0% found this document useful (0 votes)
23 views50 pages

Care For Network

Uploaded by

EYOHA ICT MEDIA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views50 pages

Care For Network

Uploaded by

EYOHA ICT MEDIA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 50

OLENCHITY TVET COLLEGE

IT SUPPORT SERVICE LEVEL II


Based on May 2011 Occupational Standards

Module Title: Caring for Network and Computer Hardware


TTLM Code: ICT ITS2 TTLM 1019v1

October, 2019
Identifying external hardware components and peripherals
Hardware
Computer hardware refers to the physical parts of a computer and related devices. Internal hardware
devices include motherboards, hard drives, and RAM. External hardware devices include monitors,
keyboards, mice, printers, and scanners etc.

Basic Components
 Case or Tower - This is the plastic box that contains the computer. Housed in the case, you will
find the floppy drive, CD R OM drive, and the main components of the computer. Some of these
are the hard drive, motherboard and the processor chip (CPU). The case keeps them neatly and
safely together.
 Monitor or Screen - This is the TV-type screen on which you see the work you’re doing
on your computer.
 Mouse - The mouse allows you to move, select and click on objects.
 Keyboard - The keyboard is used to type in information and operate the computer.
 Speakers - Sometimes speakers are connected to the computer so that you can hear music
and sound.
 Microphone - A microphone can provide a way to talk through or to the computer.
 Printer - A device that makes a printed copy of your work on a sheet of paper.
 A scanner is a device that captures text or illustrations on paper and converts the information
into a form the computer can use. One of the most common kinds of scanners is called a flatbed
scanner. It has a glass surface on which you lay paper, magazines, or other documents that you
want to scan. Sometimes scanners can be manufactured so that they are combined with a printer
thus can also be used as a photocopier and fax machine.

 Digital cameras store images digitally onto a storage device, either a memory card or a floppy
disk, rather than recording them on film. Once a picture has been taken, it can be downloaded to
a computer system, and then manipulated or printed.

 USB flash drive:-A small, portable device that plugs into a computer’s USB port

Identifying internal hardware components


The internal hardware parts of a computer are often referred to as components, while external hardware
devices are usually called peripherals. Together, they all fall under the category of computer hardware.
Software, on the other hand, consists of the programs and applications that run on computers. Because
software runs on computer hardware, software programs often have system requirements that list the
minimum hardware required for the software to run.
COMPONENT F UNCTIONS
 CPU: The CPU is the brains of the computer. All information goes through the CPU to be
processed. The latest CPUs execute many millions of instructions per second.
 MEMORY: Memory is where the information is stored.
 RAM: Random Access Memory stores programs and data as it is used. The information in RAM
is lost when the power is turned off.
 ROM: Read Only Memory stores start up and basic operating information.
 DISKS: Disks are where large amounts of information are stored, even when the power is off.
 Floppy Disks - Information can be written to and read from floppy disks. The advantage
of floppy disks is that they can be removed from the computer and the data taken to another
machine.
 Hard disks - Hard disks are not removable like floppy disks, but hold more information.
 CD ROMs - Compact Disk Read Only Memory. They are useful for storing large
amounts of data. A CD ROM holds about 650 MB of data and is removable.
 Input/Output Components : Allow a computer to communicate with the outside world.
Following are some examples of Input/ Output devic es.
 Keyboard is used to enter information from the user to the computer.
 Monitors are used to display information.
 Video controller is a board in the computer that controls the monitor. It translates the data
in the video memory into symbols on the monitor .
 Parallel/Serial ports allow the computer to send data to and receive data from printers,
modems, etc.
 Mouse and Joystick are used to input positional information to the computer.
 Network Interface Card – A NIC connects the computer to a network. Networks are a high -
speed method of transferring data from one computer to another.

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.6
Reviewing ,recording and applying Requirements
specifying by hardware manufacturers

Access point
Internet Access
• There are several ways to obtain Internet access.
• The type chosen often depends on the cost as well as what technologies are available in the
area you are located.
• XDSL Internet Access
• Cable Internet Access
• Satellite Internet Access
• Wireless Internet Access
• POTS(Plain Old Telephone Service) Internet Access

Cable Internet Access


• Cable Internet access is an always-on Internet access method available in areas that have
digital cable television.

• Cable Internet access is attractive to many small businesses and home office users because
it is both inexpensive and reliable.

• Connectivity is achieved by using a device called a cable modem; it has a coaxial connection
for connecting to the provider's outlet and an unshielded twisted-pair (UTP) connection for
connection directly to a system or to a hub or switch.

• Most cable modems supply a 10Mbps Ethernet connection for the home LAN, although the
actual Internet connection ranges from 1.5Mbps to 3Mbps.

• One of the biggest disadvantages of cable access is the fact that you share the
available bandwidth with everyone else in your cable area.

• As a result, during peak times, performance of a cable link might be poorer than in low- use
periods.

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.6
Feature Cable Internet DSL Internet

Bandwidth/ The theoretical maximum cable speed of DSL lists speeds from to 384Kbps to
Speed 30Mbps downstream, aside, in practical use the 6.0Mbps depending on the type of
rate is somewhere between 300 and 700Kbps DSL used and whom you ask. DSL
downstream and a 128 connection. offers 128Kbps upstream transfers.

Connection Cable Internet uses a shared connection. You share DSL bandwidth is dedicated and
type the connection with others in your area. This can not shared.
affect bandwidth performance during peak usage
times.

Distance With cable Internet distance is not a concern. DSL speeds degrade as the distance
factors Subscribers maintain the same speeds regardless from the ISP increases. The farther
of the distance from the Internet provider. you are, the more overall speed
deteriorates.

Security The shared nature of cable Internet make it an DSL is more secure because it offers
increased security risk. Security risks include a dedicated link to the ISP. The
eavesdropping, tampering, service theft and more. dedicated link helps protect against
attacks associated with a shared
connection.

Table 1.1. Cable Internet and DSL Internet

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.6
Satellite Internet Access
• DSL and cable Internet access are not offered everywhere.
• Satellite Internet offers an always-on connection with theoretical speeds advertised
anywhere from 512Kbps upload speeds to 2048Kbps download speeds, considerably faster
than a 56K dial-up connection.
• One primary drawback to satellite Internet is the cost, and even with the high price tag, it is not as
fast as DSL or cable modem.
• As with other wireless technologies, atmospheric conditions can significantly affect the
performance of satellite Internet access.
• Greatest advantage is its portability.
Types of Satellite Internet
• Two different types of Internet satellite services are deployed: one-way and two-way
systems.
• A one-way satellite system requires a satellite card and a satellite dish installed at the end user's
site; this system works by sending outgoing requests on one link using a phone line, with inbound
traffic returning on the satellite link.
• A two-way satellite system, on the other hand, provides data paths for both upstream and
downstream data. Like a one-way system, a two-way system also uses a satellite card and a
satellite dish installed at the end user's site; bidirectional communication occurs directly between
the end user's node and the satellite.
Wireless Internet Access

• Nowadays it is becoming increasingly common to see people surfing the Web in many
different public places.
• This is made possible by subscribing to a wireless Internet service provider (WISP) or
connecting to a company's local wireless router.

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.6
Determining and establishing relationship of hardware
and software components
4.1. Introduction
When caring for computer equipment you will inevitably be faced with a computer, or peripheral, that is not
operating as it should. You will be looked upon to provide the answer to ‘What’s wrong with it?’. In order for
you to answer that question, you will need to know a basic diagnostic approach to fault finding. In this section we
will examine what a system usually does when nothing is wrong, list some of the typical faults encountered and
what to do about it, and what to do if you can’t fix it. If you are not able to effect repairs then you should be able to
give the user some indication on how long their system will be down.
Firstly, let’s look at what normally happens, before looking at what can go wrong.
Booting up
The POST
When first turning the computer on, you will notice that there are certain lights flashing, beeping sounds and text
displayed on the screen. When power is applied to a computer system, the first thing that happens is that the
computer performs a Power On Self Test, commonly called a POST. After performing this self-check, the system
will try to load an operating system. Loading the operating system was traditionally known as loading the
bootstrap loader, or pulling the system up by the boot-straps. While the terminology has been dropped, we still
use the term ‘Booting Up’ to refer to starting the system.
The BIOS (Basic Input Output System) is responsible to perform the POST. The BIOS is a program that is built-in
to the motherboard and is responsible for the low level operations of the hardware, such as placing data from a
hard disk and writing it into RAM (Random Access Memory),
The system boot sequence
The following are the steps in a boot sequence. Of course this will vary by the manufacturer of your hardware,
BIOS, etc, and especially due to the peripherals you have connected. Here is what generally happens when you
turn on your system power:
1 The internal power supply turns on and initialises. The power supply takes some time until it can generate
reliable power for the rest of the computer, and having it turn on prematurely could potentially lead to
damage. Therefore, the chipset will generate a reset signal to the processor (the same as if you held the reset
button down for a while on your case) until it receives the Power Good signal from the power supply.

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.9
2 When the reset button is released, the processor will be ready to start executing. When the processor first
starts up there is nothing at all in the memory to execute. Of course processor makers know this will happen,
so they pre-program the processor to always look at the same place in the system BIOS ROM for the start
of the BIOS boot program.
3 The BIOS performs the POST. If there are any fatal errors, the boot process stops.
4 The BIOS looks for the video card. In particular, it looks for the video card’s built in BIOS program and
runs it. The system BIOS executes the video card BIOS, which initialises the video card. Most modern cards
will display information on the screen about the video card. This is why on most systems you usually see
something on the screen about the video card before you see the messages from the system BIOS itself.
5 The BIOS then looks for other devices’ ROMs to see if any of them have BIOSes. Normally, the IDE/ATA
hard disk BIOS will be found and executed. If any other device BIOSes are found, they are executed as well.
6 The BIOS displays its start-up screen.
7 The BIOS does more tests on the system, including the memory count-up test which you see on the screen. The
BIOS will generally display a text error message on the screen if it encounters an error at this point.

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.10
8 The BIOS performs a ‘system inventory’ of sorts, doing more tests to determine what sort of hardware is in
the system. Modern BIOSes have many automatic settings and can dynamically set hard drive parameters
and access modes, and will determine these at roughly this time. Some will display a message on the screen
for each drive they detect and configure this way. The BIOS will also now search for and label logical
devices (COM and LPT ports).
9 The BIOS will detect and configure Plug and Play devices at this time and display a message on the screen
for each one it finds.
10 The BIOS will display a summary screen about your system’s configuration. Checking this screen of
information can be helpful in diagnosing setup problems, although it can be hard to see because sometimes
it flashes on the screen very quickly before scrolling off the top or behind an operating systems splash
screen. Try being quick to press the <Pause> key.
11 The BIOS begins the search for a device to boot from.
12 Having identified its target boot device, the BIOS looks for boot information to start the operating system
boot process. If it is searching a hard disk, it looks for a master boot record (MBR) at cylinder 0, head 0,
sector 1 (the first sector on the disk); if it is searching a floppy disk, it looks at the same address on the
floppy disk for a volume boot sector.
13 If it finds what it is looking for, the BIOS starts the process of booting the operating system, using the
information in the boot sector. At this point, the code in the boot sector takes over from the BIOS. If the first
device that the system tries (floppy, hard disk, etc.) is not found, the BIOS will then try the next device in the
boot sequence, and continue until it finds a bootable device.
14 If no boot device at all can be found, the system will normally display an error message and then freeze up
the system. What the error message is depends entirely on the BIOS, and can be anything from ‘No boot device
available’ to ‘No ROM BASIC—System Halted’.
When diagnosing hardware problems you will need to keep in mind the steps above, particularly for errors that
halt the system from starting up.
Error messages
An error message can be produced by different parts of the system, depending on how far into the boot process
the system gets before it is produced. Most error messages are produced by the system BIOS,

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.11
as it is responsible for most of the functions of starting the boot process. However, other error messages are
operating system specific.
Error messages that crop up while the system is operational can be generated by different sources, including the
system BIOS, the operating system, hardware driver routines, or application software. It is usually possible to
determine roughly what is causing the error, since application-specific messages usually mention the application
that is generating them. However, error messages that crash a specific application can sometimes be caused by
hardware or system problems, especially i f the problem occurs in many different applications. This can make
diagnosis very difficult.
Even sticking to hardware, there are many thousands of individual error messages; some are more common than
others because there are only a few different BIOS companies that are used by the majority of systems in use.
However, since the exact wording of an error message can be changed by the manufacturer of each system or
motherboard, there are a lot of variations.
In most cases, the messages are pretty similar to each other; you may see a slightly different wording in your
error message than the ones listed here, but if the messages meaning will be substantially the same. For example,
‘Disk drive failure’ and ‘Diskette drive failure’ are virtually identical message s.
You may want to consult with your owner’s manual regarding some unusual messages, or to ensure that your
manufacturer means the same thing with their messages compared to others.
BIOS beep codes
There usually is a single quick beep sound when a system is turned on, and that often is an audible
acknowledgement of a good power supply ie the Power Good signal. However, when diagnosing fatal errors in a
system, knowledge of the beep codes, and their meaning, can be the key to quick repair or replacement.
Unfortunately not all manufacturers use the same set of codes to m

ean the same error, so we will have a look at some of the most common.
AMI BIOS beep codes
The American Megatrends Inc. (AMI) BIOS is one of the most popular in the personal computing world and is
quite consistent in its use of beep codes, across its many different versions.

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.12
Beep Code Meaning

1 beep There is a problem in the system memory or the motherboard.

2 beeps Memory parity error. The parity circuit is not working properly.

3 beeps Base 64K RAM failure

4 beeps System timer not operational. There is problem with the timer(s) that
control functions on the motherboard.

5 beeps The system CPU has failed.

6 beeps Keyboard controller failure.

7 beeps Virtual mode exception error.

8 beeps Video memory error. The BIOS cannot write to the frame buffer
memory on the video card.

9 beeps ROM checksum error. The BIOS ROM chip on the motherboard is
likely faulty.

10 beeps CMOS checksum error. Something on the motherboard is causing an


error when trying to interact with the CMOS.

Continuous A problem with the memory or video.


beeping

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.13
Phoenix BIOS beep codes
Phoenix uses sequences of beeps to indicate problems. The ‘-’ between each number below indicates a pause
between each beep sequence. For example, 1-2-3 indicates one beep, followed by a pause and two beeps,
followed by a pause and three beeps. Phoenix version before 4.x use 3 -beep codes, while Phoenix versions
starting with 4.x use 4-beep codes. This list is by no means comprehensive.

4- Beep Code Meaning

1-1-1-3 Faulty CPU/motherboard.

1-1-2-1 Faulty CPU/motherboard.

1-1-2-3 Faulty motherboard or one of its components.


1-1-3-2
1-1-3-3
1-2-1-2

1-1-3-2 Failure in the first 64K of memory.

1-1-4-1 Level 2 cache error.

1-1-4-3 I/O port error.

1-2-1-1 Power management error.

1-2-2-1 Keyboard controller failure.

1-2-2-3 BIOS ROM error.

1-2-3-1 System timer error.

1-2-3-3 DMA error.

1-2-4-1 IRQ controller error.

1-3-1-1 DRAM refresh error.

1-3-3-1 Extended memory error.

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.9
4- Beep Code Meaning

2-3-1-1
2-3-3-3

1-3-3-3 Error in first 1MB of system memory.


1-3-4-1
1-3-4-3
2-2-4-1

1-4-1-3 CPU error.


1-4-2-4

2-1-2-3 BIOS ROM error.

2-1-3-1 Video system failure.


2-1-3-3

2-1-1-3 IRQ failure.


2-1-2-1
2-2-3-1

2-1-2-3 BIOS ROM error.

2-1-2-4 I/O port failure.

2-1-4-3 Video card failure.


2-2-1-1

2-3-4-1 Motherboard or video card failure.


2-3-4-3
2-3-4-1
2-3-4-3
2-4-1-1

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.10
4- Beep Code Meaning

3-1-4-1 Floppy drive or hard drive failure.


3-2-1-1
3-2-1-2

3-3-1-1 Real Time Clock error.

Table 1.3 Phoenix BIOS beep codes


Award BIOS beep codes
Award BIOSes do not have many error beep codes, instead most errors are reported on the screen.
Typical hardware level errors
While the range of possibilities is enormous when it comes to errors and computing problems, there are a few
typical errors. For each of the errors, there may be a simple solution, or at least a way of determining the actual
cause of the problem. Let’s look at some of them:
System appears dead
Listen to the power supply and determine if the internal fan starts up. If the fan does not start up then the cause
of the problem could be:
 The system is not plugged into a power outlet, or the outlet has no power.
 The power supply unit is faulty.
 There is an internal short circuit and the fan does not start as a protective measure.
 The computer is dead!
No video
No video appears on the screen when the system is performing its POST. Often an audible beep is heard if the
BIOS detects the video error, but other likely causes are:
 Video card is faulty — swap it out with a known good card.

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.11
 There is a fault in the motherboard.
 The video card is not inserted correctly.
 The monitor is turned off or has no power.
No boot device or unable to boot
The system could not find a bootable device; the most likely cause is the hard disk drive. The system summary
screen is the first place to check. If the hard disk is listed as a detected device, then the problem may be a logical
and not physical problem. Things to consider are:
 Missing boot files — they may have been deleted by the user.
 A virus has caused damage to the boot files or has corrupted the file system or Master Boot Record (MBR).
 A common mistake is a floppy disk being left in the drive.
 Cables not connected to hard disk drive properly.

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.12
Failure to read hard disk drive
This usually means that there is a serious problem with the drive which may be physical or logical. A physical
problem would mean the drive was unserviceable, whereas a logical problem may mean the drive and its
contents could be recovered by:
 Running a disk checking program like scandisk, fsck, Norton’s Disk Doctor or some other program
appropriate to the operating system.
 Reinstalling the operating system making sure the drive is formatted. If the option allows it, perform a full
format and not a quick format. A full format will make a thorough check of the drive for faulty sectors.
 The cable may be faulty or not connected to the hard disk drive properly.
CD-ROM or DVD-ROM drive not reading disks
It is common for copied disks to be difficult to be read in standard CD/DVD-ROM drives. Often the drive
(CD/DVD Read Write drive, a.k.a. burner) that was used to copy the disk will be able to read the contents, unless
the disk is totally unserviceable. Other possibilities are:
 The copying process was never complete and the disk session not closed off. Check the setting on the
software in use.
 General poor quality disks or CD/DVD burner.
 Disk dirty or in need of cleaning.
 Faulty drive — when CD-ROM dives first came onto the market, the quality was poor and it seemed as
though they were a disposable item. These days the quality and reliability seems much improved.
Floppy drive errors
Floppy disks are notable for their unreliability. This is one reason why it is important to have more than one
copy of a disk, or its contents. Things to consider:
 Try the disk in another drive or two, if it can be read then the problem is likely the floppy disk drive
(FDD) and not the disk.
 The cable to the drive has not been connected properly. Most cables to floppy disk drives can be
connected to two drives. To distinguish between the first (A) and second (B) drive there is a twist

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.13
in the wires of the cable. If there is only a single drive (most common) and the cable is not connected at the
end of the cable (past the twist) then a drive error message is typical.
 The floppy disk has not been formatted to this operating system.

Unable to print
Most current printers come with a high degree of intelligence built in and can detect errors like cable not
connected, printer offline, out of paper, out of toner/ink etc. Things to consider:
 Read the LCD display (if the printer has one) or check the status lights are displaying what they should for
normal operation.
 Check the print manager software of the operating system to see if the printer is being shown as connected
and on-line. If it is not on-line or shown as connected, then it may be a hardware problem.
 Change the cable.
 Perform a self test on the printer using the LCD display or options on the printer panel. If it performs the test
properly then try the options available in the printer control of your operating system.
No network connectivity
The likely cause of networking problems can be many and varied. Without delving into the finer details of
networking, the easiest option to try is to change the network cable and check the status lights that are on both
the network interface card (NIC) and the hub/switch/router at the other end. If there is activity then the likely cause
is not hardware. You can also try switching off, or resetting, the hub/switch/router. System hangs (locks up)
One of the most difficult to problems with personal computers occurs when it appears as though a system is not
responding to any user input (key press, mouse movement etc.). The likely causes are many and varied but a few
possibilities are:
 Faulty memory (RAM) — you could turn memory testing on in CMOS settings which may confirm the
problem, or perform a rigorous test using third-party diagnostic software.

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.14
 Conflict with devices — you should check the systems properties information available on you
operating system platform, for any messages or indications of conflict.
 Device driver is faulty — try to isolate the problem occurrence to when a particular device is in use, such as a
scanner or printer. A driver update may be a solution.
KISS principle
Keep It Simple Stupid (KISS), while sounding strange, is an approach that can be surprisingly effective. Look
for the simple things first. For instance:
 If a system does not power up as you expect then consider if there is in fact power connected and turn on.
 If nothing appears on a monitor, then try a different monitor. Then you will know if the problem is the
monitor or within the system unit. Another possibility is that little fingers have turned the brightness
control down so that the screen simply appears black, when in fact nothing is wrong.
 If you suspect that a video card is faulty, then swap it with a known good card – if the fault continues then you
know that the card is not at fault. If another card is not available then, remove the card, power the system
and you should hear an appropriate audible error – no beeps and the motherboard is the likely faulty
component.
 If the mouse-pointer movement seems erratic, then turn the mouse over and clean the rollers, if it still is not
working properly then replace it with a new mouse. The cost of some devices is so low, in comparison to
the time wasted, that it is just not worth the bother.
Diagnostic tools
The most useful diagnostic tool that can be used is your brain. The tool should be used in conjuncti on with the
KISS principle. While that is suitable for some obvious problems, there are times when more specific
information is needed in order to take the appropriate corrective measures. To get good information about a
systems condition, good diagnostic tools are required.

A POST card

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.15
Where a system does not boot, or appears to be dead, there are some specialist interface cards that can be used to
diagnose the problem. A set of LEDs (light emitting diodes) display a code that can be referenced from the
manual. Example of this type of card would be:
 Post-Probe by Micro2000 (www.micro2000.com).
 ISA/PCI PC Analyzer Diagnostic Card by Pro Tech Diagnostics (www.protechdiagnostics.com).
Diagnostic software
Where a computer is capable of starting to the boot level, you can use diagnostic software in an attempt to isolate
the cause of a problem. While there is software that runs on your existing operating system (like Norton’s
Utilities), the better software will have its own operating system.
When a program requests access to any hardware device, it should be accessing it through the operating system
and any drivers. The problem with this approach is that the operating system shields the higher-level programs
from the lower-level hardware functions. If a program were to access the hardware directly, then it is highly
likely that the operating system will not respond well and the system could easily crash.
If diagnostic software is operated on its own specially designed operating system, then direct access (via the
BIOS) to the hardware will likely yield accurate and thorough details. Having unimpeded access to the low-level
functions of the hardware means the diagnostic software is able to run rigorous testing and reporting. After all,
it’s unlikely that rigorous memory testing could be performed while there are several other programs currently
running in memory.
Examples of good diagnostic software are:
 Micro-Scope Diagnostic Suite from Micro2000 (www.micro2000.com)
 PC Certify Lite from Pro Tech Diagnostics (www.protechdiagnostics.com)

Warnings

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.16
If the case is on a retail or brand-name system that is under warranty, be very sure that opening the case will not
void your warranty. Some vendors have this policy, and you may see stickers on the case that say that if they are
removed or broken the warranty is void. Some have the policy without the stickers.
Case and system manufacturers are quite creative, so not every imaginable case design is covered here. If you
read all of the different choices you are likely to find one that is close to what you have.
Be careful not to touch any of the internal components when removing the cover.
Cover removal procedure
Disconnect cables
Make sure the system itself is off. Detach all the cables from the back of the system case. Make a note of what
went where so that you will know how to reconnect them later on.
Remove monitor and other devices
If you have a desktop case, you of course need to move the monitor so that you can open the case. Also remove
any other devices from the top of the case.
Loosen and remove cover
The instructions for removing the cover depend on what sort of case you have. Find the one that best describes
your system:
Conventional tower: This is the classic design that has been around for years and is still being sold. Locate the
screws along the edge of the back of the case, and remove them using a screwdriver. There are usually four to six.
Gently pull back on the U-shaped top cover about a half-inch.; you may have to rock it slightly. Lift the cover up
off the frame of the case. Be careful, as these covers are large and unwieldy.
Conventional desktop: The conventional desktop case has been around since the original IBM PC in 1982, and
is still sometimes seen in new systems. Locate the screws along the edge of the back of the case, and remove
them with a screwdriver. There are usually five but may be fewer. Gently push the cover forward. Watch out for
drive faceplates that may become caught on the cover as you try to slide it forward. On some cases, the front
cover slides all the way off the front of the case. On others it will slide forward a couple of inches and stop, and
then you lift it up off the case.

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.17
Slimline Desktop: An odd design found on some proprietary systems, the low-profile case has the screws that
hold the cover on the front or rear of the case. Others may in fact be screwdriver-less, using finger tight screws.
Look at the front of the case near the bottom, or the centre top at the rear. Loosen the screw(s), and slide the
cover forward off the case. Watch out for drive faceplates that may become caught on the cover as you slide it.
Store screws in safe place
If you forget this step you might regret it later on.
Remember to wear an anti-static wrist strap before touching any internal components.
Post change, re-assembly procedure
After changing any component, you should take the following basic reassembly procedure.
Power inspection
Verify the following key items related to the system power:
 If the system case has a dual voltage switch, make sure it is set to the correct voltage eg 230/240V.
 Make sure the power switch is off. You don’t want the system booting up as soon as you connect the
power cord.
 If you are working in an ATX system, double-check that you have connected the power switch to the
motherboard properly.
 Make sure all your drives have a power connector attached to them correctly.
 Make sure that the CPU fan and any additional case fans have their power connectors attached.
Cable inspection
 Check the cable connections to make sure they are correct.
 Check for loose connections or cables that are misaligned. Make sure the red edge of the cable is lined up to
pin 1 of each device
 Check the IDE cable(s) going to the hard disk drive and CD-ROM drive.
 Check the floppy cable going to the floppy disk drive.
 Check the cables that attach the I/O port connectors and PS/2 mouse port connector to the motherboard.
Most new motherboards have all these connections integrated on the motherboard, so this is not an issue.

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.18
 Make sure the cables running to the case switches and LEDs are correct. For instance, if the speaker is not
connected you will not be able to hear any audible error beeps, or power good signal.
Motherboard inspection
Double-check these configuration and installation aspects relevant to the motherboard:
 Make sure the memory is inserted into the correct socket(s) and is fully seated.
 Make sure the processor is inserted correctly and is all the way into its socket.
 Ensure that the heat sink is secured properly to the processor.
 Make sure the video card is seated properly in its slot. Some motherboards, particularly proprietary ones,
will also have the video fully integrated on the motherboard, so this is not necessary.
Physical interference inspection
Check the following physical issues:
 Ensure that all the drives are properly secured in their bays.
 Make sure there are no loose wires in the case that may interfere with any moving objects like the CPU
fan. Some video cards can also have a fan attached and some cases can have more than

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.19
1 Determining and applying suitable environmental
conditions

Environmental conditions

Just like the environmental conditions affect us as humans, computer equipment can also be
affected. In order install and maintain equipment to gain the maximum useful life, the
environmental conditions need to be considered — factors such as temperature extremes, humidity,
dust, electromagnetic interference (EMI), and so on. The following notes are a discussion of these
factors.

Temperature
One of the single most important factors in prolonging the life of your computer hardware is
the temperature of the components. Components that run hot, have a much shorter life than
those that stay cool most of the time. To keep components cool you could use cooling
equipment or ensure certain procedures or actions (discussed later). A more general
approach is to provide a room environment that is appropriate for the hardware.

A rule of thumb for room temperature is that computers like the temperatures that most
people like. That is temperatures between 15 and 24 degrees Celsius. Having computer
equipment operating in a hot room that is over 25 degrees Celsius will make general cooling
equipment, such as fans, fairly ineffectual.

Some businesses have their air-conditioners on a timer that will shut off at night. In this
situation you might want to make sure that computer equipment is switched off overnight,
or that a special computer room is designated with independent controls.

Humidity
As with temperature, computers prefer moderate humidity as opposed to either extreme.
While computer equipment is not as sensitive to humidity as temperature, they can still be
affected by it.

Obviously, computers are best kept dry. That means keeping it away from places or things that
can get it wet. Consider the inappropriate positioning near a window if it is frequently
opened, and be wary of beverages placed near the computer that could spill on it and short it
out.

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.1
Dirty environments

Computers operate best when they are used in a clean environment, and when they are
cleaned regularly. Most offices and homes are clean enough that a computer requires no
special treatment other than regular cleaning as part of routine preventi ve maintenance.
Industrial environments however can be quite destructive on computer equipment.

Computer systems that are going to be used in dirty environments should be protected or
cleaned often. Cleaning would also mean taking the covers off and cleaning the inside. If
you get the chance to see the inside of a system unit that has been in an industrial
environment, you will be amazed how much dirt accumulates.

One easy preventive measure is to use an air cleaner in the room where the computer is
located. There are also special cases and enclosures for computer hardware designed for
industrial environments to safeguard against damage due to dirt. The typical office owner
only has to remember to clean their equipment occasionally and no problems will generally
result

Now this might be stating the obvious, but cigarette smoke is bad. The simple fact is that
cigarette smoke, especially in high concentration, contaminates and damages computer
equipment. The smoke particles are very small and work their way into all sorts of places
that they do not belong. The most common problems relate to storage devices. The very fine
particles accumulate on read/write heads and the storage media, such as floppy disks.

Electromagnetic interference (EMI)

Probably everyone at some stage has had a radio on when there is an approaching
thunderstorm. You would clearly hear the crackling and noise distortion coming from the
radio. That crackling is the result of electromagnetic interference, often referred to as EMI.

All electronic devices give off electromagnetic emissions. This is radiation that is a by-
product of electrical or magnetic activity. Unfortunately, the emissions from one device can
interfere with other devices, causing potential problems. Just like the

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.1
crackling on the radio, interference can lead to data loss, picture quality degradation on
monitors, and other problems with your PC, television set or other devices.

EMI emissions are a two-way problem; emitted by the computer system, and EMI received
by the computer system. PCs generally do not cause very much interference with other devices.
As with many other electronic devices, they should be certified as Class B compliant with the
Federal Communications Commission (FCC). This certification shows that the PC conforms
to standards that limit the amount of EMI that a PC can produce. As metals absorb EMI, you
have to keep the metal covers on the computer.

PCs can be affected by electromagnetic interference from other devices, in two major ways.
One is direct effects through proximity with other devices; another is electrical interference
over the power lines.

Try this quick test:

1 Hold a mobile phone near next to an operating monitor

2 Send an SMS message to someone you know.

3 Watch the effects on picture quality.

While a more colourful test would be to place a strong magnet next to a monitor, it is not
recommended as sometimes the effects can be long-lasting. Degauss is the process that
demagnetises the metal components in the cathode ray tube (CRT), eliminating image
distortion that can result from magnetic charges acquired by the components. Some new
monitors degauss automatically whenever you turn on your monitor.

Most PCs generally do not have many problems with EMI, but for those that do, there are things
that you can do to reduce EMI:

 Physical isolation: Devices that emit electromagnetic radiation should be kept a reasonable
distance from your computers, peripherals and media. This includes television sets, radios,
lights, kitchen appliances, and stereo speakers. Speakers designed for use with PCs are
generally shielded and are much less of a problem.

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.1
Determining and applying System protection devices

Power conditioning
There are many issues with computers that are ultimately related to power problems. Providing a
good, reliable power source to your computer, and peripheral, is another aspect of system care. We
should take a look at how to avoid power problems, as well as energy conservation and other
issues related to the use of power.
Typical power problems

There are a number of terms related to power and problems, some of the most common are:

 Blackouts: When power levels drop to virtually zero, or in other words there is NO
power.

 Brownouts: Also called sag. A brownout occurs when power levels drop below that
which is suppose to be delivered, for a sustained time. For example if you have a 230-240
volt power outlet, but the measurable level drops below 230 volts. Typically experienced in
switching on of heavy equipment.

 Surges: Is the opposite of a brownout. It is where voltage levels increase above that which
is specified at the outlet eg above 240 volts

 Spikes: A short sharp and very sudden increase of voltage, that also drops just as quickly
eg a 240 volt supply jumps to 1000 volts or more for a period of as little as 20 milliseconds
(1/50th of a second). This is typical of a lightning strike.

Protection from power problems


When power problems strike, they can cause permanent damage. The damage could be to your
equipment or your data. The only effective way to deal with power problems is to prevent them
from happening in the first place. Here are some steps you can take to greatly reduce the chances
of power problems with your computer:
 Power Control:

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.1
 There are different devices that enable us to control power. Their function varies from
device to device depending on what we use.

o UPS (Uninterruptible Power Supply):

A UPS helps in black out situations when the power is gone totally and brown outs, when
voltage is low though there is power. UPS has batteries that provides back up power. When
the power is gone, the battery provides voltage to the PC so that you can save your work.
But it does not provide unlimited power. There are two types of UPS:
o Standby UPS:

SPS has a battery that begins generating power as soon as the unit detects a sag in the
power supply. It takes only a split of seconds to come online. The disadvantage is that till
the UPS become online, your data might get lost.
o Online UPS: It provides electricity to the PC all the time. It uses electricity
from the AC outlet to simply recharge its batteries. When the power goes, the data is not
affected because the UPS is supplying power.

 Surge Suppressor: Surge suppressors help to absorb power surges so that your
computer does not feel their effects. They come as either separate modules or
incorporated in the UPS.

 Voltage Stabilizer: It is a transformer that delivers relatively constant output when


output voltage changes over time. The output voltage is regulated using transistor.

 Battery: Computer has a Chip that combines real time clock and non-volatile memory.
This chip is the CMOS chip(CMOS RAM). They are designed to consume low power.

 Generators – where an organization requires the computer hardware to be powered for


an extended length of time, a generator may be installed in addition to a UPS.

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.1
Determining and applying suitable storage principle

Introduction
We need to have an awareness of possible consequences of in appropriate storage of hardware,
peripherals and Media. Based on the nature and characteristics of the hardware we will
determine how and where to store them. Points to consider when storing hardware, peripherals
and storage media including:
 Climatic effects
 OHS considerations
 OHS standards
 Ease of access.
 Workstation
 Ventilation
 electrical safety
 manual handling
 Security
 Stability
 Posture

Disposing of Used Equipment

• Various guidelines for disposing of equipment:


– Manufacturer documentation
– Local environmental regulators
• Danger posed by monitors and power supplies
– Residual charge in capacitors can cause shock
– Modern devices discharge if unplugged for 60 minutes
– Older devices may require discharge with a probe

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.25
Technical specifications

Once the business requirements have been considered, the technical specifications of the hardware
device need to be evaluated. Areas for evaluation include the following:

 processing speed of the CPU


 storage capacity of the hard drive
 size of memory (RAM)
 software capabilities
 compatibility with existing systems
 upgradeability

The technical specifications to be considered will depend on the computer hardware device to be
purchased. For example, technical specifications to be considered for a printer include:

 interface – USB or network


 resolution – measured in dots per inch
 printing speed – measured in pages per minute
 memory
 paper capacity

Safe electrical work practices

Computer hardware should be located close to a suitable electrical outlet. The use of long extension
cords is a trip hazard. If no power outlet is available, a new fixed power outlet may need to be
installed. Any fixed electrical installation is required by law to be installed by a licensed electrician.

Cables should be kept away from the floor, and a person’s workspace. Cables on the floor are easily
damaged by trolleys and chair castors.

Use switched power boards and not double adapters or piggy backed plugs.
Routinely inspect cables for any damage. Damaged cables should be disconnected and removed.

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.26
Using third-party software to evaluate and report on
system security

Introduction
Computer network : is a system in which computers are connected to share information and resources. The
connection can be done as peer-to-peer or client/server or LAN or WAN.
The term network monitoring describes the use of a system that constantly monitors a computer network for
slow or failing components and that notifies the network administrator (via email, pager or other alarms) in
case of outages. It is a subset of the functions involved in network management.

Network security consists of the requirements and policies adopted by the network administrator to prevent
and monitor unauthorized access, misuse, modification, or denial of the computer network and network-
accessible resources.
Network threats
Network threats are intentional activities to cause damage, misusing resources, or other aggressive action
on network system.
Some of Network threats
 Unauthorized accessing
 Misusing of resources
 Modification of network resources
 Denial of services

There are different ways to monitor threats to the network. Some of them are: -
 By using software Utilities
 By using security mechanism
 By Using encryption facilities
Identifying security threats
Explain why security is
important

Computer and network security help to keep data and equipment functioning and provide access only to
appropriate people. Everyone in an organization should give high priority to security because everyone
can be affected by a lapse in security.

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.27
Theft, loss, network intrusion, and physical damage are some of the ways a network or computer can be
harmed. Damage or loss of equipment can mean a loss of productivity. Repairing and replacing
equipment can cost the company time and money. Unauthorized use of a network can expose confident ia l
information and reduce network resources.

Describe security threats


To successfully protect computers and the network, a technician must understand both types
of threats to computer security:

 Physical – Events or attacks that steal, damage, or destroy equipment, such as


servers, switches, and wiring
 Data – Events or attacks that remove, corrupt, deny access, allow access, or steal
information

Threats to security can come from the inside or outside of an organization, and the level of
potential damage can vary greatly:

 Internal – Employees have access to data, equipment, and the network


o Malicious threats are when an employee intends to cause damage.
o Accidental threats are when the user damages data or equipment
unintentionally.
 External – Users outside of an organization that do not have authorized access to the
network or resources
o Unstructured – Attackers use available resources, such as passwords
or scripts, to gain access and run programs designed to vandalize
o Structured – Attackers use code to access operating systems and software

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.28
Identifying security threats

Introduction
Computer Security: The prevention and protection of (computer) assets from unauthori zed access,
use, alteration, degradation, destruction, and other threats.
Network security involves the authorization of access to data in a network which is controlled by
the network administrator and the organization policies. Users choose or an ID and password or
authenticating information that allows them access to information and program within their
authority. Network security covers a variety of computer networks, both public and private, that are
used in everyday jobs conducting transactions and communications among businesses, government
agencies and individuals Networks can be private, such as within a company, and others which
might be open to public access. Network security is involved in organizations, enterprises, and other
types of institutions. It does as its title explains: It secures the network, as well as protecting and
overseeing operations being done.
Privacy: The right of the individual to be protected against interruption into his personal life
or affairs, or those of his family, by direct physical means or by publication of information.
Security/Privacy Threat: Any person, act, or object that poses a danger to computer security/privacy.
Computer Security and Privacy/Vulnerabilities
 Physical vulnerabilities (Eg. Buildings)
 Natural vulnerabilities (Eg. Earthquake)
 Hardware and Software vulnerabilities (Eg. Failures)
 Media vulnerabilities (Eg. Disks can be stolen)
 Communication vulnerabilities (Eg. Wires can be tapped)
 Human vulnerabilities (Eg. Insiders)

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.29
Computer and Network threats

Viruses and Worms:


 A Virus is a “program or piece of code that is loaded onto your computer without your
knowledge and runs against your wishes.
 Viruses can cause a huge amount of damage to computers.
 An example of a virus would be if you opened an email and a malicious piece of code was
downloaded onto your computer causing your computer to freeze.
 In relation to a network, if a virus is downloaded then all the computers in the network
would be affected because the virus would make copies of itself and spread itself across
networks.
 A worm is similar to a virus but a worm can run itself whereas a virus needs a host program
to run.
Solution: Install a security suite, such as Kasper sky Total Protection that protects the
computer against threats such as viruses and worms.
Trojan Horses:
 A Trojan horse is “a program in which malicious or harmful code is contained inside it
appears that harmless programming or data in such a way that it can get control and do its
chosen form of damage, such as corrupted the file allocation table on your hard disk.
 In a network if a Trojan horse is installed on a computer and tampers with the file
allocation table it could cause a massive amount of damage to all computers of that network.
 Solution: Security suites, such as Norton Internet Security, will prevent you from
downloading Trojan Horses.
SPAM:
 SPAM is “flooding the Internet with many copies of the same message, in an attempt to
force the message on people who would not otherwise choose to receive it.
 SPAM may not be the biggest risk to a network because even though it may get
maddening and plentiful it still doesn’t destroy any physical elements of the network.

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.30
 Solution: SPAM filters are an effective way to stop SPAM, these filters come with most of
the e-mail providers on line. Also you can buy a variety of SPAM filters that work
effectively.

Phishing:
 Phishing is “an e-mail fraud method in which the performer sends out legitimate-
looking emails in an attempt to gather personal and financial information from
recipients.
 phishing is one of the worst security threats over a network because a lot of people
that use computers linked up to a network are unpaid and would be very vulnerable
to giving out information that could cause situations such as theft of money or
identity theft.
 Solution: Similar to SPAM use Phishing filters to filter out this unwanted mail
Password Attacks:

 Password attacks are attacks by hackers that are able to determine passwords or
find passwords to different protected electronic areas.
 Many systems on a network are password protected and hence it would be easy
for a hacker to hack into the systems and steal data.
 This may be the easiest way to obtain private information because you are able to
get software online that obtains the password for you.
 Solution: At present there is no software that prevents password attacks.

Hardware Loss and Residual Data Fragments:


 Hardware loss and residual data fragments are a growing worry for companies,
governments etc.
 An example this is if a number of laptops get stolen from a bank that have client
details on them, this would enable the thief’s to get personal information from
clients and maybe steal the clients identities.
 This is a growing concern and as of present the only solution is to keep data and
hardware under strict surveillance.
Shared Computers:
 Shared computers are always a threat.
 Shared computers involve sharing a computer with one or more people.

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.31
Explain web security

Web security is important because so many people visit the World Wide Web every day. Some
of the features that make the web useful and entertaining can also make it harmful to a
computer.

Tools that are used to make web pages more powerful and versatile are: -

 ActiveX – Technology created by Microsoft to control interactivity on web pages. If


ActiveX is on a page, an applet or small program has to be downloaded to gain access
to the full functionality.
 Java – Programming language that allows applets to run within a web browser.
Examples of applets include a calculator or a counter.
 JavaScript – Programming language developed to interact with HTML source
code to allow interactive websites. Examples include a rotating banner or a popup
window.

Attackers may use any of these tools to install a program on a computer. To prevent against
these attacks, most browsers have settings that force the computer user to authorize the
downloading or use of ActiveX, Java, or JavaScript.
Define adware, spyware, and grayware

Adware is a software program that displays advertising on your computer. Adware is usually
distributed with downloaded software. Most often, adware is displayed in a popup window.
Adware popup windows are sometimes difficult to control and will open new windows faster
than users can close them.

Grayware or malware is a file or program other then a virus that is potentially harmful. Many
grayware attacks are phishing attacks that try to persuade the reader to unknowingly provide
attackers with access to personal information. As you fill out an online form, the data is sent to
the attacker. Grayware can be removed using spyware and adware removal tools.

Spyware, a type of grayware, is similar to adware. It is distributed without any user


intervention or knowledge. Once installed, the spyware monitors activity on the computer.
The spyware then sends this information to the organization responsible for launching the
spyware.
Explain Denial of Service

Denial of service (DoS) is a form of attack that prevents users from accessing normal services,
such as e-mail and a web server, because the system is busy responding to abnormally large

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.32
Ensuring carry-out spot checks and other security
strategies

Physical monitoring threats


Use the following Physical threats controlling :-
 Fence
 Guards
 Gate locks
 Lock devices(network device and computers)
 Authentication (Password): Password prevention is also very vital. One of the best
mechanisms is to ascertain that crasher can’t even gain access to the coded password.
 Organizational policies

Physical security: Physical Security


Your organization should be aware how physically secure every aspect of its network is because if
an intruder gets physical access, they can get your data. Be sure the organization properly secures
locations and consider the following:
 Servers - Contain your data and information about how to access that data.
 Workstations - Man contain some sensitive data and can be used to attack other
computers.
 Routers, switches, bridges, hubs and any other network equipment may be
used as an access point to your network.
 Network wiring and media and where they pass through may be used to
access your network or place a wireless access point to your network.
 External media which may be used between organizational sites or to other
sites the organization does business with.
 Locations of staff that may have information that a hostile party can use.
 Some employees may take data home or may take laptops home or use laptops on the
internet from home then bring them to work. Any information on these laptops should
be considered to be at risk and these laptops should be secure according to proper
policy when connected externally on the network.

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.33
Threats to Security
 Internal threats - employees of the organization.
 Deliberate data damage - "just for fun" or with more shady intent, some people might delight
in corrupting data or deleting it completely.
 Industrial intelligence - the process of a person retrieving data from a server for a purpose.
 Physical equipment theft - If an important piece of equipment is stolen (for example, the
server or a backup tape), the intruder will have access to your data.
 A firewall is a system or group of systems that controls the flow of traffic between two
networks. The most common use of a firewall is to protect a private network from a public
network such as the Internet.
Protect your password.

Never share your password with anyone, not even a relative or colleague. If another person has your
password, they can, for all computer purposes, be you. This extends far beyond simply reading your
email.

It's very important to use different passwords for different systems. This limits the damage a malic ious
person can do should a password fall into the wrong hands.

Following are some measures that you can take in order to minimize the risks associated with malicious
human threats:
 Data Storage in Safe Locations: Keep your data in safe and secure locations that have limited
access to others.
 Virus and Spyware Protection: You must open an e-mail attachment or install any software
from a Web site with caution. The most reliable way is to install antivirus and anti-spyware software
from a reputable vendor.
 Human Errors: Many times, damage to a computer is due to unintentional human error. For
example, you may accidentally delete an important file, causing the computer to malfunction.
 Hardware Damage: Computer components, being delicate, run the risk of getting damaged
due to carelessness..
 Protecting hardware from accidental and environmental damages: You can take various
measures to avoid any unintentional damage to your computer. Keep the computer in an area

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.34
that is dust-free, free from vibration, and out of the way of possible impact, should be well- ventilated
to prevent any damage due to heat.
 Backing up Data: Regularly back up important computer data. Creating multiple copies of data
provides protection against loss of data due to accidental erasure or destruction of data.
Identify security procedures

A security plan should be used to determine what will be done in a critical situation. Security
plan policies should be constantly updated to reflect the latest threats to a network. A security
plan with clear security procedures is the basis for a technician to follow. Security plans
should be reviewed on a yearly basis.

There are different security strategies

 Privacy
 Authentication
 Authorization and integrity

Privacy is the ability of an individual or group to seclude themselves or information about


themselves and thereby reveal themselves selectively. The boundaries and content of what is
considered private differ among cultures and individuals, but share basic common themes.

Authentication is the act of confirming the truth of an attribute of a datum or entity.

Authorization is the process of giving someone permission to do or have something. In


multi-user computer systems, a system administrator defines for the system which users are
allowed access to the system and what privileges of use (such as access to which file
directories, hours of access, amount of allocated storage space, and so forth).

Integrity is a concept of consistency of actions, values, methods, measures, princip les,


expectations, and outcomes. In ethics, integrity is regarded as the honesty and truthfulness or
accuracy of one's actions.

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.35
Investigating and implementing inbuilt or additional
encryption facilities

Data Encryption
Encrypting data uses codes and ciphers. Traffic between resources and computers on the
network can be protected from attackers monitoring or recording transactions by
implementing encryption. It may not be possible to decipher captured data in time to make
any use of it.

Virtual Private Network (VPN) uses encryption to protect data. A VPN connection allows
a remote user to safely access resources as if their computer is physically attached to the local
network.

Port Protection
Every communication using TCP/IP is associated with a port number. HTTPS, for instance,
uses port 443 by default. A firewall is a way of protecting a computer from intrusion
through the ports. The user can control the type of data sent to a computer by selecting
which ports will be open and which will be secured. Data being transported on a network
is called traffic.
Data Backups
Data backup procedures should be included in a security plan. Data can be lost or
damaged in circumstances such as theft, equipment failure, or a disaster such as a fire or
flood.
Backing up data is one of the most effective ways of protecting against data loss. Here are
some considerations for data backups:

 Frequency of backups – Backups can take a long time. Sometimes it is easier to make a
full backup monthly or weekly, and then do frequent partial backups of any data that has
changed since the last full backup. However, spreading the backups over many recordings
increases the amount of time needed to restore the data.

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.36
 Storage of backups – Backups should be transported to an approved offsite storage
location for extra security. The current backup media is transported to the offsite location on
a daily, weekly, or monthly rotation as required by the local organization.
 Security of backups – Backups can be protected with passwords. These passwords
would have to be entered before the data on the backup media could be restored.
Implementing encryption Facilities

One of the most effective ways to eliminate data loss or theft is to encrypt the data as it travels
across the network. However, not all data protection solutions are created equal. While most
solutions offer standard AES 256-bit encryption, there are other attributes that must be
considered:

Some of encryption facilities are: -


 Public Key Infrastructure (PKI) is a set of hardware, software, people, policies,
and procedures needed to create, manage, distribute, use, store, and revoke digital
certificates.[1] In cryptography, a PKI is an arrangement that binds public keys with
respective user identities by means of a certificate authority (CA). The user identity
must be unique within each CA domain. The binding is established through the
registration and issuance process, which, depending on the level of assurance the
binding has, may be carried out by software at a CA, or under human supervision. The
PKI role that assures this binding is called the Registration Authority (RA). The RA
ensures that the public key is bound to the individual to which it is assigned in a way
that ensures non-repudiation.
 Pretty Good Privacy (PGP) is a popular program used to encrypt and decrypt e-
mail over the Internet. It can also be used to send an encrypted digital signature that
lets the receiver verify the sender's identity and know that the message was not
changed en route. Available both as freeware and in a low-

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.37
cost commercial version, PGP is the most widely used privacy-ensuri ng program by
individuals and is also used by many corporations.
Symmetric and Asymmetric ciphers
 In a symmetric cipher, both parties must use the same key for encryption and decryption.
This means that the encryption key must be shared between the two parties before any
messages can be decrypted. Symmetric systems are also known as shared secret systems or
private key systems.Symmetric ciphers are significantly faster than asymmetric ciphers, but
the requirements for key exchange make them difficult to use.
 In an asymmetric cipher, the encryption key and the decryption keys are separate. In an
asymmetric system, each person has two keys. One key, the public key, is shared publicly.
The second key, the private key, should never be shared with anyone.
When you send a message using asymmetric cryptography, you encrypt the message using
the recipients’ public key. The recipient then decrypts the message using his private key.
That is why the system is called asymmetric.

Fig 3.1 Encryption Data


Preparing and presenting an audit report and
recommendation

Introduction to Multiple layer of security

There are multiple layers of security in a network, including physical, wireless, and data. Each
layer is subject to security attacks. The technician needs to understand how to imple ment
security procedures to protect equipment and data.

Fig 3.2 Multiple


Layer

Explain what is required in a basic local security policy

Though local security policies may vary between organizations, there are questions all organizat ions
should ask:

 What assets require protection?


 What are the possible threats?
 What to do in the event of a security breach?
Describe ways to protect data

The value of physical equipment is often far less than the value of the data it contains. The
loss of sensitive data to a company's competitors or to criminals may be costly. Such losses
may result in a lack of confidence in the company and the dismissal of computer technic ians
in charge of computer security. To protect data, there are several methods of security
protection that can be implemented.

Password Protection
Password protection can prevent unauthorized access to content. Attackers are able to gain
access to unprotected computer data. All computers should be password protected. Two
levels of password protection are recommended:

 BIOS – Prevents BIOS settings from being changed without the appropriate
password
 Login – Prevents unauthorized access to the network
Determining maintenance requirements specified by
the equipment manufacturer.
Maintenance requirement
Maintenance requirement is the materials or tools that are important to maintain specific equipment. Maintenance
requirement may include but not limited to: -
 Caution
 Attention

Attention is more than just noticing incoming stimuli. It involves a number of processes including filtering out
perceptions, balancing multiple perceptions and attaching emotional significance to these perceptions.

There are two major forms of attention: passive and active. Passive attention refers to the involuntary process
directed by external events that stand out from their environment, such as a bright flash, a strong odor, or a
it
sudden loud noise. We might say that because passive attention is involuntary, is easy. Active attention is
voluntary and is guided by alertness, concentration, interest and needs such as curiosity and hunger.

Personal computers (PCs), also called microcomputers, are the most popular type of computer in use today.
The PC is a small-sized, relatively inexpensive computer designed for an individual user. Today, the world of PCs
is basically divided between IBM-compatible and Macintosh-compatible machines, named after the two
computer manufacturers. Computers may be called ‘desktop’ computers, which stay on the desk, or ‘laptop’
computers, which are lightweight and portable. Organisations and individuals use PCs for a wide range of tasks,
including word processing, accounting, desktop publishing, preparation and delivery of presentations,
organisation of spreadsheets and database

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.80
management. Entry-level PCs are much more powerful than a few years ago, and today there is little distinction
between PCs and workstations.

Switches
 On the surface, a switch looks much like a hub. Despite their similar appearance, switches are far more
efficient than hubs and are far more desirable for today's network environments.
 As with a hub, computers connect to a switch via a length of twisted-pair cable. Multiple switches are
often interconnected to create larger networks.

Fig:-4.1. Switch
 Rather than forwarding data to all the connected ports, a switch forwards data only to the port on which
the destination system is connected.
 It looks at the Media Access Control (MAC) addresses of the devices connected to it to determine the
correct port. A MAC address is a unique number that is stamped into every NIC. By forwarding data
only to the system to which the data is addressed, the switch decreases the amount of traffic on each
network link dramatically.
Producing maintenance schedules

Maintenance Schedule
Maintenance Schedule is a plan or procedures that are used to maintain equipment and it must be programmed with
time of intervals. Maintenance schedules including removal of dust, grease build-up and etc.
Maintenance scheduling can be planed or prepared as:-
 Onsite response
 Remote diagnostic

Onsite response is one of maintenance schedule that display the plan or procedures from the
internet.
Remote diagnostics refers to the ability to evaluate the current status of electronic equipment from a remote
location. The process involves the establishment of some type of wired or wireless communication between the
two points in order for the remote analysis to take place.
Remote diagnostics is the act of diagnosing a given symptom, issue or problem from a distance

MAINTENANCE PLANNING AND SCHEDULING


Effective planning and scheduling contribute significantly to the following:

• Reduced maintenance cost.

• Improved utilization of the maintenance workforce by reducing delays and interruptions.

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.82
Priorities of Maintenance Work

Table 4.1. Priorities of Maintenance Work

Scheduling Techniques
The objective of the scheduling techniques is to construct a time chart showing:
• The start and finish for each job.
• The interdependencies among jobs.
• The critical jobs that require special attention and effective monitoring. Such
techniques are:
• Modified Gantt chart
• CPM
• PERT
• Integer and stochastic programming.

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.82
Performing diagnostic function

Diagnostic functions
It includes but not limited
 Replacing suspected components
 Upgrade components
 Reloading software’s
Replacing suspected components
Computer hardware or components that can be replaced are: -
 Motherboards
 CMOS battery
 Central processing Unit (CPU)
 Drives (floppy, hard disk, CD-ROM)
 Interface cards
 Fax, modem cards
 RAM

Version:01
ICT ITS2 Copyright: Ethiopia Federal TVET Agency
Page No.82

You might also like