Professional Documents
Culture Documents
administrater network and hardware peripherals2 (Autosaved)
administrater network and hardware peripherals2 (Autosaved)
administrater network and hardware peripherals2 (Autosaved)
ADMAS UNIVERSITY
Learning
Guide
Unit of Competence: ADMINISTRATE NETWORK AND HARDWARE
PERIPHERALS
INFORMATION SHEET 1
LO1: Confirm requirements of client
Title: Identifying and confirming client peripherals
Types of mouse
Opt mechanical mouse - The optical-mechanical or Opto-mechanical mouse
consists of a ball that rolls one of two wheels inside the mouse. This wheel
contains a circle of holes or notches that allow a LED light to be shined through
and detected by a sensor, as each wheel spins they represent the X or Y axis for the
mouse pointer. This mouse is much more accurate than the traditional mechanical
mouse that used only wheels and rollers, however is not as good as an optical
mouse.
Optical mouse - Computer mouse that utilizes light-emitting diodes (LED) or laser
as a method of tracking movement. These mice are more proficient than other
computer mice. These mice are easily identified by examining the bottom of the
mouse. If the mouse has no ball or has a light emitting from the bottom it's
most likely an optical mouse. This mouse is much more accurate than the ordinary
optical mechanical mouse that relies on the traction between the mouse ball and the
rollers.
One drawback to an optical mouse is they can have problems in bright lights.
New Optical Mice no longer have the disadvantages of earlier mice and are
capable of being utilized on any surface. In
comparison to the traditional Optical-Mechanical
mouse, the Optical is a much better solution for a
computer mouse.
Scanner is a device that can scan or digitize
images on paper and convert them to data that
Date: September, 2017
Video input devices are used to digitize images or video from the outside world
into the computer. The information can be stored in a multitude of formats
depending on the user's requirement.
digital camera Image scanner
Fingerprint scanner Webcam
Medical Imaging
Computed tomography
Magnetic resonance imaging
Positron emission tomography
Medical ultrasonography
Output Device
If the device is shared between several computers, it makes more sense to keep
information about the peripheral as an individual entry in an inventory. Devices
such as digital cameras, data projectors and USB drives would more likely to be
used by many computers, thus it would make more sense to record their details
separate to the computer details.
Checking contents
When unpacking any peripheral device, an organized and methodical approach
needs to be taken. Randomly ripping open boxes and packaging without carefully
identifying each component can potentially cause many problems later on.
Prepare a suitable work area before you begin unpacking. This should include a
large sturdy flat area with no carpet so that small components will not be lost.
Before commencing to open any packaging, find the manual for the device. Check
instructions for any precautions or specific unpacking procedures. Most manuals
will also contain a section that tells you a list of included components. It is useful
to create a checklist based on the component list. You will then be able to use the
checklist to mark off the components when they have been identified.
Date: September, 2017
Storing consumables
The term ‘consumables’ refers to a product that is used once and then replaced.
Examples of consumables include printer cartridges, CDs and paper. As well as for
computer equipment, consideration also needs to be given to the way consumables
for peripheral devices are stored.
Paper
Paper needs to be stored in an area which is cool and dry, to prevent moisture from
fusing pages together.
Ink cartridges and toner
Make sure to store cartridges/toner in a cool dry place, away from sparks and open
flames, with adequate ventilation and do not expose the device to high
Instructions: You are required to perform the following individually with the presence of your
teacher.
Scenario: You have already selected a supplier of computer peripherals. You are going to place
an order of the peripherals per piece. It will be assembled later by the company technician. You
can decide on the specs of it.
Code Quantity Description Price Supplier Name
GST
TOTAL
Delivery point: _
Budget holder’s signature:
Make an inventory of all the delivered items. (Just choose one item for the purpose of this
activity)
INFORMATION SHEET 1
LO3 Connect hardware peripherals
Title Avoid disruption to the client
Minimal disruption to the client
One of the most important considerations when installing a new hardware peripheral is to try and install
the device with the least amount of disruption to the client. A client may not be very happy if you install
a piece of hardware equipment while they are creating an urgent report. It is important to schedule
installation times that are:
2. Sufficient length to install and thoroughly test the hardware device. To achieve this, make sure that
you are aware of:
common organizational procedures that regularly need to be performed on the computer (for
example, end of month processing or weekly backups) and plan installations outside these
periods
Current projects, deadlines and schedules of the client/user. Installations should be scheduled
for times such as:
You won’t need many tools to assemble your computer, in fact the only one you must have is the
screwdriver, but if you can get most of the following together, you’ll find things go a little easier.
Basic tools
Before you begin building or refitting a computer, you should have some basic tools:
2. Needle-nose pliers
Preparation
Proper preparation is the key to a successful build. Before you begin, make sure you have all the tools
you will need, secure a clear, well-lit workspace, gather all the components you’ll be using and unpack
them one at a time, verifying that everything that is supposed to be there is actually present. At this
point you should leave the parts themselves in their protective anti-static bags, and assemble all the
accompanying manuals. Now I know you want to get started, but trust me, read the manuals, check the
diagrams, make sure you understand where each part goes and how it attaches. If there is anything you
don’t understand, now is the time to do a little extra Internet research or call the manufacturer with
your questions.
Find a dry, well-ventilated place to do your work. You should have plenty of light and if possible, you
should choose an area without carpet on the floor, as carpet tends to generate a lot of static. An
unfurnished basement is a good work location.
Safety precautions are important for your own security. Please read the safety precautions
thoroughly.
Name: Date:
Instruction: Answer all the questions listed below, if you have some clarifications- feel free to
ask your teacher.
1. Give the three basic tools in assembling/ replacing hardware peripherals. (1 point)
2. Give at least four (4) optional but useful tools in assembling/ replacing hardware peripherals.
(4 points)
3. What is the key to a successful build of hardware? (1 point)
4. Give the six (6) safety precautions in assembling/ replacing hardware Peripherals. (6 points)
5. What are the four (4) considerations in scheduling installations or replacement of computer
peripherals? (4 points)
Note: Satisfactory rating – 10 points above / Unsatisfactory - below 10 points.
Date: September, 2017
INFORMATION SHEET 3
LO3 Connect hardware peripherals
Title testing devices and creating a test plan
Testing
In addition to ensuring a device is able to perform a basic task (such as printing a test page or
scanning an image) it is also necessary that all functionality required by the client is tested.
When new peripheral equipment is not tested for critical functions before being used, it can
lead to malfunction, causing large disruptions to clients and potentially damage other parts of a
computer system. If, for example, a new external zip drive has not been tested to check it will
be capable of making backups of specific files, it could mean that vital information of the
client’s could be destroyed if those backups were not successful.
Ensure that all new installations are thoroughly tested after initial setup and prior to use by the
client. Depending on the device, different functions will need to be tested.
Devices that have components that are known to degrade with time, especially printers, should
also be tested periodically. Printers need to be routinely tested, as components such as the ink
Date: September, 2017
Some suggestions of functions that may be tested for a printer, scanner and digital camera
devices are included below.
Printer
Printer functions that may be tested are:
Can the printer handle different paper types (for example A4, A5, foolscap, thick, thin,
overhead transparencies)?
Will the printer work successfully on different computers?
Will the printer work successfully with different software packages (for example, word
processing, spreadsheets and desktop publishing)?
Is black and white print quality acceptable to clients?
Is color print quality acceptable to clients?
Scanner
Scanner functions that may be tested are:
Is the resolution of a scanned image an acceptable quality?
Does the scanner work correctly with different software packages (e.g. a word
processor or desktop publishing package)?
Can the scanner handle items of unusual size and thickness (e.g. a large book or
cardboard poster)?
Does the OCR software scan a document successfully?
Will the scanner work successfully on other computers?
Digital camera
Is the entire camera images transferred correctly from the camera to the computer?
Instruction: Answer all the questions listed below, if you have some clarifications- feel free to
ask your teacher.
1. What must be done after the installation of hardware peripherals? (1 point)
2. It is used to work out a structured process to ensure that a new device will work under all
expected circumstances. (1 point)
3. What does the test plan logically describes? (4 point)
4. Create a test plan for a digital camera based on its functions stated above following the test
plan table. Do it in a separate sheet of paper (10 points)
Note: Satisfactory rating – 13 points above / Unsatisfactory - below 13 points.
You can ask you teacher for the copy of the correct answers
Replacing RAM
How to Install RAM Memory Replacement DIMM
Replacing a CPU
Date: September, 2017
INFORMATION SHEET 1
LO4 Install peripherals to a network
Date: September, 2017
A computer network can also consist of, and is usually made for, more than two
computers:
Wide area networking combines multiple LANs that are geographically separate. This
is accomplished by connecting the different LANs using services such as dedicated
leased phone lines, dial-up phone lines (both synchronous and asynchronous), satellite
links, and data packet carrier services. Wide area networking can be as simple as a
modem and remote access server for employees to dial into, or it can be as complex as
hundreds of branch offices globally linked using special routing protocols and filters to
minimize the expense of sending data sent over vast distances.
4. Explain Local Area Network and give at least 3 example ?(3 points)
5. Explain Wide Area Network and give at least 3 example ?(3 points)
Bus topology
A bus topology is a type of network setup where each computer and network
device is connected to a single cable or backbone. Below, is a visual example of a
simple computer setup on a network using the bus topology?
Ring topology
Also in ring topology all the traffic flows in only one direction at very high
speed.
2) Even when the load on the network increases, its performance is better
than that of Bus topology.
3) There is no need for network server to control the connectivity between
workstations.
4) Additional components do not affect the performance of network.
5) Each computer has equal access to resources.
Star topology
• The Star Topology is fully dependant on the hub and the entire working of the
network depends on the hub or the switch.
• If there are many nodes and the cable is long then the network may slow down.
Mesh topology
A network setup where each computer and network device is interconnected with
one another, allowing for most transmissions to be distributed, even if one of the
connections goes down. This topology is not commonly used for most computer
networks as it is difficult and expensive to have redundant connection to every
computer. However, this topology is commonly used for wireless networks. Below
is a visual example of a simple computer setup on a network using a mesh
Name________________________________ Date_________________
Instruction: Answer all the questions listed below, if you have some clarifications-
feel free to ask your teacher.
1. Define topology?(1point)
2. Write three types of topology?(3 points)
3. Define Bus topology and show by diagram?(2 points)
4. Define Ring topology and show by diagram?(2 points)
5. Define Star Topology and show by diagram?(2 points)
6. Define Mesh topology and show by diagram?(2 points)
7. Write advantage of Bus topology?
8. Write advantage of Ring topology?
9. Write advantage of Mash topology?
10.Write advantage of star topology?
Cable is the medium through which information usually moves from one network
device to another. There are several types of cable which are commonly used with
LANs. In some cases, a network will utilize only one type of cable, other networks
will use a variety of cable types. The type of cable chosen for a network is related
to the network's topology, protocol, and size. Understanding the characteristics of
different types of cable and how they relate to other aspects of a network is
necessary for the development of a successful network.
The following sections discuss the types of cables used in networks and other
related topics.
Twisted pair cabling comes in two varieties: shielded and unshielded. Unshielded
twisted pair (UTP) is the most popular and is generally the best option for school
The quality of UTP may vary from telephone-grade wire to extremely high-speed
cable. The cable has four pairs of wires inside the jacket. Each pair is twisted with
a different number of twists per inch to help eliminate interference from adjacent
pairs and other electrical devices. The tighter the twisting, the higher the supported
transmission rate and the greater the cost per foot. The EIA/TIA (Electronic
Industry Association/Telecommunication Industry Association) has established
standards of UTP and rated six categories of wire (additional categories are
emerging).
The standard connector for unshielded twisted pair cabling is an RJ-45 connector.
This is a plastic connector that looks like a large telephone-style connector (See
fig. 2). A slot allows the RJ-45 to be inserted only one way. RJ stands for
Registered Jack, implying that the connector follows a standard borrowed from
the telephone industry. This standard designates which wire goes with each pin
inside the connector.
Although UTP cable is the least expensive cable, it may be susceptible to radio
and electrical frequency interference (it should not be too close to electric motors,
fluorescent lights, etc.). If you must place cable in environments with lots of
potential interference, or if you must place cable in extremely sensitive
environments that may be susceptible to the electrical current in the UTP, shielded
twisted pair may be the solution. Shielded cables can also help to extend the
maximum distance of the cables.
Coaxial cabling has a single copper conductor at its center. A plastic layer provides
insulation between the center conductor and a braided metal shield (See fig. 3).
The metal shield helps to block any outside interference from fluorescent lights,
motors, and other computers.
Thin coaxial cable is also referred to as thin net. 10Base2 refers to the
specifications for thin coaxial cable carrying Ethernet signals. The 2 refers to the
approximate maximum segment length being 200 meters. In actual fact the
maximum segment length is 185 meters. Thin coaxial cable has been popular in
school networks, especially linear bus networks.
Thick coaxial cable is also referred to as thick net. 10Base5 refers to the
specifications for thick coaxial cable carrying Ethernet signals. The 5 refers to the
maximum segment length being 500 meters. Thick coaxial cable has an extra
protective plastic cover that helps keep moisture away from the center conductor.
This makes thick coaxial a great choice when running longer lengths in a linear bus
network. One disadvantage of thick coaxial is that it does not bend easily and is
difficult to install.
The most common type of connector used with coaxial cables is the Bayone-Neill-
Concelman (BNC) connector (See fig. 4). Different types of adapters are available
for BNC connectors, including a
T-connector,
Barrel connector, and
Terminator.
Fiber optic cabling consists of a center glass core surrounded by several layers of
protective materials (See fig. 5). It transmits light rather than electronic signals
eliminating the problem of electrical interference. This makes it ideal for certain
environments that contain a large amount of electrical interference. It has also
made it the standard for connecting networks between buildings, due to its
immunity to the effects of moisture and lighting.
Fiber optic cable has the ability to transmit signals over much longer distances than
coaxial and twisted pair. It also has the capability to carry information at vastly
greater speeds. This capacity broadens communication possibilities to include
services such as video conferencing and interactive services. The cost of fiber optic
cabling is comparable to copper cabling; however, it is more difficult to install and
modify. 10BaseF refers to the specifications for fiber optic cable carrying Ethernet
signals.
The center core of fiber cables is made from glass or plastic fibers (see fig 5). A
plastic coating then cushions the fiber center, and kevlar fibers help to strengthen
the cables and prevent breakage. The outer insulating jacket made of teflon or
PVC.
There are two common types of fiber cables -- single mode and multimode. Multimode cable has
a larger diameter; however, both cables provide high bandwidth at high speeds. Single mode can
provide more distance, but it is more expensive.
Date: September, 2017
Fiber Optic
100BaseFX
Name________________________________ Date_________________
Instruction: Answer all the questions listed below, if you have some clarifications-
feel free to ask your teacher.
INFORMATION SHEET 4
Serial communication
Serial Data
The Serial Direct Connection is the one which utilizes the COM ports of your
computers. Every computer has at least two COM ports, COM1 and COM2. The
"COM" stands for "Communications". Its pinouts are a lot simpler when compared
to the parallel port, but the speed is also a lot slower.
To give you an idea of how fast (or slow) a serial port is, at its best you will get
around 12 to 14 KB per second. That's pretty slow when you're used to a network
connection, but let me show you how serial data is transferred so you can also
understand why it's a lot slower.
Most new computers have two COM ports with 9 pins each; these are DB-9 male
connectors. Older computers would have one DB-9 male connector and one DB-
25 male connector.
Parallel Data
The Parallel Direct Connection is the second solution to transfer data from one
computer to another. The cable required is slightly more complicated as it has
more wires that need to be connected, but the speeds you will get from it will make
it well worth the time and effort required to make the cable.
Date: September, 2017
What is a Hub?
Hubs are such simple devices — they require no configuration, and have no
manuals — that their function is now included in other devices such as routers and
modems. NETGEAR no longer sells stand-alone hubs. If you require a stand-
alone appliance, use a switch instead. Switches provide better performance and
features than hubs.
Examples of hubs.
The importance and the integration of networking hardware in modern devices can
be understood better, as these devices are also included in day to day utilities such
as mobile phones, PDAs and even modern coffee machines.
Date: September, 2017
A router is referred to a computer which has the ability to perform such tasks as
routing and forwarding information with use of software and hardware. Routers are
regarded to generally contain a specialized operating system, along with such
devises as RAM, NVRAM, flash memory, and one or more processors.
According to simple theoretical terms, switches are defined as devices which join
multiple computers together, with better facilities offered than hubs. And hubs can
be defined as, small, uncomplicated, economical devices that join multiple
computers, with a lower or basic level of networking facilities.
Modems
A modem enables a computer to transmit data over long distances using a cable or
telephone line. As
Computer data is in digital form, it needs to be converted for transmission over the
cable/telephone line, which only carries analog waves. This task or conversion is
facilitated by a modem.
Network Adapters
This piece of networking hardware is one of the most essential pieces of equipment
for any computer network, since it has the function of providing access between a
computer and a network connection. When considering the theoretical aspects of
network adapters, it is common to discuss the importance of another essential
component, the network interface card or NIC. The term NIC refers to network
adapter hardware in the form of a card.
Network Cables
Patch Cables - A patch cable connects two network devices
Ethernet Crossover Cables - A crossover cable directly connects two network
devices of the same type to each other over an Ethernet. Crossover cables are
useful for temporary networking of devices when a network router, switch or hub
is not present. Fiber Optic Cable - Fiber optic cables carry information using light
pulses. These cables are typically designed for long distance networking use,
although they are soon becoming popular for home use today.
Network interface devices for computers and printers typically take one of three
common forms:
Each node (workstation, file server, or printer) on your network needs a network
interface card and/or connector. The card or connector works together with the
network operating system software and network applications to supply networking
capability to the node. Additional wiring and components connect the nodes to
create the LAN.
Most network interface devices are installed inside workstations. There are
currently a few exceptions:
Workstation Software
Each workstation on your network must have network software installed on it. The
software varies according to platforms and operating systems, but all programs
require network-related information such as IP addresses, gateway addresses,
domain name information, and subnet addresses
Physical layer
Data Link layer
Date: September, 2017
This layer takes the data frames or message from the network layers and
provides for all their actual transmission. The data link layers also provide error
free delivery of data between the two computers by using physical layers.
Example of MAC layers are Enter net 802.3 and Token Ring 802.5
LLC sub layers: - defines services access points (SAPs) which are used to
transfer information to the upper layers to the OSI Model
Transport layer handles the delivery of data packets at their respective ends and
destinations. It is also responsible for identifying errors and duplication of data
through out with in the network. Once data is transferred to their respective
ends successfully it provides acknowledgement about it and resends the data on
receiving errors during transferring.
Session Layer: Layer 5
Session layer is designed to manage established sessions between two different
nodes (users) with in the network. Session layer is also responsible to establish
connection then identifies who and how much data is to be sent how much time
is required for it. Session layers keeps the connection alive, incase if it is
disconnection during the transfer, it re connects and continues the session.
Example of session layers can be Login system or time taking in file
transferring between two different users is one session.
Presentation Layer: Layer 6
Presentation layers works as interfacing layer between different formats. It
present data into similar format and update the difference of formats among two
different systems. It also provide interface between application data to network
data format. It is used for protocol conversions, encryptions, decryptions and
data compressions.
Network Router
The router ensures that information doesn't go where it's not needed. This is
crucial for keeping large volumes of data from clogging the network.
The router makes sure that information does make it to the intended
destination.
Routing is a function associated with the Network layer (layer 3) in the Open
Systems Interconnection (OSI) model. Routers use network layer protocol headers,
such as IP header where the source and destination addresses are included and
routing tables to determine the best path to forward the packets. For the
communication among routers and decide the best route between any two hosts,
routing protocols such as ICMP are used. network switch
Network switches appear nearly identical to network hubs, but a switch generally
contains more intelligence (and a slightly higher price tag) than a hub. Unlike hubs,
network switches are capable of inspecting data packets as they are received,
determining the source and destination device of each packet, and forwarding them
appropriately. By delivering messages only to the connected device intended, a
network switch conserves network bandwidth and offers generally better
performance than a hub.
A Network hub is a device which enables more than one computer (host) to
interconnect on a network. They are widely used for creating home, office and
other networks.
INFORMATION SHEET 2
LO 5 Configure peripheral services
Title: Configuring access and security
1.1.1. User privileges
When multiple users can access database objects, authorization can be controlled
to these objects with privileges. Every object has an owner. Privileges control if a
user can modify an object owned by another user. Privileges are granted or
revoked either by the instance administrator, a user with the ADMIN privilege or,
for privileges to a certain object, by the owner of the object.
Each system has an account database that stores the privileges held by user
and group accounts. When a user logs on, the system produces an access
token that contains a list of the user's privileges, including those granted to
the user or to groups to which the user belongs. Note that the privileges
apply only to the local computer; a domain account can have different
privileges on different computers
An object's owner has all object privileges for that object, and those privileges
cannot be revoked. The object's owner can grant object privileges for that object to
other database users. A user with ADMIN privilege can grant and revoke object
privileges from users who do not own the objects on which the privileges are
granted
Condition:-The computer with the hard ware peripherals should be Exist, also
the electric power must be standard.
Procedure:-
criteria Yes No
Operation sheet 2
Condition:-The computer with the hard ware peripherals should be Exist, also
the electric power must be standard.
Procedure:-
Click on next
criteria Yes No
3. Demonstrate your teacher how to share folders and files to your friends?
XenDesktop supports multiple channel streaming connections only for Virtual Desktop Agents
installed on Windows 7 environments. Work with your company's network administrator to
ensure the Common Gateway Protocol (CGP) ports configured in the Multi-Port Policy setting
are assigned correctly on the network routers.
The Secure Sockets Layer (SSL) connections are only supported when the connections are
traversing an Access Gateway that supports multi-stream. When running on an internal corporate
network, multi-stream connections with SSL are not supported (this includes SSL Relay, on the
XenApp server).
Quality of service is supported only when multiple session reliability ports, or the CGP ports, are
configured.
A typical school network will always have a number of occurrences of equipment failure. These
necessarily take precedence over routine maintenance activities. Keeping a plan of maintenance
tasks will allow you to reschedule those activities that have to be delayed.
The other issue facing a preventative maintenance programme is simply remembering to do the
tasks. It is one thing to decide that the read/write heads on floppy disks need cleaning every six
months, but how will you remember when the six months are up? One way to address this issue
is through the use of a preventative maintenance schedule, which will remind you of when
perform key maintenance activities. Some software preventative maintenance activities can also
be automated.
6.1 Configuring setting on the network
Preventative maintenance schedule
A preventative maintenance schedule can take many forms. There are commercial software
programs available that will allow you to schedule and track your maintenance activities. The
simplest method, however, is a chart that shows various maintenance activities and how often
they should be done., These allow you to set up a calendar so that you remember to do your
maintenance tasks. Once you have set up a schedule, you can translate it to actual dates to help
you remember when to perform various preventative maintenance activities.
Software procedures, which often should be performed daily, are best done using some sort of
automated program scheduler. For tasks you perform at longer intervals, you can simply mark
the activity down on a calendar. If you have appointment book software, you can put reminders
for the key maintenance tasks.
When setting up a maintenance plan it is important not to make the schedule too aggressive,
otherwise maintenance becomes tiresome and it is likely that none will get done.
The frequency of maintenance tasks is determined in part by the prevailing conditions of the PC
itself and the environment in which it is kept. For example, if the PC is subject to constant abuse
or vandalism, then you will need to make the cleaning routine more frequent.
Sample schedule
The sample schedule below for maintenance of a PC is organized by recommended frequency. The
right-hand column is for those activities that can normally be set to run automatically using a program
scheduler.
Preventative maintenance activity Recommended Automatic
frequency
Scan hard disk file systems for errors Weekly Yes
Scan for viruses Weekly Yes
Clean CRT screen Weekly No
Defragment hard disks Weekly Yes
Scan for hard disk read errors Weekly Yes
Clean mouse Monthly No
Check for full hard disk volumes and remove Monthly No
unnecessary files
Update virus definition files Monthly Sometimes
Check that power protection devices are still Quarterly No
protecting the system
Check power supply fan for ventilation and dirt Quarterly No
build-up; clean if necessary
Update emergency boot floppies Quarterly No
Clean floppy disk-drive internals and read/write Quarterly (depending No
heads on use)
Check processor temperature; inspect heat sink Annually (or whenever No
and fan to ensure that they are working case is opened)
Check hard disk for temperature and vibration Annually (or whenever No
case is opened)
Back up CMOS information Annually No
Clean exterior of case Annually No
Clean exterior of monitor Annually No
Check and clean interior, motherboard and Annually No
Date: September, 2017
2 In
the Task Scheduler dialog box, choose Action→Create
Task.
The Create Task dialog box will open, allowing you to customize exactly what task you want to
schedule and how and when you want it to run.
6In the Begin the Task drop-down list, choose when you
want the task to run. Select the options you want in the
Settings area. Click OK.
The settings change depending on what you choose in the drop-down box. You can schedule a
task to run at a set time every day, week, or month, or whenever something specific happens, like
opening a program, logging off, or connecting to the Internet.
Steps
1. Disk Cleanup - Windows bundled tool that performs Disk Space Cleanup of
no longer needed files. To run this task you will need Administrative
privileges
1. Click "Next"
2. Click "Browse"
3. Browse to "C:\WINDOWS\System32\"
Check Disk - Windows bundled tool for checking for errors and repairing them on
your hard drive, the next time the computer is rebooted.
1. Return the Focus to the DOS Prompt Window, by clicking the Window
Border.
2. Type "notepad"; Press Enter.
3. Type echo y|chkdsk C: /f/r echo y|chkdsk for each additional drive letter:
/f/r
Shutdown /r
1. When finished save the file by Clicking on "File"
2. Click "Save As"
3. In the "File Name" line type "checkdisk.bat" with the Double-Quotation
Marks.
Disk Defrag - Windows bundled tool that reorganizes files more efficiently.
Windows is very sloppy when it comes to handling files. Instead of saving them
where they belong on your hard drive Windows sticks them where ever it’s most
convenient. Over time this will slow your computer down.
1. Click "Next"
2. Click "Browse"
3. Browse to "C:\WINDOWS\System32\"
Every computer requires regular maintenance, just like every car does. The best way to ensure
that everything gets done when it should is to schedule maintenance tasks ahead of time so that
Windows 7 can do the work for you. You can use the Windows Task Scheduler to keep your PC
running at its best by scheduling it to defragment ("defrag") your computer, run backups, and
more.
1. Choose Start→Control Panel→System and Security and then click Schedule Tasks in the
Administrative Tools.
3. Enter a task name and description. Choose when to run the task.
4. Click the Triggers tab and then click New. Choose a criterion in the Begin the Task drop-
down list. Click OK.
Use the settings to specify how often to perform the task as well as when and at what
time of day to begin.
5. Click the Actions tab and then click New. In the New Action dialog box, choose the
action that will occur from the Action drop-down list.
6. Fill in the necessary information on the context-specific dialog box and click OK.
7. (Optional) Set specific conditions on the Conditions tab.
8. Click the Settings tab and adjust settings that control how the task runs.
9. After you complete all settings, click OK to save the task.
If you like a more wizard-like interface for building a new task, you can choose the
Create Basic Task item from the Action menu.
INFORMATION SHEET 1
Date: September, 2017
Date current
Peripheral or object Maintenance Frequency maintenanceDate
next maintenance
Inside computer Vacuum clean Yearly
Roller mouse Disassemble and clean Monthly
Turn upside down, gently
Keyboard Yearly
shake, vacuum
Clean with the appropriate
Monitor Monthly
fluid
Hard disk – data i.e.
Backup all data as discussed
backup daily or as Daily, or whenever appropriate
with client.
discussed with client.
Check backup tapes and
restore test data. Check
Backup tapes Monthly
schedule settings. Clean tape
and tape drive.
Hard disk—when Remove unnecessary files:
client has long-term ~*.tmp files; cookies; Internet Monthly
hire Cache; temporary files
Hard disk – when
client-specific Remove applications. End of client use
applications installed.
Remove client data – check
that this has been backed up
first. Format disk – only if
Hard disk – end of
necessary. Arrange for End of client use
client use.
computer to be reinstalled
with operating system and
standard applications.
Printer
Inside printer Vacuum clean Yearly
Clean with appropriate fluid
Menu and surrounds Monthly
or damp cloth
Following the usage log,
Toner estimate the next 12 months Six months
for toner replacement.
Developer Following the usage log,
estimate the next 12 months Six months
for toner replacement.
Use the appropriate cloth and Monthly
Date: September, 2017
Position: _____________________________________________
Department: __________________________________________
Consumable
A consumable is an item that has limited use and is depleted upon use, after which is removed
from inventory. A small number of items can be used more than once.
Types of consumables
Alcohol — beverages that cause intoxication and give points towards the Achievement, "Thirst
Slayer".
Blueprints — Items used in WvW to construct Siege weapons.
Boosts — grant temporary benefits to the user and are available via the Gem Store, storyline
quest reward, area completion reward, and drops.
Cosmetic — These are items that serve no functional game purpose and are entirely cosmetic or
"for fun". There are two subtypes:
o Change character appearance, e.g. Hylek Potions (changes the player's color) or Tonics
(transforms the player into an alternate form, such as an NPC or inanimate object).
Nourishment — these are items that give temporary boosts to a variety of stats, and are
organized in the following categories:
o Food — grant temporary benefits to the user and give points towards the
Achievement, "All You Can Eat".
o Potions — grant increased damage to specific foes...and reduced damage from those
foes.
Salvage Kit — used to break down equipment into crafting materials and/or upgrades.
Unlock items — when used, unlock something for a character or an account, e.g. dyes or
recipes.
Symptom
A symptom (from Greek σύμπτωμα, "accident, misfortune, that which befalls",[1] from συμπίπτω,
"I befall", from συν- "together, with" + πίπτω, "I fall") is a departure from normal function or
feeling which is noticed by a patient, indicating the presence of disease or abnormality. A
symptom is subjective,[2] observed by the patient,[3] and cannot be measured directly.[4]
The term is sometimes also applied to physiological states outside the context of disease, as for
example when referring to "symptoms of pregnancy".
Contents
1 Types
o 1.1 Positive and negative symptoms
2 Possible causes
4 See also
5 References
Types
Symptoms may be chronic, relapsing or remitting. Asymptomatic conditions also exist (e.g.
subclinical infections and, sometimes, high blood pressure).
Constitutional or general symptoms are those that are related to the systemic effects of a disease
(e.g., fever, malaise, anorexia, and weight loss). They affect the entire body rather than a specific
organ or location.
Non-specific symptoms are those self-reported symptoms that do not indicate a specific disease
process or involve an isolated body system. For example, fatigue is a feature of many acute and
chronic medical conditions, whether physical or mental, and may be either a primary or
secondary symptom. Fatigue is also a normal, healthy condition when experienced after exertion
or at the end of a day.
Positive symptoms are symptoms that most individuals do not normally experience but are
present in the disorder. It reflects an excess or distortion of normal functions (ie experiences
and behaviours that have been added to a person’s normal way of functioning.[8] Examples are
hallucinations, delusions, and bizarre behavior.[5]
Negative symptoms are symptoms that are not present or that are diminished in the affected
persons but are normally found in healthy persons. It reflects a diminution or loss of normal
functions (ie something that has been taken away from a person’s normal way of functioning). [8]
Examples are social withdrawal, apathy, inability to experience pleasure and defects in attention
control.[6]
Possible causes
Some symptoms occur in a wide range of disease processes, whereas other symptoms are fairly
specific for a narrow range of illnesses. For example, a sudden loss of sight in one eye has a
significantly smaller number of possible causes than nausea does.
Some symptoms can be misleading to the patient or the medical practitioner caring for them. For
example, inflammation of the gallbladder often gives rise to pain in the right shoulder, which
may understandably lead the patient to attribute the pain to a non-abdominal cause such as
muscle strain.
A symptom can more simply be defined as any feature which is noticed by the patient. A sign is
noticed by other people. It is not necessarily the nature of the sign or symptom which defines it,
but who observes it.
A feature might be sign or a symptom, or both, depending on the observer(s). For example, a
skin rash may be noticed by either a healthcare professional as a sign, or by the patient as a
symptom. When it is noticed by both, then the feature is both a sign and a symptom.
Some features, such as pain, can only be symptoms, because they cannot be directly observed by
other people. Other features can only be signs, such as a blood cell count measured in a medical
laboratory.
What is Hardware?
Simply put, hardware is the tangible parts of your computer, parts you can touch, feel and so on.
Hardware Failures
As mentioned before, hardware and software work together to form a fully functional system,
theoretically. However, rarely do you get a fully functional system all the time. There will almost
certainly be malfunction of hardware, be it within the electronic circuits or even the whole
component itself. Sometimes, the originating factor of the hardware failure is not the components
of the system itself, but due to outside factors such as environmental disasters like fire,
earthquakes and lightning storm.
Recovery of failed hardware components is not a big problem by itself. It is basically identifying
and replacing the problematic component. However, hardware failures are most deadly, when it
affects daily routine and affecting critical personal or business data. This is especially true of the
most important component of a computer system when it comes to storage of data, the hard disk.
RAM Failures
Power Connector
Hard Disk
Overheating
LCD Failures
Motherboard
USB Box
RAM Failures
Bad RAM is somehow harder to diagnose as similar symptoms may be caused by software
problems, other hardware problems or even motherboard failure. However if you experience any
of these symptoms, users should check for bad RAM before attempting any other
troubleshooting.
Symptoms:
Power Adaptor
The common weak spot on any laptop is the DC power jack. If someone trips over the power
adapter cable while it is still connected to the laptop, there is a high possibility that the power
jack will get severely damaged.
On most laptops, the DC power jack is soldered directly to the motherboard and there are only
three or four small pins holding it in place, which makes the power jack rather weak. Any
sideways pulling of the DC power cord while attached to the laptop will usually dislodge at least
one of these pins, breaking the solder around it. Modern laptops use quite a lot of power, from
about 70W to 120W or even more. The bad electrical connection from the dislodged pin will
cause sparks and heating that will eventually burn a hole through the motherboard and can even
be a fire hazard.
Symptoms which indicates poor contact between the DC power jack and the motherboard:
The battery is not charging properly or stays at half charge despite having to use the
power adaptor.
The screen flickers (the brightness is changing) while the power cord is plugged in. This
is caused by the laptop switching between DC power (screen is brighter) and battery
power (screen is dimmer).
The DC plug gets hot after a few minutes of use and may even smell of burning.
There are "scratching" sounds coming from the DC jack.
1. Remove the battery 2. Plug in the power cord 3. Start the laptop 4. Gently wiggle the
DC power plug on the back of the laptop
If the laptop shuts down abruptly (looses power), find the dealer to re-solder or change the DC
power jack as soon as possible as the motherboard has already started to burn around the
dislodged pins. The manufacturer might offer to replace the whole motherboard; however the
price of a new motherboard together with the labor charge for installing it will usually cost more
than the current value of that laptop and sometimes can the pricing can cost over a thousand
dollars.
Replacing or re-soldering the DC power jack is not an easy job. It usually takes a few hours
depending on the damage and the model of the laptop. To reach the power jack, the laptop has to
be completely disassembled and have the motherboard taken out. Then if the board around the
dislodged pin is badly burned, the power jack has to be un-soldered and the board has to be
patched.
Hard Disk
Hard disk failures are the most common computer hardware problems. And laptop hard disks fail
more often than desktop hard disks due to the portability of a laptop as compared to the rather
stagnant laptop. If user knock hard or drop the laptop even a few inches while the hard disk is
being accessed or powered up, damage can be done to the hard disk.
Symptoms:
The laptop starts as usual but when Windows starts to load it goes to blue screen with
either "UNMOUNTABLE_BOOT_VOLUME", "hal.dll is missing or corrupt" or
"WINDOWSSYSTEM32CONFIGSYSTEM" (or similar) is missing or corrupt. All these
error messages indicate a file system problem. Sometimes it can be fixed by just scanning
the hard disk for errors. However more than half of these cases indicate that the hard disk
is starting to go bad and is probably developing bad sectors.
The laptop starts as usual but Windows freezes on the initial "Windows XP" screen,
although the blue bar continues to move, and users are able to hear feint but continuous
clicking. Hard disks have to be replaced.
As soon as the laptop is started there are loud clicks or grinding sounds and Windows
doesn't load. Hard disks have to be replaced as well.
Shortly after starting the laptop a message appears (usually on a black screen) "SMART
test failed. Backup your data immediately and replace the hard disk" or similar. Well, that
says it all. S.M.A.R.T. is a self-test that is build into the hard disk.
In almost all cases the laptop can be started from a "live" bootable CD and everything works
normal. In rare cases the hard disk PCB (printed circuit board) may get short circuited and even
burn. In this scenario, the laptop won't start unless the hard disk is removed.
A good tool to use to check for hard disk lifespan is ADRC's hard disk checker. It will scan the
hard disk for bad sectors and inform you if the drive is still of good usability.
Overheating
Overheating happens when inadequate airflow from outside the computer's case across the CPU
and motherboard and back out of the case usually via the power supply fan and other case fans.
Once the airflow is disrupted, heat builds up rapidly within the case. This causes components to
either shutdown, if such protection is built in or performs erratically. Over the long term,
overheating can irreversible damage components.
It is also advisable to keep the computer in a dry and shaded room, which is clean and little dust.
The most common LCD or "Liquid Crystal Display" screen failure is the inverter, cable and
backlight.
Symptoms:
The laptop appears to start as usual but the screen is black, if users move it, it turns on
and works properly. Failed cable.
The laptop appears to start as usual but the screen is very dark, although it changes colour
a little and users can see a very feint image. Failed inverter or cable 90%/10%.
Immediately after starting the screen has dark pink/red tint and turns dark after a few
seconds. Failed backlight.
The screen flickers a few times but then turns dark, if users move it or tap it lightly on the
sides, it flickers again. Failed cable or LCD 50%/50%.
Screen is either black or white (no picture) and external monitor works. Failed cable or
LCD 30%/70%.
There are stripes on the screen (either vertical or horizontal) that change when users
move the screen or tap it lightly on the sides. Failed cable or LCD 10%/90%.
Motherboard
Most motherboard related failures are due to the "On-board" regulated supplies and component
failure within those circuits. The on-board power supply circuit had partially failed and was
overloading subsequent components else the problem would be with the capacitors which are
defective in the first place.
A motherboard failure on a laptop that is out of warranty would usually mean that it's time for a
new laptop. The price of a new motherboard is usually higher than the current value of the
laptop.
Symptoms:
Nothing happens.
The "ON" light comes on, the fan spins, but nothing on the screen (black) and you can't
hear the HD working after 10-15 sec.
The "ON" light comes on, the fan spins, but after a few seconds the light goes off.
After pressing the "ON" button the screen stays black and you can hear a quiet high-
pitched sound coming from the laptop.
INFORMATION SHEET 1
Date: September, 2017
INFORMATION SHEET 9
LO8 Use and maximize operating system
Title: Working with graphical user interface and command line
Windows
The original 1985 version of Windows introduced to home and business PC users
many of the graphical user interface (GUI) ideas that were developed at an
experimental lab at Xerox and introduced commercially by Apple's Lisa and
Macintosh computers.
accounting packages
collaborative software
compilers and interpreters
computer games
cryptography
database
Educational Software
e-mail
graphics program
spreadsheet
text editor
web browser
web server
word processor
GUI - Short for Graphical User Interface, a GUI Operating System contains
graphics and icons and is commonly navigated by using a computer mouse.
See our GUI dictionary definition for a complete definition. Below are some
examples of GUI Operating Systems.
System 7.x
Windows 98
Windows CE
DOS (Disk Operating System) was the first widely-installed operating system for
personal computers. (Earlier, the same name had been used for an IBM operating
system for a line of business computers.)
The first personal computer version of DOS, called PC-DOS, was developed for
IBM by Bill Gates and his new Microsoft Corporation. He retained the rights to
market a Microsoft version, called MS-DOS. PC-DOS and MS-DOS are almost
identical and most users have referred to either of them as just "DOS." DOS was
9. What is GUI?
Operation sheet 1
Procedure:-
If the computer doesn't have a working operating system and can't boot from
its CD-ROM drive, insert a bootable floppy disk that has CD-ROM support
into the A drive and restart the computer. When the MS-DOS command
prompt appears, type d: to switch to the CD-ROM drive (assuming drive D
is the CD-ROM), type CD \i386 and then type winnt.
As the Setup program proceeds, it leads you through five distinct installation
phases: Collecting Information, Dynamic Update, Preparing Installation,
Installing Windows, and Finalizing Installation. The following sections
Date: September, 2017