Sunteți pe pagina 1din 64

net • work • ing

noun
MAINTAINING & REPAIRING
1. the exchange of information or COMPUTER SYSTEMS &
services among individuals,
groups, or institutions. NETWORKS
TLEof– CSS
2. the establishment or use a 10 (FOURTH QUARTER)
computer network
net • work • ing
noun
Lesson 1:
1. the exchange of information or
GUIDELINES
services among individuals, ON MAINTENANCE
groups, or institutions.
PROCEDURES
2. the establishment or use of a
computer network
Maintenance (meyn-tu-nun(t)s)
noun

COMPUTER
1. keeping something in working
order

MAINTENANCE
2. includes repairing, testing,
adjusting, calibrating, and
replacing parts of the computer
system and its peripherals
MAIN TYPES OF MAINTENANCE

1. ACTIVE/PREVENTIVE MAINTENANCE

Carried out before problems arise in a computer system; scheduled regularly


and does not require that the computer system is defective

2. CORRECTIVE MAINTENANCE

Done after problems have developed in the system and requires immediate
attention
MAINTENANCE PLAN

1. HARDWARE COMPONENTS

• Design a monitoring, evaluating, & updating plan


• Placing the computer unit in a well-ventilated area
• Moving the computer unit only after it has been unplugged/switched off

2. SOFTWARE COMPONENTS

• Backing up of files
• Password security
• Temporary files deletion
• Antivirus and anti-spyware programs updates
MAINTENANCE SCHEME

1. DAILY

• Update virus and spyware definitions


• Perform incremental backing up of files
• Reboot upon crash

2. WEEKLY

• Conduct a full virus and spyware scan


• Backup of files
• Get the latest software updates of the operating system
3. MONTHLY

• Cleaning the interior and the exterior of the system unit


• Disk Defragmentation

4. YEARLY

• Uninstallation of unused programs


• Hard drive reformatting
• Full diagnostic check on the hardware and software
SCREWDRIVER

FEATURE/S:

HAND TOOLS USED FOR


• Size of a screwdriver is established
by the blade length
TESTING AND REPAIRING
• Some screwdrivers are designed
HARDWARE PROBLEMS
with a square shank. This allows a
small wrench to grasp it securely
when turning for that extra torque.
PLIERS

FEATURE/S:

HAND TOOLS USED FOR


• Either needle-nosed or long-nosed
tongs that make picking up or
TESTING AND REPAIRING
twisting things easier.

• HARDWARE PROBLEMS
Also helps in cutting wires and
cables.
DIGITAL MULTIMETER

FEATURE/S:

• Measures electric current, voltage,


HAND TOOLS USED FOR
and resistance.

TESTING
TONE PROBEAND REPAIRING

HARDWARE PROBLEMS
FEATURE/S:

• Locates and tracks wires through a


tone it transmits to the attached
speaker.
NETWORK CABLE TESTER

FEATURE/S:

• Tests the strength and connectivity


of straight-through and crosover
HAND TOOLS USED FOR
cables.
TESTING
FORCEPS
AND REPAIRING
HARDWARE
FEATURE/S:
PROBLEMS
• Pair of tongs used to hold and pick
up tiny objects.
RAGS

FEATURE/S:

CLEANING TOOLS
• Remove dirt from dull surfaces and
table tops

AND
MICROFIBER CLOTHES

MATERIALS
FEATURE/S:

• Remove dirt while preventing


surfaces from getting scratched
VACUUM CLEANER

FEATURE/S:

CLEANING TOOLS
• Sucks all the dirt and dust particles
inside your computer and
keyboard.
AND
LIQUID DETERGENT

MATERIALS
FEATURE/S:

• Used to clean your computer case


and keep the appearance of your
computer looking new.
CLEANING TOOLS
ELECTRONICS – GRADE ISOPROPYL
ALCOHOL

AND
FEATURE/S:

• Used to clean off heat transfer


MATERIALS
compounds and stubborn stains.
COTTON BUDS

FEATURE/S:

CLEANING TOOLS
• Used to clean narrow gaps in your
disk drives and other areas that
cannot be reached by your hands.

AND
PENCIL ERASER

MATERIALS
FEATURE/S:

• Can be used as another way of


removing dust on your RAM.
DUST MASK

FEATURE/S:

PERSONAL
• Flexible pad worn over the nose
and mouth to protect against dust
PROTECTIVE
encountered when cleaning or
going to polluted places.

EQUIPMENT
SAFETY GOGGLES

FEATURE/S:
(PPE)
• Protect against dust or any large
materials that might hit your eyes.
GROUNDING STRAP

PERSONAL
FEATURE/S:

PROTECTIVE
• A tool that prevents electrical/static
shocks when you are working on
your computer’s case; should be
EQUIPMENT
clipped onto the metal chassis of
your computer.

(PPE)
WORKING TRAY

FEATURE/S:

MISCELLANEOUS
• A small tray or flat surface that can
be used as a laptop or writing desk.

TOOLS
PERMANENT MAGNET

FEATURE/S:

MISCELLANEOUS
• Used to temporarily magnetize
tools when grasping small metal
parts.
TOOLS
GUITAR PICKS

FEATURE/S:

MISCELLANEOUS
• Used to open plastic devices
without leaving any scratches on
the surface.
TOOLS
net • work • ing
noun
Lesson 3:
1. the exchange of information or
MAINTAIN
services among individuals, COMPUTER SYSTEM
groups, or institutions.
AND NETWORKS
2. the establishment or use of a
computer network
IMPORTANCE OF DOING COMPUTER MAINTENANCE

1. ENSURES THE PROPER OPERATION OF SOFTWARE & HARDWARE OVER


THEIR DESIGNED LIFESPAN

• Computer hardware, for instance, produces heat and require airflow to


operate properly. Heat can dislodge components o affect their behavior. Air
passages for cooling can collect dust over time and become less effective at
transferring heat.
• For software, security issues may be discovered with commonly used
software.
2. REGULAR MAINTENANCE IS IMPORTANT TO ENSURE THE PROPER
OPERATION OF COMPUTERS AND NETWORKS

• While regular maintenance procedures do have a cost in terms of time,


effort, and redundancy of some equipment, these are offset by the peace of
mind and trust the organization will have in their equipment and data
security.
3. A WELL-MAINTAINED COMPUTER AND NETWORK SYSTEM CAN
ENSURE AN ORGANIZATIONS FUNCTIONALITY, WHICH CAN BE
MEASURED IN YEARS

• This is very important to avoid generating unnecessar waste from


equipment that was either poorly maintained or unmaintained.
THINGS TO CONSIDER FOR MAINTENANCE

1. NEWER SOFTWARE HAS HIGHER HARDWARE REQUIREMENTS

SPECIFICATION WINDOWS XP WINDOWS 10


(2001) (2015)
Processor Speed 233 MHz 1 GHz

RAM 64 MB 2 GB

Disk Space Used 1.5 GB 16 GB


• LEGACY APPLICATIONS – older version/type of a computer application

• While it seems more economical to keepan older application running on


newer hardware, these tend to be more prone to data security issues.

• It is more economical to focus on the more recent application versions


instead of fanning out their programmers thinly to support all their existing
products.
2. MANUFACTURERS WILL STOP PRODUCING OR SUPPORTING DEVICES

• Technology improves as time progresses. Often-used software and hardware


at present can become obsolete or might have more advanced and updated
versions in the future.
3. STANDARDS CHANGE OVER TIME

Wired vs. Wireless Networks

• Wireless networks provide the easiest network solution for an organization,


with almost no cabling required and cables to maintain.

• However, wireless networking is the least secure way to transmit data, as


anyone who knows the passkey can snoop into the network without
permission.
QUICK MAINTENANCE TASKS

1. CLEANING

• Ensure that the computer is powered off and all electricals are unplugged.

• Use a damp cloth/rug to remove smudges and dirt from your keyboard,
mouse, and mousing surface, and damp microfiber cloth to clean computer
screens.

• Using furniture polish or strong cleaning agents like acetone or sprays is not
recommended as these may damage or dissolve plastic parts.
2. COMPUTER P.O.S.T. DIAGNOSTICS

• Most computers today will splash the manufacturer logo while the BIOS
performs some self-diagnostics to see what might be wrong.

• The most common POST Diagnostic result that usually appears would be
that the CMOS Battery is dead that will lead to inaccurate timekeeping.
Correct date and time settings are very important for log-in services to work
properly.

• SMART – Self-monitoring, Analysis, and Reporting Technology


- HDDs and SSDs with SMART will inform the BIOS and the
operating system that the drive is pending a failure, and data
should be transferred immediately.
3. COMPUTER MALWARE SCAN

• Can be set to be automated to run on certain days and times and may be
configured to run on the usrs preferred off time.

• A complete scan may take several hours.

4. COMPUTER APPLICATION AUDIT

• Inspect the installed applications and version numbers to ensure that the
system is up to date.
LONG MAINTENANCE TASKS

1. PROCESSOR CLEANING

• Make sure that the CPU is out-of-warranty before proceeding.

• To prevent damage to the components, consider wearing a grounding wrist


strap, and avoid working on plastic work surfaces or using plastic chairs.

• You can use an air blower or use a vacuum cleaner to clean the inside of the
CPU.
2. STORAGE DEVICE MAINTENANCE

• Device Checks (SMART, Error Checking Test)

• Application and System Updates (for Windows, this is often on the second
Tuesday of the month)

• HDD Defragmentation (SSDs, flash drives, and SD cards should never be


defragmented

• Memory Tests (MemTest86+)

• Full Data Backup (Save files in external HDDs, DVD-Rs, and Flash Drives)
1. Updating Windows OS

2. Preparing data backups and


SOFTWARE
schedules

MAINTENANCE
3. Disk Management Tools

4. Setting up protection from viruses


PROCEDURES
and malware

5. Creating a restore point


UPDATING WINDOWS OPERATING SYSTEM

• Fixes the bugs and improves the performance of your computer.

What is a BUG?

- A bug is an error in a software program that may cause a program to


unexpectdly quit or behave in an unintended manner.
Ex. A bug may cause a button within a program’s interface not to
respond when you click it, or may cause the program to hang or
crash.
STEPS IN UPDATING WINDOWS OPERATING SYSTEM

1. Start up your computer.

2. Go to Control Panel.

3. Click on System and Security.

4. Select Windows Update.

5. Click Change Settings on the left side of the window.

6. In the Drop-down menu, select Install Updates Automatically, then click OK.
STEPS IN BACKING UP YOUR DATA

1. Start up your computer.

2. Go to Control Panel.

3. Click on System and Security.

4. Select Backup and Restore, click set the backup, and specify to which external
drive you will save your backup.

5. Choose the drive you want to save your backup to.

6. You can let Windows choose which files and folders to back up, or you can do it
yourself.

7. Check the files and folders that you want to back up.

8. Click Next and wait for the process to finish.


DISK DEFRAGMENTER

Disk defragmentation means files that have been split into smaller chunks and
saved in different places will be put back together in one place. It helps in
making your computer work efficiently and gives boost to its performance.
• When you delete a bunch of little files and add a new large file,
the file may get broken up into multiple sections on the hard
disk. The computer will still read the newly added file as a single
valid file, but the drive will have to scan multiple parts of the disk
to read it. Because HDD seek time is one of the most significant
bottlnecks in a computer’s performance, this can drag down
your PC’s speed quite a bit. If you have a ton of “fragmented”
files on your hard disk, you might hear extra grinding,
sputtering, and other weird noises coming from your computer.
DISK CLEANUP

Disk cleanup is a Windows utility designed to free up hard disk space. This
utility searches for files that are no longer used and also removes unnecessary
files, temporary files, and othe data files that can be removed to free space
without endangering any applications or process.
TEMPORARY FILE – also known as a foo file or temp file, it is a file
created to hold information temporarily while a file is being created.
After the program has been closed, the temporary file should be
deleted. Temporary files are used to help recover lost data if the
program or computer is abnormally halted.

Microsoft Windows and Windows programs often create a .TMP file


as a temorary fiel.however, the Windows temporary folder can
contain any file, not just .tmp files.
SETTING UP VIRUS AND MALWARE PROTECTION

MALWARE – also called as malicious software, it is a computer program that


invades devices, steals information, and performs unwanted tasks without your
consent.
- computers are prone to malware if they do not have software
installed that can protect against them.
1. VIRUSES
• Need human intervention to
replicate and spread
• Small programs or scripts that
can negatively affect the health of
your computer.
• They create files,move files, erase
files, consume your computer’s
memory, and cause your PC not
to function correctly; can
TYPES OF MALWARE
duplicate themselves attach
themselves to programs, and
travel across networks.
• The most common way to get a
virus is opening an infected e-
mail attachment.
2. WORM
• A type of virus that replicates
itself, but does not alter any
files on your machine.
• Causes havoc by multiplying so
many times that they take up
all your PC’s available memory
or HDD space, causing your pc
to run very slowly and possibly
TYPES OF MALWARE
even crash.
• Typically invisible files, and can
replicate themselves and travel
between systems without any
human interaction.
3. SPYWARE
• Spies on user’s activity without
being detected; can detect
keystrokes and thus acquire
your passwords and capture
information like Web browsing
habits,e-mail messages,
usernames, and passwords, and
credit card information.
TYPES OF MALWARE
• If left unchecked, the software
can transmit this data to
another person’s computer
over the Internet.
4. ROOTKIT
• Software program designed to
provide a user with administrator
access to a computer without
being detected by antiviruses.
• Considered as one of the most
serious types of malware since
they may be used to gain
unauthorized access to remote TYPES OF MALWARE
systems and perform malicious
information.
• ROOT – top-level directory of a
file system
• KIT – includes files that can cause
harm to the PC
5. ADWARE
• Free software that is supported
by advertisements
• Free to use,but require you to
watch advertisements as long as
the programs are open.
• Most adware is safe to use, but TYPES OF MALWARE
some can serve as spyware,
gathering information about you
from your hard drive, the Web
sites you visit, or your keystrokes.
6. TROJAN HORSE
• Software that pretend to be a
harmless program, but when they
are run, they start spreading
throughout the computer.
• A Trojan Horse might appear to
be a computer gamen, but once
you double-click it, the program
starts writing over certain parts of
TYPES OF MALWARE
your hard drive, corrupting your
data.
• It cannot reproduce itself, and
only dangerous if they are given a
chance to run.

S-ar putea să vă placă și