Вы находитесь на странице: 1из 112

richardrrr.blogspot.

com

MODULE 4:
DIAGNOSE AND
TROUBLESHOOT
COMPUTER SYSTEMS (DT)

Content Standard Performance Standard

The learner demonstrates The learner independently diagnoses


understanding of the underlying and troubleshoots computer systems
concepts and principles on as prescribed in the TESDA Training
diagnosing and troubleshooting of
Regulation.
computer systems.

Number of Sessions (Time Allotment): 60 hrs.

165
In this module, there will be four (4) major topics that you will
encounter: (1) be plan and prepare diagnosis of computer system errors;
(2) diagnose and configure computer systems and networks; (3) inspect and
test the configured computer systems and networks; and (4) test systems and
networks. The four major topics contains sub-topics which all leads to
diagnose and troubleshoot computer systems. This module contains what
to KNOW, what to PROCESS, what to REFLECT and UNDERSTAND as well
as what to TRANSFER. The competencies for this module are:

LO 1. Plan and prepare for diagnosis of computer systems errors


 Follow OHS procedures in planning and preparing diagnosis of computer
systems errors
 Determine the computer systems errors using manual and software
diagnosis

LO 2. Diagnose and configure computer systems and networks


 Follow OHS procedures in planning and preparing diagnosis of computer
systems and network errors
 Identify the diagnosed computer systems and network errors based on
the job requirements
 Configure computer systems and networks

LO 3. Inspect and test the configured computer systems and networks


 Follow OHS procedures in inspecting and testing configured computer
systems and networks
 Inspect configured computer systems and networks
 Replace defective components
 Reinstall defective computer systems
 Identify network errors
 Repair network errors based on standard procedures
 Test the configured computer systems and networks

LO 4. Test Systems and Networks


 Follow OHS procedures in testing systems and networks
 Test computer systems and networks in accordance with the job
requirements
 Accomplish technical reports on the tests conducted

166
In order to master the above listed competencies, you must be
knowledgeable of the topics under what to KNOW, perform activities required
under what to PROCESS, accomplish additional meaningful tasks under what
to REFLECT and UNDERSTAND and finally show some evidences of your
learning by transferring what you have learned in a different context under
what to TRANSFER.

You will be challenged to dig deeper into your prior knowledge and
previous experiences about computer hardware servicing.

Instruction:
 Read each of the statements in the left-hand column of the chart.
 Place a check on the column that indicates your answers.

Knowledgeable Have a No
Little Knowledge
Knowledge at All
Plan and prepare work to ensure
occupational health and safety
(OHS) policies and procedures
are followed
Obtain materials, tools,
equipment and testing devices
needed to conform with job
requirements
Interpret work instructions
according to job requirements
Obtain computer
components/devices/systems and
determines its location prior to
installation
Install
equipment/devices/systems in
accordance with job requirements
Check/Test devices/systems
and/or installations to determine
the conformity to job
requirements.
Check computer systems and
networks for configuration in
accordance with specifications

167
and requirements
Diagnose fault or problem in the
computer systems and networks
in line with standard operating
procedures (SOP)
Configure the identified systems
and networks based on
specifications and job
requirements
Inspect and test configured
computer systems and networks
in conformity with manufacturer's
instructions/manual
Correct/adjust components or
parts of computer systems and
networks in accordance with job
requirements
Test computer systems and
networks to ensure safe
operation
Perform scheduled/periodic
maintenance in accordance with
manufacturer's requirements
Make needed
repairs/replacements in
accordance with established
procedures, when necessary
Document tasks undertaken in
accordance with SOP
Clean and clear worksite of all
surplus/excess materials in
accordance with company SOP

168
LESSON 1: PLAN AND PREPARE FOR DIAGNOSIS OF COMPUTER
SYSTEMS ERRORS

SAFETY PRECAUTIONS

Personal Protective Equipment

Proper preparation is the key to a successful work. Before you begin,


make sure that you have the tools you will need, and secure a clear well-lit
workplace. Gather all the components you’ll be using and unpack them at the
same time. Always keep in mind that personal protection is one of the traits of
a good computer technician.

Types of personal protective devices

1. Anti-static devices
2. Power surge protectors
3. Personal equipment

Anti-static devices
Devices designed to protect the computer from static electricity.

Source: www.desktopreality.com
Source: www.desktopreality.com
Anti-static Mat
Anti-static Wrist Strap

169
Source: www.desktopreality.com Source: www.rapidonline.com
Anti-static Bag Anti-static Spray

Power surge protectors


Devices designed to protect the computer from sudden power surges
from intermittent power sources.
Examples:
1. AVR (Automatic Voltage Regulator)

Source: www.neopower.com

2. UPS (Uninterrupted Power Supply)

Source: www.amazon.co.uk

170
Personal Equipment

small paint brush

screw drivers

pliers and tweezers

compressed air

handheld vacuum

171
Directions: Perform the activity below.

 Choose a partner
 Do a simulation exercise
o One will act out the role of a computer teacher.
o The other will be the student
Situation: Computer teacher will show/demonstrate to the students the
Personal Protective Devices, what they are and how they are used.
The Student keeps on asking about the Personal Protective
Devices/Equipment and how they can be maintained in good condition
of PC.

Answer the following questions in your own answer/test notebook.

1. What personal protective devices do people who always works (do


troubleshooting) with computers commonly use? How often do they
use them?
2. Computers should be protected from static electricity to prevent
component malfunction. What anti-static devices can you utilize to
avoid such malfunction?

172
TYPES OF COMPUTER SYSTEM ERROR

There are several errors in a computer from the point you open it upto the
point you reach the stand by window (reaching standby windows means boot
process has no error). Below is a list of computer errors.

1. No Video Output - When you open your PC, nothing shows up in your
monitor and the LED indicator of your monitor is flashing in yellow color.

2. No Video Output - Same as number one but now the LED indicator of your
monitor is in steady orange color.

3. Doesn't Boot - When you open your PC it will show the processor’s brand
and/or the motherboard’s brand but doesn't continue. Usually this error will
result to system restart over and over again.

4. Never Ending Loading of Operating system - The computer opens up then


boots but when the operating system loads it, doesn't continue and it will take
a longtime if you're going to wait for it to load.

5. Lots of pop up windows showing on standby mode - This also happens


even if you try disconnecting your computer set from the internet. This is what
we called aftershock virus which will continue to run even if internet is
disconnected.

6. Lots of hardware installation windows appear - This happens even if you try
installing the hardware. When you restart your set it will happen again.

7. Safe mode doesn't work - When you try going to safe mode, all you will see
is a list of files in Command prompt style.

8. Keyboard and mouse system restart - This will happen only in standby
mode, when you move your mouse or type something, your system will
automatically restart and the worst part is it will delete a file at random.

173
9. Sound on/off error - Upon loading the operating system, you will hear a
loading sound and then the sound stops, when you try running an audio file,
no sound will be heard.

10. Application causes system to restart - Just like the mouse problem, when
you open a program that will take the whole screen like for example a game
and/or a program applications, when you close it, it will cause your system to
restart.

Aside from the common computer errors, computers also can have
different Operating System (OS) errors. OS errors can be classified into
various categories such as:

1. System errors – These are moderately dangerous types of errors


among those that can pop up on your PC. System errors are caused
by malfunctioning hardware components, corrupted operating system
modules, etc.
2. Runtime errors – Runtime errors are caused by corrupted or
malfunctioning system files or software executables. Most runtime
errors cause the application that caused it to shut down. However,
more serious runtime errors may cause the system to become
unstable or unresponsive, suggesting that you should restart your
computer.
3. Stop errors – Stop errors are caused by corrupted hardware,
especially malfunctioning RAM modules and bad sectors on hard
disks. Stop errors can be difficult to resolve at times.
4. Device Manager Errors – These are usually caused by corrupted
driver files or malfunctioning hardware components. In case of the
former cause, the problem is often solved by reinstalling or updating
the drivers. However, the latter cause can often be solved only by
replacing hardware components.
5. POST code errors – POST code errors are caused by malfunctioning
hardware components, and are characterized by short beep sounds
from the tiny internal speaker of your motherboard. POST code errors
occur when you press the power button to turn on your PC.
6. Application errors – These can happen at any point of time. As the
name suggests, these are caused by applications while those are
running. These are commonly caused by glitches in the program code
itself. These are normally resolved by updating the program to its latest
version.

174
7. Browser Status Codes – These are caused by problems faced by
browsers when trying to access a website. These can be caused by
misplaced web pages in the server of the website itself, or due to
connection problems. For instance, a 404 error would indicate that the
browser is trying to access a webpage that does not exist in the
specified location.

DIAGNOSING COMPUTER SYSTEMS

PC Diagnosing

Probably the most frustrating problem computer users


run into are startup problems, where your computer
won’t boot. Equally annoying are error messages you
constantly run into during your computer’s startup
process. In this module, you will be given a few tips on
how you can avoid some of the most common problems
that happen right after your computer is turned on. Here
you will learn the basic troubleshooting.

 Trial and error: When you find a faulty component in your computer,
check it with the other computers so that you can make sure whether
the fault is in the component or not.
 Check cables: In case of any device failure, check all the cables of
your computer such as data cables, power cable, internal circuitry
cable and make sure that all these are plugged in and working fine.
 Hardware settings: Check the hardware settings in the CMOS and in
the device manager of the system and make all the device drivers up
to date and all the cards are plugged in properly.
 Notice changes: When you notice a software or hardware error in
your computer, determine what was changed before the problem
occurred.
 Event viewer: In the event viewer, you will find the error or warning
messages associated with any faulty hardware or software.

175
 Make notes: Troubleshooting is a useful skill and we can learn a lot
when we face any kind of troubleshooting in our computer. Make notes
including the error messages and their solutions, so that you have a
record on how a certain problem occurred and how did you solve it.

Common PC Problems and Solutions


You are working away at your computer when suddenly, an error
message – or worse, your computer comes to a screeching halt. Here are the
common computer problems and solutions that can help you.

Steps

1. Check the POST. POST stands for Power On Self-Test. This is generally
the first or second thing that appears on a computer after turning on the
power. This appears before the operating system begins to load. The POST
will display any problem found with the hardware that makes the computer
unable to boot. POST may also display problems with hardware that allow the
computer to boot, but not operate at its full capacity during operation.

2. Notice the load time of the OS (operating system). A longer than usual
load time may indicate errors in the hard drive.

3. Notice any graphics problems once the OS has loaded. Reduced


graphics may indicate driver failures or hardware failures with graphic cards.

4. Perform an auditory test. An auditory test is a simple, but still effective


way of judging how a computer is working. With the computer on and running,
play any decent length audio file (usually above 30 sec.) If the audio is
choppy or slow, it usually means that the processor is working at an elevated
level, or there is not enough RAM to run all programs loading. Changing the
startup sound is a great way to apply this test. Another issue associated with
choppy sounds is PIO (Programmed Input/Output) Mode. This affects how the
hard drive reads and writes data from a drive. Switching to Direct Memory
Access (DMA) allows for faster reads and writes, and can sometimes repair
choppy audio.

5. Check any newly installed hardware. Many operating systems,


especially Windows, can have conflicts with new drivers. The driver may be
badly written, or it may conflict with another process. Windows will usually
notify you about devices that can cause or have any problem. To check this

176
use the Device Manager, this can be accessed by entering the Control Panel,
clicking the System icon, clicking the Hardware tab, and clicking on Device
Manager. Use this to check and arrange the properties of hardware.

6. Check any newly installed software. Software may require more


resources than the system can provide. Chances are that if a problem begins
after software starts, the software is causing it. If the problem appears directly
upon startup, it may be caused by software that starts automatically on boot.

7. Check RAM and CPU consumption. A common problem is a choppy or


sluggish system. If a system is choppy it is good practice to see if a program
is consuming more resources than the computer can provide. An easy way to
check this is to use the Task Manager, right click on the taskbar select Task
Manager, and click the Processes tab. The CPU column contains a number
that indicates the percentage of CPU the process is consuming. The Memory
Usage column indicates how much memory a process is consuming.

8. Listen to the computer, if the hard drive is scratching or making loud


noises, shut off the computer and have a professional diagnose the
hard drive. Listen to the CPU fan, this comes on a high speed when the CPU
is working hard, and can tell you when the computer is working beyond its
capacity.

9. Run a virus and malware scan. Performance problems can be caused by


malware on the computer. Running a virus scan can find any problem. Use a
commonly updated virus scanner (such as Norton Antivirus or Avast!
Antivirus)

10. Check for the problem in safe mode. To enter safe mode, press F8
repeatedly during POST (this works on most systems). If the problem persists
in safe mode, it is a fair bet that the operating system itself is to blame.

Common Trouble shooting for Computer Units

1. Double check the power connections.


2. Voltage regulator and power supply could cause power failure in the
computer unit.
3. Check the power cords and cable connectors in your computer unit.
4. Unseated card. Loose cards could cause malfunction.

177
5. Check the boot sequence configuration in the advance BIOS (Basic
Input/Output Unit) setup.

Diagnosing Network Connection

Things to look for if a PC is connected to the internet or network:


 First, check the cable connecting to the network card into the network
hub.
 Check the back of the computer to see if the network card light is on
 Check the network cable (use cable tester)
 Check the network hub (use multi-tester)

Identify the following:

1. Moderately dangerous types of errors that can pop up on your PC.


2. Caused by malfunctioning hardware components and characterized by
short beep sounds from the tiny internal speaker of your motherboard.
3. They happen at any point of time. As the name suggests, these are
caused by applications while those are running.
4. Usually caused by corrupted driver files or malfunctioning hardware
components.
5. Caused by corrupted or malfunctioning system files or software
executables.
6. Caused by corrupted hardware, especially malfunctioning RAM
modules and bad sectors on hard disks.
7. Caused by problems faced by browsers when trying to access a
website.

178
Task: Develop a Sample Diagnostic Plan

List down all possible components to be checked based on the symptoms.

Symptoms: Dead Computer Monitor Good Defective Remedy

AC outlet
AVR
AVR fuse
Monitor Power Cable
Monitor Switch
Power Supply

Diagnosing a Computer Power Supply

Create a diagnostic plan for troubleshooting a power supply with the


use of the following tools, materials and equipment.

You will be assessed using the following criteria:

CRITERIA Passed Failed


1. Sequence of steps in diagnosing is followed.
2. Safety precaution is observed.
3. Appropriate tools are used in diagnosing.
4. Diagnostic plan for troubleshooting is created.
PERFORMANCE RATING

179
LESSON2: DIAGNOSE AND CONFIGURE COMPUTER SYSTEMS AND
NETWORKS

SAFETY PRECAUTIONS

Occupational Health and Safety (OHS) refers to the legislation,


policies, procedures and activities that aim to protect the health, safety and
welfare of all people at the workplace.

Every worker has the right to a healthy and safe work and to a work
environment that enables them to live a socially and economically productive
life. Safety practices should be learned early and must be followed when
working with any electrical device including personal computers and
peripherals.

Personal safety while working with PC’s

The following are some safety precautions to take before working with any
computer devices:

 Before doing anything, listen to your teacher’s instruction to prevent


accidents or any unwanted events that may occur on your workplace.
 Do not work on a computer when you are wet because you might get
electrocuted.
 Do not remove internal devices of the computer when it is turned on.
 Avoid playing or running while inside the room.
 Always wear personal protective equipments (PPE) like coverall, shoes
with rubber sole, anti-static wrist strap, etc.
 Ask for assistance from your teacher when it comes dealing with
computer devices.
 Applying safety measures when handling tools and equipment are
necessary to avoid certain damages.

180
The student is further expected to maintain good health, to be neat in
personal appearance and to practice safe working procedures at all time with
appropriate equipment.

Basic Concepts of Electricity

This lesson will introduce you to the fundamental knowledge of


electricity. It will equip the student with the basic knowledge in electricity.

Basic Electrical Terms

 Electricity Is defined as the flow of electron or electric current. It


is an invisible form of energy that can be
transformed into other forms of energy like heat light
and mechanical.

 Electron Is the negatively charged component of an atom. It


has the ability to flow.

 Proton Is the positively charged component of an atom. It


has the ability to attract electron.

 Matter Is anything that occupy space and has mass. It can


be a solid, liquid or gas in state.

 Atom Basic component of matter. It composes of a


nucleus which is the central part, the protons and
electrons.

 Current Same as electricity or flow of electron. The amount


of current flowing in a circuit can be measured in
ampere (I).

 Voltage The amount of pulling force that makes the electron


flow. Also known as potential difference or EMF
(electromotive force). The amount of voltage can be

181
measured in volt (V).

 Resistance Defined as the opposition to the flow of current. The


amount of resistance can be measure in ohms (Ω).

Conductors and Insulators

 Conductors are materials that easily allow the flow of current, or it has
a low resistance to current flow.

Examples; aluminum, gold, silver, copper, iron

 Insulators are materials that do not easily allow the flow of current, or
it has a high resistance to current flow.

Examples; rubber, plastic, paper

Types of Current

1. Direct Current

In direct current (DC), the flow of electric charge is only in one


direction, the type of electricity produced by batteries, static, and lightning.A
voltage is created and maybe stored until it is consumed when the current
flows directly, in one direction. In the circuit, the current flows at a specific,
constant voltage (this is oversimplified somewhat but good enough for our
needs.) When you use a flashlight, pocket radio, portable CD player or
virtually any other type of portable or battery-powered device, you are using
direct current.

Most DC circuits are relatively low in voltage; for example, your car's
battery is approximately 12V, and that's about as high a DC voltage as most
people ever use.

182
Source: www.electrostudy.com
Figure 1.Direct Current

Figure 1 shows an ideal 12 V DC current. The voltage is considered


positive because its potential is measured relative to ground or the zero-
potential default state of the earth.

Direct currents flow in one direction only and are constant in time. Their
appearance is that of a straight line which does not vary. They are produced
from power sources such as batteries, power supplies and DC generators.
Photovoltaic devices such as solar cells also generate DC power.

2. AC Alternating Current

In alternating current (AC, also ac) the movement of electric charge


periodically reverses direction. This type of electricity is produced or
generated by AC generators commonly from a hydro electric plant. It is the
commercial power that we use in homes and offices. Delivered through a
power transmission lines.AC current can be reduced through the use of
power transformer to suite for its application.It can also be converted to DC
for a specific purpose. In the Philippines AC is rated as 220V AC at 60 Hz.

Alternating currents change direction, flowing first one way and then
the other. They are sinusoidal waves, so that they change in time. They are
produced from sources such as power supplies and AC generators. In North
America, AC is 120 volts and 60 hertz or cycles per second. This means it
changes direction 60 times per second. In Europe, it is generally 50 hertz with
220 to 240 volts.

183
Source: www.electrostudy.com
Figure2. Alternating Current
Why does standard electricity come only in the form of alternating
current?

There are a number of reasons, but one of the most important is that a
characteristic of AC is that it is relatively easy to change voltages from one
level to another using a transformer, while transformers do not work for DC.
This capability allows the companies that generate and distribute electricity to
do it in a more efficient manner, by transmitting it at high voltage for long
lengths, which reduces energy loss due to the resistance in the transmission
wires. Another reason is that it may be easier to mechanically generate
alternating current electricity than direct current.

PC’s use only direct current, which means that the alternating current
provided by your utility must be converted to direct current before use.
This is the primary function of your power supply.

AC POWER PC’s PSU DC POWER

MOTHERBOARD

DRIVES

COOLING FANS

Figure 3.Simplified block diagram of a PC power supply

184
Electric Circuit

Electric circuit - is the pathways for electricity to flow.

Components of Circuit

 Load - commonly represented by a bulb or any electrical component


that consumes electricity.

 Supply - Commonly represented by a cell or a battery

 Switch - an electrical device that opens or closed a circuit.

Figure4. A simple circuit

Types of Circuit

1. Open Circuit - a type of circuit that has an open path for current to flow. It
means that current cannot flow in open circuit.

- +

Supply
Load

Switch

Figure5. An open circuit

185
The switch is said to be “OPEN” the current can’t flow into the circuit
and the bulb is “OFF”

2. Closed Circuit - a type of circuit that has a closed path for current to flow.
It means that current can flow in a closed circuit.

Load
- +

Supply

Switch

Figure6. A closed circuit

The switch is said to be “CLOSED” the current can’t flow into the circuit
and the bulb is “ON”

I. Identification:
Direction: Identify the following statement.

_________1. Defined as the flow of electron or electric current. It is an invisible


form of energy that can be transformed into other form of energy
like heat light and mechanical.

_________2. The negatively charge component of an atom. It has the ability to


flow.

_________3. Defined as the opposition to the flow of current. The amount of


resistance can be measured in ohms (Ω).

_________4. The positively charged component of an atom. It has the ability to


attract electron.

186
_________5. Anything that occupy space and has mass. It can be a solid, liquid
or gas in state.

_________6. Basic component of matter. It is composed of a nucleus which is


the central part, the protons and electrons.

_________7. Same as electricity or flow of electron. The amount of current


flowing in a circuit can be measured in ampere (I).

_________8. The amount of pulling force that makes the electron flow. Also
known as potential difference or EMF (electromotive force). The
amount of voltage can be measured in volt (V).

_________9. Materials that easily allow the flow of current, or it has a low
resistance to current flow.

_________10. Materials that do not easily allow the flow of current, or it has a high
resistance to current flow.
_________11. A computer power supply converts AC to ___________________.

_________12. Define as the pathways for electricity to flow.

_________13. A component of a circuit that is commonly represented by a bulb or


any electrical component that consumes electricity.

_________14. A component of a circuit that is commonly represented by a cell or


a battery.

_________15. An electrical device that opens or closed a circuit.

_________16. A type of circuit that has a closed path for current to flow. It means
that current can flow in this circuit.

_________17. A type of circuit that has an open path for current to flow. It means
that current cannot flow in this circuit.

_________18. A circuit connection has only one path of current flow. In this circuit
connection the current remain constant.

187
_________19. A circuit connection that has 2 or more path of current. In this circuit
the voltage remains constant.

_________20. An invisible form of energy.

Techniques for diagnosing computer systems

Computer Diagnosis

Sometimes when the problem with a system is not totally apparent and
intermittent, using a basic common diagnostic procedure may help determine
what is wrong. This procedure has a number of steps that, if followed each
time, can be of help.

Rules in Diagnosing Computer System

1. Know the facts


 Educate one self on all aspects and operation of computer parts.
 Continuous learning on computer technology.
2. Use your common sense
3. Focus on Field Replaceable Units
 Identify the different types of FRU that can be used for replacement or
subassembly.
4. Proper assembly and disassembly
5. Factors Causing Computer Failures and Defects
 Peopleware
Untrained personnel could have damaged programs in PC.
 Firmware
Programs or software burnt in chips may be corrupted.
 Software
Corrupted operating systems would cause the system to fail.
 Hardware
Defective hardware components would lead to computer malfunction.
Hardware conflicts and viruses can hinder your computers
performance.

188
ESD (Electro Static Discharge)

Electro static discharge can easily damage sensitive components in


yourcomputer.

Electricity

Incoming supply from AC outlet must be regulated; power surges can


damage computer units.

Problem Isolation

Problem isolation is a detective work in which you need to determine


what is out of the ordinary by making detailed observation of what is not
working normally and record any information as you proceed. The information
you will be able to gather will help diagnose your computer. You need to
observe wisely. Look for any abnormalities in the unit, any change in smell or
foreign smell, listen to all the sounds, and error codes.

Component Isolation

This section will aid in determining components in your system which


are failing. First, most systems have 3 major components; monitor, system
unit, and printers. Some have multiple external devices. To troubleshoot, you
need to isolate major components which are failing to operate.

Diagnostics Procedure for ATX Power Supply Failure


1. Determine whether or not the power comes on.
2. Check the switch operation with a Digital Volt Meter on the
continuity or resistance setting.
3. Check the pins if the corresponding voltage are properly
regulated to the motherboard.
4. Replace the power supply unit if defective.

189
Flowchart for ATX Power Supply Repair

Warning! You must unplug your ATX power supply from the wall before
working inside the case.

190
Things to Consider:

There are many devices, parts, cords, and connections on a computer,


which means that there are many possible problems that could arise. In
addition, your computer uses a variety of software, which can also cause
problems. However, no matter what the problem is, you can use the
following tips to help you find a solution:

 Always check the cables: Many computer problems are related to an


issue in the cables and connections. The easiest first step you can take to
troubleshoot most problems is to check all related cables and connections.
 Isolate the problem: If possible, try to isolate the problem. For example, if
you can't get the cursor to move on the screen, try to determine if the
issue is with the mouse. If you have an extra mouse, you can alternate
devices to see if the one plugged in is the issue, or use the arrow keys on
the keyboard to help determine if the mouse is the source of the problem.
When trying to isolate the problem, only make one change at a time.

Figure 7. An error message

 Take notes about error messages: If your computer gives you error
messages, be sure to write down as much information as possible. If the
basic troubleshooting steps don't work, you may need the information you
have taken.
 Remember the steps you've taken, or write them down: Once you start
troubleshooting, you will want to remember what you have done, so you
don't repeat yourself. If you can't remember it, then write it down. If you
end up asking someone for help, it will be much easier if they know
exactly which steps you've taken.

191
Simple Solutions to Common Problems

Most of the time, problems can be fixed by using simple


troubleshooting techniques, such as closing and re-opening the program.
It's important to try these simple solutions before resorting to more extreme
measures. If the problem still isn't fixed, you can then try other
troubleshooting techniques, such as reinstalling the software.

Program Runs Slowly or Isn't Working Right

 If a program is running slowly or otherwise isn't working right, the first thing
you should try is closing the program and re-opening it.
 You can also shut down your computer, wait a few seconds, and boot it
up again. Some minor problems will work themselves out when you do
this.
 Check with the company for any known problems or updates to the
software.

Figure 8.Checking for updates

Program is Completely Unresponsive

 If a program has become completely unresponsive, you can press (and


hold) Control+Alt+Delete on your keyboard to open the Task Manager.
You can then select the program that isn't working and click End Task. If
you are using a Mac, you can press Option+Command+Esc to open a
similar dialog box.

192
Figure 9.The Task Manager

Problems Starting or Shutting Down the Computer

Figure 10.Resetting a surge protector

 If your computer does not start, begin by checking the power cord to
confirm that it is plugged securely into the back of the computer case and
the power outlet.
 If it is plugged into an outlet, make sure it is a working outlet. Often, this
will require you to plug a lamp or other electrical device into the outlet to
make sure it is receiving power.
 If the computer is plugged into a surge protector, verify that it is turned
on. You may have to reset the surge protector by turning it off and then
back on. You can also plug a lamp or other device into the surge protector
to verify that it is on.

193
 If you are using a laptop, the battery may not be charged. Plug the AC
adapter into the wall and then try to turn on the laptop. If it still doesn't
start up, you may need to wait a few minutes and then try again.

"Non-System Disk” or “Disk Error" Message

If you get this message when you boot up your computer, it usually
means there is a CD, DVD, USB flash drive, or floppy disk in your
computer, which is interfering with your computer's booting process.
Remove the disk from the drive and restart the computer.

Figure 11.The Non-System Disk or Disk Error Message

Windows Shutting Down Message Will Not Disappear

Sometimes Windows will freeze during the shutdown process. If


this happens, the Windows is Shutting Down message screen will stay
active on your screen. To finish shutting down the computer, press and
hold the power button for about 10 seconds, or until the computer turns
off.

Figure12.The Windows shutdown screen

194
Computer Begins Randomly Rebooting or Crashing

 Check for overheating. Make sure the vents in the case are not blocked.
Confirm that there is good air flow around the computer.
 Update your antivirus software and scan for viruses.

Figure13.Virus Scanning

Problems with the Monitor and Speakers

No Picture on the Monitor

 Confirm the computer is turned on.


 Check the brightness control, located on your monitor or your keyboard,
and make sure it is not set too low.
 Check the connections for the monitor and surge protector, and make
sure the surge protector is turned on.

Figure 14.Cable plugged into monitor

195
Monitor Goes Blank Periodically

 You may have the screensaver


enabled. If the screen saver is
enabled, just move your mouse
back and forth and your original
screen will appear. You can
change the screensaver settings
by going to your Control Panel
(or your System Preferences if
you're using a Mac).

Figure 15.Opening the Control Panel

No Sound

Figure 16.Adjusting the sound volume on a Mac

 Check the volume control on your computer. In Windows, the sound icon
will usually be on the taskbar, and you can also access the sound options
in the Control Panel. On Macs, the sound options are found at the top of
the screen or in System Preferences.
 Most media programs (such as iTunes or Windows Media Player) have
a volume control, which will need to be turned up.
 Make sure the speakers are turned on, if using external speakers.

196
 Make sure external speakers are connected to the correct audio port or a
USB port. If your computer has color-coded ports, the audio output will
usually be green.
 Connect headphones to the correct audio port and determine if sound is
audible from the headphones.

Searching the web for a solution

If you still haven't found a solution to your problem, you may need to
ask someone else for help. Try searching the web for the problem that
you're having, as other people may have had similar problems. Also, if you
have a friend or family member who knows a lot about computers, they may
be able to help you.

Keep in mind that most computer problems have simple solutions,


although it may take some time to find them. For very difficult problems, a
more drastic solution may be required, such as reformatting your hard
drive, reinstalling programs, or reinstalling your operating system. If you're not
a computer expert, it's possible that you could make the situation worse, so
it's best to consult a professional if you think a drastic solution is needed.

Task. Examining the Motherboard in Detail

1. Look at the back of your computer. Without opening the case, list the ports
that you believe come directly from the motherboard.
2. Remove the cover of the case. List the different expansion cards in the
expansion slots. Was your guess correct about which ports come from the
motherboard?
3. To expose the motherboard so you can identify its parts, remove all the
expansion cards.
4. Draw a diagram of the motherboard and label these parts: Processor
(Include the prominent label on the processor housing.)
a) RAM (each DIMM slot)
b) CMOS battery
c) Expansion slots (Identify the slots as PCI, PCIe x1, PCIe x4, PCIe
x16, and AGP.) Each port coming directly from the motherboard

197
Power supply connections, SATA or IDE drive connectors and
floppy drive connector
5. Draw a rectangle on the diagram to represent each bank of jumpers on
the board.
6. What is the brand and model of the motherboard?
7. Locate the manufacturer’s Web site. If you can find the motherboard
manual on the site, download it.
8. You can complete the following activity only if you have the documentation
for the motherboard:.

 What do you do if a program on a PC is completely unresponsive? What


about a program on a Mac?
 What should you do if you've tried everything and the problem still isn't
fixed?

Diagnosing Power Supply Failure

Directions: Divide the class into five (5) groups. Choose a leader for each
group. The group will prepares a chart and perform the tasks required by the
Diagnostics Procedure of ATX Power Supply Failure. After the activity
they will be graded through the given Performance Score Card below:

198
PERFORMANCE SCORE CARD

Performance Criteria Passed Failed


1. The students clearly identified the problem and applied
the possible solution correctly.
2. The students utilized actual tools/device in performing
the actual usage of each tools and OHS was observed.
3. The students applied safety precautions during the
Activity.
4. The activity gave students more critical thinking on the
personal protective equipment.
5. The students cooperatively performed the activity.

199
Tools for Testing Computer System

Tools and equipment play vital roles in troubleshooting. They help the
user determine the errors found in their computer hardware and network.

Tools used to test hardware problems:

1. Screw drivers - are used for installing and removing screws in the computer
unit.

Figure 17.Screw Drivers

2. Pliers and tweezers - are used for picking small parts in the computer unit.

Figure18. Pliers and Tweezers

3. Soldering iron- is primarily used for connecting terminals in the power supply
and circuit board with the use of a soldering lead.

200
Figure19. Soldering iron

4. Anti-static wrist strap, mat and spray- are used for eliminating electrostatic
discharge in the work area.

Figure20. Anti- static wrist strap, mat and spray

5. Lens cleaner – a device used for cleaning optical media, such as DVD-
ROMS and CD-writers.

Figure21. Lens Cleaner

6. Thermal paste-is a paste used for heat dissipation of the processor.

201
Figure22. Thermal Paste

Network Troubleshooting Tools

1. LAN Tester – is a device used for testing the network connection.

Source: www.nudata.com
Figure23. LAN Tester
2. Crimping tool- is a device used to crimp the RJ45 connector to the UTP
cable.

Source: www.ted-kyte.com
Figure24. Crimping Tool

202
Direction: Answer the following question. Write your answers on your
notebook.

Enumerate the six tools used for 2. Enumerate the two


troubleshooting. network troubleshooting
. tools.
1.
2. a.
3.
4. b.
5.
6.

203
Troubleshooting computer system network

Causes of Network Trouble

If a computer is unable to connect to a network or see other computers


on a network, it may be necessary to troubleshoot the network. A network
may not work because of any of the reasons below.

1. Network card not properly connected.


2. Bad network card drivers or software settings.
3. Firewall preventing computers from seeing each other.
4. Connection related issues.
5. Bad network hardware.

Solution

Because of the large variety of network configurations, operating


systems and setup, not all of the below information may apply to your network
or operating system. If your computer is connected to a company or large
network, or you are not the administrator of the network, it is recommended
that if you are unable to resolve your issues after following the below
recommendations, you should contact the network administrator or company
representative.

Verify connections / LEDs

Verify that the network cable is properly connected to the back of the
computer. In addition, when checking the connection of the network cable,
ensure that the LEDs on the network are properly illuminated. For example, a
network card with a solid green LED or light usually indicates that the card is
either connected or receiving a signal.

If, however, the card does not have any lights or has orange or red
lights, it is possible that the card is bad, not connected properly, or the card is
not receiving a signal from the network.

204
If you are on a small or local network and have the capability of
checking a hub or switch, verify that the cables are properly connected and
that the hub or switch has power.

Adapter resources

Ensure that if this is a new network card being installed into the
computer that the card's resources are properly set and not conflicting with
any hardware in the computer.

Adapter functionality

Verify that the network card is capable of detecting or seeing itself by


using the ping command. Windows / MS-DOS users ping the computer from a
MS-DOS prompt. Unix / Linux variant users ping the computer from the shell.
To ping the card or the local host, type either ping 127.0.0.1 or ping
local host
This should show a listing of replies from the network card. If you
receive an error or if the transmission failed, it is likely that either the network
card is not physically installed into the computer correctly, or that the card is
bad.

Protocol

Verify that the correct protocols are installed on the computer. Most
networks today will utilize TCP/IP, but may also utilize or
require IPX/SPX and NetBEUI.
When the TCP/IP protocol is installed, unless a DNS server or other
computer assigns the IPX address, the user must specify an IP address as
well as a Subnet Mask. To do this, follow the instructions below.
1. Click Start / Settings / Control Panel
2. Double-click the Network icon
3. Within the configuration tab double-click the TCP/IP protocol icon. Note: Do
not click on the PPP or Dial-Up adapter, click on the network card adapter.
4. In the TCP/IP properties click the IP address tab
5. Select the option to specify an IP address
6. Enter the IP address and Subnet Mask address, an example of such an
address could be:
IP Address: 102.55.92.1
Subnet Mask: 255.255.255.192

205
7. When specifying these values, the computers on the network must all
have the same Subnet Mask and have a different IP Address. For
example, when using the above values on one computer you would want
to use an IP address of 102.55.92.2 on another computer and then specify
the same Subnet Mask.

Firewall

If your computer network utilizes a firewall, ensure that all ports required
are open. If possible, close the firewall software program or disconnect the
computer from the firewall to ensure it is not causing the problem.

Additional time

In some cases it may take a computer some additional time to detect


or see the network. If after booting the computer you are unable to see the
network, give the computer 2-3 minutes to detect the network. Windows users
may also want to try pressing the F5 (refresh) key when in Network
Neighborhood to refresh the network connections and possibly detect the
network

Additional troubleshooting

If after following or verifying the above recommendations you are still


unable to connect or see the network, attempt one or more of the below
recommendations.
If you have installed or are using TCP/IP as your protocol you can ping
another computer's IP address to verify if the computer is able to send and
receive data. To do this, Windows or MS-DOS users must be at a prompt and
Linux / Unix variant users must open or be at a shell.
Once at the prompt assuming, that the address of the computer you
wish to ping is 102.55.92.2, you would type:
ping 102.55.92.2
If you receive a response back from this address (and it is a different
computer), this demonstrates that the computer is communicating over the
network. If you are still unable to connect or see the network, it is possible
that other issues may be present.
Another method of determining network issues is to use the tracert
command if you are a MS-DOS or Windows user or the trace route command

206
if you are a Linux / Unix variant user. To use this command you must be at
the command prompt or shell. Ortrace route 102.55.92.2
This should begin listing the hops between the computer and network
devices. When the connection fails, determine what device is causing the
issue by reviewingthe trace route listing.

Networking with DHCP

Task: Setting up a local area network with a Dynamic Host Control


Protocol (DHCP) server is easy. The DHCP server provides all the
information your computer needs to get up and running on the network. Once
connected, you will check network connectivity with the router and at least
one other peer on the network.
Procedures:
Getting connected

1. Before connecting your PC to the network, be sure the Windows XP


operating system is running on your computer. You will use Windows XP sp2
throughout this activity.

2. Next, open a terminal window on your computer by clicking on


Applications->Accessories->Terminal.

3. In the terminal window, type ipconfig and press Enter.

a. How many network devices are listed in the output? Record their names in
your worksheet.

b. Is there an IPv4 address listed for any of the network devices? If so, record
your

IP address (es) in your worksheet.

4. Connect your computer to a network switch using a patch cable. Did you
get a light on the switch? Record the port number you connected to in your
worksheet.

207
5. Draw a diagram of the entire local area network in the space below,
including the

router, any switches or hubs, and all connected PCs.

6. Run ifconfig again. Do you see an IP address? If so, record it in your


worksheet.

7. In the terminal window, type dhclient eth1 and press Enter. Describe what
happens.

Checking your connection:

1. Check connectivity with the router with the ping command. Type ping -c4
10.0.1.1 and press Enter. Record the times listed in the last column of the
output. What was the average round trip time (rtt) from your computer to the
router and back?

2. Ask another group for their IP address. Check connectivity with that group's
computer with ping. Run ping as shown above, substituting the new IP
address for the one listed in the previous item. Record the times listed in the
last column below. What was the average round trip time (rtt)?

3. When you have completed the activity, shut down your computer and
return to your seat.

Title: Networking with Static IPs

Purpose: While setting up a network with a Dynamic Host Control


Protocol (DHCP) server is very convenient, it is sometimes preferable to use
static IP addresses. In this activity, you will join the network using an IP
address and netmask provided by your instructor. Once connected, you will
check network connectivity with at least one other peer on the network.

208
Procedures:

Getting connected

1. Before connecting your PC to the network, be sure the windows


Operating system is running on your computer.
2. When the boot process is completed, connect your computer to the
network switch using a patch cable. Did you get a light? What port
number did you connect to on the switch?
3. Draw a diagram of the entire network in the space below.
4. To configure your network settings, click System->Administration-
>Network.
5. In the Network settings window, make sure the Connections tab is
selected.
6. Click on Wired connection, and then click the Properties button.
7. In the Interface properties window, change the Configuration setting
to Static IP address.
8. Enter the IP address provided by your instructor in the IP address
field.
9. Enter 10.0.1.0 in the Gateway address field.
10. Finally, enter 255.255.255.0 in the Subnet mask field. Click OK to
close the Interface properties window.
11. Click OK to close the Network settings window.

Checking your connection

1. Open a terminal window on your computer, if one is not already


open, by clicking Applications->Accessories->Terminal.

2. Type ipconfig and press Enter. Are your network setting correct? If
not, repeat the steps 4–11 in the previous section.

3. Ask another group for their IP address. Check connectivity with that
group's computer with ping. For example, ping -c4 10.0.1.200.
Record the times listed in the last column below. What was the
average round trip time?

4. Ask a second group for their IP address. Check connectivity to that


group's computer with ping. Record the times listed in the last
column below. What was the average round trip time?

209
Evaluation:
CRITERIA
Passed Failed

1. Sequence of steps in diagnosing is followed.

2. Safety precaution are observed.

3. Appropriate tools are used in diagnosing.

4. Diagnostic plan for troubleshooting is created.

Remarks

210
Computer System and Network Configurations

Computer Networks

Networks are collections of computers, software, and hardware that


are all connected to help their users work together. A network connects
computers by means of cabling systems, specialized software, and devices
that manage data traffic. A network enables users to share files and
resources, such as printers, as well as send messages electronically (e-mail)
to each other.

The most common networks are Local Area Networks or LANs for
short. A LAN connects computers within a single geographical location, such
as one office building, office suite, or home. By contrast, Wide Area Networks
(WANs) span different cities or even countries, using phone lines or satellite
links.

Network System Configuration

All networks go through roughly the same steps in terms of design, rollout,
configuration, and management.

Designing Your Network

Plan on the design phase to take anywhere from one to three working
days, depending on how much help you have ad how big your network is.

Here are the key tasks:

 Settle on a peer-to-peer network or a client/server network.


 Pick you network system software.
 Pick a network language.
 Figure out what hardware you need.
 Decide on what degree of information security you need.

211
 Choose software and hardware solutions to handle day-to-day
management chores.

Rolling Out Your Network

Rolling out your network requires the following steps:

 Run and test network cables.


 Install the server or servers if you’re setting up a client/server network. (If
you are setting up a peer-to-peer network, you typically don’t have to
worry about any dedicated servers.)
 Set up the workstation hardware.
 Plug in and cable the Network Interface Cards (NICs – these connect the
network to the LAN).
 Install the hub or hubs (if you are using twisted-pair cable).
 Install printers.
 Load up the server software (the NOS, or Network Operating System) if
your network is a client/server type.
 Install the workstation software.
 Install modem hardware for remote dial-up (if you want the users to be
able to dial into the network).
 Install the programs you want to run (application software).

Configuring Your Network

Network configuration means customizing the network for your own use.

 Creating network accounts for your users (names, passwords, and


groups).
 Creating areas on shared disk drives for users to share data files.
 Creating areas on shared disk drives for users to share programs (unless
everyone runs programs from their own computer).
 Setting up print queues (the software that lets users share networked
printers).
 Installing network support on user workstations, so they can "talk" to your
network.

212
Managing Your Network

The work you do right after your LAN is up and running and configured can
save you huge amounts of time in the coming months.

 Mapping your network for easier management and troubleshooting.


 Setting up appropriate security measures to protect against accidental and
intentional harm.
 Tuning up your LAN so that you get the best possible speed from it.
 Creating company standards for adding hardware and software, so you
don’t have nagging compatibility problems later.
 Putting backup systems in place so that you have copies of data and
programs if your hardware fails.
 Installing some monitoring and diagnostic software so that you can check
on your network’s health and get an early warning of impleading problems.
 Figuring out how you plan to handle troubleshooting – educating your LAN
administrator, setting up a support contract with a software vendor, and so
on.

Smooth Setup

One key advantage of a peer-to-peer network is that it’s easy to setup.


With the simplest sort of peer-to-peer network, you just use the built-in
networking that comes with your operating system (Windows 98, Windows
XP, Windows 7, Windows 8 and so on) and you have very little software to
set up – even less if you have computers that have the operating system
preinstalled, as most computers do these days.

For Windows XP and Windows 7, the basic steps to setting up a peer-


to-peer network are as follows:

(Review for Cabling) UTP Cable

A UTP cable (category 5) is one of the most popular LAN cables. This
cable consists of 4 twisted pairs of metal wires (that means there are 8 wires
in the cable). Adding RJ45 connectors at both ends of the UTP cable it
becomes a LAN cable they usually use.

213
Preparation

You need a UTP Cable, Crimping Tool, RJ45, and Cutter

Figure 25. Materials for Cabling

Making Cable
Follow the steps below.

1. Remove the outmost vinyl shield for 12mm at one end of the cable (we
call this side A-side).
2. Arrange the metal wires in parallel (refer the each section's wire
arrangement table). Don't remove the shield of each metal line.
3. Insert the metal wires into RJ45 connector on keeping the metal wire
arrangement.
4. Set the RJ45 connector (with the cable) on the pliers, and squeeze it
tightly.
5. Make the other side of the cable (we call this side B-side) in the same
way.
6. After you made it, you don't need to take care of the direction of the cable.
(Any cable in this page is directionless --- that means you can set either
end of the cable to either device.)

214
How to see the wire arrangement

Take the UTP cable with your left hand and a RJ45 connector with
your right hand. Hold the RJ45 connector in the way you can see the contact
metal face of the RJ45 connector.

The tables below are for the case where the UTP cable consists of
green/green-white, orange/orange-white, blue/blue-white, brown/brown-white
twisted pairs.

10 Base T / 100 Base T Straight

10BaseT and 100BaseT are most common mode of LAN. You can use
UTP category-5 cable for both modes. (You can use UTP category-3 cable for
10BaseT, in which there are only 3 wires inside the cable.)

A straight cable is used to connect a computer to a hub. You can use it


to connect 2 hubs in the case one of the hubs has an uplink port (and you use
normal port on the other hub).

Pin ID side A side B


1 orange-white orange-white
2 orange orange
3 green-white green-white
4 blue blue
5 blue-white blue-white
6 green green
7 brown-white brown-white
8 brown brown

215
10 Base T / 100 Base T Cross
A cross cable for 10BaseT and 100BaseT is used to connect 2
computers directly (with ONLY the UTP cable). It is also used when you
connect 2 hubs with a normal port on both hubs. (In other words, the cross
cable is used relatively in a rare case.)

Pin side A side B


ID
1 orange- green-
2 white
orange white
green
3 green- orange-
4 white
blue white
blue
5 blue-white blue-white
6 green orange
7 brown- brown-
8 white
brown white
brown

To create a peer network, you must have the following components:

• A network interface or Local Area Network (LAN) adapter for each


computer. The same manufacturer and model of network card is preferred.

• Cabling that is supported by the network cards.

• Windows XP or 7 drivers for the network cards.

• A common network protocol.

• A unique computer name for each computer.

Task1. Creating Peer to Peer Network

To create a peer network, follow these steps for each computer connected to
the network:

216
1. Shut down the computer and install the network card and appropriate
cabling for each computer.

NOTE: For information about how to configure your network adapters


and physically connect your computers, consult the documentation
included with your network adapters or contact the manufacturer(s) of
your network adapters.

2. Start Windows and install the network drivers. Windows may detect your
network card and install the drivers when you start the computer. If the
network card drivers are not included with Windows, follow the manufacturer's
instructions about how to install the network drivers.

3. Choose a client and a common protocol for each computer. To do this,


follow these steps:

a. Click Start, point to Settings, click Control Panel, and then double-click
Network.

b. Click Add, click Client, and then click Add.

c. In the Manufacturers box, click the appropriate manufacturer, click the


appropriate client in the Network Clients box, and then click OK.

d. Click Add, click Protocol, and then click Add.

e. In the Manufacturers box, click the appropriate manufacturer, click the


appropriate protocol in the Network Protocol box, and then click OK.

4. Configure a peer server. Each computer that is configured for File and
Printer Sharing can act as a server. To configure a computer for File and
Printer Sharing, use the following steps:

a. Click Start, point to Settings, click Control Panel, and then double-click
Network.

b. Click File and Print Sharing, click one or both options to share files and
printers, click OK, and then click OK again.

c. Click Yes when you are prompted to restart your computer.

5. Give each computer a unique computer name. To do this, use the following
steps:

217
a. Click Start, point to Settings, click Control Panel, and then double-click
Network.

b. On the Identification tab, type a unique name in the Computer name box.

c. Click OK, and then click Yes when you are prompted to restart your
computer.

NOTE: The computer name must be unique for each computer on the
network and should be no more than 15 characters in length. In small
networks, the workgroup name should be the same for each computer
so that all computers are visible in the same workgroup when
browsing. You should not use spaces or the following characters in
: computer and workgroup names

Task 2. Using the Internet for Research

In this activity, you will learn how useful the Internet can be for a PC support
technician.

1. Using your own or computer laboratory, pretend that the motherboard


manual is not available and you need to replace a faulty processor. Identify
the manufacturer and model of the motherboard by looking for the
manufacturer name and model number stamped on theboard. Research the
Web site for that manufacturer. Print the list of processors the boardcan
support.

2. Research the Web site for your motherboard and print the instructions for
flashing BIOS.

3. Research the Abit Web site (www.abit.com.tw) and print a photograph of a


motherboardthat has a riser slot. Also print the photograph of the riser card
that fits this slot. What isthe function of the riser card?

218
Task 1. Setting Windows Network Connection

Equipment, Tools and Materials Required:


- UTP cables
- 4 Computer units
- 1 hub

Given the following materials, set-up a network connection on four computers.

CRITERIA 1 2 3 4 5
 Safety Precautions are observed.
 All the UTP are properly connected to the computer
and hub.
 Computers are properly connected and seen in the
network.
 Proper boot-up and shutdown of the computer is
observed.

Total:

More Security for Remote Desktop

Task2. Analyze the situations below and answer the questions that
follow.

When Enzo travels on company business, he finds it’s a great help to be able
to access his office computer from anywhere on the road using Remote
Desktop. However, he wants to make sure his office computer as well as the
entire corporate network is as safe as possible.One way you can help Enzo to
add more security is to change the port that Remote Desktop uses.
Knowledgeable hackers know that Remote Desktop uses port 3389, but if you
change this port to a secret port, hackers are less likely to find the open port.
Search the MicrosoftKnowledge Base articles (support.microsoft.com) for a
way to change the port that RemoteDesktop uses. Practice implementing this
change by doing the following:

219
1. Set up Remote Desktop on a computer to be the host computer. Use
another computer (the client computer) to create a Remote Desktop
session to the host computer. Verify the session works by transferring files
in both directions.
2. Next, change the port that Remote Desktop uses on the host computer to
a secret port. Print a screen shot showing how you made the change. Use
the client computer to create a Remote Desktop session to the host
computer using the secret port. Print a screen shot showing how you
made the connection using the secret port. Verify the session works by
transferring files in both directions.
3. What secret port did you use?

220
Lesson 3.INSPECT AND TEST THE CONFIGURED COMPUTER
SYSTEMS AND NETWORKS

General Safety Tips and Reminders

 Observe good housekeeping in the area of the machines during and after
maintenance.
 Place removed covers and other parts in a safe place, away from all
personnel, while you are servicing the machine.

Dress for the Job

 Keep your tool case away from walk areas so that other people will not trip
over it.
 Do not wear loose clothing that can be trapped in the moving parts of a
machine. Ensure that your sleeves are fastened or rolled up above your
elbows. If your hair is long, use hair net or hair cap.
 Insert the ends of your necktie or scarf inside clothing or fasten it with a
nonconductive clip, approximately three (3) inches from the end.
 Do not wear jewelry, chains, metal-frame eyeglasses, or metal fasteners.

Remember: Metal objects are good conductors

 After service, reinstall all safety shields, guards, labels, and ground wires.
Replace any safety device that is worn out or defective.
 Finally, reinstall all covers correctly before returning the unit to the
customers.

221
Electrical safety
Electric current from power, telephone, and communication cables can
be hazardous. To avoid personal injury or equipment damage, disconnect the
attached power cords, telecommunications systems, networks and modems
before you open the server/workstation covers, unless instructed otherwise in
the installation and configuration procedure.

Precautions

 Disconnect all power before:


 Performing a mechanical inspection
 Working near power supplies
 Removing or installing main units
 Before starting work on the machine, unplug the power cord.
 Never assume that power has been disconnected from a circuit.
First, check that it has been powered-off.
 Always look carefully for possible hazards in your work
 Moist floors
 Non-grounded power extension cables
 Power surges.
 If an electrical accident occurs:
 Switch off power
 Send another person to get medical aid
Safety Inspection Guide

These steps will help you identify potentially unsafe conditions on electrical
products:
 Check exterior covers for damage (loose, broken, or sharp edges)
 Power-off computer. Disconnect the power cord.
 The power cord should be the appropriate type.
 Insulation on the power cord must not be frayed or worn out.
 Remove the cover.
 Check for any obvious alteration. Use good judgment as to the
safety of any alterations.
 Check for worn out, frayed or pinched cables.
 Check that the power-supply cover fasteners (screws or rivets)
have not been removed or tampered with.
Accident Reporting Policy and Procedure
There must be a process put in place to report accidents, incidents or near
misses for immediate action and to help track causes. The organization needs to
222
identify what needs to be reported, to whom it is to be reported, and how to report
it, then put this process into a written procedure.

For example:
Any accident, incident, or "near miss," no matter how slight the injury or
damage, must be reported to the department supervisor immediately for
appropriate action.
The supervisor is responsible for taking appropriate follow-up action,
including getting medical attention for the injured, completing an investigation
report and recommending or implementing appropriate corrective actions.
The primary purpose of the accident investigation is to identify the cause(s)
of the accident, incident or "near miss" and take action to prevent a similar
occurrence in the future. In some instances, an employee's or volunteer's failure to
follow recognized safety procedures requires disciplinary action to protect co-
workers.
Remember: One person's actions can jeopardize the safety of others in the
workplace.

Accident Reporting Policy

Approved by
Chairman:
Date:

1. Purpose [complies with legislation, ensure the necessary action to


2. Prevent any recurrence and to enable the organization to maintain
proper records.
3. Scope [accident, incident, near-miss; employee, volunteer, anyone
on site or involved in organization-sponsored activities.
4. Definitions of terms.
5. Accident Reporting [timeline, to whom, how (phone, e-mail, fax) \
OSHA, NIOSH?
6. Absence resulting from an accident [who to report to, Return-to
work.
7. Accident Investigation [who investigates what to do with resulting
recommendations.
8. Forms Names, where to find them.
9. Reportable Diseases communicable diseases listed where?

223
Accident Investigation Procedures

The senior staff member available at the accident scene or the first
member notified should complete the appropriate investigation reporting form
(accident, incident, near miss). The completed form should be given to the
organization's safety committee, which will forward a copy of the report to the
safety coordinator for review.

When an employee or volunteer is injured:

1. Get the person professional medical attention.


2. Protect others.
3. Minimize property damage.
4. Stabilize the situation.
5. Conduct an investigation.

General guidelines for investigating accidents:

 Go to the scene of the accident while the facts are fresh.


 Inspect and record any changed physical characteristics or conditions of
the accident site
 Preserve any physical evidence, such as potentially defective equipment.
 Take photos to help preserve the scene (i.e., puddles on the floor,
overturned storage shelves and spilled contents).
 Talk to the injured person, if possible.
 Talk to any eyewitnesses.
 Ask simple open-ended questions, one question at a time, and attempt to
have events related chronologically to ensure thorough coverage.
 Distinguish a person's actual knowledge from hearsay.
 Ask when, where, who, how, and what was said or done.
 Avoid opinions, judgments or conclusions and be as objective as possible.
Avoid commenting on the information gathered except to confirm your
understanding or to clarify.
 Stress getting the facts.
 Do not comment on liability or fault during the investigation. Listen for
clues in the conversation around you.
 Unsolicited comments often have merit.
 Review and finalize any notes immediately upon completion of your
inspection and any interview or other communication with those involved.

224
 Fill out the appropriate accident, incident or near-miss form, giving an
accurate account of the facts.
 Send the form to the safety coordinator and safety committee for their
review.

Accident reports

Forms are used to give specific details with regards to the accidents
happened in the laboratory during experiments.

Accident reports contain the following details:

 Name of the person injured


 Date and time of the accident
 Type of injury
 First aid given
 Action taken to prevent further accidents

Task. Accomplish the sample Accident report sample form

Date:

Form No: Accident Report Form


Rm. No:

Name: Yr/Sec:

Type of Injury Cause of Injury Remedy

225
Replacing different Components

When replacing computer parts and peripherals, you need to consider the
following factors:

1. Compatibility of the component or part


2. Consider the component specification
3. Components form factor

Compatibility of the Component


When replacing computer parts you should check if it is compatible
with your unit. Double check on your computer manual if the component you
are replacing is compatible or not with the unit because this may lead to
system crash.
Component Specification

This focuses on the specification of the component. Check if the


voltage rating, current rating, memory size and frequency matches your
computer unit.

Form factor

The components’ manufacturer should be considered. Check if the unit


you are trying to repair or upgrade is generic or branded units. Branded units
have their own set of components compatible only to their units, while genetic
types can be used only to generic type of units.

List of Components Commonly Replaced in a Computer System

1. Memory
2. Video Cards (also referred to as a graphics accelerator)
3. Network Interface Card
4. Hard disk drive
5. Motherboard
6. Processor
7. CMOS Battery
8. CD/DVD Drive
9. Sound card

226
Directions: Write your answer on your notebook

1. Give the functions of each component.

a. Memory
b. Video card
c. NIC
d. Motherboard
e. HDD

2. Factors to consider when replacing a component.


a. _____________________
b. _____________________
c. _____________________

227
Upgrading Your Computer Components

To upgrade means to change some parts with faster and better


performing ones. These parts may even cost less and more powerful.

Commonly Upgraded Computer Parts

1. Monitors- replace old CRT monitors to new LCD or LED monitors.


2. Optical drives- old CD-ROMs drives are commonly replaced with DVD-
ROM and DVD writers.
3. Hard Drives- small capacity hard drives are replaced with faster and high
capacity hard drives.
4. Keyboards and mouse- keyboards and mouse are commonly replaced with
optical mouse and wireless keyboards.
5. RAM (Random Access Memory)- upgrading the computer’s memory or
RAM speeds up the performance of the computer
6. Video cards- upgrade computer’s graphics card to improve the computer
performance in terms of graphics and games.
7. Processors- replacing the processors increase the data processing speed.
8. Modem- installing a modem enables your computer to connect to the
internet.

How to Speed up the Computer


1. Defragmenter utility: Automatically analyzes the empty disk space on
the hard disk and defrag all scattered files.

228
Figure 26. Defragmenter Utility

2. Shutdown Unnecessary programs: Close all unwanted programs at the


Windows start up and this will automatically increase the windows loading
time and speed of the computer will also be increased.

3. Increased memory: Increasing the memory in the system will result to


exceptional speed of your computer.

4. Disk Cleanup: You can delete unwanted programs and files from your
computer and this will be helpful in increasing the speed.

Figure 27. Disk Cleanup

5. Empty Recycle Bin: Delete all the files and folders from the recycle bin
and you will get the space of C drive for reusability.

229
Figure 28. Emptying the recycle bin

Memory Upgrade
To make your computer faster, you can upgrade its memory. Here are
the steps in upgrading your computer’s memory
1. Remove the memory modules from the slot.

Figure 29. Removing memory module from the slot

2. In Figure 30 the notches we have marked


as A are used for the ejector clip on the
DIMM slot.

The notches we have marked as B is used Figure 30. Notch A


to align the memory module with the DIMM
slot key C as shown in Figure 31.

In Figure 31 you can see the ejector clips


(D), using your finger, push these into the
down position as shown in Figure 31 this
allows the memory to be inserted.
Figure 31. DIMM Slot

230
3. Now you are ready to install the module,
ensuring the notches line up with the keys
gently but firmly push the memory into the
slot until it is seated fully(see Figure 32 the
ejector clips should rise to the vertical
position as shown in Figure 33). Figure 32. Ejector clips

4. Now your memory is installed. Be sure


you have not loosened any cables while
working and also ensure that the memory
module is fully seated and the ejector clips
are in the vertical position. Figure 33. Ejector clips in vertical
position

Video card Upgrade

1. Take the video card (hold it by the edges) and line it up with the slot
paying careful attention to the alignment notch. When it is aligned correctly,
press gently but firmly until the card is seated fully and evenly into the slot.
2. When you are happy that the card is firmly in place, insert the fixing
screw and check to make sure you have not loosened anything during
installation.
3. When you reboot your machine Windows (or other OS) should find the
card automatically, it may then ask you to insert the disk/CD that came with
your video card, insert the CD and follow the on-screen instructions to install
the video card driver.

Hard Drive Upgrade

The first thing to do (after removing the case covers) is to locate the
drive bay where the hard drive will go.

231
The next step is to attach the IDE and power cables.

In figure 34 below you can see a standard IDE Cable, note there are
three (3) connections (notice the difference in distance between the
connectors). Connection A plugs into the motherboard and then the slave and
master connections are used for IDE devices such as hard drives, if you are
only installing one drive or the new drive is to be the master then use the
master connector, if the drive is to be the slave then use the slave connector.

The IDE cable will be marked down one side with a red or black strip,
this denotes Pin 1, match this with the Pin 1 indicator on the back of the hard
drive.

The power cable you will find in your case is attached to your power
supply; you can see an example below in figure 35.

Figure 34. Standard IDE Cable Figure 35.Power Cable

232
Basic Network Errors

If your network connection is not configured properly or suffers a


technical failure, you will often see some error message generated and
displayed on your screen. These messages give helpful clues to the nature of
the issue. Use this list of the common network-related error messages to help
troubleshoot and fix networking problems.

Network Problem error Messages

Network problem error message 1

Read the message in the box.


Box running software 14.8 and Box running software 14.7 and below:
above:
A network adapter was not
No network adapter. (N01) detected. (N01)

Please make sure that your network Please make sure that your network
adapter is securely plugged into a USB adapter is securely plugged into a USB
port on the back of the box. port on the back of the box.

Possible solution for error message 1

Quick 1. If you have a TiVo Wireless G or N Adapter: Remove the adapter


Steps from the TiVo box for 15 – 60 seconds and reconnect. Then force a
connection to the TiVo service.
2. Try another USB port (when applicable).

3. If these steps have not resolved your issue, see Detailed Steps
below for additional assistance.

233
Network problem error message 2
Read the message in the box.
Box running software 14.8 and Box running software 14.7 and
above: below:

Problem with router. (N03) The DHCP server was unable to


supply an IP address.(N03)
It might be temporarily out of IP
addresses. Wait a few minutes, and It might be temporarily out of IP
then try connecting again. If the addresses. Wait a few minutes, and
DHCP server is part of your home then try connecting again. If the
network, try increasing the number of DHCP server is part of your home
IP addresses it can assign. network, try increasing the number of
IP addresses it can assign.

Possible solution for error message 2

1. Power cycle your network, then force a connection to the


TiVo service.
Quick Steps

2. Renew the DHCP lease on your router.


NOTE: Please contact your router manufacturer if
you are unsure how to do this.

3. If these steps have not resolved your issue, see Detailed


Steps below for additional assistance.

Network problem error message 3


Read the message in the box:
Box running software 14.8 and Box running software 14.7 and below:
above:
The specified IP address (<IP
Problem with network Address>) is already in use by another
settings. (N05) device on the network. (N05)

Change your network settings to Change your network settings to use a


use a different (and unused) IP different (and unused) IP address.
address.

234
Possible solution for error message 3

1. If the box is using a static IP address, then it will need to be


changed. See How to configure network settings on your TiVo
Quick Steps box for instructions.
2. Power cycle your network devices, then force a connection
to the TiVo service.
3. Renew the DHCP lease on your router.
NOTE: Please contact your router manufacturer if
you are unsure how to do this.

Network problem error message 4


Read the message in the box:
Box running software 14.8 and Box running software 14.7 and below:
above:
Could not connect to the wireless
Wireless Network Not Found. (N06) network (<Network Name>). (N06)

Possible solution for error message 4

1. Verify your TiVo box has the latest software version to


support the encryption used by your router.
2. Make sure your wireless network is operational and you have
sufficient signal strength where the box is located. See How to
configure network settings on your TiVo box for instructions.
3. Verify you entered the correct the correct name of your
network and/or the correct encryption key or password.
Quick Steps

4. Check for possible interference sources nearby, such as


microwave ovens, cordless phones, etc.

5. Power cycle your network devices, then force a connection to


the TiVo service.
6. Move your wireless adapter to improve signal strength.
7. Contact your router manufacturer to determine whether you
need to update your router firmware.

8. If these steps have not resolved your issue, see Detailed


Steps below for additional assistance.

235
Network problem error message 8
Read the message in the box:
Box running software 14.8 and Box running software 14.7 and below:
above:
Your network adapter has not been
Adapter not set up. (N08) set up for use with the box. (N08)

Select Change network Select Change network settings to


settings to begin setting up your begin setting up your network
network adapter. adapter.

Possible solution for error message 8

1. TiVo Wireless N adapter: Verify that your adapter has


been set up properly. Please see TiVo Wireless N Adapter
Setup for instructions.
Quick Steps

2. Verify you entered the correct name of your


network and/or the correct encryption key or password.
3. Verify your wireless adapter is compatible with your TiVo
box.
4. Try another USB port (when applicable).
5. If these steps have not resolved your issue, see Detailed
Steps below for additional assistance.

Common Network Errors and Solutions

Network Errors Possible Solutions


Network problem is 1. Make sure no any firewall running.
not accessible 2. Make sure you have created the same
workgroup, and the same username for
Message: "....is not logging on a remote computer.
accessible. You may 3. Check user's rights.
not have permission 4. You may want to enable guest account on
to use this network windows.
resource. Contact the 5. if you are using simple file sharing, you may
administrator of this try to disable it and re-share the drive
server to find out if manually.
you have access 6. If it is mixed OS network, enable NetBIOS
permissions. The over TCP/IP.
semaphore timeout 7. Make sure the Computer Browser service is
period has expired." started if all computers are w2k/xp.
8. Stop Computer Browser service on wwin9x,

236
ME and NT if this is a mixed OS network.
9. Cache credential by using net
use \\computername\share /user:username
command (it is better to have the username
logon shared computer).
10. If you have tried enabling netbios over tcp/ip
but doesn't work, you may try to load netbeui
(loading netbeui may slow your network).
11. Make sure the server service is running.
12. Still need help, contact
consultant at http://hidev.com/contactus.asp f
or the tech support.

Network problem not 1. Type command "net share" on the shared


available. The server computer. If there is not a share named "IPC$"
is not configured for in the share list, use the command "net share
transactions" ipc$" to create it.

An extended error has 1. This issue may occur if the workstation doesn't
occurred" or "Access synchronize the time with the server. After
Denied" Symptoms: verifying that basic network connectivity exists,
When mapping a you can force time synchronization on the
network drive using client computer manually. To do this, run net
net use or using time /domain /set command.
the net 2. Make sure you have granted enough licenses
view command to for clients accessing.
view a different
computer in the
domain, you may
receive: "An extended
error has occurred" or
"Access Denied" error
messages.

“Computer name is 1. Are you sure the logon user has permission to
not accessible. No the shared folder?
permission to access 2. Have you tried to logon using the same user
the resources" name and password of the accessed
computer?
3. The last and risky one, if you enable guest
account in computer, can you access now?

237
"Multiple connections 1. Try using net use /d from a command to clear
to the server or allyour mapped connections before joining the
shared resource domain. You can also disconnect the mapped
are not allowed" drive in Windows Explorer by right-click the
mapped drive and select disconnection.
Symptom: when
attempting to join a
domain, you may
receive "Multiple
connections to the
server or shared
resource are not
allowed. Please
disconnect all
previous connections
to the server or
shared resource and
try again."

"Network path not 1. This issue may occur if the TCP/IP NetBIOS
found" in a domain Helper Service is not running on the client
network 1 computer. To start the TCP/IP NetBIOS
Helper Service, go to MMS>Services, double-
SYMPTOMS: click TCP/IP NetBIOS Helper Service.
When trying to join a
domain by using he
NetBIOS domain
name, you are
successful but not the
FQDN and you may
receive one of the
following error
messages:

1) The following error


occurred attempting
to join domain
"example.com": The
network location
cannot be reached.
For information about
network
troubleshooting, see
Windows Help.

238
2) Network path not
found.

"Network path not 1. You can find some computer browser errors
found" in a domain on the DNS server. Disable one of two NICs
network 2 will work. More resolutions can be found in
browser Issue page.

"Network path not 1. Make sure that File and Printer Sharing is
found" in a workgroup enabled on the shared computer.
network - error 53 Make sure that shared machine has
something shared.
2. Make sure that you have created the same
workgroup and logon the same username
Make sure that you have enabled NetBIOS
over TCP/IP if this is a mixed OS network.

"Not accessible. You 1. Enable NetBIOS over TCP/IP on one or more


may not have computers in the workgroup. To do that, go to
permission to use this properties of Local Area
network resource" Connection>properties of Internet Protocol
(TCP/IP)>General> Advanced>WINS, check
Symptom: Your peer- Enable NetBIOS over TCP/IP (If you have
to-peer network, may a DHCP-assigned IP address, select Use
receive the following NetBIOS setting from the DHCP server ).
error when you 2. Make sure the Computer Browser service is
double-click My started.
Network
Places/Computers
Near Me: <Workgroup
Name> is not
accessible. You may
not have permission
to use this network
resource.

"Not enough server 1. The registry value IRPstackSize may be not


storage is available to explicitly present. To increase the value of the
process this parameter, go to the key
command." error. HKEY_LOCAL_MACHINE\SYSTEM\CurrentC
ontrolSet\Services\
SYMPTOMS: When LanmanServer\Parameters. If the key is not
accessing shares on present, choose Add Value in the Registry
a server from a client, Editor. The Value Name should be

239
you may receive "Not IRPStackSize and the Data Type is
enough server REG_DWORD.
storage is available to 2. Remove any unnecessary entries from this
process this value in the registry,
command." error. You HKEY_LOCAL_MACHINE\System\CurrentCo
may receive this ntrolSet\Services\LanmanServer\Parameters\
message and Event NullSessionPipes.
ID: 2011 after you 3. Disable Norton antivirus to see if that will fix
install Norton the problem.
Antivirus for Windows.

"No logon server This sounds like cache credential issue.


available"
1. Make sure the computers in the same
Symptoms: you can network, the same workgroup/domain and
ping the server by have created the same username.
ip and name but 2. Use net
can't map the use \\servername\sharename password /user:
shared drive by username to cache the credential.
using net
use \\ip or \\server
name. If you try,
you may receive
the "No logon
server available".

Still need help, 1. Disable ICF if you don't need it.


contact 2. Open port # (UDP and TCP) from 135 through
consultant at http://hid 139 and/or 445. to do this, go to the properties
ev.com/contactus.asp of the
for the tech support. connection>Advanced>ICF>Settings>Service
s. For Microsoft file sharing SMB: add (UDP
"System error 6118 and TCP) ports from 135 through 139. For
has occurred. The list direct-hosted SMB traffic without network
of servers for this basic input/output system (NetBIOS) uses port
workgroup is not (TCP and UDP) 445. Note: the external and
currently internal port numbers should be identical.
available." Symptoms:
When using the net
view
\\computername com
mand, you receive the
following error

240
message: System
error 6118 has
occurred. The list of
servers for this
workgroup is not
currently available.

"The password is 1. You need to setup every user that needs


incorrect. Try again" access to the shared folder on every computer
they have to connect to. Then give the proper
user proper permission to the shared folder.
2. Logon the same user and password.
3. As always, you can try to enable a guest
account on the accessed machine.

"There are no entries 1. If there are no file or print shares on the


on the list" computer, the net view command displays a
"There are no entries in the list" message. So,
Symptom: when using make sure there are file or print shares on the
net computer. Or to use net share command to
view \\remotecompute check sharing status.
r command, you may 2. Make sure no firewall running because the
receive "There are no firewall may block sharing.
entries on the list".
And you may have a
problem to access the
remote computer.

"Unable to access 1. NetBIOS over TCP/IP. To do that, go to the


Computers near Me" properties of TCP/IP>Advanced>WINS. If you
or "Workgroup is not are using a static Internet Protocol (IP)
accessible" errors address, click
2. Enable NetBIOS over TCP/IP. If you have a
DHCP-assigned IP address, click Use
NetBIOS setting from the DHCP server.
No Master Browser or too many browsers may
cause this issue. Check Browser issue.

"Unable to Browse 1. Have you loaded the NIC or is it working?


Network" 2. Have you loaded common protocol, TCP/IP?
3. Does the Computer browser work?
Symptom: When you 4. Have you enable file and printer sharing in the

241
attempt to browse accessed computer?
your network by 5. Is the workstation service running?
opening Entire
Network in My
Network
Places/Network
Neighborhood, you
may receive the
following error
message: Unable to
Browse Network.

242
Award BIOS / CMOS Setup

This is the BIOS setup for Award BIOS v6.00PG. If you have a
different version of the Award BIOS there would be a lot of similarities. If your
BIOS are AMI or Phoenix then the common BIOS features would have some
similarities. Whatever BIOS you have, this setup guide should give you an
idea about how to setup BIOS.

Please note that setting up BIOS incorrectly could cause system


malfunction, therefore it is recommended that you also follow the BIOS guide
provided on your motherboard manual. If you decide to make changes to
certain options it is safer to make a note of what you have changed. Then
restart the system to see how it performs. If the system behaves abnormally
or becomes unstable you can revert back to your previous settings.

Softmenu III

Softmenu III is where you can setup up the CPU without setting
jumpers on the motherboard. You can setup the CPU simply by selecting the
speed i.e. Pentium III 750 from the list. This ensures that the CPU bus,
multiplier, voltage etc, is correctly set for that particular CPU. However you
can manually setup each feature if required. Once you have finished with the
setup press ESC to return the previous menu.

Figure 36. BIOS CMOS Setup Utility

243
Standard CMOS Features

Here you can setup the basic BIOS features such as date, time, type of
floppy etc. Use the arrow keys to move around and press enter to select the
required option. You can specify what IDE devices you have such as Hard
drive, CD-ROM, ZIP drive etc. The easiest way to setup the IDE devices is by
leaving it set to auto. This allows the BIOS to detect the devices automatically
so you don't have to do it manually. At the bottom, it also displays the total
memory in your system.

Figure 37. Standard CMOS Feature

Advanced BIOS Features

As you can see from figure 3, there are numerous advance settings
which you can select if required. For most cases leaving the default setting
should be adequate. As you can see the first boot device is set to floppy. This
ensures that the floppy disk is read first when the system boots, and therefore
can boot from windows boot disk. The second boot device is the Hard disk
and third is set to LS120. If you want to boot from a bootable CD then you can
set the third boot device to CD/DVD-ROM.

244
Figure 37. Advance Bios Feature

Advanced Chipset Features

Here you can setup the contents of the chipset buffers. It is closely
related to the hardware and is therefore recommended that you leave the
default setting unless you know what you are doing. Having an incorrect
setting can make your system unstable. If you know that your SDRAM can
handle CAS 2, then making changes can speed up the memory timing. If you
have 128MB SDRAM then the maximum amount of memory the AGP card
can use is 128MB.

Figure 38. Advance Bios Chipset

245
Integrated Peripherals

This menu allows you to change the various I/O devices such as IDE
controllers, serial ports, parallel port, keyboard etc. You can make changes as
necessary.

Figure 39. Integrated Peripherals

Power Management Setup

The power management allows you to setup various power saving


features, when the PC is in standby or suspend mode.

Figure 40. Power Management setup

246
PnP/PCI Configurations

This menu allows you to configure your PCI slots. You can assign
IRQ's for various PCI slots. It is recommended that you leave the default
settings as it can get a bit complicated messing around with IRQ's

Figure 41. Pnp/PCI Configurations

PC Health Status

This menu displays the current CPU temperature, the fan speeds,
voltages etc. You can set the warning temperature which will trigger an alarm
if the CPU exceeds the specified temperature.

Figure 42. PC Health Status

247
Load Fail-Safe Defaults

If you made changes to the BIOS and your system becomes unstable
as a result, you can change it back to default. However if you made many
changes and don't know which one is causing the problem, your best bet is to
choose the option "Load Fail Safe Mode Defaults" from the BIOS menu. This
uses a minimal performance setting, but the system would run in a stable
way. From the dialog box Choose "Y" followed by enter to load Fail-Safe
Defaults.

Figure 43. Load fail-safe defaults

Load Optimized Defaults

Like the Fail-Safe mode above, this option loads the BIOS default
settings, but runs the system at optimal performance. From the dialog box
Choose "Y" followed by enter to load Optimized Defaults.

Figure 44. Load optimized


Set Password

To password protect your BIOS you can specify a password. Make


sure you don't forget the password or you cannot access the BIOS. The only
way you can access the BIOS is by resetting it using the reset jumper on the
motherboard.

248
Figure 45. Load optimized

Save and Exit Setup

To save any changes you made to the BIOS you must choose this
option. From the dialog box choose "Y".

Figure 46. Save to CMOS and EXIT

Exit without Saving

If you don't want to save changes made to the BIOS, choose "N" from
the dialog box.

Figure 47. Quit Without Saving

249
Task 1. The BIOS settings in the CMOS memory have become corrupted
or damaged

Task: Check the CMOS battery and replace if needed.

Procedure:

1. Power on your desktop pc and wait for the POST


2. Read the Power on self-test report and do the necessary procedure to
solve the problem.
3. Boot up your pc into BIOS setup.
4. Look for incorrect or changing time settings. A noticeable symptom is an
invalid time showing within the operating system. This symptom is confirmed
if time sets after the computer system is restarted. Under these
circumstances, the CMOS battery should be replaced.

Procedure: On how to replace the CMOS Battery.


1. Locate your CMOS battery
2. Obtain battery information
3. Removing the battery
4. Insert the new battery
5. Enter CMOS values
You will be assessed using the following criteria

Evaluation
CRITERIA
Passed Failed

1. Sequence of steps in CMOS diagnosing


procedure is followed.

2. Sequence of steps for replacing CMOS battery is


followed carefully.

3. Safety precaution is observed.

Remarks

250
Task 1. Practicing TCP/IP Networking Skills

While connected to the Internet or another TCP/IP network, answer


these questions:

1. What is your current IP address?

2. Release and renew your IP address. Now what is your IP address?

3. Are you using dynamic or static IP addressing? How do you know?

4. What is your adapter address for this connection?

5. What is your default gateway IP address?

6. What response do you get when you ping the default gateway?

Task 2. Investigating Verizon FiOS

Verizon (www.verizon.com) is currently offering an alternative to DSL


and cable modemfor broadband Internet access. FiOS is a fiber-optic Internet
service that uses fiber-opticcable all the way to your house for both your
residential telephone service and Internetaccess. Search the Web for
answers to these questions about FiOS:

1. Give a brief description of FiOS and how it is used for Internet access.

2. What downstream and upstream speeds can FiOS support?

3. When using FiOS, does your telephone voice communication share the
fiber-optic cablewith Internet data?

4. What does Verizon say about FiOS cabling used for television?

5. IsFiOS available in your area?

251
Hardware Upgrade

Tool, Materials, and Equipment

Tools

Philip Screw Deriver

Anti-static wrist strap

Anti-static mat

Equipment

Network Card

Network Card Upgrade

Given the tools and materials, upgrade your computer by installing a


network card.

You will be assessed using the following criteria

Evaluation
CRITERIA
Passed Failed

1. Safety precautions are observed.

2. Appropriate tools are used in upgrading

3. Necessary improvement and adjustment are


done in terms up upgrading.

Remarks

252
LESSON 4: TEST SYSTEMS AND NETWORKS

Testing Computer System

Is your PC healthy? Don't be too sure. Think back to when you heard a
kerklunk sound coming from the hard drive. Or maybe you remember the last
time your Internet connection was down.

The best way to find out what's wrong is to take a proactive approach:
Check under your PC's hood with the following mostly free diagnostic tools,
and see if anything is amiss--before disaster strikes.

Three Major Components of Computer System:

 Hardware
 Software
 Firmware

Test Your Hardware

Checking your computer hardware and its peripherals

1. Computer Monitor and its peripherals


 Monitor and interface cables
 Video card
 Monitor power cable

2. Keyboard and Mouse

 Keyboard connector
 Mouse Connector

253
3. I/O port and devices

 Connection between the I/O port and the peripheral device


 A faulty cable between the I/O port and the peripheral device
 A faulty peripheral device
 Incorrect settings in the System Setup program
 Incorrect settings in the system's configuration files
 Faulty I/O port logic on the system board

4. Power supply

 Power cord
 Fuse

Fuse Power cord

Testing Your Software


Check the different software installed in the computer.
1. Operating system
 Run live updates for your operating systems to get the latest
patches and protection for your OS.
 Run registry scanners to check the OS registry configuration

Figure 48. Operating System

254
2. Application Software
 Check for live updates

Figure 49. Live Updates


3. Anti-virus software

 Run anti-virus program


 Check for virus signature updates
 Check for spyware updates

Test Your Firmware


Firmware- is a combination of hardware and software integrated on a
chip.
To test the firmware
Check for the correct configuration, you can accomplish this by
configuring the BIOS in the computer

Figure 50. BIOS Configuration


255
Sample Accomplishment Report Form

Task to be accomplished Status

Hardware component testing Working Not working


properly properly

Software testing Status

Working Not working


properly properly

256
Error Beep codes

When a PC is first switched on or reset it performs a special diagnostic


test called a POST (Power-On Self Test), to check all components in the PC,
the POST program sends out a signal to each device initializing each device's
built-in self test procedure.

The POST test is a two stage process:

1. First, it will check all the basic components including among other things
the system clock, the processor, RAM, the keyboard controller and the Video

2. After the video has been tested the BIOS will then indicate any errors
encountered by displaying either a numeric code or a text message on the
screen.

When a device fails the first part of the POST, the BIOS will send a
series of beeps from the PC's speaker (internal) to inform the PC user that
there is a problem these beeps are coded allowing the user to diagnose the
troublesomemcomponent.

When the POST has been completed successfully, the PC will make a
short beep to let the user know everything is as it should be.

Three (3) major brands of BIOS chip

1. AWARD BIOS
2. Phoenix BIOS
3. AMI BIOS

257
Each type of BIOS chip has it own error code

AMI BIOS ERROR BEEP CODES

Indicator Error message Solution

Memory refresh failure Check memory


1 Beep Memory parity error

Memory read/write error Check memory


2 Beeps
Motherboard timer not Check memory
3 Beeps functioning
Processor error
Gate A20/keyboard Replace motherboard
4Beeps controller failure Replace processor

5Beeps Processor exception Replace motherboard


interrupt
Replace processor
6 Beeps Display memory
read/write failure Replace video card
7 Beeps ROM checksum error
Replace BIOS
8 Beeps CMOS shutdown chip/Motherboard
read/write error Replace BIOS
9 Beeps Bad cache memory chip/Motherboard
10 Beeps Replace cache memory

258
Phoenix BIOS ERROR BEEP CODES

Phoenix BIOS beep codes are a series of beeps separated by a


pause, for example:
beep --- beep beep --- beep --- beep beep would be 1-2-1-2

Indicator Error message Solution

1-1-4-1 Cache error Check cache memory


Check BIOS ROM
1-2-2-3 BIOS ROM Checksum

DRAM test rate Check DRAM


1-3-1-1
Keyboard controller Check keyboard
1-3-1-3 test controller
RAM failure Check memory

1-3-4-1 Check memory


RAM failure data bits Check memory
of low memory bus
1-3-4-3
RAM failure data bits
of high memory bus
1-4-1-1 Check ROM
ROM copyright notice
2-1-2-3
Test for unexpected
interrupt

259
AWARD BIOS ERROR BEEP CODES

Indicator Error message Solution

One long beep and Video error Replace video card


two short beeps

Two short beeps


Non-fatal error Reset RAM, Check
other components.

Directions: Answer the following questions and place your answers on your
answer sheet.

1. What does the acronym POST stand for?


2. What are the Three Major Brand of BIOS chips
3. Identify the following error codes:

 1-2-2-3
 1-3-4-1
 2-1-2-3
 1-1-4-1
 1-3-1-1

260
Directions:

Test I. Identify the tools presented below and write your answer in separate
paper.

1.

2.

3.

4.

5.

261
Directions:

Test II. List down at list Five (5) common problem and solution. Use a
separate sheet of paper if needed.

Common Problem Solution

Task 1.Understanding Hardware Documentation

Obtain the manual for the motherboard for your PC. (If you cannot find the
manual, try downloading it from the motherboard manufacturer’s Web site.)
Answer these questions:

1. What processors does the board support?

2. What type of RAM does the board support?

3. What is the maximum RAM the board can hold?

4. If the board has a PCIe slot, what version of PCIe does the board use?

5. What chipset does the board use?

Task 2. Teaching Yourself about Windows Meeting Space

Using the Windows Help and Support window, Search for information
on Windows MeetingSpace. Describe the tool. When would you want to use
it? What can you do with WindowsMeeting Space? Set up and test the tool
with a friend on a network connection.

262
Task 1. Testing a Computer Unit

Equipment, Tools, and Materials:

Tools

Multi-tester

Screw driver

Equipment

Computer unit

Monitor

Keyboard and mouse

Power cables

Materials

Bond paper

Ruler and Pencil

Hardware Testing and Documentation

Directions: Test the following computer peripherals and equipment with the
use of the tools provider. Document your testing with the use of an
accomplishment form.

Assigned Task Condition

Hardware component testing Working Not working


properly properly

Computer monitor
Power supply

263
Keyboard
Mouse

You will be assessed using the following criteria

CRITERIA Percentage

1. Sequence of steps in testing is followed. 20%

2. Safety precautions are observed. 20%

3. Appropriate tools are used in testing. 30%

4. An accomplishment report is created. 30%

Performance Rating 100%

Task 2.Identify Error codes

Equipment, Tools, and Materials:

Tools

Screw drivers
Anti-static wrist strap

Equipment

Computer unit

Memory Error Codes

Given the tools and equipment, identify the memory error code by removing
the module in the computer unit

264
You will be assessed using the following criteria

Evaluation:

CRITERIA Percentage

1. Observance of safety precautions. 30%

2. Appropriate tools are used in testing. 30%

3. Identifying the error code. 40%

Performance Rating 100%

265
POST ASSESSMENT

Do the Activity on More Security for Remote Desktop

When Enzo travels on company business, he finds it’s a great help to


access his office computer from anywhere on the road using Remote
Desktop. However, he wants to make sure his office computer as well as the
entire corporate network is as safe as possible.

One way to help Enzo add more security is to change the port that
Remote Desktop uses. Knowledgeable hackers know that Remote Desktop
uses port 3389, but if you change this port to a secret port, hackers are less
likely to find the open port. Search the Microsoft Knowledge Base articles
(support.microsoft.com) for a way to change the port that Remote Desktop
uses.

Practice implementing this change by doing the following:

1. Set up Remote Desktop on a computer to be the host computer. Use


another computer (the client computer) to create a Remote Desktop session
to the host computer. Verify the session works by transferring files in both
directions.

2. Next, change the port that Remote Desktop uses on the host computer to a
secret port. Print a screen shot showing how you made the change. Use the
client computer to create a Remote Desktop session to the host computer
using the secret port. Print a screen shot showing how you made the
connection using the secret port. Verify the session works by transferring files
in both directions.

3. What secret port did you use?

266
Instruction:
 Read each of the questions in the left-hand column of the chart.
 Place a check on the columnthat indicate your answers

I Can YES NO
Plan and prepare work to ensure occupational health and
safety
(OHS) policies and procedures are followed
Obtain materials, tools, equipment and testing devices
needed to onform with job requirements
Interpret work instructions according to job requirements
Obtain computer components/devices/systems and
determines its location prior to installation
Install equipment/devices/systems in accordance with job
requirements
Check/Test devices/systems and/or installations to
determine the conformity to job requirements.
Check computer systems and networks for configuration
in accordance with specifications and requirements
Diagnose fault or problem in the computer systems and
networks in line with standard operating procedures
(SOP)

Configure the identified systems and networks based on


specifications and job requirements
Inspect and test configured computer systems and
networks in conformity with manufacturer's
instructions/manual
Correct/Adjust components or parts of computer systems
and networks in accordance with job requirements
Test computer systems and networks to ensure safe
operation
Perform scheduled/periodic maintenance in accordance
with manufacturer's requirements
Make needed repairs/replacements in accordance with
established procedures, when necessary
Document tasks undertaken in accordance with SOP
Clean and clear worksite of all surplus/excess materials in
accordance with company SOP

267
I. Identify what computer error is illustrated on the following situations.

__________1. The LED indicator of your monitor is in steady orange color.

_________ 2.When you open your PC, nothing shows up in your monitor and
the LED indicator of your monitor is flashing in yellow color.

__________3. When you open your PC it will show the processor brand
and/or the motherboard brand but doesn't continue. Usually this error will
result to system restart over and over again.

__________4.This also happens even if you try disconnecting your computer


set from the internet. This is what we called aftershock virus which will
continue to run even if internet is disconnected.

__________5. The computer opens up then boots but when the operating
system loads it doesn't continue and it will take a lifetime if you're going to
wait for it to load.

__________6. This happens even if you try installing the hardware. When
you restart your set it will happen again.

__________7. When you try going to safe mode all you will see is a list of
files in Command prompt style.

__________8. Upon loading he operating system, you will hear a loading


sound and then the sound stops, when you try running an audio file, no sound
will be heard

__________9.This will happen only in standby mode, when you move your
mouse or type something, your system will automatically restart and the worst
part is it will delete a file at random.

__________10. Just like the mouse problem, when you open a program that
will take the whole screen like for example a game and/or a program
applications, when you close it, it will cause your system to restart.

268
II. Choose the letter of the best answer:

1) These are moderately dangerous types of errors among those that can
pop up on your PC. System errors are caused by malfunctioning
hardware components, corrupted operating system modules, etc.
a. System error c. Stop errors
b. Runtime errors d. Device managers errors

2) These are caused by corrupted or malfunctioning system files or


software executables. Most runtime errors cause the application that
caused it to shut down. However, more serious runtime errors may
cause the system to become unstable or unresponsive, leaving you
with no choice but to reach for the Reset button.
a. System error c. Stop errors
b. Runtime errors d. Device managers errors

3) These are caused by corrupted hardware, especially malfunctioning


RAM modules and bad sectors on hard disks. Stop errors can be
difficult to resolve at times.
a. System error c. Stop errors
b. A Runtime errors d. Device managers errors

4) These are usually caused by corrupted driver files or malfunctioning


hardware components. In case of the former cause, the problem is
usually solved simply by reinstalling or updating the drivers. However,
the latter cause can often be solved only by replacing hardware
components.
a. System error c. Stop errors
b. B. Runtime errors d. Device managers errors

5) Theseare caused by malfunctioning hardware components, and are


characterized by short beep sounds from the tiny internal speaker of
your motherboard. POST code errors occur when you press the power
button to turn on your PC..
a. System error c. Application errors
b. B. Runtime errors d. Post Code errors

6) These can be caused at any point of time. As the name suggests,


these are caused by applications while those are running. These are

269
usually caused by glitches in the program code itself. These are
usually resolved by updating the program to its latest version.
a. System error c. Application errors
b. Browser status errors d. Post Code errors

7) These are caused by problems faced by browsers when trying to


access a website. These can be caused by misplaced web pages in
the server of the website itself, or due to connection problems. For
instance, a 404 error would indicate that the browser is trying to access
a webpage that does not exist in the specified location.
a. System error c. Application errors
b. Browser status errors d. Post Code errors

8) is define as the flow of electron or electric current. It is an invisible form


of energy that can be transform into other form of energy like heat light
and mechanical.

a. electricity c. Proton
b. atom d. Post Code errors
9) the amount of pulling force that makes the electron flow. Also known
as potential difference or EMF(electromotive force).
a. electricity c. Current
b. resistance d. Voltage
10) a type of circuit that has an open path for current to flow. It means that
current cannot flow in open circuit.
a. Open circuit c. Current circuit
b. resistance d. close circuit

III. Match Column A with Column B

Column A Column B
1. Used for installing and A. Screw drivers
removing screws in the
computer unit.
2. Used for picking small parts in B. Pliers and tweezers
the computer unit.
3. Used for eliminating C. Soldering iron
electrostatic discharge in the
work area.
4. Primarily used for connecting D. Lens cleaner
terminals in the power supply

270
and circuit board with the use
of a soldering lead.
5. It is a paste used for heat E. Anti-static wrist strap, mat and
dissipation of the processor. spray
6. A device used for cleaning F. Thermal paste
optical media, such as DVD-
ROMS and CD-writers.
7. A device used to crimp the G. LAN Tester
RJ45 connector to the UTP
cable
8. A device used for testing the H. Crimping tool
network connection
I. Systems Tool Box

IV. Arrange the following steps in verifying the correct protocols are
installed on the computer.

_____Within the configuration tab double-click the TCP/IP protocol icon.


Note: Do not click on the PPP or Dial-Up adapter, click on the network card
adapter.

_____Select the option to specify an IP address

_____Click Start / Settings / Control Panel

_____Double-click the Network icon

_____In the TCP/IP properties click the IP address tab

_____When specifying these values, the computers on the network must all
have the same Subnet Mask and have a different IP Address. For example,
when using the above values on one computer you would want to use an IP
address of 102.55.92.2 on another computer and then specify the same
Subnet Mask.
_____Enter the IP address and Subnet Mask address, an example of such an
address could be:IP Address: 102.55.92.1, Subnet Mask: 255.255.255.192

271
V. List down at list Five (5) common computer problems and solutions.

Common Computer Problems Solutions


1.
2.
3.
4.
5.

272
Books and Articles and Printed Materials:

Barry Press, Marcia Press, PC Upgrade and Repair Bible,


Desktop Edition., Wiley Publishing Inc., 10475 Crosspoint
Boulevard, Indianapolis, IN 46256

Ron Gilster, PC Repair Bench Book., Wiley Publishing Inc., 10475


Crosspoint Boulevard, Indianapolis, IN 46256
Barry Press, Marcia Press, PC Upgrade and Repair Bible, Desktop
Edition., Wiley Publishing Inc., 10475 Crosspoint Boulevard,
Indianapolis,
IN 46256

Ronaldo V. Ramiloand Deover M. Pasco , K to 12 Basic Education


Curriculum- Technology and Livelihood EducationLearning Module
–Computer Hardware Servicing

JethroCampos , et.al , Competency – Based Learning Materials for


Strengthening Technical Vocational Education Program

273
Computer System - The complete computer made up of the CPU, memory
and related electronics (main cabinet), all the peripheral devices connected to
it and its operating system. Computer systems fall into two broad divisions:
clients and servers. Client machines fall into three categories from low to high
end: laptop, desktop and workstation. Servers range from small to large: low-
end servers, midrange servers and mainframes.

Configuration - The makeup of a system. To "configure" is to choose options


in order to create a custom system. "Configurability" is a system's ability to be
changed or customized.

Connector - Any plug and socket that links two devices together. Although
taken for granted and rarely in the limelight, connectors are a huge industry,
and the quality of these components is more critical than most people would
imagine. When not designed or constructed properly, they often become the
weakest element in an electronic system.

Display Adapter- A plug-in card in a desktop computer that converts the


images created in the computer to the electronic signals required by the
monitor. It determines the maximum resolution, refresh rate and number of
colors that can be displayed, which the monitor must also be able to support.
On many PC motherboards, the display adapter circuits are built into the
chipset, and an AGP or PCI card is not required.

ESD (Electro Static Discharge)-A small amount of static electricity that can
destroy small parts of your computer.

Expansion Board - A printed circuit board that plugs into an expansion slot
and extends the computer's capability to control a peripheral device. All the
boards (cards) that plug into a computer's bus are expansion boards, such as
display adapters, disk controllers, network adapters and sound cards.

Expansion Bus - An input/output bus typically comprised of a series of slots


on the motherboard. Expansion boards (cards) are plugged into the bus. ISA
and PCI are the common expansion buses in a PC.

Graphical User Interface- A graphics-based user interface that incorporates


movable windows, icons and a mouse. The ability to resize application
windows and change style and size of fonts are the significant advantages of
a GUI vs. a character-based interface. GUIs have become the standard way

274
users interact with a computer, and the major GUIs are the Windows and Mac
interfaces along with Motif for Unix and the GNOME and KDE interfaces for
Linux.

Motherboard - Also called the "system board," it is the main printed circuit
board in an electronic device, which contains sockets that accept additional
boards. In a desktop computer, the motherboard contains the CPU, chipset,
PCI bus slots, AGP slot, memory sockets and controller circuits for the
keyboard, mouse, disks and printer. It may also have built-in controllers for
modem, sound, display and network, obviating the need to plug in a card. A
laptop motherboard typically has all peripheral controllers built in.

Operating System - The master control program that runs the computer. The
first program loaded when the computer is turned on, its main part, the
"kernel," resides in memory at all times. The operating system sets the
standards for all application programs that run in the computer. The
applications "talk to" the operating system for all user interface and file
management operations. Also called an "executive" or "supervisor," an
operating system performs the following functions.

Peripheral -Any hardware device connected to a computer, such as a


monitor, keyboard, printer, disk, tape, graphics tablet, scanner, joy stick,
paddle or mouse

Server - A computer system in a network that is shared by multiple users.


Servers come in all sizes from x86-based PCs to IBM mainframes. A server
may have a keyboard, monitor and mouse directly attached, or one keyboard,
monitor and mouse may connect to any number of servers via a KVM switch.
Servers may be also be accessed only through a network connection as well.

Sound Card- Also called a "sound board" or "audio adapter," it is a computer


expansion board that records and plays back sound, providing inputs from a
microphone or other sound source and outputs to speakers or an external
amplifier. The de facto standard for sound card compatibility in PCs is
Creative Labs' Sound Blaster.

User Interface - All graphics based today, the user interface includes the
windows, menus and method of interaction between you and the computer.
Prior to the Mac, Windows and Motif (Unix) interfaces, all interaction was
based on commands entered by the user. Operating systems may support
optional interfaces and allow a new shell, or skin, to be used instead.

Virus- Software used to infect a computer. After the virus code is written, it is
buried within an existing program. Once that program is executed, the virus

275
code is activated and attaches copies of itself to other programs in the
system. Infected programs copy the virus to other programs.

276

Вам также может понравиться