Documente Academic
Documente Profesional
Documente Cultură
2.
3.
Hands-on:
LAN Cabling
(Cross over and Straight Thru)
Testing LAN cable
Configuring (peer to peer)
File Sharing and printing
MIDTERM
Lesson 2 - Maintaining Computer
and Network Systems
1.
PC Specifications
Diagnostics Software
Maintenance Techniques
Solutions to Faulty
Computer System
3. Inspect and test
Configured/Repaired computer
systems and networks
Computer Communications
Internet Connectivity
DEPARTMENTAL
GAME DEVELOPMENT
Chapter 1
Understanding Game Design
Lesson 1 Game Classification
Lesson 2 Game Motivation and
Design
Lesson 3 Game Design
Document
Written Activities :
Time line of Game History
Differences of List of Game
Classification (table making)
List of Game Motivation
Illustration of Logo (Draft)
Hands-on Activities:
Hands-on:
Diagnose and trouble shoot network
Problem
Installing anti- virus
Checking installed anti-virus
Reference Materials:
K to 12 Basic Education Curriculum
Junior High School TLE and Senior High School Tech-Voc-Livelihood Track
Information and Communications Technology Computer Hardware Servicing
D Whiz in Game Development, Rex Bookstore Inc.
Subject Requirements:
LAN Cabling
File Sharing
Printed Documents
Hands-on Exercises
MIDTERM
Lesson 6 Control Statements
DEPARTMENTAL
Chapter 3
Working with Microsoft XNA
Lesson 7 Working with
Microsoft XNA
Lesson 5 Understanding
Variables
Familiarization :
Familiarization:
Manipulating C# Language
If Else Statement,
Values and its result
Loops
Written Activities:
Written Activities:
Hands-on Exercises:
Hands-on Exercises:
Activities:
Downloading picture for image
management
Hands-on Exercises:
Reference Materials:
D Whiz in Game Development, Rex Bookstore Inc.
Subject Requirements: Program Output
C# Structure
Question Game
LOGO
Traditional Games
Hangman Game
Hands-on Exercises
The following are the OHS observed during computer hardware servicing maintenance
implementation.
A. Workplace
1. Do not work alone so that there's someone who can take care of you in case of
emergency.
2. Contingency measures during workplace accidents, fire and other emergencies are
recognized.
3. Hazard/risks in the workplace and their corresponding indicators are identified to minimize
or eliminate risk to co-workers, workplace and environment.
4. Clean the area before and after using it to maintain sanitation and prevent accidents.
B. Computer systems
1. Always power off and unplug the computer before working on it. When making circuit
changes, switch off and unplug the power cord from the equipment then discharge the
capacitors.
2. Be careful with tools that may cause short circuit.
3. Replace only fuses with those proper rating (usually on AVRs).
4. Handle all sensitive components in non-conducting metallic edge.
5. Check all signal pins and alignment to avoid incorrect connection.
6. Be careful with the sharp edges inside the computer case.
7. Do not use excessive force when installing computer components to prevent damage.
8. Do not clean your system with wet clothes or any liquid detergents.
9. Use brush, compressed air or blower in cleaning the computer system.
C. Technician
1. Personal protective equipment are correctly used in accordance with organization OHS
procedures and practices.
2. Always discharge yourself before touching any part of the computer.
3. Use anti-static devices and rubber footwear to disperse static electricity.
4. Do not eat, drink or smoke when working on your computer.
SAFETY PROCEDURES
(Ref: http://www.upgradenrepair.com/Howtodoandinfo/safety.htm)
There are certain procedures you should follow when you are installing items in your system.
Below is information to avoid damage to your system or/and yourself.
Before entering the computer, move computer off the carpet (for static purposes). If your
not able to then try not to move on the carpet to keep the static from building.
Disconnect all cables including power cord. Remove the power cord, monitor, keyboard,
mouse, phone line, network cable, speakers, printer, scanner, USB cables, cable modem,
DSL modem and anything else that is connected. (it should look similar to the picture
below)
With everything disconnected, push the power button for 5 seconds. (with power cord
disconnected). The computer can store power even with the power cord disconnected.
Pushing the power button drains that power (only if the power cord is
disconnected). VERY IMPORTANT!!!
Touch something metal on the case of the system to release any static build up in your
body.
Computers are the best dust collectors. Do not blow on the dust with your breath.
Your breath has moisture and electronics hate moisture.
If you want to clean the inside of the system of dust, use compressed air that is designed
for electronics.
While using the compressed air, do not hold down the button. Not only will the can get
cold, moisture will also form. Use quick short bursts.
When handling parts, do not touch the bronze teeth. Hold the parts on the edges if at all
possible.
Never put your hands inside system when the system is either plugged in or turned on.
Some computer desks have a compartment that you can put your computer in. Make sure
that compartment is well ventilated. If it is not ventilated, it can fry the system. If it is not
well ventilated, you can drill holes in the desk to give it ventilation, or you can install a
small fan in the desk that will circulate air.
Do not connect or disconnect cables while the system or device is turned on. ( unless it is
USB. USB can be disconnected or connected while system is on). Equipment can be
damaged by this.
DEFINITION
A computer network is a telecommunications network that allows computers to exchange data.
The physical connection between networked computing devices is established using either cable
media or wireless media (radio waves/infrared).
TYPES OF NETWORK COMMUNICATION
Intranet
Extranet
Internet
- is a public network
- is worldwide collection of networks that links million of business, government
agencies, educational institution and individuals
- internet users can access service like web browsing, email, file transfer, mailing
list, chat rooms, instant messaging and newsgroups
WORKSTATION
WORKSTATION
WORKSTATION
PEER-TO-PEER ARCHITECTURE
On a network built using the peer-to-peer architecture, no specific distinction exists
between a client and a server. Any node can provide a service as well as send a request
for a service from another node on the network. The peer-to-peer network architecture
allows sharing of resources, data, and users. Each node on the network has full control
over the network resources.
HYBRID ARCHITECTURE
A hybrid, in general, is a composition of two different types of elements. A hybrid network
architecture is created to get the benefits of both, the peer-to-peer and the client-server
architectures in a network.
TYPES OF NETWORK
(Based on the size and the coverage area)
PERSONAL AREA NETWORKS (PANs)
A personal area network (PAN) is a computer network used for communication among
computer and different information technological devices close to one person. It is a small
network established for communication between different devices such as laptops,
computers, mobiles, and PDAs. A PAN may include wired and wireless devices. The reach of a
PAN typically extends to 10 meters.
LOCAL AREA NETWORK (LANs)
A local area network (LAN) is a network that connects computers and devices in a
limited geographical area such as a home, school, office building, or closely positioned group
of buildings. Each computer or device on the network is a node. Wired LANs are most likely
based on Ethernet technology.
METROPOLITAN AREA NETWORK (MANs)
Metropolitan Area Network (MAN) is high speed network that connects local area
network in Metropolitan Area such as city or town and handles bulk of communication activity
across the region. A MAN typically includes one or more LAN but covers a smaller
geographically area than a WAN.
WIDE AREA NETWORK(WANs)
A wide area network (WAN) is a computer network that covers a large geographic area
such as a city, country, or even intercontinental distances. A WAN uses a communications
channel that combines many types of media such as telephone lines, cables, and air waves. A
WAN often makes use of transmission facilities provided by common carriers, such as
telephone companies. One of the most prominent examples of the existing WANS is the
Internet
NETWORK TOPOLOGY
The pattern of interconnection of nodes in a network is called the Topology. This layout also
determines the manner in which information is exchanged within the network.
BUS
-
TOPOLOGY
Popular topology for data network
Single transmission medium onto which various nodes are attached.
Normally coaxial cable is used.
Terminators at both end of BUS absorb signal, removing it from BUS.
STAR TOPOLOGY
The star topology connects nodes over a network using a central control unit called the hub.
You can easily add nodes to a star-based network by attaching the required nodes to the hub.
Setting up a star topology requires a lot of cabling because all the nodes have to connect to
the hub.
RING TOPOLOGY
The ring topology connects the nodes on a network through a point-to-point connection. Data
is accepted from one neighboring node transmitted to other. Data travels in one direction. If
one of the nodes on the network stops, the entire network stops functioning.
MESH
-
TOPOLOGY
Each node is connected to more than one node.
Provide an alternate route mechanism
Excellent for long distance networking
Supports back-up and rerouting
Used in large internetworking environments with stars, rings and buses as nodes
TREE TOPOLOGY
The tree topology is created where the nodes are connected in a hierarchical manner. In tree
topology, the device at the root is referred to as the parent for all the other nodes or devices
in the network. The nodes below a parent node are referred to as child nodes.
HYBRID TOPOLOGY
The hybrid topology can be a combination of two or more basic topologies such as bus, ring,
star, mesh, or tree. Hybrid networks combine more than two topologies, which, in turn,
enable you to get advantages of the constituent topologies
Flathead/Slotted
The slotted style is the original type of screw drive, with a straight slotted line
going across the screw head, from end to end. These are also very common,
though it is becoming harder to find them in applications that require a good
amount of torque because the screwdriver tends to slip out of the slot more
easily than drivers do for other screw drive types. Slotted screwdrivers have a flat
blade that varies in size depending upon the size of the slot. The table below
shows the blade width that corresponds with the slot size.
Hex
Whereas a Torx screw drive has six points, a hex screw drive has six even sides,
giving it the shape of a hexagon. Many hex-type screws can be fastened and
unfastened using an allen wrench, but there are also hex screwdrivers that can be
used for these purposes. The six sides create a stronger connection between the
screwdriver and the screw drive than a square recess screw drive has with its
compatible screwdriver.
NETWORK MATERIALS
UTP Cable - A popular type of cable that
consists of two unshielded wires twisted
around each other.
RJ45 CONNECTOR
1.
2.
3.
4.
5.
Only tools and equipment which are in good condition may be used.
Tools shall only be used for the purpose for which they were designed.
Employees shall make frequent inspections of tools and equipment, and
immediately remove from service any items found defective. The following are
examples of the types of defects which should be looked for:
Split, broken, cracked, or splintered wooden handles.
Mushroomed heads on chisels or impact drills.
Wrench jaws which slip or do not hold.
Frayed cords, damaged or modified grounding plugs, or broken insulation on
electrical tools.
Rounded edges on sharp-edged tools.
Dull cutting tools.
When using hand tools, the employee shall place himself in such a position that he
will avoid injury if the tool slips.
Only soft faced hammers (brass, plastic, rubber, or similar materials) shall be used
on highly tempered steel tools such as cold chisels, star drills, etc. Proper eye
protection must be worn when performing such an operation.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
Files, rasps, and other tools having sharp tangs shall be equipped with approved
handles.
Tools which are not in use shall be placed where they will not present a tripping or
stumbling hazard.
Pointed tools shall never be carried edge or point up in pockets.
Tools shall not be thrown from one worker to another, or to another working
location.
Extensions shall not be used on wrenches to gain leverage unless the wrench is
designed to be used in such a fashion.
When cutting wire or any other material under tension, the material being cut shall
be secured to prevent the ends from snapping free.
All power tools must be properly grounded before their use.
Gloves shall not be worn when operating lathes, drill presses, power saws, or
similar equipment. Loose clothing must not be worn and long sleeves should be
rolled up prior to operation.
Hooks, brushes, vacuums, or special tools shall be used to remove dust or chips.
Compressed air shall not be used.
All machinery must be turned off when unattended.
Maintenance, repairs, adjustments, and measurements must not be made while
saws, lathes, grinders, and similar equipment are in operation.
Compressed air shall never be used to dust off clothing, or be directed toward
another person.
Sawblades, gears, sprockets, chains, shafts, pulleys, belts, and similar apparatus
shall not be operated without the proper guarding.
Safety glasses, goggles, or face shields shall be worn when operating power tools.
1. Find a standard Ethernet cable you don't use for anything. With this guide, you will
be able to use a long 100 feet (30.5 m). cable, or a shorter size, whatever your needs
require.
2. Towards one end of the cable, cut open a slit a few inches long. Be careful not to
damage the wiring inside the cable or cut yourself.
3. Peel back and remove the cable casing. This will leave the inner wiring exposed.
Examine how the wiring is twisted together and note the colors of the wires. For this
project, we will be cutting the colored wires (green, orange, white-green, white-orange)
and leaving the other wires in place as usual.
4. Cut the green, orange, white-green and the white-orange. The other wires will be
left as-is.
5. With the wires cut, work now one-by-one.
First, strip the orange wire on both cut sides down. (approx. 1/4 or 1/2 inch)
After both ends of the orange wire has been stripped, strip both ends of the green
wire down. (approx. 1/4 or 1/2 inch)
6. On Side "A" we will call it, connect the green stripped end to the orange stripped
end on Side "B". Twist the wires together, and mend with electrical or another kind of
tape. If you have a soldering iron, you can optionally solder the leads together.
7. You now have one step of your crossover wire completed. Lets continue on.
8. Just as we connected the orange and green wires for one side of our crossover
cable, lets now repeat the process with the final two wires.
Start by stripping the green-white wires. (once again, approx. 1/4 or 1/2 inch)
Repeat the wire stripping on orange-white wires. (once again, approx. 1/4 or 1/2
inch)
9. On Side "A", join the green-white wire to the orange-white wire on Side "B".
Twist the wires together and fix with tape. Again, if you prefer, you can solder the wires
together as opposed to twisting them together.
10. Join the remaining wires. Join the orange-white wire on Side "A", with the green-white
wire on Side "B". Fashion the wires with tape or solder.
11. Clean the cable up.
Note the direction that the wiring in the cable case is twisting.
Holding the cable in your hands, twist the cable in the same way as the internal
wiring is twisted.
12. Admire your new, homemade crossover cable!
all of it. But if you want to know more about how networks work, you'll find it there. For
more information on ip addresses, subnets, and gateways go here
Dynamic vs Static IPs Most routers assign dynamic IP addresses by default. They do
this because dynamic ip address networks require no configuration. The end user can
simply plug their computer in, and their network will work. When ip addresses are
assigned dynamically, the router is the one that assigns them. Every time a computer
reboots it asks the router for an ip address. The router then hands it an ip address that
has not already been handed out to another computer. This is important to note. When
you set your computer to a static ip address, the router does not know that a computer
is using that ip address. So the very same ip address may be handed to another
computer later, and that will prevent both computers from connecting to the internet. So
when you asign a static IP addresses, it's important to assign an IP address that will not
be handed out to other computers by the dynamic IP address server. The dynamic IP
address server is generally refered to as the dhcp server.
ASSIGNING IP ADDRESS
(Ref : http://portforward.com/networking/static-win7.htm)
If you have a printer, before you begin print out this page!
Step 1:
Open up the start menu, and look for the Search programs and files box. You should now see
the following window.
Step 2:
Type cmd in the Search programs and files box, and press Enter on your keyboard. The will
bring up a black command prompt window.
Step 3:
The command prompt may look different on your screen, but it doesn't really matter.
Type ipconfig /all in that window, and then press the enter key. This will display a lot of
information. If it scrolls off the top you may need to enlarge the window.
Step 4:
I want you to write down some of the information in this window. Take down the IP address,
Subnet Mask, Default Gateway, and Name Servers. Make sure to note which is which. We are
going to use this information a little bit later. We are only concerned with IPv4 entries, you can
ignore the IPv6 stuff.
The name server entries are a bit complicated. Name Server is just another name for
DNS(domain name server) server. Some router's act as a proxy between the actual name
servers and your computer. You will know when this is the case, because the Default Gateway
will list the same ip address as the Name Servers entry. We need to have the correct Name
Server IP addresses. If we do not, you will not be able to browse the web. There are a couple
ways to get these. The first way is to log into your router's web interface, and look at your
router's status page. On that page you should see an entry for DNS Servers, or Name Servers.
Write down the ip adresses of your Name Servers. Another way to get the correct Name Servers
to use, is to give your ISP a call. They should know the ip addresses of your Name Servers right
off. If they ask you why you need them, you can tell them you are trying to setup a static IP
address on your computer. If they try to sell you a static external ip address, don't buy it. That's
an entirely different thing that what you are trying to setup.
Type exit in this window, then press the enter key to close it.
Step 5:
Once again open the start menu. This time click Control Panel.
Step 6:
Click on View Network Status and Tasks.
Step 7:
Single click Change adapter settings on the left side of your screen.
Step 8:
You might have more than one Internet connection listed here. You will need to determine which
adapter is your connection to the Internet if this is the case. Right click on your network adapter
and choose propertiesto open up the properties window of this internet connection.
Step 9:
Click Internet Protocol Version 4(TCP/IPv4) and then the Properties button.
Step 10:
Before you make any changes, write down the settings that you see on this page. If something
goes wrong you can always change the settings back to what they were! You should see a dot in
the Obtain an IP address automatically box. If you do not, your connection is already setup
for a static ip. Just close all these windows and you are done.
Pick an ip address and enter it into the IP Address box. The ip address you choose should be
very similar to the router's ip addres. Only the last number of the ip address should be different.
If the router's ip address is 192.168.1.1, I might choose 192.168.1.10. The ip address you
choose should end with a number between 1 and 254, and should not be the same as the
router's ip address. Every device that connects to your network needs to have it's own ip
address.
Put the subnet mask we previously found in the subnet mask section. The default gateway
should go into theDefault gateway box. Enter the dns servers we prevoiusly found into the
two DNS Server boxes. Click okay all the way out of this menu.
If you find that you can not pull up webpages, the problem is most likely the dns numbers you
entered. Give your ISP a call, and they will be able to tell you which dns servers to use. This is a
question they answer all of the time. They will be able to tell you what you should use right
away.
That's it you should be done! If you can't connect to the internet go back and change your
configuration back to what it originally was.
NETWORK SECURITY
1.
2.
3.
4.
5.
6.
7.
8.
o
o
For a home computer: Click the down arrow next to Home or Work (Windows 7) or
Private (Windows 8).
For a computer connected to a domain network: Click the down arrow next to
Domain.
The figure shows the settings for a Domain network. The settings for a Home or Work
network are the same.
Do not enable file or printer sharing for the Public network. Enabling file or printer sharing on
a public network exposes your computers data to other users on the same public network.
To test the proper functioning of a network, there is a highly practical utility provided as a
standard feature with most operating systems; this is the ping utility. Ping lets you send a data
packet to a network computer and lets you evaluate the response time.
To test the network thoroughly, simply open a command-line window, then successively carry
out the following steps:
ping the loopback address (127.0.0.1), representing your computer:
ping -t 127.0.0.1
ping the IP addresses of the network's computers, for example:
ping -t 192.168.0.3
ping the computer names, for example:
ping -t Mickey
ping the computer used as gateway on the local area network, that is, the computer sharing its
internet connection. It usually has the address 192.168.0.1:
ping -t 192.168.0.1
ping the service provider's gateway. The address of the service provider's gateway can be
retrieved using the ipconfig command on the computer being used as gateway on the local area
network;
ping the service provider's name servers . The address of the service provider's DNS servers can
be retrieved using the ipconfig command on the computer being used as gateway on the local
area network;
ping a machine on the internet network, for example:
ping -t 193.19.219.210
ping a domain name, for example:
ping -t www.commentcamarche.net
If all this works, your network is ready to be used!
PC SPECIFICATIONS
MINIMUM SPECIFICATION
Processor
Motherboard (built-in)
o Video Card
o Sound Card
o LAN Card
RAM
Hard Drive
DVD Drive
LED MONITOR
Casing w/power supply
mouse
keyboard
speaker
avr
4.Wrenches Any of various hand or powertools, often having fixed or adjustable jaws, used for
gripping, turning, or twisting objects
5. Utility knife/stripper is a knife used for general or utility purposes. The utility knife was
originally a fixed blade knife with a cutting edge suitable for general work.
6. Hot air soldering station A hot air gun or hot air station is used to heat devices and
melt solder,
7. LAN Tester
8. Crimping tools
EQUIPMENT AND TESTING DEVICES
1. Maintenance bench- A test bench or testing workbench is a virtual environment used to
verify the correctness or soundness of a design or model
2. Power supply equipment - A simple desktop power supply with power output connector
seen at lower-left ...supplies are designed to be secured into standard
electronic equipment racks.
7. Appropriate Software
Cleaning your computer, components, and peripherals help keep everything in good working
condition and helps prevent germs from spreading. The picture shows a good example of just
how dirty the inside of your computer case can get. In this example, it is obvious that all the
dust and dirt is going to prevent proper air flow and may even prevent the fan from working.
How often should I clean my computer?
General cleaning tips
Cleaning tools
Case cleaning
CD-ROM, DVD, and other disc drives
CD and DVD disc cleaning
Fan cleaning
Hard drive cleaning
Headphones cleaning
Keyboard cleaning
Laptop cleaning
LCD cleaning
Monitor cleaning
Motherboard cleaning
Mouse cleaning
Printer cleaning
Scanner cleaning
How often should I clean my computer?
The frequency of how often you should clean your computer varies on different factors. To help
you determine how often you need to clean your computer we created the checklist below.
Check each of the boxes below that apply to your computers conditions to help determine how
often you should clean the computer.
Where is computer located?
In a home environment
In a clean office environment
In construction or industry environment
In school environment
Computer environment
Have cat or dog in same building as computer
Smoke in same building as computer
Smoke next to computer
Computer is on floor
Room that the computer is in has carpet
Eat or drink by computer
Who uses it?
Adult (18 and older)
Young adults (ages 10-18) use computer
Pre-teen (younger than 10) use computer
More than one person uses computer
With what is checked above, clean your computer every
11
months.
1. Never spray or squirt any liquid onto any computer component. If a spray is needed,
spray the liquid onto a cloth.
2. You can use a vacuum to suck up dirt, dust, or hair around the computer. However,do
not use a vacuum inside your computer as it generates static electricity that can
damage your computer. If you need to use a vacuum inside your computer, use a
portable battery powered vacuum or try compressed air.
3. When cleaning a component or the computer, turn it off before cleaning.
4. Be cautious when using any cleaning solvents; some people have allergic reactions to
chemicals in cleaning solvents, and some solvents can even damage the case. Try
always to use water or a highly diluted solvent.
5. When cleaning, be careful to not accidentally adjust any knobs or controls. Also, when
cleaning the back of the computer, if anything is connected make sure not to
disconnect the plugs.
6. When cleaning fans, especially smaller fans, hold the fan or place something inbetween the fan blades to prevent it from spinning. Spraying compressed air into a fan
or cleaning a fan with a vacuum may cause damage or generate a back voltage.
7. Never eat or drink around the computer.
8. Limit smoking around the computer.
Cleaning Tools
Although computer cleaning products are available, you can also use household items to clean
your computers and peripherals. Below is a listing of items you may need or want to use while
cleaning your computer.
Cloth - A cotton cloth is the best tool used when rubbing down computer components.
Paper towels can be used with most hardware, but we always recommend using a cloth
whenever possible. However, only use a cloth when cleaning components such as the
case, a drive, mouse, and keyboard. You should not use a cloth to clean any circuitry such
as the RAM or motherboard.
Water or rubbing alcohol - When moistening a cloth, it is best to use water or rubbing
alcohol. Other solvents may be bad for the plastics used with your computer.
Portable Vacuum - Sucking the dust, dirt, hair, cigarette particles, and other particles
out of a computer can be one of the best methods of cleaning a computer. However, do
not use a vacuum that plugs into the wall since it creates lots of static electricity that can
damage your computer.
Cotton swabs - Cotton swaps moistened with rubbing alcohol or water are excellent tools
for wiping hard to reach areas in your keyboard, mouse, and other locations.
Foam swabs - Whenever possible, it is better to use lint-free swabs such as foam swabs.
Tip: See our tools page for a list of other tools every technician should have.
Case Cleaning
Why? Cleaning your case keeps the appearance of the computer looking new. While cleaning, if
you see ventilation slots, these can be cleaned or cleared to help keep a steady airflow into the
computer and keep all components cool.
Procedure: The plastic case that houses the PC components can be cleaned with a slightly
damp lint-free cloth. For stubborn stains, add a little household detergent to the cloth. You
should not use a solvent cleaner on plastics.
Make sure all vents and air holes are hair and lint free by rubbing a cloth over the holes and
vents. It is also helpful to take a vacuum around each of the hole, vents, and crevices on the
computer. It is safe to use a standard vacuum when cleaning the outside vents of a computer.
If you are looking for steps on cleaning the inside of the computer, see the motherboard cleaning
section.
Computer case help and support.
Tip: If the substance on a CD cannot be removed using water, pure alcohol can also be used.
Computer CD-ROM and disc drive help and support.
Headphones Cleaning
Why? Headphones and headsets can be used by many different people and may need to be
frequently cleaned to help prevent the spreading of germs and head lice.
Procedure: If the headphones being used are plastic or vinyl, moisten a cloth with warm water
and rub the head and earpieces of the headphones.
Note: If the headphones are being used for a library or school, do not use any disinfectant or
cleaning solvent since some people can have allergic reactions to the chemicals they contain.
Headphones that have cushions also have the availability of having the cushions replaced.
Replacing these cushions can also help keep the headphones clean.
Finally, in regards to headphones spreading head lice. If many different students use the same
headphones, consider having the students using their own headphones, placing bags over the
headphones, or using headphones that can be wiped with warm water after each use.
Keyboard Cleaning
These steps are for cleaning a desktop keyboard. See the cleaning a laptop keyboard page for
laptop steps.
Dust, dirt, and bacteria
The computer keyboard is usually the most germ infected items in your home or office. A
keyboard may even contain more bacteria than your toilet seat. Cleaning it helps remove any
dangerous bacteria and keeps the keyboard working properly.
Procedure: Before cleaning the keyboard first turn off the computer or if you are using
a USB keyboard unplug it. Not unplugging the keyboard can cause other computer problems as
you may press keys that cause the computer to perform a task you do not want it to perform.
Many people clean the keyboard by turning it upside down and shaking. A more efficient method
is to use compressed air. Compressed air is pressurized air contained in a can with a very long
nozzle. To clean a keyboard using compressed air aim between the keys and blow away all of the
dust and debris that has gathered there. A vacuum cleaner can also be used, but make sure the
keyboard does not have loose "pop off" keys can be sucked up by the vacuum.
If you want to clean the keyboard more extensively, remove the keys from the keyboard.
After the dust, dirt, and hair has been removed. Spray a disinfectant onto a cloth or use
disinfectant cloths and rub each of the keys on the keyboard. As mentioned in our general
cleaning tips, never spray any liquid onto the keyboard.
Substance spilt into the keyboard
If the keyboard has anything spilt on it (e.g. pop, cola, Pepsi, Coke, beer, wine, coffee, and
milk), not taking the proper steps can destroy the keyboard.
Procedure: Below are recommendations that can help prevent a keyboard from becoming bad
after something has spilt into the keys.
If anything is spilt onto the keyboard turn the computer off immediately or at the very least
disconnect the keyboard from the computer. Once done flip the keyboard over to prevent the
substance from penetrating circuits. While the keyboard is upside down, shake the keyboard
over a surface that can be cleaned later. While still upside down, use a cloth to start cleaning the
keys. After cleaned leave the keyboard upside down for at least one night allowing it to dry.
Once dry, continue cleaning the keyboard with any remaining substance.
If after cleaning the keyboard keys are sticking, remove the keys and clean below the keys and
the bottom portion of the key.
Finally, if the keyboard still works but remains dirty or sticky before discarding the keyboard as a
last resort try washing the keyboard in the dishwasher.
If after doing all the above steps the keyboard still does not work we recommend buying a new
keyboard.
Computer keyboard help and support.
LCD Cleaning
Why? Dirt, dust, and fingerprints can cause the computer screen to be difficult to read.
Procedure: Unlike a computer monitor, the LCD or flat-panel display is not glass and requires
special cleaning procedures.
When cleaning the LCD screen it is important to remember to not spray any liquids onto the LCD
directly, press gently while cleaning, and do not use a paper towel since it scratches the LCD.
To clean the LCD screen use a non-rugged microfiber cloth, soft cotton cloth, or Swiffer duster. If
a dry cloth does not completely clean the screen, you can apply rubbing alcohol to the cloth and
wipe the screen with a damp cloth. Rubbing alcohol is used to clean the LCD before it leaves the
factory.
Computer Flat panel and LCD help and support.
Monitor Cleaning
Tip: This section is for computer monitors if you have an LCD or flat-panel see theLCD cleaning
section.
Why? Dirt, dust, and fingerprints can cause the computer screen to be difficult to read.
Procedure: A glass monitor screen can be cleaned with ordinary household glass cleaner. Be
sure to remove power from the monitor and spray the cleaner onto a lint-free cloth so the fluid
does not leak into the electrical components inside the monitor. Vacuum off any dust that has
settled on top of the monitor, and make sure no books or papers are covering the air vents.
Obstructed monitor vents can cause the monitor to overheat or even catch on fire.
Caution: We suggest only using a cloth dampened with water when cleaning non-glass monitors
or any anti-glare screens. Using ordinary household glass cleaner on special screens, especially
cleaners with ammonia can remove anti-glare protection or other special surfaces.
Other good cleaning solutions
Microfiber Towels
Swiffer Dusters
Related pages
Computer monitor help and support.
Motherboard Cleaning
Why? Dust and especially particles of cigarette smoke can build up and corrode circuitry causing
various problems such as computer lockups.
Caution: When inside the computer take the necessary ESD precautions and try to avoid
unplugging any cables or other connections.
Procedure: Our recommendation when cleaning the motherboard from dust, dirt, or hair is to
use compressed air. When using compressed air, hold it in the upright position to prevent any of
the chemicals from coming out of the container, which may damage or corrode the Motherboard
or other components. Also, ensure when using compressed air that you always blow the dust or
dirt away from the motherboard, or out of the case.
Another good alternative to compressed air is a portable battery powered vacuum. Portable
vacuum's can effectively remove the dust, dirt, and hair from the motherboard completely and
prevent it from getting trapped within the case.
Warning: Never use an electricity powered vacuum as it can cause lots of static electricity that
can damage the computer. When using a vacuum keep it a couple inches away from the
motherboard and all other components to prevent damage and anything from being sucked into
the vacuum (e.g. jumpers or small cables).
Tip: When cleaning the inside of the case also look at any fans or heat sinks. Dust, dirt, and hair
can collect around these components the most.
Computer motherboard help and support.
Mouse Cleaning
Why? A dirty optical-mechanical mouse (mouse with a ball) can cause the mouse to be difficult
to move as well as cause strange mouse movement.
Procedure: To clean the rollers of an optical-mechanical mouse, you must first remove the
bottom cover of the mouse. To do this, examine the bottom of the mouse to see what direction
to rotate the cover. As you can see in the below illustration, the mouse cover must be moved
counter clockwise. Place two fingers on the mouse cover and push the direction of the arrows.
Once the cover has rotated about an inch, rotate the mouse into its normal position, covering
the bottom of the mouse with one hand and the bottom should fall off including the mouse ball.
If the cover does not fall off try shaking the mouse gently.
Once the bottom cover and the ball is removed, you should be able to see three rollers located
within the mouse. Use a cotton swab, finger, or fingernail to remove any substance. Usually,
there is a small line of hair and dirt in the middle of the roller, remove as much as this substance
as possible.
Once you have removed as much dirt and hair as possible, set the ball back within the mouse
and place the cover back on.
If the mouse still has the same problems repeat the above process. If after several attempts the
mouse is still having the same problems, your mouse has other hardware issues and should be
replaced.
Note: Cleaning your mouse pad with a damp cloth can also help improve a computer's mouse
movement.
Why? To help keep the mouse clean and germ-free, it can be helpful to clean the mouse.
Procedure: Use a cloth moistened with rubbing alcohol or warm water and rub the surface of
the mouse and each of its buttons.
Computer mouse help and support.
Printer Cleaning
Why? Cleaning the outside of a printer can help keep the printer's appearance looking good and
if used by many different people keep the printer clean of germs.
Procedure: First, make sure to turn off the printer before cleaning it. Dampen a cloth with
water or rubbing alcohol and wipe the case and each of the buttons or knobs on the printer. As
mentioned earlier, never spray any liquid directly onto the printer.
Why? Some printers require the inside to be cleaned to help keep the printer running smoothly.
Computer printer help and support.
Scanner Cleaning
Why? Flatbed scanners commonly become dirty with dust, fingerprints, and hair. When the
scanner is dirty, the images may have distortions.
Procedure: Clean a flatbed scanner's surface by spraying a window cleaner onto a paper towel
or cotton cloth and wipe the glass until clean. As mentioned earlier, never spray a liquid directly
onto the component.
The same towel or cotton cloth can also be used to clean the outside of the scanner.
DIAGNOSTICS SOFTWARE
(Ref: http://www.techradar.com/news/software/applications/10-best-free-lightweight-networking-tools-1088165)
Tools in the list will help the network with performance issues, network management, security,
file sharing and more. And they're all free, and very lightweight: even installing all ten will use
less than 7MB hard drive space.
1. Network Stuff 3.0.9 - 1.34 MB
Figuring out what's happening on your network normally involves a whole library of tools,
yet somehow Network Stuff has managed to cram them all into a single portable
application.
It's strong on the basics, for instance: the program can display your IP addresses (both
local and external), scan your network for other systems, reveal MAC addresses and run
graphical ping or trace routes to the addresses you specify.
But Network Stuff can also display all the currently open network and internet
connections; use built-in Who is and DNS tools to get more information on IP addresses;
remotely wake up or shut down other systems on your network, and the list goes on.
The only problem here is complexity, as there's a lot to explore. If you get lost, though,
check the author's website for some helpful guidance.
2. DNS Jumper 1.0.5 - 812KB
Changing your DNS settings can improve your online security, perhaps give you access to
sites you couldn't reach otherwise, and improve your browsing speed. Windows doesn't
exactly make this easy, but that's where DNS Jumper comes in.
This tiny tool comes with a lengthy list of DNS alternatives. If you're not sure which is
best then it can test them all to find the fastest. When you're happy, it's able to apply
your preferred DNS settings in a click, and the program can even back up and restore
your original settings to avoid the chance of any problems.
3. RawCap 0.1.4.0 - 20KB
Packet sniffing - capturing network traffic for later analysis - can be an invaluable way to
diagnose tricky network problems, both hardware and software. And there are few easier
ways to get the job done than with the super-lightweight RawCap.
The program is a command line tool, but it's also straightforward to run from Explorer.
Just double-click the file, choose your network interface, enter an output file name, and
that's it - the program will capture raw packets and save them in a .pcap file.
Unsurprisingly for a 20KB tool, there's no help here to analyze the finished results. Just
opening the file in Notepad may be enough, though if you're looking for plain text. And
there's no doubting RawCap's simplicity: it doesn't need any other components or DLLs
beyond the .NET Framework 2.0.
4. Fast Software Audit 1.0.0 - 160 KB
If you manage a PC network then you'll know it's important to keep track of the software
your users are installing. You could check this manually, or invest in some big corporate
inventory tool, but the ultra-compact Fast Software Audit - portable and only 160KB could be enough. Just enter the network names of the computers you'd like to audit and
it'll quickly scan them, revealing the list of installed applications. (Though please note,
your systems will need the Remote Registry service to be running for this to work.)
5. CloseTheDoor 0.2.1 portable - 484 KB
When you want to secure your network it's important to understand which processes are
listening for connections, and the portable CloseTheDoor will tell you everything you want
to know: the network interface, ports, protocols, process, related Windows services and a
whole lot more.
All this information can seem baffling at first, but CloseTheDoor can help. Right-click
something and you'll find options to search the web for useful information on the process,
port and how it's generally used.
And if you do identify malware then CloseTheDoor can even shut down that process,
though be careful - if you accidentally terminate something important then you might
crash your PC.
6. BlueLife Hosts Editor 1.0 - 388KB
The HOSTS file can be used to tell Windows the IP address of various network or Internet
resources, so improving performance or allowing you to block some sites or resources
entirely.
Windows doesn't make it particularly easy to access HOSTS, unfortunately, but
the BlueLife Hosts Editor probably provides everything you'll need. Just launch the
program to view your current HOSTS file, then add or remove entries to suit your needs,
and save the results when you're finished: easy.
Beware, though, if you try to block a site you've just visited then it'll appear not to work,
as Windows will cache the previous IP address. Save the new file, click "Flush DNS" and
everything should now work just as you expect.
7. Network Activity Indicator 1.6 -1.03 MB
We often miss the old Windows XP network icon, where the monitors flashed to show
network activity. But now there's an easy way to get it back. Install Network Activity
Indicator and it'll immediately restore the same icon to your system tray. (Although
Windows Vista/Windows 7 will often hide it again: click the arrow to the left of the system
tray area, click Customize and set "Network Activity Indicator" to "Show icon and
notifications to bring it back.)
This isn't just a cosmetic tool, though. You can also customize the program to flash only
for particular network traffic (TCP, UDP, ICMP), or on specific network interfaces. And it's
even able to provide details on network traffic (MB's uploaded and downloaded), and a
host of useful statistics (open connections, failed connection attempts, errors received,
more).
8. RemoteRebootX 2012 - 428KB
Network management can be easier than you think. If you've got a copy of
RemoteRebootX to hand, anyway.
Add the names of your network computers to the program, and in click or two you can
then remotely shut them down or wake them up again, all from the comfort of your own
PC.
You can even automate the process, for example having a PC woken up just after lunch so
it's ready and waiting when you return.
And there are even system information options to, say, retrieve the free C: drive space on
one of the systems, or its list of automatic but stopped services (very useful for
troubleshooting). Not bad at all for a portable tool under 500KB in size.
9. HFS 2.2f - 560KB
When you want others on the network to be able to access your files then you'll probably
start by sharing folders. But if you can't get that working as you like then setting up a web
server with HFS could be a simpler approach.
There's no complex configuration involved, for instance - just run the program and it's
ready to go.
Drag and drop the files you'd like to share and they'll be accessible within seconds.
And yet there are plenty more advanced options, if you need them. Worried about the
program taking up all your bandwidth, for instance? Just limit the download speed to suit
your requirements - it's all very easy.
10. Simple IP Config 2.3 - 1.32MB
If you regularly use a laptop on a couple of networks - home and work, say - then the
chances are you probably waste a lot of time manually adjusting a host of low-level
network settings. But it doesn't have to be that way.
Simple IP Config allows you to create separate network profiles for home, work, and
anywhere else you like. Each of these can be used to store your IP Address, Subnet Mask,
Gateway, DNS Server, and so on. And switching from one profile to another is as simple as
selecting it, and clicking "Apply" - no messing around in Control Panel is required at all.
MAINTENANCE TECHNIQUES
1. Deleting Files
You have decided to remove a program from your computer. There are 2
ways to do it: use the uninstall program that may have come with your
application or use the "Add or Remove Programs" function in the Control
Panel.
This is an easy task to perform. Here's what you will need:
The Add or Remove Programs application
A small amount of time (depending on the size of the application you
want to remove and the speed of your computer
A bit of nerve and interest in learning something new.
Note: This procedure is written for Windows XP; Windows Vista is similar.
Network troubleshooting tools are a necessity for every network administrator. When getting
started in the networking field, it is important to amass a number of tools that can be used to
troubleshoot a variety of different network conditions.
While it is true that the use of specific tools can be subjective and at the discretion of the
engineer, the selection of tools in this article has been made based on their generality and
common use. This article reviews the top 10 basic tools that can help you troubleshoot most
networking issues.
10. Ping
The most commonly used network tool is the ping utility. This utility is used to provide a basic
connectivity test between the requesting host and a destination host. This is done by using the
Internet Control Message Protocol (ICMP) which has the ability to send an echo packet to a
destination host and a mechanism to listen for a response from this host. Simply stated, if the
requesting host receives a response from the destination host, this host is reachable. This utility
is commonly used to provide a basic picture of where a specific networking problem may exist.
For example, if an Internet connection is down at an office, the ping utility can be used to figure
out whether the problem exists within the office or within the network of the Internet provider.
Figure 1 below shows an example of the ping utility being used to obtain the reachability status
of the locally connected router.
Figure 6: PuTTY
Figure 9: Speedtest
in other situations where multiple IP address and multiple gateways are available. Figure 13
below shows an example of the route utility being used on a Windows machine.
COMPUTER COMMUNICATIONS
INTERNET CONNECTIVITY
(Ref:http://www.tutorialspoint.com/internet_technologies/internet_connectivity.htm)
Here in this tutorial, we will discuss how to connect to internet i.e. internet service providers,
software and hardware requirements, configuring internet connection etc.
Internet Service Providers (ISP)
Internet Service Provider (ISP) is a company offering access to internet. They offer various
services:
Internet Access
Dial-up access
ISP Types
ISPs can broadly be classified into six categories as shown in the following diagram:
ACCESS PROVIDERS
They provide access to internet through telephone lines, cable wi-fi or fiber optics.
MAILBOX PROVIDER
Such providers offer mailbox hosting services.
HOSTING ISPS
Hosting ISPs offers e-mail, and other web hosting services such as virtual machines, clouds etc.
VIRTUAL ISPS
Such ISPs offer internet access via other ISP services.
FREE ISPS
Free ISPs do not charge for internet services.
Connection Types
There exist several ways to connect to the internet. Following are these connection types
available:
1. Dial-up Connection
2. ISDN
3. DSL
4. Cable TV Internet connections
5. Satellite Internet connections
6. Wireless Internet Connections
Dial-up Connection
Dial-up connection uses telephone line to connect PC to the internet. It requires a modem to
setup dial-up connection. This modem works as an interface between PC and the telephone line.
There is also a communication program that instructs the modem to make a call to specific
number provided by an ISP.
Dial-up connection uses either of the following protocols:
1. Serial Line Internet Protocol (SLIP)
2. Point to Point Protocol (PPP)
The following diagram shows the accessing internet using modem:
ISDN
ISDN is acronym of Integrated Services Digital Network. It establishes the connection
using the phone lines which carry digital signals instead of analog signals.
There are two techniques to deliver ISDN services:
1. Basic Rate Interface (BRI)
2. Primary Rate Interface (PRI)
Key points:
The BRI ISDN consists of three distinct channels on a single ISDN line: t1o 64kbps B
(Bearer) channel and one 16kbps D (Delta or Data) channels.
The PRI ISDN consists of 23 B channels and one D channels with both have operating
capacity of 64kbps individually making a total transmission rate of 1.54Mbps.
DSL
DSL is acronym of Digital Subscriber Line. It is a form of broadband connection as it provides
connection over ordinary telephone lines.
Following are the several versions of DSL technique available today:
1. Asymmetric DSL (ADSL)
2. Symmetric DSL (SDSL)
3. High bit-rate DSL (HDSL)
4. Rate adaptive DSL (RDSL)
5. Very high bit-rate DSL (VDSL)
6. ISDN DSL (IDSL)
All of the above mentioned technologies differ in their upload and download speed, bit transfer
rate and level of service.
The following diagram shows that how we can connect to internet using DSL technology:
A cable modem is used to access this service, provided by the cable operator.
The Cable modem comprises of two connections: one for internet service and other for
Cable TV signals.
Since Cable TV internet connections share a set amount of bandwidth with a group of
customers, therefore, data transfer rate also depends on number of customers using the
internet at the same time.
The following diagram shows that how internet is accessed using Cable TV connection:
In one way connection, we can only download data but if we want to upload, we need a dialup
access through ISP over telephone line.
In two way connection, we can download and upload the data by the satellite. It does not
require any dialup connection.
The following diagram shows how internet is accessed using satellite internet connection:
Wi Fi wireless technology is based on IEEE 802.11 standards which allow the electronic
device to connect to the internet.
Bluetooth wireless technology makes use of short-wavelength radio waves and helps to
create personal area network (PAN).