolutions: this is cache credentials issue. To fix this problem andcache


the credentials, use net use \\computername /user: username command.

System error 1385 has occurred - Logon failure: the user has not
beengranted the requested logon type at this computer

Symptoms: When using net use\\remotecomouter\ahredname,you


mayreceive above message.

Resolution:
1. The users do not have permission to connect to theremote computer. To
resolve this problem: on the remote computer, select Administrative
Tools>Local Security Settings>Local Policies>User Rights Assignment, right-
click on Access this computer from thenetwork>Properties>Add Users or
Groups, add everyone or any users you want to be able to access the
computer from the network.

2. refer to this case: Solved: System error 1385 - Logon failure -


http://chicagotech.net/netforums/viewtopic.php?t=286

System error 1396 has occurred - Logon Failure: The target accountname
is incorrect.

Symptoms:
1. when using net use, you may receive above message.
2. when using net view \\hostname, you may receive "System error 5 has
occurred. Access is denied.". However, net view \\ip works fine. 3. You may
receive above error while running logon script.

Causes:
1. SPN for the domain that is hosting the replica has not been propagated.
2. Incorrect target account name or the server is not online.

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 77 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
3. If you have DFS, make sure the DFSRoot is available.
Refer to RL060704

System error 6118 has occurred. The list of servers for this workgroup
isnot currently available

SYMPTOMS:
1) After enabling ICS/ICF, you can't see any computes on MyNetwork places.
If you try, you may get "workgroup is not accessible".
2) If you use the net view command, you may receive "System error 6118
has occurred. The list of servers for this workgroup is not currently
available." message.

Resolutions:

1) This behavior can occur if you enable the ICF that will closes the ports for
file sharing by default. To open these ports, right-click the network
connection that is firewall protected> Properties>Advanced>Settings>Service
Tab>Add, Enter 127.0.0.1 for the required Internet Protocol (IP) number.
Enter UDP ports from 135 through 139, and TCP ports from 135 through
139 one by one (the external and internal port numbers should be identical).

2) This may occur if the workgroup name and the domain name are the
different.

3) No master browser. Starting Computer Browser Service on one of w2k/xp


computers should fix the problem

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 78 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
Self-Check 4.3-1

Write the Symptoms & Resolutions of the following system Errors

System
Error Symptoms Action/resolutions

51 The
remote
computer
is not
available
67 The
network
name
cannot be
found
1219 The
credentials
supplied
conflict
with an
existing
set of
credentials
1231 The
network
location
cannot be
reached.

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 79 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
Information Sheet 4.3-2
DIAGNOSE FAULTS OF COMPUTER SYSTEM

Learning objectives
After reading the INFORMATION SHEET, YOU MUST be able to:
1. Identify the problem of computer system
2. Recognize if procedure of Diagnosing a computer system

Introduction:
PC Diagnosing

Probably the most frustrating problem computer


users run into are startup problems, where your
computer won’t boot. Equally annoying are error
messages you constantly run into during your
computer’s startup process. In this module you will be
given a few tips on how you can avoid some of the most
common problems that happen right after your computer
turns on.

Troubleshooting Plan for Personal


Computers
How to Troubleshoot the Computer?
Here you will learn the basic troubleshooting methods of your computer.
Trial and error: When you find a faulty component in yourcomputer, check
it with the other computers so that you can make sure whether the fault is
in the component or not.

Check cables: In case of any device failure, check all the cables ofyour
computer such as data cables, power cable, internal circuitry cables and
make sure that all these are plugged in and working fine.

Hardware settings: Check the hardware settings in the CMOS andin the
device manager of the system and make all the device drivers are up to date
and all the cards are plugged in properly.

Notice changes: When you notice a software or hardware error inyour


computer, determine what was changed before the problem occurred

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 80 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
Event viewer: In the event viewer, you will find the error orwarning
messages associated with any faulty hardware or software.

Make notes: Troubleshooting is a big learning option and we canlearn a lot


when we face any kind of troubleshooting in our computer. Make notes
including the error messages and their solutions, so that you have a record
on how a certain problem occurred and how did you solve it.

Sample Diagnostic Plan

List down all possible components to be checked based on the symptoms.

Symptoms: Dead Computer Monitor Good Defective Remedy

AC outlet
AVR
AVR fuse
Monitor Power Cable
Monitor Switch

Power Supply

Common Trouble for Computer Units


1. Double check the power connections.

2. Voltage Regulator and power supply could cause power failure in


the computer unit.

3. Check the power cords and cable connectors in your computer unit.

4. Unseated card. Loose cards could cause it to malfunction.

5. Do you have ink or toners in your printer? Check the


ink toners/cartridges in your printers.

6. Check the boot sequence configuration in the advance BIOS (Basic


Input/output Unit) setup.

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 81 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
Diagnosing Network Connection
These are the things to look for if a PC will not connect to the
internet or network.
· First check the cable connecting to the network card into the
network hub
· Check the back of the computer to see if the network card light is on
· Check the network cable
· Check the network HUB

Testing Procedures

 Deciding When to Test the System. Identify computersymptoms and


defects
 Preparing to Test the System . It’s recommended that youshould not
plug your computer and monitor directly to a wall outlet. Rather, you
should purchase a UPS (uninterruptible power supply). The UPS
serves as a surge protector to prevent your system from being
damaged if a power spike is delivered to it and when power will fail
unexpectedly. The UPS gives you time to save your work and properly
shut down your system. If a system is turned off and back on rapidly,
it’s probably not good for the system. A very short power drop could
mimic this effect and could be hard on both the computer and the
monitor.
CBLM on CSS NC II Date Developed: Document No.
JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 82 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
Test Your Computer Memory RAM
Most Computer Memory comes with a life time warranty from the
manufacturer but this can be very inconvenient. You can return memory
easily to the seller in the 1st 2 weeks but most problems show themselves
much later and it always seems to happen when you need your computer
the most. Learn how to detect problems in the 1st 8 hours after you install
memory and save yourself from headaches and inconvenience down the
road.
Memory is an easy upgrade but how do you know its running at the
advertised speed? Do you know for sure its running error free? Memory can
arrive from the seller and have a defects that won't be seen for weeks or a
months. But then it happens. Blue screens, freezing, memory errors,
spontaneous reboots. All signs of defective memory. Read on to learn how to
protect yourself from buying bad memory.

Instructions
Things You'll Need:
· New memory
· CD burner
· Blank CD-R or CDRW

1. We will assume you know how to buy the right memory. If not, visit my
article on buying the right memory.

2. Shut down your PC, unplug your computer, and Open the cover.

TIP: If you have toggle switch on the back of your power supply, you can add
more safety by turning the switch off and leaving the computer plugged
into the wall outlet. Yes, leave it plugged with the hard power switch off.
This provides an excellent ground to your computer with no actual power
applied.
3. we have 2 sticks of new memory rated for our computer. Lets assume our
computer has 4 slots. 2 slots are filled, 2 are empty. With the case open,
open the levers on the side of the installed memory sticks and remove
them. Put them in a safe place.

4. Insert the new memory sticks in the same place the old sticks were and
lock the levers. The reason we are doing these extra steps is so we can test
the new memory. Leaving in the old memory can affect the new memory's
speed reading or even errors in the old memory will not be clearly the fault
of the old memory.

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 83 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
5. Turn on the power and boot up. Watch for the prompt to access SETUP or
BIOS. Most popular keys for this are DEL, F2, or F10.

6. Inside the BIOS or Setup screen, look for the section called memory.
Check to see the memory is running at the speed you purchased and
displays the full amount you purchased. Exist setup and allow computer
to boot up fully.

7. Download Memtest86+ 2.11. Its free and supports DDR2 and DDR3
memory. Unzip the file and create a CD using the ISO file using your
favorite cd burner program. This is a bootable CD.

9. Reboot the PC and insert the CD you just made before the post screen is
done. Assuming your PC is set to boot from the CD first,(most are), the
CD will start up the MEMTEST program and start running. This will run
over and over. It will also count how many times its run and the number
of errors it encounters. The number of errors should be zero Let it run for
up to 8 hours. Once you are satisfied, exit the program using the legend
on screen. Remove the CD, and turn off the computer.

10. You now know you have reliable memory that will likely last for years to
come

How to Tell if a Motherboard Is Defective


The motherboard is the backbone of your computer as it is the piece
that all of the other components are connected to. If your computer will
notboot up properly or power on at all the problem may potentially lie with
the motherboard. Because so many other components are connected to the
motherboard you will need to troubleshoot each other part first.

Instructions

Things You'll Need:

· Screwdriver

· Replacement processor

· Replacement RAM modules

· Replacement video card

1. Turn the computer off and then remove the power cable from the
electrical wall outlet. Plug a power cable from a different electrical device

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 84 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
into the outlet and power it on so that you can rule out the outlet as your
problem. Connect the computer's power cable back into the outlet.

2. Power the computer back on and place your hand behind the case
near the power supply. Wait a few moments to see if any air is pushed
out of the power supply by the cooling fan. Replace the power supply
instead of the motherboard if the fan is not working.

3. Shut down the computer again and pull out all of the cables from the
back side of the case. Remove any other devices you have
connected to the front ports on the computer such as a USB printer or
jump drive.

4. Set down the computer so that the left side panel is facing towards
you. Unlock the side panel from the computer case by removing the case
screws if there are any. Twist of the thumbscrew or pull up on the metal
holding latch if the computer does not use case screws.

5. Remove the screws holding any expansion cards to the case and then
pull them off the motherboard. Pull out all of the cables running from the
motherboard to the power supply and drive bays. Pull out the screws
holding the motherboard to the case. Pull the motherboard straight up
out of the case and set it down carefully on a flat non-metal surface.

6. Check to make sure that there is no physical damage to the


motherboard such as bent pins or burnt transistors. Purchase a new
motherboard and place it back in the case if there is any visible damage.

7. Remove the screws holding the power supply to the case and slide it
out of the drive bay. Set it down near the motherboard and connect the
SATA cable from the motherboard to the power supply. Connect the
power cable from the power supply to a wall outlet. Plug cable from the
computer's monitor into the corresponding port on the motherboard.

8. Remove the RAM modules and replace them with another set. Press
down the power button on the motherboard with a screwdriver or another
flat object. Wait to see if the computer loads up without error, which will
indicate that the problem is with the RAM modules instead of with the
motherboard.

9. Power the motherboard back off and replace the processor with a
different one. Turn the motherboard back on and see if the system boots
up normally, which will indicate a defective processor.

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 85 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
10. Turn the motherboard off and replace the video card with a different
one. Power the motherboard on and see if the system boots up, which will
indicate a defective video card.

11. Replace the motherboard if the system still will not boot up after all of
the other components have been checked.

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 86 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
How to Know If a Sound Card Is Bad
You turn on your computer one morning, hoping to listen to the
morning news, but there's one tiny little problem. You're not getting any
sound out of the speakers. A few simple steps will determine what is wrong.

Instructions

Things You'll Need:

· Extra set of speakers


· Another computer
· Internet access
1. Try restarting the computer to see if it does it again. It may be a freak
incident.

2. If that doesn't work then check to make sure that everything is plugged in
and is turned on. This includes checking the wires from the speakers to the
computer and making sure the speakers have power. Also check to see if the
volume isn’t muted or turned down extremely low.

3. Check to see if the driver is working. Click the start menu, right click on
the computer icon, and select properties. On the left hand side under task
select device manager and select sound, video and games controller. Double
click on your sound device to bring up the properties page. From here it will
tell you if your sound card is working properly or not. If it isn’t try
reinstalling the sound card driver. If the sound card is not showing up at all,
then it might be defective.

4. The next step is to rule out the speakers. Either take them and hook they
up to another computer to see if they work or you can take different
speakers and hook it up to the computer to see if they work. If they do work
chances are the card is defective.

5. Before ruling out the sound card is toast, try rolling Windows back to an
earlier date by using System Restore which is located under accessories >
System Tools. Restore the computer to a few days before the problem started
to happen

Self-Check 4.3-2
TRUE OR FALSE: Write T if the statement is True and F if the
statement is False.
CBLM on CSS NC II Date Developed: Document No.
JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 87 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
___1. The most frustrating problem computer users run into are startup
problems.
____2. When you find a faulty component in your computer, check it with
the other computers so that you can make sure whether the fault
is in the component or not.
____3.Troubleshooting is a big learning option and we can learn a lot
when we face any kind of troubleshooting in our computer.

____4. Unseated card or loose cards could cause computer to function


normally.

____5. Voltage Regulator and power supply could cause power failure in
the computer unit.

Information sheet 4.3-3

HAND TOOLS FOR TESTING AND TROUBLESHOOTING

Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Identify and use Hand Tools for Testing and troubleshooting Computer
System & Network.

Introduction

Tools and equipment play a vital role in troubleshooting; it helps the


user to determine the errors found in your computer hardware and network.

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 88 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
1. Screw drivers-is used to install and remove
screws in your computer unit.

2. Pliers and Tweezers is used for picking


small

2. Soldering iron- is primarily used for


connecting terminals in your power
supply and circuit board with the use of
a soldering lead.

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 89 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
4.Anti-static wrist strap, mat and spray- are used
to eliminate electrostatic discharge in your work
area.

5.Lens cleaner-is used for cleaning optical


media, such as DVD-ROMS and CD-writers.

6.Thermal paste-is a paste used for heat dissipation for


your processor.

Network Troubleshooting Tools


1. LAN Tester – is a device used to test the network connection.
2. Crimping tool- is a device used to crimp the RJ45 connector to the UTP
Common Windows XP Diagnostic Utilities & Tools
1. There are a lot of diagnostic utilities for Windows XP, both included
with the system and third-party applications, that can examine your
computerfor a range of problems. Microsoft's own, included utilities
have been specially trimmed to apply to certain devices and uses,
making them the best choice for all but the most devastating of
problems.
Disk Utilities
2. Many errors can be caused by hard disk problems. The Disk Cleanup,
Disk Defragmenter and Disk Error Checking utilities can assess and
fix many of these problems. All can be found under the System Tools
section of the Accessories sub-menu. Also, running your hard drive
manufacturer's specific disk diagnostic tool can help to diagnose any
read or write errors that cause application problems in Windows XP.
Application and Memory Utilities
3. Run time errors, blue screens and other memory errors are often
caused by badly written programs or incorrect system calls. The Dr.
Watson tool is great for checking application errors and can be
accessed by clicking the "Run" shortcut from the Start menu, typing

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 90 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
in "DRWATSN32" and pressing "Enter." Memtest86+ is another great
tool for checking your computer's standalone memory (see Resources).
Network Diagnostics
4. The Network Diagnostics Tool is included with Windows XP and
provides a way to test your Internetconnection settings. You can
access it from Internet Explorer by clicking "Diagnose Connect
Problems" from an error page or by selecting the tool under the "Tools"
option menu. You can also right-click any network connection from
the Network Connections menu and choose to troubleshoot the
connection there to do further network diagnostics.
Also, try using a website such as Speed Test (see Resources) to test your
broadband connection speed and diagnose any speed issues.
Hardware Diagnostics
5. Under the Device Manager you can see hardware that is working
improperly, because it will have a warning icon next to it. Right-click
that device and choose to troubleshoot. This will bring up the device
troubleshooting utility that will often try to update the driver or fix an
existing driver.
Malware and Adware Utilities
6. Adware, malware and viruses can infect your computer, decimate its
performance and siphon your private data from your fingertips. Since
most of these malicious programs are built to target Windows XP, it is
important to regularly check for malware. Tools such as Lavasoft's Ad-
Aware or Spybot Search & Destroy are great utilities for finding and
eliminating harmful or infected applications (see Resources). In
combination with traditional anti-virus software such as Norton or
McAfee, they are essential for keeping your computer running
smoothly.

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 91 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
Self-Check 4.3-3
Please write your answers in your computer using MS Word and save it in
your folder:

1. Enumerate the six tools used for troubleshooting.


a.
b.
c.

d.

e.

f.

2. Enumerate the two network troubleshooting tools.


a.
b.

Information Sheet 4.4-1

RECTIFY/CORRECT DEFECTS IN COMPUTER

SYSTEMS AND NETWORKS

Learning Objectives
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Replace and repair computer parts and upgrade.
2. Enumerate computer parts that needs replacement
Introduction:
In all cases, if you’re upgrading or replacing a computer part, you’re doing so on the assumption that
the PC still has some value , so you don’t want to get in over your head and break things if you aren’t
fairly sure of what you’re doing . Replacing PC parts is pretty much all screwdriver work, it doesn’t
require great coordination, but it does demand a certain mechanical awareness, the ability to see where
things fit and how they are supposed to go together. If you force something, you’re doing it wrong and it
will break . Modern PC’s all use ATX power supplies which are really only safety off when they are
unplugged or the override switch on the back is turned off.
CBLM on CSS NC II Date Developed: Document No.
JANUARY, 2020
MAINTAINING AND REPAIRING Date Revised: Issued by:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 92 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
10 pieces of hardware you should replace neither than repair
Any time a computer component stops working, or just becomes unstable as we all know will
happen from time o time -- we have to decide whether to replace it, have it repaired, or just get by as is
with perhaps a temporary fix. Repair or just getting by will nearly always be the cheapest solution, at
least in the short run. Replacement, however, will usually provide a good opportunity to upgrade. In
fact, given the rate at which the various technologies behind computer hardware are advancing , unless
you replace something a week after you buy it, you may almost be forced to upgrade. Following are a
few items which, if replaced (and generally upgraded), can provide excellent benefits, from an enhanced
user experience to additional compatibility, greater longevity, and stability for the whole system.

Power Supply

One of the most overloaded pieces of computer hardware is the power supply unit (PSU).
Computer enthusiasts often brag about their blazing fast processors, top-of-the- line video cards, ans
gigs upon gigs of RAM, but rarely about their great PSUs.
The truth is, the power supply is the last thing we should skimp on when choosing components
for our system. If a computer‘s brain is its processor, its heart is the power supply. And having one that
is worn out, underpower, unstable, or just generally cheap can be a major cause of hardware failure.
Every computer’s power requirements are different, but a good minimum for a modern PC is 450
watts. Some system, especially those with multiple high-end video cards or lots of add-on cards and
peripherals may require a PSU rated at 800 watts or more. Replacing a failing or inadequate power
supply can make a previously unstable system stable.
Aside from supplying enough power, that power must be supplied stably. A common cause of
‘unexplained’ lockups and system crashes is a drop in voltage supplied to the system when under load,
caused by a poorly manufactured PSU. The easiest way to find a quality PSU is to stick to the consistently
top brands such as Antec, EnerMax, and PC Power & Cooling.
Fans
As computers have gotten more powerful over the last decades, they have also gotten hotter.
Gone are the days of a passively cooled Pentium 100; now we have fans on our massive CPU heatsinks,
on our monster video cards, and on intake and outtake vents to our computer cases.
All of these fans are playing important roles by keeping our computers safely cooled, and we
should try to ensure that they continue doing so.
CBLM on CSS NC II Date Developed: Document No.
JANUARY, 2020
MAINTAINING AND REPAIRING Date Revised: Issued by:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 93 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
Fans are one of the few parts that when replaced with something better. But they deserve
mention because:
As one of the few moving parts in our system, they are one of the most likely to actually break.
When they break it’s likely to pass unnoticed or not cause mush concern.
Also, fans are cheap and easy to replace. It generally takes about 10 dollars, 15 minutes, and a
screwdriver to install a new one, so there’s really no good excuse for not doing so.

Surge protector/UPS

This is another item that keeps our computers safe and


should not be neglected. A surge protector can be a stand-alone
power strip, but one is also built into virtually every
uninterruptible power supply (UPS). The surge protector guards
our devices against spikes in energy that occur in our circuits at
the home or office, usually due to lightning or the powering up of
high-powered device, such as hair dryers or refrigerators.
repairing a surge protector would be difficult and expensive at
best; replacement is almost always the best option.

It can be tricky to know when it’s time to replace a surge


protector, because the component inside that diverts excess
power from surges to the ground simply wears out with repeated
use. However, there is often no interruption of power or other
indication that it’s done. You may still have juice but not be
protected. The cheapest protectors may wear out after fewer
than 10 small surges, while the better ones can last through

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Date Revised: Issued by:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 94 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
hundreds. The safest thing to do is to get higher quality protectors but still replace them occasionally.

VIDEO CARD
The video card is one of the most important elements in the performance of your system and
overall user experience. Even though it is also one of the priciest components, there are two good
reasons to replace it should your old one bite the dust.
First, video cards are one of the components that are being improved upon seemingly every day. Just
like with CPUs, a video card that’s two years old simply isn’t as fast as a current one and won’t have the
newest features (such as support for directX 10).
Also, the video card is the number one hardware stopgap as we migrate to vista. Manufactures just
aren’t providing new vista-compatible drivers for lots of their old video cards. This means that many of
us will have to replace our video cards whether they are broken or not, if we plan to switch to Vista.

Flash Media Reader

All kind of devices use flash cards these days;


cameras, MP3 players, even cell phones. These small
devices let us take our data anywhere easily. Since it
seems as if every device uses a different format of
flash media, most of us have all-in-one type card
readers. If the reader breaks or gets lost (which seems
to happen a lot), these are two excellent reasons for
upgrading to a newer model instead of trying to repair
the old one
First, many old card readers are USB 1.1. The
newer ones use USB 2.0 instead, which is 40 times faster. This is more than enough reason to

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Date Revised: Issued by:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 95 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
replace an old reader, even if it’s broken .
In addition, new formats are constantly coming out for flash cards, and when they do,
you need a new reader to use them. For example, Secure Digital High Capacity(SDHC)and xD
from fujifilm are not supported by older readers.

CD/ DVD Drivers

Considering that it has moving spinning parts, the average CD/DVD drive is actually fairly
robust. Because of that, how ever , many people are still using old read-only (or CD RW) drives
instead of amazingly cheap (and handy)DVD writers. If you’re still using an old drive and it
finally gives up the replace it with a DVD/CD RW combo drive for less than 50 dollars.
Hard drives

The computer component we all least want to fail is the hard drive. It’s easier to cope with the
loss of the much more expensive processor or video card as long as we still have our precious data, or
your first instinct is to try to repair.
But if you’ve been practicing good backup habits, you can actually come out of the situation better of
when you replace the old drive with something bigger and faster.
The “giant” 100-GB hard drive of a few years ago is no longer so large. Today, you can get 750
GB for less than 200 bucks. In addition to being much, much larger , newer hard drives will generally be
serial ATA II (SATA II), which has a maximum data transfer rate of about 300 MB /as. SATA II is fairly new
, so many motherboards don’t support it. But even if yours doesn’t, the SATA II drives generally have a
jumper that can put them in SATA I mode.
TIP: Right now, most SATA II hard drives ship with thyis limiting jumper in place by default, so if your
board does support SATA II, be sure to change the jumper before you install the drive.
Monitor
With the exception of servers, a computer isn’t much good without a monitor. Monitors rarely
make it all the way to the stage of completely not working, because we replace them when they start to
fade. If you replace a monitor that’s more than a few years old , the new likely not much resemble the
CBLM on CSS NC II Date Developed: Document No.
JANUARY, 2020
MAINTAINING AND REPAIRING Date Revised: Issued by:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 96 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
old.

Any reluctance you may have had to switch from the giant 50-pound cathode ray tube (CRT)
monitor to a slim and featherweight liquid crystal display (LCD) should be gone by now. The gap in
performance in terms of color rendering and refresh rates between CRTs and LCDs is very small.
Unless you’re a graphic designer who need a multi-thousand dollar large screen CRT, the
benefits of size, weight, power consumption, and less eye fatigue that LCDs enjoy will far
outweigh any small performance advantages of a CRT. With the exception of the extremely low
end markets, it’s quite hard to find a new CRT monitor anyway.
If you were already using an LCD that’s a few years old , when you replace it you’ll enjoy
those leaps in performance that the LCDs have made in the last few years.

Keyboard

Since so many of us spend hours every day banging away at them, its important to have a
keyboard that’s comfortable and efficient. And since we use them so much and often so
brutally, it is no wonder that they break often. Keys come off, get stuck, or just get really dirty.
When these things happen, you should usually go ahead and replace the keyboard rather than
CBLM on CSS NC II Date Developed: Document No.
JANUARY, 2020
MAINTAINING AND REPAIRING Date Revised: Issued by:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 97 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
live with the hassle.
Today’s keyboard have new, handy features. Some have built in user defined macro
keys for often- repeated commands; some can fold up for easy transport ability; some have
built-in ports so they can double as USB hubs. There is a keyboard with some unique feature to
suit nearly anyone’s needs.
Motherboard and Processor

Replacing the motherboard is always the most involved upgrade. Since it usually means “starting
over” with a clean installation of the operating system, lots of people are reluctant to change to a newer
board even when the old one gives up the ghost, preferring instead to replace it with the exact same
model, thus avoiding having to wipe the OS. However, since a motherboard upgrade is the most
involved, it also can give the widest range of benefits.
First and foremost, replacing the mother board usually gives us the chance to upgrade to the latest
processor technology. Today, you can get the benefits of a dual or even quad CPU setup with only one
processor processing core is placed on a single wafer. In computer’s performance by a factor of two or
four.
Additionally, upgrading the motherboard gives you access to new technologies for other
components. PATA and SATA I hard drives (and optical drives) can be upgraded to SATA II. AGP video
cards can be upgraded to PCI-E USB 1.1 ports become USB 2.0. The list goes on for virtually every
component. Sometimes, even though it can be a pain, starting over can be the best thing.

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Date Revised: Issued by:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 98 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
Self-Check 4.4-1
IDENTIFICATION:
Instructions: Supply the correct answer.
_________________1. Part of the computer system that gives power to the computer.
_________________2. This can be a stand-alone power strip, but one is also built into virtually
every uninterruptible power supply UPS.
_________________3. A part of a computer system which is similar to a typewriter.
_________________4. This part of a computer system similar to a television.
_________________5. Sometimes it is called as the main board.

Information Sheet 4.5-1


INSPECT AND TEST THE COMPUTER
SYSTEMS AND NETWORKS

Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to:
4. Inspect and test computer systems and networks
5. Learn how to burn-in

Introduction:

BURN-IN
Burn-in is a test in which a system or component is made to run for an extended period
of time to detect problems.
Burn-in may be conducted to ensure that a device or system functions properly before it
leaves the manufacturing plant or may be part of a repair or maintenance routine.
An end user may use a burn-in process to ensure that new equipment is functioning
properly, for example, running a new computer for several days before committing it to serious
use. If any of the components are defective the problem will usually show up within this initial
testing time frame.
When a faulty device or system is brought into a repair facility, the malfunction might
not occur until the hardware has been warmed or cooled to a certain temperature. Humidity
may also be a factor. Under these circumstances, a burn-in must be performed and
environmental parameters varied until the problem is found. The equipment is powered-up and
then left to run continuously for hours (or sometimes for days) until the malfunction is
observed and can be diagnosed.
PassMark BurnInTest is a software tool that allows all the major sub-systems of a
computer to be simultaneously stress tested for endurance, reliability and stability.
• Assists in PC Troubleshooting and diagnostics.
• Avoid delivering dead on arrival and faulty hardware to your customers.
CBLM on CSS NC II Date Developed: Document No.
JANUARY, 2020
MAINTAINING AND REPAIRING Date Revised: Issued by:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 99 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
• Dramatically reduce your test times with simultaneous testing.
• Build your image as a supplier of quality systems.
• Avoid costly downtime, system rebuilds and lost data.
• Test the stability of a system after configuration changes or hardware upgrades
(critical for overclocking and system upgrades).
• The hottest, fastest CPU Burn In tool around! (Heat testing)
Configuration files
What are configuration files?
A configuration file contains all the parameters available in the test duty cycles and test
preferences windows. That is to say it contains information about which tests to perform, the
duty cycle setting for each test and other preferences, such as drive letters and device names.
Configuration files end in the extension „bitcfg. For example the current configuration is

stored automatically in the file „LastUsed.bitcfg‟, which is located in the BurnInTest installation
directory. Configuration files aid with the automation of the testing process and also allow the
maintenance of several different test configurations. For example a configuration file could be
created for each different model of computer to be tested.
By saving a particular configuration to a file, you can avoid resetting all the parameters
each time BurnInTest is used.
How are configuration files created?
A configuration file can be created by first selecting all the required settings in the test
duty cycles and test preferences windows, then use the menu option, „Save Test Configuration
As‟. This will create a new configuration file in the location selected by the user.
After the configuration files have been created they can be transferred between
computers where BurnInTest is installed.
How are configuration files used?
Files can be used in three ways
4. They can be loaded from the command line.
5. They can be loaded by using the menu option, „Load Test Configuration‟.
CBLM on CSS NC II Date Developed: Document No.
JANUARY, 2020
MAINTAINING AND REPAIRING Date Revised: Issued by:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 100 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
6. They can be loaded by a BurnInTest script file. A script file can load multiple test
configurations during the one test run.
For the purpose of test automation options 2 and 3 are of most interest.
Selecting a test configuration
It is possible to adjust a wide range of values from the „test duty cycles‟ and “test
preferences‟ windows. The following general tips can be used to help select the right
combination of tests to perform and their intensity level.
 Only turn on tests for which there is some corresponding hardware. For example, there
is obviously no point in turning on the tape drive test if there is no tape drive installed.
 If the disk drive has a fairly large capacity, you will probably need to set the duty cycle
for the disk test to 100% in order to make sure the maximum amount of disk surface is
tested over several cycles.
 Monitor the CPU utilization during the 1st couple of test runs. If the CPU is not running
at 100% all the time, raise the duty cycle of one or more tests. Conversely, if the CPU
consistently runs at 100%, lower the duty cycle of one or more tests.
 If the machine has booted to Windows there is a reasonable chance that the CPU is
working reasonably reliably. Give preference to the RAM test over the CPU test when
setting the duty cycle. RAM tends to fail more often than a CPU.
 Don’t be scared of pushing the machine too hard. It’s better that it fails on the
production line than after you have shipped it to your customer.

You should test for at least a few hours. An absolute minimum is one complete cycle of
the disk test. Leaving BurnInTest to run on the PC overnight should give the machine a good
work out.

Carrying out tasks before the test run

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Date Revised: Issued by:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 101 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
From the Pre-Test tab in the preferences window, BurnInTest allows the user to
select the option of running an external application before the test run proper starts. For
instance you may want to launch a report of the previous test run before beginning the current
one. The test run proper will not begin until the external application is exited.
Carrying out tasks after the test run
From the Timers tab in the preferences window, it is possible to define certain actions to
take on successful or unsuccessful test completion. In each case (successful or unsuccessful completion),
there are three options.
1. Stop the tests normally (this is the default behavior).
2. Stop the tests, Close BurnInTest and run a specified external application. This could be used,
for example, to call an application or batch file that would clean up the hard disk after the
completion of testing.
3. Reboot the PC using the current Reboot options. This option uses the PassMark Rebooter
application to perform the reboot. If used in conjunction with a startup shortcut to
BurnInTest, it’s possible to create a reboot cycle. See the „Rebooter‟ section below for more
details.

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Date Revised: Issued by:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 102 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
As each environment will be different, the function of an external batch file will vary
between companies. Some possibilities are described below.
Example Autostop actions
 Copy the log files (see below) to a network drive
 Call an external program to sound an audible alarm
 Start another test program to run a sequence of tests
 Call a batch file to clean up the hard disk of the machine
Report information - (Machine identification)
General report information
The identity of the machine can be entered in to the „Machine Identity‟ window,
(accessible from the Edit menu in BurnInTest).
Certificate report information
The fields in this section allow the entry of customer specific information for the system
under test. This information is used in the Customer Test Certificate report.

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Date Revised: Issued by:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 103 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
This information can be saved to a file using the „Save as Defaults‟ button. The name of
the file is always “machineid.dat‟. This file will be saved in the BurnInTest installation
directory.Each time BurnInTest starts it checks to see if this file exists on the disk and loads the
contents of the file.

Test reporting - logging to disk


BurnInTest can create report files automatically. Using the setting in the preferences dialog the
user can select:
 If logging to disk is on or off.
 The log file directory and base file name. Note: Log files are prefixed as described below
and suffixed with the created date and time.
 The required detail level of the log file. Either a Results Summary or Normal
(recommended).
 Whether a very detailed activity trace log is produced and the level. It is recommended
that No trace log be specified under normal circumstances.
 The approximate size of the log (and trace) files.
 The format of the log file. Plain ASCII text, HTML web page or HTML Customer
certificate..
 A prefix to the log file name, including a number of system Environment variables.
 Whether to clear all log files at the start of each test run, or to accumulate the log files
over test runs.
Note: Log entries are written to disk in real time. You can also log periodic interim
result reports.

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Date Revised: Issued by:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 104 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
The log file format can be ASCII (plain text), HTML (for the web) or an HTML
Customer certificate (1 page HTML report for your customer). Log files can be opened in a text
editor or a word processor application. See the example reports Appendix 1. HTML files can be
opened in a browser and posted on the web. Both formats can be attached to E-Mail messages.

New log/trace files will be created when BurnInTest is started and logging is turned
on, or any logging options are changed (eg. Turned on, Log directory changed, format changed).
If BurnInTest is restarted with scripting commands of REBOOT or REBOOTEND, entries will be
concatenated to the previous log file (ie. That relate to the same script being run).
BurnInTest will automatically modify the file name selected to include the current
date and time, e.g. If you use the file c:\temp\logfile.txt as your log directory then BurnInTest
will create files like,
c:\temp\logfile_081209_113751.log
or
c:\temp\logfile_081209_113751.trace (for a trace file)
051209 is the date (in Year Month Day format), the 9th of December 2008 in this case.
113751 is the time (in Hour Minute Second format)
Logging to disk may be useful if your system is unstable. You could create a log, and
then even if the computer crashed, you would have a record of how much testing was
completed before the crash. Logging can also be used as a method of keeping quality assurance
records in a manufacturing environment.
Installation and execution options

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Date Revised: Issued by:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 105 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
There are several different ways to install and run BurnInTest. Some of them are
more suited to a mass production environment.
Standard Install
This is what happens when the standard package is installed. The files are expanded
from the compressed archive and the install program is run to prompt the user for various
information, like the installation directory. Files are then copied from the archive to the
installation directory and some information is written to the registry to support the security
software used to protect BurnInTest and the uninstallation of the package. After a standard
install, uninstallation should be done from the Add / Remove programs icon in the Windows
control panel. In a mass production environment this option can be time consuming.
Run from a removable drive or network drive
The installation step can be avoided entirely by running BurnInTest directly from a
CD, USB drive or Network drive. There are some issues with each method that bear
consideration.
 Running from a CD
Normally BurnInTest uses the BurnInTest installation directory to store log files and
configuration settings. Running BurnInTest from a read only CD will mean that it will not be
possible to create / update these files. To run BurnInTest from a CD when no Operating System
is installed, please see the section on “Running BurnInTest from a bootable CD”
 Running from a USB Key drive
This method is recommended over running BurnInTest from CD as configuration
and log files can be saved.
 Running from a Network drive
This can be a viable option but if multiple instances of BurnInTest are started from
the same network directory at the same time, there is a risk that configuration and log files will
be overwritten by the various different instances. BurnInTest also uses a custom driver for
certain purposes, such as accessing Parallel ports. BurnInTest will not have sufficient privileges
to install the driver from a network.
 Running from a Floppy disk
From V5.0, BurnInTest is too large to run be from a floppy.
Examples
Example 1: Use the following process to run BurnInTest from a CD or USB key drive.
It is possible to install BurnInTest Professional onto a USB drive or CD/DVD/BD such
that no installation is required on the test system. This can be useful in a number of scenarios,
such as field staff testing PC's without installing BurnInTest on the test system.
When running BurnInTest this way, there will be no files left on the PC after
BurnInTest has finished. The procedure is the same for optical disks, but as it is not writeable

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Date Revised: Issued by:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 106 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
for log files, logging should be either turned off or specified to be on a writeable drive . You can
also get more sophisticated by having multiple test configurations; there is some information
about this in the help file.
When BurnInTest is run from a removable drive when installed in this way, the
default directory for the users files (like reports and the configuration file) is the BurnInTest
directory, rather than the normal default directory of the users Documents directory. The
command line parameter "/p" required in V5.x in this scenario is now turned on automatically,
and is no longer required for a USB drive installation.
Installing BurnInTest to a USB drivePassMark
This installation process can be performed for a USB drive installation (any writable
drive) using the menu option "File"->"Install BurnInTest to a USB drive". This option was added
to the normal BurnInTest Professional V6.0.1002 package (and the "zip" build as required in
V5.x is no longer required or available).
From the "Install BurnInTest to a USB drive" Window, you need to specify:
4) The USB drive and directory you want to install BurnInTest to. For example,
"F:\BurnInTest". BurnInTest will create the directory if it does not exist.
5) The type of installation. If you have a license key, then select Licensed, otherwise
select Evaluation for a trial period.
6) If you selected a "Licensed" installation type, then enter the Username/Key. When
you select install, BurnInTest will create the directory on the USB drive (e.g.
F:\BurnInTest), copy all of the files from the BurnInTest directory (e.g. C:\Program
Files\BurnInTest) to the USB drive (e.g. F:\BurnInTest) and install the license
information onto the USB drive.
When you select install, BurnInTest will create the directory on the USB drive (e.g.
F:\BurnInTest), copy all of the files from the BurnInTest directory (e.g. C:\Program
Files\BurnInTest) to the USB drive (e.g. F:\BurnInTest) and install the license information onto
the USB drive.
Installing BurnInTest to an optical disk
To install BurnInTest on an optical disk (CD/DVD/BD) follow the process above, but specify a
writable temporary directory in step 1 (e.g. C:\BurnInTest). On completing the installation to the
temporary directory, burn the created directory to the optical disk.
Example 2: An alternate example of running BurnInTest from a CD is provided below. This example
assumes the following.
 That log files need to be kept
 That each PC to be tested has a CD drive (Drive F), a USB key drive (Drive G) and no network
connection.
 That the machine needs to be left in a clean state.
1. Create the required configuration files

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Date Revised: Issued by:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 107 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
From within BurnInTest, select the settings that suit your specific test requirements from
the test duty cycle window and the test preferences window. Save this configuration, using the „Save
Config As‟ menu option. This can be repeated several times if several test configurations are required.
For this example we assume the following…
 The default „Stop Tests‟ on testing Passed and „Stop Tests‟ on testing Failed options are
selected from the Post-test tab of the preferences window.
 Automatic logging is turned ON from the Logging tab of the preferences window.
The log file directory is, c:\burnintest
The name of the log file is, ‘bitlogfile.txt’
 The name of the saved configuration file is, ‘heavyload.bitcfg’
2. Create the required batch file
Using Notepad or another text editor, create an installation batch file (“startburn.bat‟), eg.

mkdir c:\burnintest
copy f:\*.* c:\burnintest
c:\burnintest\bit.exe /r /p heavyload.bitcfg
copy c:\burnintest\bitlogfile*.* g:\
copy c:\burnintest\error*.* g:\
del c:\burnintest\*.*
rmdir c:\burnintest
This batch file installs BurnInTest then runs the software with the configuration file that was
prepared in advance. It then saves the log files to a USB Key drive and cleans up.
3. Create a fast install CD
Follow the steps given above to create a CD (in section „Installation and execution options‟), but when
burning the CD include the configuration files and batch file created above. Optionally a machine
identification file, „machineid.dat‟, (see above), could also be included on the CD.
4. Run the tests
To run the tests insert the CD in a machine to be tested and run the batch file.
5. Collect the results
If the test is completed without error there will be a number of log files on the USB Key
drive. These can then be transferred to a central data store (along with the serial number of the
machine). If the test is completed with at least one error you will see something that looks like the
following.

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Date Revised: Issued by:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 108 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
Example 3: Other examples of using command line arguments
There are a number of different ways to specify command line arguments and this can
depend on what you are trying to achieve. The most common options for specifying a command line
argument are:

1) You can create a shortcut to bit.exe and then specify the command line in the shortcut target.
Example 3.1: Start BurnInTest from a shortcut and run tests automatically.
Right click on the bit.exe file and select Create Shortcut.
Right click on the new shortcut file and select Properties and specify a Target with the command
line argument.
"C:\BurnInTest\bit.exe" –r

Now to run BurnInTest with these command line parameters, just double click the
BurnInTest shortcut. You could also copy the shortcut to the Windows Startup folder to run BurnInTest
automatically with thecurrent default settings after Windows has booted.

2) You can open a command window, Start-R, "Cmd". This will open a command window where you can
type commands directly, such as shown below.
Example 3.2: Start BurnInTest from a command window and run a pre-defined script of tests
Select Windows Start-R, "Cmd"
Once the Windows command window is open, type in the commands:
cd C:\Program Files\BurnInTest
bit.exe -s MyScript.bits

4) You can write a batch file to execute BurnInTest with Command line arguments.
Example 3.3: Start BurnInTest from a batch file with a pre-defined configuration file
Create a file with an text editor (like Notepad) called Test.bat and include the lines in the file
c:
cd "\program files\BurnInTest"
CBLM on CSS NC II Date Developed: Document No.
JANUARY, 2020
MAINTAINING AND REPAIRING Date Revised: Issued by:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 109 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
bit.exe –c “heavyload.bitcfg”

Running BurnInTest on a System without an operating system


A bootable CD can be created with Microsoft Windows XP and BurnInTest 6.0 Professional
using Bart Preinstall Environment. Many BurnInTest users can benefit from testing PC hardware when
there is no Operating system installed, or the Operating System is inoperable. This can be useful for
testing PC hardware:
5. In a production line environment,
6. That is to be shipped with Linux,
7. In a known virus free environment and
8. To try to determine the cause of corruption of an Operating System.
A document (http://passmark.com/ftp/BIT_BartPE_v6.0.pdf) has been produced to assist
people in setting up an environment that allows PassMark BurnInTest to be used in these situations.
Restricting a user from changing the tests selected
In a production line environment, it may be required to remove the ability of the tester to
modify which tests are to be used, either to force the use of pre-defined test configurations or simply to
stop tests being removed from the test setup. The option to select and de-select tests in the BurnInTest
“Test setup and duty cycles” window can be disabled per test. To do this a file “BITaccess.txt” needs to
be included in the BurnInTest directory to specify which checkboxes in the setup window will be
disabled. Please email us to request a sample “BITaccess.txt” file.
Rebooter
PassMark Rebooter is a small freeware application, which is distributed with BurnInTest. It
offers various options, to provide automated rebooting of computers.

The “Reboot options‟ section allows the selection of Reboot types (Reboot,
Shutdown, Power Off, Logoff), Force shutdown behavior (Ask to close, Force to close, Force if
hung), the Delay once Rebooter is triggered before rebooting and the number of Maximum
Reboots, used for during reboot cycling (see below). The „Auto-login‟ section provides the

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Date Revised: Issued by:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 110 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
option of setting the system to auto login on restart. If Rebooter is run without any command
line options, it launches the configuration window as above. If the command line option –
reboot is used, Rebooter will automatically carry out the currently saved reboot option.
e.g.
rebooter.exe –reboot
Reboot cycling
BurnInTest can be setup so that the PC will reboot itself in a cycle, with test runs
occurring between each reboot. BurnInTest uses another software utility called Rebooter to
reboot / restart a PC. Rebooter can be used from within BurnInTest or it can be run by itself
(look for the executable called, rebooter.exe in the BurnInTest installation directory).
To use Rebooter from within BurnInTest, go to the BurnInTest Preferences window
and then select the "Post-Test" tab. Clicking on the „Reboot options‟ button will open the
Rebooter configuration window. You can get additional help about Rebooter options by clicking
on the help button in the Rebooter configuration window.
Here is a brief description of how a BurnInTest can be set-up to reboot itself in a
cycle.
Step1 – Select and save Rebooter settings
Set the “Maximum Reboots‟ value to the number of cycles required.
Set the other parameters in Rebooter. (Reboot type, Delay, etc). Don’t set the delay value to be too
short, as you want BurnInTest to fully stop before rebooting. 20 Seconds is a good value.
Save the settings, with the „Save Options‟ button. Then close the Window.
Step2 – Configure the settings you want in BurnInTest
From the Preferences and Duty Cycle windows enter all the settings that you want for your test runs.
When you close these windows, the settings are saved to disk and will become the new default values.
Alternatively a separate configuration file could be created (using the „Save As Config‟ menu option)
and used on the command line.
Make sure you
- Set a test period with the Auto-Stop option in the preferences window.
- Select „Exit & reboot PC‟ in the Action after Auto-Stop check boxes.
- Have the log file accumulation option set in the Logging section of the preferences window
Step3 – Create an auto run shortcut
Create an auto run short cut that points to the BurnInTest executable. You need to do this
manually in Windows. The command line in the shortcut should use the „/r‟ option. This will start tests
executing in BurnInTest automatically. The command line for the shortcut should be something like
C:\Program Files\BurnInTest\bit.exe /r
The Rebooter help file (Rebooter.hlp ) also contains more details about how to start programs
automatically with Windows.
Step4 – Start the cycle
Start the 1st test run from within BurnInTest, with the "Start Tests" button. At the
end of the test period you have entered the PC will reboot according to the settings in Rebooter
CBLM on CSS NC II Date Developed: Document No.
JANUARY, 2020
MAINTAINING AND REPAIRING Date Revised: Issued by:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 111 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
and after the reboot, BurnInTest will automatically re-start and do another test run, then
Reboot again.
Note:
When Rebooter is started from BurnInTest, the Rebooter setting of "Auto load
Rebooter at startup" is not applied. This allows BurnInTest to be setup as the auto restart
program, and avoids the conflict of both BurnInTest and Rebooter autostarting after a reboot.
This means that only a single reboot will be performed when rebooter is run from BurnInTest.
To perform multiple reboots from within BurnInTest a script should beused with multiple
REBOOT commands.
More about Rebooter
Rebooter is a small utility program developed by PassMark Software to help
automate the PC hardware testing process. It has been designed to work with PassMark
BurnInTest but will also work with 3rd party application. Rebooter allows you to
 Shutdown, Reboot or Logout of a PC.
 Reboot a PC from the command line
 Set a timer so that the PC will reboot after a certain amount of time
 Setup a reboot loop, to reboot a PC over and over again in a cycle.
 Force a shutdown or request a shutdown.
 Enable and disable the Windows auto-login feature. (Windows 2000, XP and later)
 Include reboots into your hardware stress testing plan, (when used with BurnInTest).
Sleeper
PassMark Sleeper is a small freeware application, which allows the user to put their
system into various states of sleep and hibernation. Sleeper can be called from BurnInTest using
the „Close BurnInTest and run external file‟ option from the Post test tab of the BurnInTest
preferences window.

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Date Revised: Issued by:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 112 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
If Sleeper is called without any command line, the configuration screen above is
displayed allowing the user to select options such as the Sleep state to enter, the duration of
the sleep or hibernation etc. It is then possible to begin the sleep by clicking the Sleep Now
button.
All settings can also be specified from the command line. See the Sleeper online
help for more details on command line options.
Like Rebooter, Sleeper can be called from within BurnInTest by specifying the required
command line from within the Pre-Test and/or Timers tabs on the preferences window.
Test hardware - Loopback plugs
The BurnInTest optical drive test provides the best test when used with PassMark
CD/DVD test set as this provides pre-defined test data selected for the specific purpose of
testing optical drives and that BurnInTest can better validate.
The following BurnInTest tests use loopback plugs or cables.
 Serial Port test
 Parallel Port test
 Audio test

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Date Revised: Issued by:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 113 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
 USB test. PassMark USB 2.0 Loopback plug: Used to test USB 1.x and 2.0 ports. Supports
testing of FullSpeed (12Mb/s) and HighSpeed (480Mb/s). USB 2.0 ports will be tested at
the faster HighSpeed.
It is recommended that you have at least one plug per port on the machine under
test. For example, if the computer being tested has two COM ports, then having two serial
loopback plugs will halve the amount of time you must spend testing.
When testing BurnInTest with the BurnInTest Firewire Plugin, a 3rd part Firewire
plug is recommended (Kangaru FireFlash).
Testing specialized hardware
If you have specialized hardware that BurnInTest does not test, you can write your
own test and integrate it with BurnInTest (V5.0 and later).
Up to 5 Plugins can be specified. PassMark has developed Plugins for the following tests:
 Modem testing, using PassMark's ModemTest software;
 Keyboard testing, using PassMark's KeyboardTest software,
 Firewire port testing, using a PassMark developed Plugin and a "Kanguru FireFlash"
drive.
Sample software in C and C++ is also available to assist developing a Plugin for your specific
hardware.
As well as demonstrating how to develop and integrate a test Plugin, these samples
also provide examples of how to run pre-test applications and post test applications, and how
to pass some information, such as pre-test configuration and post-test results, between
BurnInTest and other applications.
Un-installer command line arguments
The BurnInTest uninstaller executable can be found in the BurnInTest installation
directory. It is called, “unins000.exe”. Running this file will uninstall BurnInTest. There is also a
command line option for the
uninstaller.
/silent
When specified, the uninstaller will not ask the user any questions or display a
message stating that uninstall is complete. Shared files that are no longer in use are deleted
automatically without prompting. Any critical error messages will still be shown on the screen.

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Date Revised: Issued by:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 114 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
Self-Check 4.5-1

Directions:
TRUE OR FALSE
True or False:
Instructions: Write TRUEif the statement is true andFALSEif it is false.
1. Burn-in is necessary in all computer system and its
components.
2. Windows 7 is a software designed especially for burn-in.
3. BurnInTest detects and collects system information and this is
displayed in BurnInTest and the test reports.
4. Another term of burn-in testing is stress testing.
5. Burn-n may be conducted to ensure that advice or system
functions properly before it leaves the manufacturing plant or
may be part of a repair or maintenance routine.

CBLM on CSS NC II Date Developed: Document No.


JANUARY, 2020
MAINTAINING AND REPAIRING Date Revised: Issued by:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 115 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01

You might also like