Care For Network
Care For Network
October, 2019
Identifying external hardware components and peripherals
Hardware
Computer hardware refers to the physical parts of a computer and related devices. Internal hardware
devices include motherboards, hard drives, and RAM. External hardware devices include monitors,
keyboards, mice, printers, and scanners etc.
Basic Components
Case or Tower - This is the plastic box that contains the computer. Housed in the case, you will
find the floppy drive, CD R OM drive, and the main components of the computer. Some of these
are the hard drive, motherboard and the processor chip (CPU). The case keeps them neatly and
safely together.
Monitor or Screen - This is the TV-type screen on which you see the work you’re doing
on your computer.
Mouse - The mouse allows you to move, select and click on objects.
Keyboard - The keyboard is used to type in information and operate the computer.
Speakers - Sometimes speakers are connected to the computer so that you can hear music
and sound.
Microphone - A microphone can provide a way to talk through or to the computer.
Printer - A device that makes a printed copy of your work on a sheet of paper.
A scanner is a device that captures text or illustrations on paper and converts the information
into a form the computer can use. One of the most common kinds of scanners is called a flatbed
scanner. It has a glass surface on which you lay paper, magazines, or other documents that you
want to scan. Sometimes scanners can be manufactured so that they are combined with a printer
thus can also be used as a photocopier and fax machine.
Digital cameras store images digitally onto a storage device, either a memory card or a floppy
disk, rather than recording them on film. Once a picture has been taken, it can be downloaded to
a computer system, and then manipulated or printed.
USB flash drive:-A small, portable device that plugs into a computer’s USB port
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.6
Reviewing ,recording and applying Requirements
specifying by hardware manufacturers
Access point
Internet Access
• There are several ways to obtain Internet access.
• The type chosen often depends on the cost as well as what technologies are available in the
area you are located.
• XDSL Internet Access
• Cable Internet Access
• Satellite Internet Access
• Wireless Internet Access
• POTS(Plain Old Telephone Service) Internet Access
• Cable Internet access is attractive to many small businesses and home office users because
it is both inexpensive and reliable.
• Connectivity is achieved by using a device called a cable modem; it has a coaxial connection
for connecting to the provider's outlet and an unshielded twisted-pair (UTP) connection for
connection directly to a system or to a hub or switch.
• Most cable modems supply a 10Mbps Ethernet connection for the home LAN, although the
actual Internet connection ranges from 1.5Mbps to 3Mbps.
• One of the biggest disadvantages of cable access is the fact that you share the
available bandwidth with everyone else in your cable area.
• As a result, during peak times, performance of a cable link might be poorer than in low- use
periods.
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.6
Feature Cable Internet DSL Internet
Bandwidth/ The theoretical maximum cable speed of DSL lists speeds from to 384Kbps to
Speed 30Mbps downstream, aside, in practical use the 6.0Mbps depending on the type of
rate is somewhere between 300 and 700Kbps DSL used and whom you ask. DSL
downstream and a 128 connection. offers 128Kbps upstream transfers.
Connection Cable Internet uses a shared connection. You share DSL bandwidth is dedicated and
type the connection with others in your area. This can not shared.
affect bandwidth performance during peak usage
times.
Distance With cable Internet distance is not a concern. DSL speeds degrade as the distance
factors Subscribers maintain the same speeds regardless from the ISP increases. The farther
of the distance from the Internet provider. you are, the more overall speed
deteriorates.
Security The shared nature of cable Internet make it an DSL is more secure because it offers
increased security risk. Security risks include a dedicated link to the ISP. The
eavesdropping, tampering, service theft and more. dedicated link helps protect against
attacks associated with a shared
connection.
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.6
Satellite Internet Access
• DSL and cable Internet access are not offered everywhere.
• Satellite Internet offers an always-on connection with theoretical speeds advertised
anywhere from 512Kbps upload speeds to 2048Kbps download speeds, considerably faster
than a 56K dial-up connection.
• One primary drawback to satellite Internet is the cost, and even with the high price tag, it is not as
fast as DSL or cable modem.
• As with other wireless technologies, atmospheric conditions can significantly affect the
performance of satellite Internet access.
• Greatest advantage is its portability.
Types of Satellite Internet
• Two different types of Internet satellite services are deployed: one-way and two-way
systems.
• A one-way satellite system requires a satellite card and a satellite dish installed at the end user's
site; this system works by sending outgoing requests on one link using a phone line, with inbound
traffic returning on the satellite link.
• A two-way satellite system, on the other hand, provides data paths for both upstream and
downstream data. Like a one-way system, a two-way system also uses a satellite card and a
satellite dish installed at the end user's site; bidirectional communication occurs directly between
the end user's node and the satellite.
Wireless Internet Access
• Nowadays it is becoming increasingly common to see people surfing the Web in many
different public places.
• This is made possible by subscribing to a wireless Internet service provider (WISP) or
connecting to a company's local wireless router.
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.6
Determining and establishing relationship of hardware
and software components
4.1. Introduction
When caring for computer equipment you will inevitably be faced with a computer, or peripheral, that is not
operating as it should. You will be looked upon to provide the answer to ‘What’s wrong with it?’. In order for
you to answer that question, you will need to know a basic diagnostic approach to fault finding. In this section we
will examine what a system usually does when nothing is wrong, list some of the typical faults encountered and
what to do about it, and what to do if you can’t fix it. If you are not able to effect repairs then you should be able to
give the user some indication on how long their system will be down.
Firstly, let’s look at what normally happens, before looking at what can go wrong.
Booting up
The POST
When first turning the computer on, you will notice that there are certain lights flashing, beeping sounds and text
displayed on the screen. When power is applied to a computer system, the first thing that happens is that the
computer performs a Power On Self Test, commonly called a POST. After performing this self-check, the system
will try to load an operating system. Loading the operating system was traditionally known as loading the
bootstrap loader, or pulling the system up by the boot-straps. While the terminology has been dropped, we still
use the term ‘Booting Up’ to refer to starting the system.
The BIOS (Basic Input Output System) is responsible to perform the POST. The BIOS is a program that is built-in
to the motherboard and is responsible for the low level operations of the hardware, such as placing data from a
hard disk and writing it into RAM (Random Access Memory),
The system boot sequence
The following are the steps in a boot sequence. Of course this will vary by the manufacturer of your hardware,
BIOS, etc, and especially due to the peripherals you have connected. Here is what generally happens when you
turn on your system power:
1 The internal power supply turns on and initialises. The power supply takes some time until it can generate
reliable power for the rest of the computer, and having it turn on prematurely could potentially lead to
damage. Therefore, the chipset will generate a reset signal to the processor (the same as if you held the reset
button down for a while on your case) until it receives the Power Good signal from the power supply.
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.9
2 When the reset button is released, the processor will be ready to start executing. When the processor first
starts up there is nothing at all in the memory to execute. Of course processor makers know this will happen,
so they pre-program the processor to always look at the same place in the system BIOS ROM for the start
of the BIOS boot program.
3 The BIOS performs the POST. If there are any fatal errors, the boot process stops.
4 The BIOS looks for the video card. In particular, it looks for the video card’s built in BIOS program and
runs it. The system BIOS executes the video card BIOS, which initialises the video card. Most modern cards
will display information on the screen about the video card. This is why on most systems you usually see
something on the screen about the video card before you see the messages from the system BIOS itself.
5 The BIOS then looks for other devices’ ROMs to see if any of them have BIOSes. Normally, the IDE/ATA
hard disk BIOS will be found and executed. If any other device BIOSes are found, they are executed as well.
6 The BIOS displays its start-up screen.
7 The BIOS does more tests on the system, including the memory count-up test which you see on the screen. The
BIOS will generally display a text error message on the screen if it encounters an error at this point.
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.10
8 The BIOS performs a ‘system inventory’ of sorts, doing more tests to determine what sort of hardware is in
the system. Modern BIOSes have many automatic settings and can dynamically set hard drive parameters
and access modes, and will determine these at roughly this time. Some will display a message on the screen
for each drive they detect and configure this way. The BIOS will also now search for and label logical
devices (COM and LPT ports).
9 The BIOS will detect and configure Plug and Play devices at this time and display a message on the screen
for each one it finds.
10 The BIOS will display a summary screen about your system’s configuration. Checking this screen of
information can be helpful in diagnosing setup problems, although it can be hard to see because sometimes
it flashes on the screen very quickly before scrolling off the top or behind an operating systems splash
screen. Try being quick to press the <Pause> key.
11 The BIOS begins the search for a device to boot from.
12 Having identified its target boot device, the BIOS looks for boot information to start the operating system
boot process. If it is searching a hard disk, it looks for a master boot record (MBR) at cylinder 0, head 0,
sector 1 (the first sector on the disk); if it is searching a floppy disk, it looks at the same address on the
floppy disk for a volume boot sector.
13 If it finds what it is looking for, the BIOS starts the process of booting the operating system, using the
information in the boot sector. At this point, the code in the boot sector takes over from the BIOS. If the first
device that the system tries (floppy, hard disk, etc.) is not found, the BIOS will then try the next device in the
boot sequence, and continue until it finds a bootable device.
14 If no boot device at all can be found, the system will normally display an error message and then freeze up
the system. What the error message is depends entirely on the BIOS, and can be anything from ‘No boot device
available’ to ‘No ROM BASIC—System Halted’.
When diagnosing hardware problems you will need to keep in mind the steps above, particularly for errors that
halt the system from starting up.
Error messages
An error message can be produced by different parts of the system, depending on how far into the boot process
the system gets before it is produced. Most error messages are produced by the system BIOS,
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.11
as it is responsible for most of the functions of starting the boot process. However, other error messages are
operating system specific.
Error messages that crop up while the system is operational can be generated by different sources, including the
system BIOS, the operating system, hardware driver routines, or application software. It is usually possible to
determine roughly what is causing the error, since application-specific messages usually mention the application
that is generating them. However, error messages that crash a specific application can sometimes be caused by
hardware or system problems, especially i f the problem occurs in many different applications. This can make
diagnosis very difficult.
Even sticking to hardware, there are many thousands of individual error messages; some are more common than
others because there are only a few different BIOS companies that are used by the majority of systems in use.
However, since the exact wording of an error message can be changed by the manufacturer of each system or
motherboard, there are a lot of variations.
In most cases, the messages are pretty similar to each other; you may see a slightly different wording in your
error message than the ones listed here, but if the messages meaning will be substantially the same. For example,
‘Disk drive failure’ and ‘Diskette drive failure’ are virtually identical message s.
You may want to consult with your owner’s manual regarding some unusual messages, or to ensure that your
manufacturer means the same thing with their messages compared to others.
BIOS beep codes
There usually is a single quick beep sound when a system is turned on, and that often is an audible
acknowledgement of a good power supply ie the Power Good signal. However, when diagnosing fatal errors in a
system, knowledge of the beep codes, and their meaning, can be the key to quick repair or replacement.
Unfortunately not all manufacturers use the same set of codes to m
ean the same error, so we will have a look at some of the most common.
AMI BIOS beep codes
The American Megatrends Inc. (AMI) BIOS is one of the most popular in the personal computing world and is
quite consistent in its use of beep codes, across its many different versions.
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.12
Beep Code Meaning
2 beeps Memory parity error. The parity circuit is not working properly.
4 beeps System timer not operational. There is problem with the timer(s) that
control functions on the motherboard.
8 beeps Video memory error. The BIOS cannot write to the frame buffer
memory on the video card.
9 beeps ROM checksum error. The BIOS ROM chip on the motherboard is
likely faulty.
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.13
Phoenix BIOS beep codes
Phoenix uses sequences of beeps to indicate problems. The ‘-’ between each number below indicates a pause
between each beep sequence. For example, 1-2-3 indicates one beep, followed by a pause and two beeps,
followed by a pause and three beeps. Phoenix version before 4.x use 3 -beep codes, while Phoenix versions
starting with 4.x use 4-beep codes. This list is by no means comprehensive.
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.9
4- Beep Code Meaning
2-3-1-1
2-3-3-3
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.10
4- Beep Code Meaning
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.11
There is a fault in the motherboard.
The video card is not inserted correctly.
The monitor is turned off or has no power.
No boot device or unable to boot
The system could not find a bootable device; the most likely cause is the hard disk drive. The system summary
screen is the first place to check. If the hard disk is listed as a detected device, then the problem may be a logical
and not physical problem. Things to consider are:
Missing boot files — they may have been deleted by the user.
A virus has caused damage to the boot files or has corrupted the file system or Master Boot Record (MBR).
A common mistake is a floppy disk being left in the drive.
Cables not connected to hard disk drive properly.
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.12
Failure to read hard disk drive
This usually means that there is a serious problem with the drive which may be physical or logical. A physical
problem would mean the drive was unserviceable, whereas a logical problem may mean the drive and its
contents could be recovered by:
Running a disk checking program like scandisk, fsck, Norton’s Disk Doctor or some other program
appropriate to the operating system.
Reinstalling the operating system making sure the drive is formatted. If the option allows it, perform a full
format and not a quick format. A full format will make a thorough check of the drive for faulty sectors.
The cable may be faulty or not connected to the hard disk drive properly.
CD-ROM or DVD-ROM drive not reading disks
It is common for copied disks to be difficult to be read in standard CD/DVD-ROM drives. Often the drive
(CD/DVD Read Write drive, a.k.a. burner) that was used to copy the disk will be able to read the contents, unless
the disk is totally unserviceable. Other possibilities are:
The copying process was never complete and the disk session not closed off. Check the setting on the
software in use.
General poor quality disks or CD/DVD burner.
Disk dirty or in need of cleaning.
Faulty drive — when CD-ROM dives first came onto the market, the quality was poor and it seemed as
though they were a disposable item. These days the quality and reliability seems much improved.
Floppy drive errors
Floppy disks are notable for their unreliability. This is one reason why it is important to have more than one
copy of a disk, or its contents. Things to consider:
Try the disk in another drive or two, if it can be read then the problem is likely the floppy disk drive
(FDD) and not the disk.
The cable to the drive has not been connected properly. Most cables to floppy disk drives can be
connected to two drives. To distinguish between the first (A) and second (B) drive there is a twist
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.13
in the wires of the cable. If there is only a single drive (most common) and the cable is not connected at the
end of the cable (past the twist) then a drive error message is typical.
The floppy disk has not been formatted to this operating system.
Unable to print
Most current printers come with a high degree of intelligence built in and can detect errors like cable not
connected, printer offline, out of paper, out of toner/ink etc. Things to consider:
Read the LCD display (if the printer has one) or check the status lights are displaying what they should for
normal operation.
Check the print manager software of the operating system to see if the printer is being shown as connected
and on-line. If it is not on-line or shown as connected, then it may be a hardware problem.
Change the cable.
Perform a self test on the printer using the LCD display or options on the printer panel. If it performs the test
properly then try the options available in the printer control of your operating system.
No network connectivity
The likely cause of networking problems can be many and varied. Without delving into the finer details of
networking, the easiest option to try is to change the network cable and check the status lights that are on both
the network interface card (NIC) and the hub/switch/router at the other end. If there is activity then the likely cause
is not hardware. You can also try switching off, or resetting, the hub/switch/router. System hangs (locks up)
One of the most difficult to problems with personal computers occurs when it appears as though a system is not
responding to any user input (key press, mouse movement etc.). The likely causes are many and varied but a few
possibilities are:
Faulty memory (RAM) — you could turn memory testing on in CMOS settings which may confirm the
problem, or perform a rigorous test using third-party diagnostic software.
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.14
Conflict with devices — you should check the systems properties information available on you
operating system platform, for any messages or indications of conflict.
Device driver is faulty — try to isolate the problem occurrence to when a particular device is in use, such as a
scanner or printer. A driver update may be a solution.
KISS principle
Keep It Simple Stupid (KISS), while sounding strange, is an approach that can be surprisingly effective. Look
for the simple things first. For instance:
If a system does not power up as you expect then consider if there is in fact power connected and turn on.
If nothing appears on a monitor, then try a different monitor. Then you will know if the problem is the
monitor or within the system unit. Another possibility is that little fingers have turned the brightness
control down so that the screen simply appears black, when in fact nothing is wrong.
If you suspect that a video card is faulty, then swap it with a known good card – if the fault continues then you
know that the card is not at fault. If another card is not available then, remove the card, power the system
and you should hear an appropriate audible error – no beeps and the motherboard is the likely faulty
component.
If the mouse-pointer movement seems erratic, then turn the mouse over and clean the rollers, if it still is not
working properly then replace it with a new mouse. The cost of some devices is so low, in comparison to
the time wasted, that it is just not worth the bother.
Diagnostic tools
The most useful diagnostic tool that can be used is your brain. The tool should be used in conjuncti on with the
KISS principle. While that is suitable for some obvious problems, there are times when more specific
information is needed in order to take the appropriate corrective measures. To get good information about a
systems condition, good diagnostic tools are required.
A POST card
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.15
Where a system does not boot, or appears to be dead, there are some specialist interface cards that can be used to
diagnose the problem. A set of LEDs (light emitting diodes) display a code that can be referenced from the
manual. Example of this type of card would be:
Post-Probe by Micro2000 (www.micro2000.com).
ISA/PCI PC Analyzer Diagnostic Card by Pro Tech Diagnostics (www.protechdiagnostics.com).
Diagnostic software
Where a computer is capable of starting to the boot level, you can use diagnostic software in an attempt to isolate
the cause of a problem. While there is software that runs on your existing operating system (like Norton’s
Utilities), the better software will have its own operating system.
When a program requests access to any hardware device, it should be accessing it through the operating system
and any drivers. The problem with this approach is that the operating system shields the higher-level programs
from the lower-level hardware functions. If a program were to access the hardware directly, then it is highly
likely that the operating system will not respond well and the system could easily crash.
If diagnostic software is operated on its own specially designed operating system, then direct access (via the
BIOS) to the hardware will likely yield accurate and thorough details. Having unimpeded access to the low-level
functions of the hardware means the diagnostic software is able to run rigorous testing and reporting. After all,
it’s unlikely that rigorous memory testing could be performed while there are several other programs currently
running in memory.
Examples of good diagnostic software are:
Micro-Scope Diagnostic Suite from Micro2000 (www.micro2000.com)
PC Certify Lite from Pro Tech Diagnostics (www.protechdiagnostics.com)
Warnings
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.16
If the case is on a retail or brand-name system that is under warranty, be very sure that opening the case will not
void your warranty. Some vendors have this policy, and you may see stickers on the case that say that if they are
removed or broken the warranty is void. Some have the policy without the stickers.
Case and system manufacturers are quite creative, so not every imaginable case design is covered here. If you
read all of the different choices you are likely to find one that is close to what you have.
Be careful not to touch any of the internal components when removing the cover.
Cover removal procedure
Disconnect cables
Make sure the system itself is off. Detach all the cables from the back of the system case. Make a note of what
went where so that you will know how to reconnect them later on.
Remove monitor and other devices
If you have a desktop case, you of course need to move the monitor so that you can open the case. Also remove
any other devices from the top of the case.
Loosen and remove cover
The instructions for removing the cover depend on what sort of case you have. Find the one that best describes
your system:
Conventional tower: This is the classic design that has been around for years and is still being sold. Locate the
screws along the edge of the back of the case, and remove them using a screwdriver. There are usually four to six.
Gently pull back on the U-shaped top cover about a half-inch.; you may have to rock it slightly. Lift the cover up
off the frame of the case. Be careful, as these covers are large and unwieldy.
Conventional desktop: The conventional desktop case has been around since the original IBM PC in 1982, and
is still sometimes seen in new systems. Locate the screws along the edge of the back of the case, and remove
them with a screwdriver. There are usually five but may be fewer. Gently push the cover forward. Watch out for
drive faceplates that may become caught on the cover as you try to slide it forward. On some cases, the front
cover slides all the way off the front of the case. On others it will slide forward a couple of inches and stop, and
then you lift it up off the case.
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.17
Slimline Desktop: An odd design found on some proprietary systems, the low-profile case has the screws that
hold the cover on the front or rear of the case. Others may in fact be screwdriver-less, using finger tight screws.
Look at the front of the case near the bottom, or the centre top at the rear. Loosen the screw(s), and slide the
cover forward off the case. Watch out for drive faceplates that may become caught on the cover as you slide it.
Store screws in safe place
If you forget this step you might regret it later on.
Remember to wear an anti-static wrist strap before touching any internal components.
Post change, re-assembly procedure
After changing any component, you should take the following basic reassembly procedure.
Power inspection
Verify the following key items related to the system power:
If the system case has a dual voltage switch, make sure it is set to the correct voltage eg 230/240V.
Make sure the power switch is off. You don’t want the system booting up as soon as you connect the
power cord.
If you are working in an ATX system, double-check that you have connected the power switch to the
motherboard properly.
Make sure all your drives have a power connector attached to them correctly.
Make sure that the CPU fan and any additional case fans have their power connectors attached.
Cable inspection
Check the cable connections to make sure they are correct.
Check for loose connections or cables that are misaligned. Make sure the red edge of the cable is lined up to
pin 1 of each device
Check the IDE cable(s) going to the hard disk drive and CD-ROM drive.
Check the floppy cable going to the floppy disk drive.
Check the cables that attach the I/O port connectors and PS/2 mouse port connector to the motherboard.
Most new motherboards have all these connections integrated on the motherboard, so this is not an issue.
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.18
Make sure the cables running to the case switches and LEDs are correct. For instance, if the speaker is not
connected you will not be able to hear any audible error beeps, or power good signal.
Motherboard inspection
Double-check these configuration and installation aspects relevant to the motherboard:
Make sure the memory is inserted into the correct socket(s) and is fully seated.
Make sure the processor is inserted correctly and is all the way into its socket.
Ensure that the heat sink is secured properly to the processor.
Make sure the video card is seated properly in its slot. Some motherboards, particularly proprietary ones,
will also have the video fully integrated on the motherboard, so this is not necessary.
Physical interference inspection
Check the following physical issues:
Ensure that all the drives are properly secured in their bays.
Make sure there are no loose wires in the case that may interfere with any moving objects like the CPU
fan. Some video cards can also have a fan attached and some cases can have more than
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.19
1 Determining and applying suitable environmental
conditions
Environmental conditions
Just like the environmental conditions affect us as humans, computer equipment can also be
affected. In order install and maintain equipment to gain the maximum useful life, the
environmental conditions need to be considered — factors such as temperature extremes, humidity,
dust, electromagnetic interference (EMI), and so on. The following notes are a discussion of these
factors.
Temperature
One of the single most important factors in prolonging the life of your computer hardware is
the temperature of the components. Components that run hot, have a much shorter life than
those that stay cool most of the time. To keep components cool you could use cooling
equipment or ensure certain procedures or actions (discussed later). A more general
approach is to provide a room environment that is appropriate for the hardware.
A rule of thumb for room temperature is that computers like the temperatures that most
people like. That is temperatures between 15 and 24 degrees Celsius. Having computer
equipment operating in a hot room that is over 25 degrees Celsius will make general cooling
equipment, such as fans, fairly ineffectual.
Some businesses have their air-conditioners on a timer that will shut off at night. In this
situation you might want to make sure that computer equipment is switched off overnight,
or that a special computer room is designated with independent controls.
Humidity
As with temperature, computers prefer moderate humidity as opposed to either extreme.
While computer equipment is not as sensitive to humidity as temperature, they can still be
affected by it.
Obviously, computers are best kept dry. That means keeping it away from places or things that
can get it wet. Consider the inappropriate positioning near a window if it is frequently
opened, and be wary of beverages placed near the computer that could spill on it and short it
out.
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.1
Dirty environments
Computers operate best when they are used in a clean environment, and when they are
cleaned regularly. Most offices and homes are clean enough that a computer requires no
special treatment other than regular cleaning as part of routine preventi ve maintenance.
Industrial environments however can be quite destructive on computer equipment.
Computer systems that are going to be used in dirty environments should be protected or
cleaned often. Cleaning would also mean taking the covers off and cleaning the inside. If
you get the chance to see the inside of a system unit that has been in an industrial
environment, you will be amazed how much dirt accumulates.
One easy preventive measure is to use an air cleaner in the room where the computer is
located. There are also special cases and enclosures for computer hardware designed for
industrial environments to safeguard against damage due to dirt. The typical office owner
only has to remember to clean their equipment occasionally and no problems will generally
result
Now this might be stating the obvious, but cigarette smoke is bad. The simple fact is that
cigarette smoke, especially in high concentration, contaminates and damages computer
equipment. The smoke particles are very small and work their way into all sorts of places
that they do not belong. The most common problems relate to storage devices. The very fine
particles accumulate on read/write heads and the storage media, such as floppy disks.
Probably everyone at some stage has had a radio on when there is an approaching
thunderstorm. You would clearly hear the crackling and noise distortion coming from the
radio. That crackling is the result of electromagnetic interference, often referred to as EMI.
All electronic devices give off electromagnetic emissions. This is radiation that is a by-
product of electrical or magnetic activity. Unfortunately, the emissions from one device can
interfere with other devices, causing potential problems. Just like the
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.1
crackling on the radio, interference can lead to data loss, picture quality degradation on
monitors, and other problems with your PC, television set or other devices.
EMI emissions are a two-way problem; emitted by the computer system, and EMI received
by the computer system. PCs generally do not cause very much interference with other devices.
As with many other electronic devices, they should be certified as Class B compliant with the
Federal Communications Commission (FCC). This certification shows that the PC conforms
to standards that limit the amount of EMI that a PC can produce. As metals absorb EMI, you
have to keep the metal covers on the computer.
PCs can be affected by electromagnetic interference from other devices, in two major ways.
One is direct effects through proximity with other devices; another is electrical interference
over the power lines.
While a more colourful test would be to place a strong magnet next to a monitor, it is not
recommended as sometimes the effects can be long-lasting. Degauss is the process that
demagnetises the metal components in the cathode ray tube (CRT), eliminating image
distortion that can result from magnetic charges acquired by the components. Some new
monitors degauss automatically whenever you turn on your monitor.
Most PCs generally do not have many problems with EMI, but for those that do, there are things
that you can do to reduce EMI:
Physical isolation: Devices that emit electromagnetic radiation should be kept a reasonable
distance from your computers, peripherals and media. This includes television sets, radios,
lights, kitchen appliances, and stereo speakers. Speakers designed for use with PCs are
generally shielded and are much less of a problem.
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.1
Determining and applying System protection devices
Power conditioning
There are many issues with computers that are ultimately related to power problems. Providing a
good, reliable power source to your computer, and peripheral, is another aspect of system care. We
should take a look at how to avoid power problems, as well as energy conservation and other
issues related to the use of power.
Typical power problems
There are a number of terms related to power and problems, some of the most common are:
Blackouts: When power levels drop to virtually zero, or in other words there is NO
power.
Brownouts: Also called sag. A brownout occurs when power levels drop below that
which is suppose to be delivered, for a sustained time. For example if you have a 230-240
volt power outlet, but the measurable level drops below 230 volts. Typically experienced in
switching on of heavy equipment.
Surges: Is the opposite of a brownout. It is where voltage levels increase above that which
is specified at the outlet eg above 240 volts
Spikes: A short sharp and very sudden increase of voltage, that also drops just as quickly
eg a 240 volt supply jumps to 1000 volts or more for a period of as little as 20 milliseconds
(1/50th of a second). This is typical of a lightning strike.
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.1
There are different devices that enable us to control power. Their function varies from
device to device depending on what we use.
A UPS helps in black out situations when the power is gone totally and brown outs, when
voltage is low though there is power. UPS has batteries that provides back up power. When
the power is gone, the battery provides voltage to the PC so that you can save your work.
But it does not provide unlimited power. There are two types of UPS:
o Standby UPS:
SPS has a battery that begins generating power as soon as the unit detects a sag in the
power supply. It takes only a split of seconds to come online. The disadvantage is that till
the UPS become online, your data might get lost.
o Online UPS: It provides electricity to the PC all the time. It uses electricity
from the AC outlet to simply recharge its batteries. When the power goes, the data is not
affected because the UPS is supplying power.
Surge Suppressor: Surge suppressors help to absorb power surges so that your
computer does not feel their effects. They come as either separate modules or
incorporated in the UPS.
Battery: Computer has a Chip that combines real time clock and non-volatile memory.
This chip is the CMOS chip(CMOS RAM). They are designed to consume low power.
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.1
Determining and applying suitable storage principle
Introduction
We need to have an awareness of possible consequences of in appropriate storage of hardware,
peripherals and Media. Based on the nature and characteristics of the hardware we will
determine how and where to store them. Points to consider when storing hardware, peripherals
and storage media including:
Climatic effects
OHS considerations
OHS standards
Ease of access.
Workstation
Ventilation
electrical safety
manual handling
Security
Stability
Posture
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.25
Technical specifications
Once the business requirements have been considered, the technical specifications of the hardware
device need to be evaluated. Areas for evaluation include the following:
The technical specifications to be considered will depend on the computer hardware device to be
purchased. For example, technical specifications to be considered for a printer include:
Computer hardware should be located close to a suitable electrical outlet. The use of long extension
cords is a trip hazard. If no power outlet is available, a new fixed power outlet may need to be
installed. Any fixed electrical installation is required by law to be installed by a licensed electrician.
Cables should be kept away from the floor, and a person’s workspace. Cables on the floor are easily
damaged by trolleys and chair castors.
Use switched power boards and not double adapters or piggy backed plugs.
Routinely inspect cables for any damage. Damaged cables should be disconnected and removed.
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.26
Using third-party software to evaluate and report on
system security
Introduction
Computer network : is a system in which computers are connected to share information and resources. The
connection can be done as peer-to-peer or client/server or LAN or WAN.
The term network monitoring describes the use of a system that constantly monitors a computer network for
slow or failing components and that notifies the network administrator (via email, pager or other alarms) in
case of outages. It is a subset of the functions involved in network management.
Network security consists of the requirements and policies adopted by the network administrator to prevent
and monitor unauthorized access, misuse, modification, or denial of the computer network and network-
accessible resources.
Network threats
Network threats are intentional activities to cause damage, misusing resources, or other aggressive action
on network system.
Some of Network threats
Unauthorized accessing
Misusing of resources
Modification of network resources
Denial of services
There are different ways to monitor threats to the network. Some of them are: -
By using software Utilities
By using security mechanism
By Using encryption facilities
Identifying security threats
Explain why security is
important
Computer and network security help to keep data and equipment functioning and provide access only to
appropriate people. Everyone in an organization should give high priority to security because everyone
can be affected by a lapse in security.
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.27
Theft, loss, network intrusion, and physical damage are some of the ways a network or computer can be
harmed. Damage or loss of equipment can mean a loss of productivity. Repairing and replacing
equipment can cost the company time and money. Unauthorized use of a network can expose confident ia l
information and reduce network resources.
Threats to security can come from the inside or outside of an organization, and the level of
potential damage can vary greatly:
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.28
Identifying security threats
Introduction
Computer Security: The prevention and protection of (computer) assets from unauthori zed access,
use, alteration, degradation, destruction, and other threats.
Network security involves the authorization of access to data in a network which is controlled by
the network administrator and the organization policies. Users choose or an ID and password or
authenticating information that allows them access to information and program within their
authority. Network security covers a variety of computer networks, both public and private, that are
used in everyday jobs conducting transactions and communications among businesses, government
agencies and individuals Networks can be private, such as within a company, and others which
might be open to public access. Network security is involved in organizations, enterprises, and other
types of institutions. It does as its title explains: It secures the network, as well as protecting and
overseeing operations being done.
Privacy: The right of the individual to be protected against interruption into his personal life
or affairs, or those of his family, by direct physical means or by publication of information.
Security/Privacy Threat: Any person, act, or object that poses a danger to computer security/privacy.
Computer Security and Privacy/Vulnerabilities
Physical vulnerabilities (Eg. Buildings)
Natural vulnerabilities (Eg. Earthquake)
Hardware and Software vulnerabilities (Eg. Failures)
Media vulnerabilities (Eg. Disks can be stolen)
Communication vulnerabilities (Eg. Wires can be tapped)
Human vulnerabilities (Eg. Insiders)
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.29
Computer and Network threats
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.30
Solution: SPAM filters are an effective way to stop SPAM, these filters come with most of
the e-mail providers on line. Also you can buy a variety of SPAM filters that work
effectively.
Phishing:
Phishing is “an e-mail fraud method in which the performer sends out legitimate-
looking emails in an attempt to gather personal and financial information from
recipients.
phishing is one of the worst security threats over a network because a lot of people
that use computers linked up to a network are unpaid and would be very vulnerable
to giving out information that could cause situations such as theft of money or
identity theft.
Solution: Similar to SPAM use Phishing filters to filter out this unwanted mail
Password Attacks:
Password attacks are attacks by hackers that are able to determine passwords or
find passwords to different protected electronic areas.
Many systems on a network are password protected and hence it would be easy
for a hacker to hack into the systems and steal data.
This may be the easiest way to obtain private information because you are able to
get software online that obtains the password for you.
Solution: At present there is no software that prevents password attacks.
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.31
Explain web security
Web security is important because so many people visit the World Wide Web every day. Some
of the features that make the web useful and entertaining can also make it harmful to a
computer.
Tools that are used to make web pages more powerful and versatile are: -
Attackers may use any of these tools to install a program on a computer. To prevent against
these attacks, most browsers have settings that force the computer user to authorize the
downloading or use of ActiveX, Java, or JavaScript.
Define adware, spyware, and grayware
Adware is a software program that displays advertising on your computer. Adware is usually
distributed with downloaded software. Most often, adware is displayed in a popup window.
Adware popup windows are sometimes difficult to control and will open new windows faster
than users can close them.
Grayware or malware is a file or program other then a virus that is potentially harmful. Many
grayware attacks are phishing attacks that try to persuade the reader to unknowingly provide
attackers with access to personal information. As you fill out an online form, the data is sent to
the attacker. Grayware can be removed using spyware and adware removal tools.
Denial of service (DoS) is a form of attack that prevents users from accessing normal services,
such as e-mail and a web server, because the system is busy responding to abnormally large
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.32
Ensuring carry-out spot checks and other security
strategies
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.33
Threats to Security
Internal threats - employees of the organization.
Deliberate data damage - "just for fun" or with more shady intent, some people might delight
in corrupting data or deleting it completely.
Industrial intelligence - the process of a person retrieving data from a server for a purpose.
Physical equipment theft - If an important piece of equipment is stolen (for example, the
server or a backup tape), the intruder will have access to your data.
A firewall is a system or group of systems that controls the flow of traffic between two
networks. The most common use of a firewall is to protect a private network from a public
network such as the Internet.
Protect your password.
Never share your password with anyone, not even a relative or colleague. If another person has your
password, they can, for all computer purposes, be you. This extends far beyond simply reading your
email.
It's very important to use different passwords for different systems. This limits the damage a malic ious
person can do should a password fall into the wrong hands.
Following are some measures that you can take in order to minimize the risks associated with malicious
human threats:
Data Storage in Safe Locations: Keep your data in safe and secure locations that have limited
access to others.
Virus and Spyware Protection: You must open an e-mail attachment or install any software
from a Web site with caution. The most reliable way is to install antivirus and anti-spyware software
from a reputable vendor.
Human Errors: Many times, damage to a computer is due to unintentional human error. For
example, you may accidentally delete an important file, causing the computer to malfunction.
Hardware Damage: Computer components, being delicate, run the risk of getting damaged
due to carelessness..
Protecting hardware from accidental and environmental damages: You can take various
measures to avoid any unintentional damage to your computer. Keep the computer in an area
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.34
that is dust-free, free from vibration, and out of the way of possible impact, should be well- ventilated
to prevent any damage due to heat.
Backing up Data: Regularly back up important computer data. Creating multiple copies of data
provides protection against loss of data due to accidental erasure or destruction of data.
Identify security procedures
A security plan should be used to determine what will be done in a critical situation. Security
plan policies should be constantly updated to reflect the latest threats to a network. A security
plan with clear security procedures is the basis for a technician to follow. Security plans
should be reviewed on a yearly basis.
Privacy
Authentication
Authorization and integrity
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.35
Investigating and implementing inbuilt or additional
encryption facilities
Data Encryption
Encrypting data uses codes and ciphers. Traffic between resources and computers on the
network can be protected from attackers monitoring or recording transactions by
implementing encryption. It may not be possible to decipher captured data in time to make
any use of it.
Virtual Private Network (VPN) uses encryption to protect data. A VPN connection allows
a remote user to safely access resources as if their computer is physically attached to the local
network.
Port Protection
Every communication using TCP/IP is associated with a port number. HTTPS, for instance,
uses port 443 by default. A firewall is a way of protecting a computer from intrusion
through the ports. The user can control the type of data sent to a computer by selecting
which ports will be open and which will be secured. Data being transported on a network
is called traffic.
Data Backups
Data backup procedures should be included in a security plan. Data can be lost or
damaged in circumstances such as theft, equipment failure, or a disaster such as a fire or
flood.
Backing up data is one of the most effective ways of protecting against data loss. Here are
some considerations for data backups:
Frequency of backups – Backups can take a long time. Sometimes it is easier to make a
full backup monthly or weekly, and then do frequent partial backups of any data that has
changed since the last full backup. However, spreading the backups over many recordings
increases the amount of time needed to restore the data.
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.36
Storage of backups – Backups should be transported to an approved offsite storage
location for extra security. The current backup media is transported to the offsite location on
a daily, weekly, or monthly rotation as required by the local organization.
Security of backups – Backups can be protected with passwords. These passwords
would have to be entered before the data on the backup media could be restored.
Implementing encryption Facilities
One of the most effective ways to eliminate data loss or theft is to encrypt the data as it travels
across the network. However, not all data protection solutions are created equal. While most
solutions offer standard AES 256-bit encryption, there are other attributes that must be
considered:
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.37
cost commercial version, PGP is the most widely used privacy-ensuri ng program by
individuals and is also used by many corporations.
Symmetric and Asymmetric ciphers
In a symmetric cipher, both parties must use the same key for encryption and decryption.
This means that the encryption key must be shared between the two parties before any
messages can be decrypted. Symmetric systems are also known as shared secret systems or
private key systems.Symmetric ciphers are significantly faster than asymmetric ciphers, but
the requirements for key exchange make them difficult to use.
In an asymmetric cipher, the encryption key and the decryption keys are separate. In an
asymmetric system, each person has two keys. One key, the public key, is shared publicly.
The second key, the private key, should never be shared with anyone.
When you send a message using asymmetric cryptography, you encrypt the message using
the recipients’ public key. The recipient then decrypts the message using his private key.
That is why the system is called asymmetric.
There are multiple layers of security in a network, including physical, wireless, and data. Each
layer is subject to security attacks. The technician needs to understand how to imple ment
security procedures to protect equipment and data.
Though local security policies may vary between organizations, there are questions all organizat ions
should ask:
The value of physical equipment is often far less than the value of the data it contains. The
loss of sensitive data to a company's competitors or to criminals may be costly. Such losses
may result in a lack of confidence in the company and the dismissal of computer technic ians
in charge of computer security. To protect data, there are several methods of security
protection that can be implemented.
Password Protection
Password protection can prevent unauthorized access to content. Attackers are able to gain
access to unprotected computer data. All computers should be password protected. Two
levels of password protection are recommended:
BIOS – Prevents BIOS settings from being changed without the appropriate
password
Login – Prevents unauthorized access to the network
Determining maintenance requirements specified by
the equipment manufacturer.
Maintenance requirement
Maintenance requirement is the materials or tools that are important to maintain specific equipment. Maintenance
requirement may include but not limited to: -
Caution
Attention
Attention is more than just noticing incoming stimuli. It involves a number of processes including filtering out
perceptions, balancing multiple perceptions and attaching emotional significance to these perceptions.
There are two major forms of attention: passive and active. Passive attention refers to the involuntary process
directed by external events that stand out from their environment, such as a bright flash, a strong odor, or a
it
sudden loud noise. We might say that because passive attention is involuntary, is easy. Active attention is
voluntary and is guided by alertness, concentration, interest and needs such as curiosity and hunger.
Personal computers (PCs), also called microcomputers, are the most popular type of computer in use today.
The PC is a small-sized, relatively inexpensive computer designed for an individual user. Today, the world of PCs
is basically divided between IBM-compatible and Macintosh-compatible machines, named after the two
computer manufacturers. Computers may be called ‘desktop’ computers, which stay on the desk, or ‘laptop’
computers, which are lightweight and portable. Organisations and individuals use PCs for a wide range of tasks,
including word processing, accounting, desktop publishing, preparation and delivery of presentations,
organisation of spreadsheets and database
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.80
management. Entry-level PCs are much more powerful than a few years ago, and today there is little distinction
between PCs and workstations.
Switches
On the surface, a switch looks much like a hub. Despite their similar appearance, switches are far more
efficient than hubs and are far more desirable for today's network environments.
As with a hub, computers connect to a switch via a length of twisted-pair cable. Multiple switches are
often interconnected to create larger networks.
Fig:-4.1. Switch
Rather than forwarding data to all the connected ports, a switch forwards data only to the port on which
the destination system is connected.
It looks at the Media Access Control (MAC) addresses of the devices connected to it to determine the
correct port. A MAC address is a unique number that is stamped into every NIC. By forwarding data
only to the system to which the data is addressed, the switch decreases the amount of traffic on each
network link dramatically.
Producing maintenance schedules
Maintenance Schedule
Maintenance Schedule is a plan or procedures that are used to maintain equipment and it must be programmed with
time of intervals. Maintenance schedules including removal of dust, grease build-up and etc.
Maintenance scheduling can be planed or prepared as:-
Onsite response
Remote diagnostic
Onsite response is one of maintenance schedule that display the plan or procedures from the
internet.
Remote diagnostics refers to the ability to evaluate the current status of electronic equipment from a remote
location. The process involves the establishment of some type of wired or wireless communication between the
two points in order for the remote analysis to take place.
Remote diagnostics is the act of diagnosing a given symptom, issue or problem from a distance
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.82
Priorities of Maintenance Work
Scheduling Techniques
The objective of the scheduling techniques is to construct a time chart showing:
• The start and finish for each job.
• The interdependencies among jobs.
• The critical jobs that require special attention and effective monitoring. Such
techniques are:
• Modified Gantt chart
• CPM
• PERT
• Integer and stochastic programming.
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.82
Performing diagnostic function
Diagnostic functions
It includes but not limited
Replacing suspected components
Upgrade components
Reloading software’s
Replacing suspected components
Computer hardware or components that can be replaced are: -
Motherboards
CMOS battery
Central processing Unit (CPU)
Drives (floppy, hard disk, CD-ROM)
Interface cards
Fax, modem cards
RAM
Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.82