Blue Nile College, COVID-19 Emergency Response Reading Material
TVET-PROGRAMME TITLE: II Support Service Level II
MODULE TITLE:Caring for Network and Computer Hardware
MODULE CODE:EIS ITS2 M070919
NOMINAL DURATION: 50 Hours
MODULE DESCRIPTION:
This module defines the competence required to maintain computer hardware. It
includes locating sitting of hardware for safe and efficient utilization and reducing
risk of infection.
LEARNING OUTCOMES
At the end of the module the learner will be able to:
LO1. Identify computer hardware components
LO2. Establish location requirements for hardware and peripherals
LO3. Monitor threats to
Caring for Network and Computer Hardware Page 1
Blue Nile College, COVID-19 Emergency Response Reading Material
LO1. Identify computer hardware components
1.1 Introduction to computer hardware
Computer hardware is the collection of physical elements that comprise a computer system. Computer
hardware refers to the physical parts or components of a computer such as monitor, keyboard, hard drive
disk, mouse, printers, graphic cards, sound cards, memory, motherboard and chips, etc all of which are
physical objects that you can actually touch.
1.1.1 External hardware
* External hardware is accessories or parts for a computer that you can plug in
externally to the computer.
* For example keyboard, mouse, printer, scanner, etc.
1.1.1.1 Standards
A standard is a definition or format that has been approved by a recognized organization.
Standards are extremely important in the computer industry because they allow the combination of products from
different manufacturers to create a customized system.
- Standard user interfaces can make it much easier to learn how to use new applications.
Most official computer standards are set by one of the following organizations:
- ANSI (American National Standards Institute)
- ITU (International Telecommunication Union)
- IEEE (Institute of Electrical and Electronic Engineers)
- ISO (International Standards Organization)
- VESA (Video Electronics Standards Association)
IEEE sets standards for most types of electrical interfaces. Its most famous standard is RS-232C
(Recommended Standard 232), which defines an interface for serial communication. This is the interface
used by most modems, and a number of other serial devices, including display screens and mice.
IEEE is also responsible for designing floating-point data formats.
While IEEE is generally concerned with hardware, ANSI is primarily concerned with software.
ANSI has defined standards for a number of programming languages, including C, COBOL, and FORTRAN.
ITU defines international standards, particularly communications protocols. It has defined a number of
standards, including V.22, V.32, V.34 and V.42, that specify protocols for transmitting data over telephone
lines.
1.1.1.2 Compatibility
The term compatible refers to the ability of one device or program to work with another device or program.
Caring for Network and Computer Hardware Page 2
Blue Nile College, COVID-19 Emergency Response Reading Material
Example: - A printer and a computer are said to be compatible if they can be connected to each other.
To know hardware compatibility, you have to check the Hardware Compatibility List.
* A hardware compatibility list (HCL) is a list of computer hardware that is compatible with a particular
operating system or device management software.
I.e.:- A hardware compatibility list is a database of hardware models and their compatibility with a certain
operating system.
* Program compatibility is a mode in Windows that lets you run programs written for earlier versions of
Windows. Most programs written for Windows XP also work in this of Windows 7, but some older
programs might run poorly or not run at all.
If an older program doesn't run correctly, start the Program Compatibility Wizard to simulate earlier versions of
Windows. I.e.: - Control Panel Programs Use an older program with this version of Windows Next
Select the program you need, and then proceed with the wizard.
1.1.1.3 Specification
A specification is an explicit (clear or precise) set of requirements to be satisfied by a material, product, or service
The hardware specifications of a computer will vary depending on what an individual user will be doing with
computer.
1.1.2 Internal hardware
An internal hardware is any piece of hardware inside the computer case.
E.g. - C.P.U - R.A .M - R.OM
- Graphic card - Motherboard - Sound card
- Network interface. – Internal fan - power supply, and so on
HARDWARE STANDARDS
HARDWARE COMPONENT STANDARD
Chassis: Mid-Tower Case
Caring for Network and Computer Hardware Page 3
Blue Nile College, COVID-19 Emergency Response Reading Material
DQ35 Chipset Intel Core2Duo E6550 2.33
Processor: GHz 1333 FSB
Intel Core2Duo E6750 2.66
GHz 1333 FSB
Cache: 4 MB 4 MB
Memory: 2 GB RAM with 2 DIMMs 4 GB RAM with 2 DIMMs
Keyboards: USB USB
Monitor: 19” LCD 19” LCD
Video Card: Integrated Integrated
Hard Drive: B SATA HDD 250 GB SATA 7200 RPM
Operating System: Windows XP Pro SP3 Windows XP Pro SP3
Mouse: USB optical scroll mouse USB optical scroll mouse
Integrated Network Adapter Integrated 10/100/1000 Integrated 10/100/1000
(NIC):
Optical Storage Device: CD/DVD Combo Player CD/DVD Combo Player
Audio Solution: Integrated Sound Integrated Sound
Speaker: Internal Audio Speaker Internal Audio Speaker
Hardware Support Services: 4 years Parts & Labor with 4
years Next Business Day
1.2. Determining safe workplaces
1.2.1. Legal requirement
To determine the appropriate methods of working with computer hardware, knowledge of the following is
required:
Manufacturer’s requirements
Occupational Health and Safety (OH & S) requirements and safe work practices.
The Workplace Safety program objectives include improving the safety of the work environment through the
recognition, evaluation, and control of hazardous conditions; reducing the numbers and severity of injuries to
faculty, students, and staff through training and implementation of safe work practices; and complying with
regulatory requirements of the Occupational Safety and Health Administration (OSHA) and various state and local
codes.
These objectives are accomplished through:
Caring for Network and Computer Hardware Page 4
Blue Nile College, COVID-19 Emergency Response Reading Material
safety training to management, staff and students on a variety of topics such as electrical safety, slips and
falls, back care, computer workstations ergonomics, and safe maintenance practices;
investigations of workplace accidents;
regular safety surveys of various workplaces and the campus grounds and walkways;
a wide variety of safety programs such as construction safety, computer workstation ergonomics, electrical
safety, accident prevention, summer youth camp safety, and emergency action planning.
Safety Signs and Hazards:
Safety signs and symbols (for example, posters, labels, tags, cones and signs) are displayed to alert staff and
members of the public to danger areas.
First Aid Eye Protection No Smoking Watch Your Step
Fire Extinguisher Hearing Protection Electrical Hazard Slippery Floor
The use of the computer is one of the most dangerous physical hazards in the workplace.
A hazard is defined as ‘anything that could cause harm’.
Sitting at the computer, using the keyboard and looking at the screen for long periods of time, will often result in
back pain, stiff neck and shoulders, sore hands and wrists and tired legs.
To prevent any of the previously mentioned things from happening you should:
- Provide a safe and healthy workplace
Caring for Network and Computer Hardware Page 5
Blue Nile College, COVID-19 Emergency Response Reading Material
- Recognize hazards in the workplace
- Assess the risks of the hazards in your workplace
- Control the hazards in your workplace
1.2.2. Manufacturer’s requirement
Computer hardware will usually come with a user manual or guide, either in a hard copy or soft copy format.
Information in the user guide may include:
Installation instructions including required environmental conditions
Handling precautions
Software installation guide
Instructions on how to use the hardware
Maintenance instructions
Fault finding guide
Another source for this information is the manufacturer’s website.
Caring for Network and Computer Hardware Page 6
Blue Nile College, COVID-19 Emergency Response Reading Material
LO2: Establish location requirements for hardware and peripherals
2.1. Computer platforms
* In computer terms, platform is a framework upon which applications (programs) may run.
* Platforms may be either hardware or software and are layered onto one another.
* Hardware platforms are the physical hardware onto which software is installed. The heart of your
computer, the CPU, is a hardware platform.
Example: Windows may be installed on your hardware (computer) and then you may install the Flash
platform to start developing Flash applications.
* Software platforms create the framework for all the programs you use. Operating Systems are a form of
software platform that is loaded onto your computer.
A platform is any base of technologies on which other technologies or processes are built.
2.2. Preventive Maintenance
* Maintenance is all activities undertaken to keep equipments in a good condition or to return to such
condition. It is an action on that we may change the component or repair it.
Strategy of maintenance
• Preventive maintenance
• Break down or corrective maintenance
• Improvement maintenance
Preventive maintenance means prevent the components of the pc before the failure.
I.e.:- It refers to performing proactive maintenance in order to prevent system problem.
- PM covers all programmed maintenance which is carried out in order to prevent the occurrence of failure
or to detect failures before they develop to breakdown or interruption in training/production.
PM can be active or passive preventive maintenance.
- Active PM is a method of preventing the PC when some events or actions are happening.
- Passive PM is a type of preventing the PC from any danger always (continuously).
Corrective maintenance means already there is a failurity, so correcting the failed part or it is all
activities which is carried out in order to correct (repair) a fault in equipment.
Caring for Network and Computer Hardware Page 7
Blue Nile College, COVID-19 Emergency Response Reading Material
Improvement maintenance is the activities to improve the capacity or performance of the system/pc or
upgrading the performance. It is used when to modify the equipments, so the condition improves
Important of Preventive maintenance
. Saves money(Decreases cost of replacement)
. Saves time
. Helps safeguard to your data (minimize lost of data)
. Prolong the life of your pc(Decreases system downtime)
. Improve the performance of your pc components(Improves system reliability)
. Minimize component failurity
When apply PM? As the condition/situation of the environment (has no regular path because it depends on
environment or situations
2.2.1. System protection devices
Many devices are available that can help to protect your system from danger to ensure a longer life for your
computer components.
This includes maintaining/protecting the various components that make up your PC, along with looking at overall
factors that affect the system as a whole.
The correct operation of computer hardware is dependent on a continuous supply of electrical power within set
conditions. If the electrical supply is outside those conditions, the operation of computer hardware can be adversely
affected.
Common electrical problems are:
Blackout – total loss of electrical power.
Brownout and sags – the electrical power is delivered below the set conditions for the computer
hardware.
Surges and spikes – the electrical power is delivered above the set conditions, commonly only for a short
period of time.
- Surges and spikes commonly occur when there is lightning.
- Computer hardware (and other electronic equipment) may be damaged.
Protection devices
To provide protection for computer hardware from electrical problems, the following devices can be installed.
- Surge protectors – a device designed to protect against electrical surges and spikes.
- It provides no protection against blackouts or brownouts.
- Uninterruptible Power Supply (UPS) – a device designed to protect against blackouts.
Caring for Network and Computer Hardware Page 8
Blue Nile College, COVID-19 Emergency Response Reading Material
A UPS provides power automatically during a blackout and is designed to provide battery power for a relatively
short period of time – around ten to twenty minutes. This gives time to save all data and shut down the computer
correctly. Most UPS devices also provide protection against brownouts, surges and spikes depending on their
design.
- Generators – when an organization requires the computer hardware to be powered for an extended length
of time, a generator may be installed in addition to a UPS. This is a relatively costly option and would be
considered where the operation of the computer hardware is considered critical to the organization.
- Anti ESD devices – anti static floor mat(grounding mat), bag, spray, wrist and Ankle straps,
Maintenance and testing
The above devices should be regularly tested and maintained to ensure they will function correctly in the event of
an electrical problem.
2.2.2. Suitable environmental conditions for hardware and peripherals
- Computer hardware is designed for operation within a set range of environmental conditions.
- Outside these conditions, operation of computer hardware will damage or reduce its working life.
The manufacturer’s recommendations for operating a specific computer hardware device will be found in the user
manual or specifications.
environmental conditions (environmental care factors)
Temperature
- Hot Temperature is more danger than cool Temperature
- If the temperature exceeds the upper limit of this range, the life of the electronic components will be
shortened, and the reliability of the device decreased.
- The optimum temperature range for computer hardware is usually from 15 to 24 deg C (60-70 deg F).
Air conditioning will maintain the relative humidity levels in the room, and also improve the air quality by filtering
out dust particles.
Humidity and moisture
- t refers to the amount of moisture (water vapour) in the air.
- If the relative humidity is too high or too low, a computer has a short life time.
- Don’t put any moisture near the computer (Computer hardware devices should be located away from
sources of moisture such as open windows).
- Eating and drinking should not be allowed anywhere near a computer hardware device.
Dust
– Use clean up materials to remove dusts such as: -Liquid cleaning compounds
- Clean or soapy water and damp cloth
Caring for Network and Computer Hardware Page 9
Blue Nile College, COVID-19 Emergency Response Reading Material
- Denatured alcohol for CD and floppy drive
You must power off the computer and unplug the computer components before any liquid cleaning compounds.
- Eraser cleaner like brush
- Compressed air
Physical security
Physical security refers to making sure only authorized people have physical access to computer hardware.
Examples of physical security include: - Servers located in a server room secured with locks.
- Workstations protected by a key lock on the system case .
2.2.3. Requirements when moving hardware
When moving computer from one location to another, you have to consider the safety for the device.
. backup your data on secondary storage media
. Shutdown the power
. disconnect all cables
. Store computer, monitor and other components and cables into carrying box.
. Move the box in safe way
2.4. Applying and considering business requirements
2.4.1. Business requirement
What is requirement?
A requirement is a condition or capability needed by a stakeholder to solve a problem or achieve an objective.
Requirements can be classified into two major types:
Functional ( Capability)
Non-Functional (Constraint)
- A Functional Requirement is a requirement that will be satisfied by performing some function by the
proposed solution.
- A Non-Functional Requirement is usually some form of constraint or restriction that limits the user’s
ability to achieve their needs.
What is business requirement?
- A Business Requirement is a statement of need expressed by a user or stakeholder (owner).
The terms Business Requirement, User Requirement, Functional Requirement and just plain Requirement are
generally used interchangeably.
2.4.1.1. Quality and cost
- Quality is measure of excellence or a state of being free from defects/imperfection/fault, deficiencies, and
significant variations.
- Cost is amount that has to be paid or given up in order to get something.
Caring for Network and Computer Hardware Page 10
Blue Nile College, COVID-19 Emergency Response Reading Material
In business, cost is usually a monetary/financial/economical valuation of effort, material, resources, time and
utilities consumed, risks incurred/gain, and opportunity forgo in production and delivery of a good or service
2.4.1.2. Robustness
o Robustness means being very strong and excellent health. It derives from the Latin robustus, meaning
"strength."
o A robust product can be one that doesn't break easily.
Example: - an operating system in which any individual application can fail without disturbing the
operating system or other applications can be said to be robust.
o Robust is also sometimes used to mean a product or system of products designed with a full complement
of capabilities.
2.4.1.3. Upgrade
- Upgrade Means adding additional feature on the existing system or replacement of a product with a newer
version of the same product to improve the performance of the system.
2.5. Functions of computer hardware
2.5.1. Motherboards, CMOS battery, CPU, Drives, Interface cards, modem card, RAM and Upgrades.
The motherboard is the main circuit board in a computer. It provides a way for hardware in a computer
to communicate with each other.
CMOS (complementary metal-oxide-semiconductor) is the term usually used to describe the small amount
of memory on a computer motherboard that stores the BIOS settings.
Incorrect or slow system date and time and loss of BIOS settings are major signs of a dead or dying CMOS
battery.
The CPU is the hardware device in a computer that executes all of the instructions from the software.
Drive refers to the slot that is used to read and write data onto the disk.
Interface is a port that used to connect two devices.
Upgrades: - you can add additional hardware or replace.
Caring for Network and Computer Hardware Page 11
Blue Nile College, COVID-19 Emergency Response Reading Material
LO3. Monitor threats to the network
3.1. Using software Utilities
What is Utility software?
Utility software is system software (utility or tool) that performs a specific task related to the management of
computer functions, resources, or files, as password protection, memory management, virus protection, and file
compression.
- It is designed to enhance the operation of the OS by analyze, configure, optimize or maintain the system.
- Utility software usually focuses on how the computer infrastructure (including the computer hardware,
operating system, application software and data storage) operates.
Types of utility software
Anti-virus is utilities software which used to scan for computer viruses.
Backup software is utilities which used to copy all/selected information stored on a disk for
recovery/ restore purpose.
Data compression utilities is used to shrink files to have a small size.
Disk checkers can be used to scan operating hard drive.
Disk cleaners helps the user to decide what to delete when their hard disk is full.
- It helps to free up disk space on a computer's hard drive.
Disk compression utilities is used to compress/uncompress the contents of a disk (to increasing
the capacity of the disk).
Disk defragmenters can detect computer files whose contents are broken across several locations
on the hard disk, and move the fragments to one location to increase efficiency.
Disk partitions can divide an individual drive into multiple logical drives.
Disk space analyzers utilities is used to visualize the disk space usage by getting the size for each
folder & files in folder or drive. It shows the distribution of the used space.
File managers utilities provide a convenient method of performing routine data management
tasks, such as deleting, renaming, cataloging, uncataloging, moving, copying, merging, generating
and modifying data sets.
Memory testers check for memory failures.
Network utilities analyze the computer's network connectivity, configure, network settings, check
data transfer or log events. Example:- ping, ipconfig, etc
Caring for Network and Computer Hardware Page 12
Blue Nile College, COVID-19 Emergency Response Reading Material
Registry cleaners clean and optimize the Windows registry by removing old registry keys that are
no longer in use.
System monitors for monitoring resources and performance in a computer system.
System profilers provide detailed information about the software installed and hardware attached
to the computer.
3.2. Identify security threats
3.2.1. Security threats
Computer security means prevention and detection of unauthorized actions/access in a computer/Network.
Types of computer/network security are:
Prevention—Take measures that prevent your information from being damaged, altered, or stolen.
Preventive measures can range from locking the server room door to setting up high-level security policies.
Detection—Take measures that allow you to detect when information has been damaged, altered, or stolen,
how it has been damaged, altered, or stolen, and who has caused the damage. Various tools are available to
help detect intrusions, damage or alterations, and viruses.
Reaction—Take measures that allow recovery of information, even if information is lost or damaged.
Network Security
Network security is important and is an essential element in maintaining any network. It involves safeguarding
computing resources, ensuring data integrity (consistency), limiting access to authorized users, and maintaining
data confidentiality (carefulness).
3.2.1.1. Eavesdropping
Eavesdropping is a term used to describe the process of listening, monitoring or examining someone without their
permission or knowledge.
I.e.: - Eavesdropping is the unauthorized real-time interception of a private communication, such as a phone call,
instant message, and videoconference or fax transmission.
- It also means to listen secretly to the private conversation of others.
Example: - a user could eavesdrop on someone’s e-mail or chat conversation.
3.2.1.2. Manipulation, impersonation and penetration
Manipulation is getting what you want by ignoring or harming the desires of others.
- It can be behaviour of persons in order to get their way or what they want.
Impersonation is a method of breaking the network to access information illegally.
3.2.1.3. Denial Of Service(DOS)
Caring for Network and Computer Hardware Page 13
Blue Nile College, COVID-19 Emergency Response Reading Material
A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to
make a computer or network resource unavailable to its intended users.
3.2.1.4. Security strategy
3.2.1.4.1. Privacy
Privacy can simply be defined as the right to be left alone.
Information privacy is the ability of an individual or group to stop information about themselves from becoming
known to people other than those they choose to give the information to.
3.2.1.4.2. Authentication
Authentication is a process for identifying and verifying who is sending a request.
Authentication is the process of determining whether someone or something is, in fact, who or what it is declared
to be.
3.2.1.4.3. Authorization and integrity
Authorization is the process of giving permission to someone to do or have something.
Example: - In multi-user computer systems, a system administrator defines for the system which users are allowed
access to the system and what privileges of use (such as access to which file/directories, hours of
access,
amount of allocated storage space, and so on).
a. Configuring security setting
i. Install firewall, Install antivirus, Install anti-malware, Install anti spyware
Install firewall
What is a firewall?
A firewall is a software program or piece of hardware that helps screen out hackers (unauthorized access), viruses,
and worms that try to reach your computer over the Internet.
- Installing a firewall is a simple step that can keep your computer safe
- A firewall can come in two main forms, but basically do the same job.
1. Hardware firewall, such as a router.
2. Software firewall.
1. Software firewall - A software firewall is a program that runs on your PC in the background. It evaluates each
network request and determines if the request is valid or not.
- Software firewalls are usually very inexpensive and very easy to configure
- Since software firewalls run on your computer, they require valuable system resources (CPU, memory and disk
space).
A software firewall can help protect your computer but at the same time can cause issues with your networking.
Caring for Network and Computer Hardware Page 14
Blue Nile College, COVID-19 Emergency Response Reading Material
Example: you may be unable to browse other computers on the network, other computers may be unable
to browse your computer, and may not be able to print on a network printer because of a firewall.
2. Hardware Firewall - A hardware firewall is a small box that connects between your computer and the network.
Hardware firewalls have the following advantages:
- They provide more complete protection than software firewalls
- A hardware firewall can protect an entire network of computers
- Since they don't run on your system, hardware firewalls don't effect system performance.
- Hardware firewalls operate independently of your operating system and software applications.
Hardware firewalls have the following disadvantages:
- They tend to be more expensive than software firewalls.
- Since they do not run on your computer, they can be a bit challenging to configure.
How to install a new firewall:
1. Physically disconnect from the Internet
2. Turn off the Windows Firewall
3. Install the new firewall
4. Reconnect the internet and quickly test the new firewall
5. Disconnect, and take corrective action if the test fails
Disable a firewall depends on what firewall or antivirus program is installed.
Install antivirus
An anti-virus software program is a computer program that can be used to scan files to identify and eliminate
computer viruses and other malicious software (malware).
Install anti-malware
Anti-malware is software which is used to protect your computer from malware.
What is malware?
Malware is short for "malicious software." Malware is any kind of unwanted software that is installed without
your adequate consent. Viruses, worms, and Trojan horses are examples of malicious software that are often
grouped together and referred to as malware.
There are several free ways to help protect your computer against malware:
Make sure automatic updating is turned on to get all the latest security updates.
Keep your firewall turned on.
Don't open spam email messages or click links on suspicious websites.
Download Microsoft Security Essentials, which is free, or another reputable antivirus and anti-malware
program (see the warning below).
Scan your computer with the Microsoft Safety Scanner.
Caring for Network and Computer Hardware Page 15
Blue Nile College, COVID-19 Emergency Response Reading Material
Anti-malware programs can combat (fight) malware in two ways:
1. They can provide real time protection against the installation of malware software on a computer. This
type of malware protection works the same way as that of antivirus protection in that the anti-malware
software scans all incoming network data for malware software and blocks any threats it comes across.
2. Anti-malware software programs can be used solely for detection and removal of malware software that
has already been installed onto a computer. This type of anti-malware software scans the contents of the
Windows registry, operating system files, and installed programs on a computer and will provide a list of
any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list
of known malware components, removing files that match.
Install anti spyware
Antispyware software is a program which will block, discover or remove spyware from your computer system.
What is spyware?
‘Spyware’ is the generic name we give to programs that contain additional functionality designed to secretly
monitor your activities on your computer.
Its aim is usually to capture passwords, banking credentials and credit card details - and send them over the internet
to fraudsters.
It performs certain behaviors without your consent such as:
Advertising
Collecting personal information
Changing the configuration of your computer
Anti-spyware programs can combat spyware in two ways:
1. They can provide real time protection against the installation of spyware software on the computer. This
type of spyware protection works the same way as that of anti-virus protection in that the anti-spyware
software scans all incoming network data for spyware software and blocks any threats it comes across.
2. Anti-spyware software programs can be used solely for detection and removal of spyware software that
has already been installed onto the computer. This type of spyware protection is normally much easier to
use and more popular. With this spyware protection software the user can schedule weekly, daily, or
monthly scans of the computer to detect and remove any spyware software that have been installed on the
computer. This type of anti-spyware software scans the contents of the windows registry, operating system
files, and installed programs on the computer and will provide a list of any threats found, allowing the user
to choose what to delete and what to keep.
Caring for Network and Computer Hardware Page 16