Pc Maintenance And Technical Support
CoSc 527
2
CHAPTER ONE
Introduction
3
Content
Describe a computer system
Internal component
Safe lab procedure and proper tool use
Preventive maintenance
4
1.1 Describe a computer system
It is an electronics device that accepts input, processes data, stores data,
and produces output, all according to a series of stored instructions.
A computer system consists of hardware and software components.
Hardware is the physical equipment such as the case, storage drives,
keyboards, monitors, cables, speakers, motherboards and others.
The term software includes the operating system and programs.
The operating system instructs the computer how to operate. These
operations may include identifying, accessing, and processing
information. Programs or applications perform different functions.
Programs vary widely depending on the type of information that will be
accessed or generated.
5
1.2 Internal Components
Identify the internal components
Motherboards
Buses
CPUs
Cooling systems
Memory
Adapter cards
Expansion slots
Storage drives
Internal cables
1.3 Safe Lab Procedures and Proper Tool use 6
1.3.1 Introduction
This topic covers basic safety practices for the workplace, hardware
and software tools, and the disposal of hazardous materials.
Safety guidelines help protect individuals from accidents and injury
and protect equipment from damage.
Some of these guidelines are designed to protect the environment
from contamination by discarded materials. Stay alert to situations
that could result in injury or damage to equipment.
Warning signs are designed to alert you to danger. Always watch for
these signs and take the appropriate action according to the warning
given.
1.3 Safe Lab Procedures and Proper Tool use 7
1.3.1 Introduction
8
1.3.2 The purpose of safe working conditions
and procedures
Safe working conditions help to prevent injury to people and damage
to computer equipment.
A safe workspace is clean, organized, and properly lighted.
Follow proper procedures for handling computer equipment to
reduce the risk of personal injury, damage to property, and loss of
data. Any damage or loss may result in claims for damage from the
owner of the property and data.
The proper disposal or recycling of hazardous computer components
is a global issue.
9
1.3.2.1 General Safety Guidelines (1)
Follow the basic safety guidelines to prevent cuts, burns, electrical
shock, and damage to eyesight. As is best practice, make sure that a
fire extinguisher and first-aid kit are available in case of fire or injury.
10
1.3.2.1 General Safety Guidelines (2)
CAUTION: Power supplies and monitors contain very high voltage. Do
not wear the antistatic wrist strap when repairing power supplies or
monitors.
CAUTION: Some printer parts may become very hot when in use and
other parts may contain very high voltages. Make sure that the printer
has had time to cool before making the repair. Check the printer
manual for locations of various components that may contain high
voltages. Some components may retain high voltages even after the
printer is turned off.
11
1.3.2.2 Identify safety procedures to protect
equipment from damage and data from loss (1)
Electrostatic discharge (ESD), harsh climates, and poor-quality sources
of electricity can cause damage to computer equipment. Follow
proper handling guidelines, be aware of environmental issues, and
use equipment that stabilizes power to prevent equipment damage
and data loss.
ESD
Static electricity is the buildup of an electric charge resting on a
surface. This buildup may zap a component and cause damage. This
is known as electrostatic discharge (ESD).
ESD can be destructive to the electronics in a computer system.
12
1.3.2.2 Identify safety procedures to protect
equipment from damage and data from loss (1)
Electrostatic discharges (ESD) are the most severe form of
electromagnet interference (EMI).
ESD occurs when an imbalance in the amounts of positive and
negative charges on the surface of an object is released.
The most dramatic example of ESD is lightning, which splits trees as
easily as it lights up the sky.
It is a quick electrical charge that occurs when two objects with two
different potentials come into contact with each other. Dust and ESD
are the two main enemies of your computer.
13
1.3.2.2 Identify safety procedures to protect
equipment from damage and data from loss (1)
To maintain your computer and to prolong the life of components,
you need to learn about the effects of ESD and how to protect your
computer from those effects.
You can prevent the effects of ESD by grounding yourself by touching
the exterior of the PC power supply before touching any of your
system's components.
14
1.3.2.2 Identify safety procedures to protect
equipment from damage and data from loss (2)
To maintain your computer and to prolong the life of components, you need
to learn about the effects of ESD and how to protect your computer from
those effects.
You can prevent the effects of ESD by grounding yourself by touching the
exterior of the PC power supply before touching any of your system's
components.
At least 3,000 volts of static electricity must build up before a person can feel
ESD. For example, static electricity can build up on you as you walk across a
carpeted floor. When you touch another person, you both receive a shock.
If the discharge causes pain or makes a noise, the charge was probably
above 10,000 volts. By comparison, less than 30 volts of static electricity can
damage a computer component.
15
1.3.2.2 Identify safety procedures to protect
equipment from damage and data from loss (3)
Sources of ESD are:
The human body has an electric field and it can generate static
electricity.
Another source of ESD is dust that build upon pc components. The dust
can create charges that could damage internal components of PC.
To avoid this, we have to clean the PC regularly. Blower is the best tool for
this.
16
1.3.2.2 Identify safety procedures to protect
equipment from damage and data from loss (3)
The amount of damage caused by ESD can be divided into three
categories:
1) Catastrophic failure: This damage causes a computer component to fail
immediately. Heat and sometimes noise and smoke are generated during the
process. This type of failure is easy to identify as the device fail completely. You can
replace such components.
2) Upset failure (degradation failure): ESD causes erratic fault in a component. This
problem is very difficult to detect and repair because the failure is intermittent. The
best way to solve this problem is replacing suspected parts until the fault stops
appearing.
3) Latent failure: this type of failure weakens the actual transistor. The part will seem
normal in most operations and will frequently pass quality control and conformance
tests. Like upset failure, it is difficult to identify.
17
1.3.2.2 Identify safety procedures to protect
equipment from damage and data from loss (3)
ESD Protection Recommendations
ESD can cause permanent damage to electrical components. Follow
these recommendations to help prevent ESD damage:
Keep all components in antistatic bags until you are ready to install them.
Use grounded mats on workbenches.
Use grounded floor mats in work areas.
Use antistatic wrist straps when working on computers.
18
1.3.2.2 Identify safety procedures to protect
equipment from damage and data from loss (3)
ESD Protection Recommendations
1) Anti-static wristband: these devices have a strap that you wrap around
your wrist or ankle on one end. The other end of the strap is attached
computer case to keep ground between the computer and you.
19
1.3.2.2 Identify safety procedures to protect
equipment from damage and data from loss (3)
ESD Protection Recommendations
2) Anti-static mats: these are mats that you place on the work surface
and on the floor in front of work area. They make an excellent place
to place your tools and components when you work on a system.
20
1.3.2.2 Identify safety procedures to protect
equipment from damage and data from loss (3)
ESD Protection Recommendations
3) Anti-static bags (pouches): they have special coating or filament
that prevents ESD. They are used to store any sensitive electronic
device like cards, RAM, drives, etc when they are not installed in a
computer.
4) Anti-static pad: It is an insulating foam pad in which individual chips
with exposed pins should be embedded when they are not installed
in a computer.
21
1.3.2.2 Identify safety procedures to protect
equipment from damage and data from loss (4)
Climate
Climate affects computer equipment in a variety of ways:
If the environment temperature is too high, equipment can overheat.
If the humidity level is too low, the chance of ESD increases.
If the humidity level is too high, equipment can suffer from moisture
damage.
22
1.3.2.2 Identify safety procedures to protect
equipment from damage and data from loss (5)
Power Fluctuation Types
The following types of AC power fluctuations can cause data loss or
hardware failure:
Blackout– complete loss of AC power. A blown fuse, damaged
transformer, or downed power line can cause a blackout.
Brownout – reduced voltage level of AC power that lasts for a
period of time. Brownouts occur when the power line voltage drops
below 80% of the normal voltage level. Overloading electrical
circuits can cause a brownout.
23
1.3.2.2 Identify safety procedures to protect
equipment from damage and data from loss (6)
Noise– interference from generators and lightning. Noise results in
unclean power, which can cause errors in a computer system.
Spike– sudden increase in voltage that lasts for a very short period
and exceeds 100% of the normal voltage on a line. Spikes can be
caused by lightning strikes, but can also occur when the electrical
system comes back on after a blackout.
Power surge – dramatic increase in voltage above the normal flow
of electrical current. A power surge lasts for a few nanoseconds, or
one-billionth of a second.
24
1.3.2.2 Identify safety procedures to protect
equipment from damage and data from loss (7)
Power Protection Devices:
To help shield against power fluctuation issues, use protection devices
to protect the data and computer equipment:
1. Surge Suppressor – helps protect against damage from surges and
spikes. A surge suppressor diverts extra electrical voltage on the line to
the ground.
2. Uninterruptible Power Supply (UPS) – helps protect against potential
electrical power problems by supplying electrical power to a
computer or other device. The battery is constantly recharging while
the UPS is in use. The UPS is able to supply a consistent quality of power
when brownouts and blackouts occur.
25
1.3.2.2 Identify safety procedures to protect
equipment from damage and data from loss (8)
Standby Power Supply (SPS) – helps protect against potential
electrical power problems by providing a backup battery to supply
power when the incoming voltage drops below the normal level. The
battery is on standby during the normal operation. When the voltage
decreases, the battery provides DC power to a power inverter, which
converts it to AC power for the computer. This device is not as reliable
as a UPS because of the time it takes to switch over to the battery. If
the switching device fails, the battery will not be able to supply power
to the computer.
26
1.3.3 Identify tools and software used with personal
computer components and their purposes (1)
For every job there is the right tool. Make sure that you are familiar
with the correct use of each tool and that the right tool is used for the
current task. Skilled use of tools and software makes the job less
difficult and ensures that tasks are performed properly and safely.
27
1.3.3 Identify tools and software used with personal
computer components and their purposes (2)
Computer Maintenance Toolkit
28
1.3.3.1 Identify hardware tools and their purpose (1)
A toolkit should contain all of the tools necessary to complete
hardware repairs. As you gain experience, you will learn which tools to
have available for different types of jobs. Hardware tools are grouped
into these four categories:
ESD tools
Hand tools
Cleaning tools
Diagnostic tools
29
1.3.3.1 Identify hardware tools and their purpose (2)
1. ESD Tools: The antistatic wrist strap protects computer equipment
when grounded to a computer chassis. The antistatic mat protects
computer equipment by preventing static electricity from
accumulating on the hardware or on the technician.
30
1.3.3.1 Identify hardware tools and their purpose (3)
2. Hand tools: Most tools used in the computer assembly process
are small hand tools. They are available individually or as part of a
computer repair toolkit. Toolkits range widely in size, quality, and
price.
31
1.3.3.1 Identify hardware tools and their purpose (4)
3. Cleaning Tools: Having the appropriate cleaning tools is essential
when maintaining or repairing computers. Using these tools ensures
that computer components are not damaged during cleaning.
Example: soft cloth and compressed air.
32
1.3.3.1 Identify hardware tools and their purpose (5)
4. Diagnostic Tools: A digital multi-meter and a loopback adapter
are used to test hardware.
33
1.3.3.1 Identify hardware tools and their purpose (5)
Generally We need the following maintenance tools:-
Screwdriver (to open up the Diagonal pliers
computer case) Contact cleaner
Compressed air (to blow away Foam swabs
dust inside the computer)
Tweezers
Cleaning Liquid: Rubbing
alcohol or mild cleaning agent Cleaning supplies
Paper towel or cotton cloth Magnifying glass
Assorted flat-blade screwdrivers Clip leads
Assorted Phillips screwdrivers IC extractors
34
1.3.3.2 Identify software tools and their purpose (1)
A technician must be able to use a range of software tools to help
diagnose problems, maintain hardware, and protect the data stored
on a computer.
Disk Management Tools
You must be able to identify which software to use in different
situations. Disk management tools help detect and correct disk errors,
prepare a disk for data storage, and remove unwanted files.
35
1.3.3.2 Identify software tools and their purpose (2)
Fdisk or Disk Management – used to create and delete partitions on a
hard drive
Format – used to prepare a hard drive to store information
Scandisk or Chkdsk – used to check the integrity of files and folders on
a hard drive by scanning the disk surface for physical errors
Defrag – used to optimize space on a hard drive to allow faster
access to programs and data
36
1.3.3.2 Identify software tools and their purpose (3)
Disk Cleanup – used to clear space on a hard drive by searching for
files that can be safely deleted.
System File Checker (SFC) – a command-line utility that scans the
operating system critical files and replaces any files that are corrupted
37
1.4 Preventive Maintenance and Troubleshooting (1)
Preventive Maintenance
Is a regular and systematic inspection, cleaning, and replacement of
worn parts, materials, and systems. Preventive maintenance helps to
prevent failure of parts, materials, and systems by ensuring that they
are in good working order.
A good preventive maintenance program helps minimize failures.
With fewer failures, there is less troubleshooting to do, thus saving and
organization time and money.
38
1.4 Preventive Maintenance and Troubleshooting (2)
Troubleshooting
Is a systematic approach to locating the cause of a fault in a
computer system.
Is a learned skill. Not all troubleshooting processes are the same, and
technicians tend to refine their troubleshooting skills based on
knowledge and personal experience.
Is a skill that you will refine over time. Each time you solve another
problem, you will increase your troubleshooting skills by gaining more
experience.
39
The Purpose of Preventive Maintenance
Preventive Maintenance reduces the probability of hardware or
software problems by systematically and periodically checking
hardware and software to ensure proper operation.
40
Preventive Maintenance for Hardware
Check the condition of cables, components and peripherals. Clean
components to reduce the likelihood of overheating. Repair or replace
any components that show signs of damage.
Use the following tasks as a guide to create a hardware maintenance
program:
Remove dust from fan intakes.
Remove dust from the power supply.
Remove dust from components inside the computer.
Clean the mouse and keyboard.
Check and secure loose cables.
41
Preventive Maintenance for Software (1)
Verify that installed software is current. Follow the policies of the
organization when installing security updates, operating system updates,
and program updates.
Many organizations do not allow updates until extensive testing has
been completed. This testing is done to confirm that the update will not
cause problems with the operating system and software.
42
Preventive Maintenance for Software (2)
Use the tasks listed as a guide to create a software maintenance
schedule that fits the needs of your computer equipment:
Review security updates.
Review software updates.
Review driver updates.
Update virus definition files.
Scan for viruses and spyware.
Remove unwanted programs
Scan hard drive for errors.
Defragment hard drives.
43
Benefits of Preventive Maintenance
Be proactive in computer equipment maintenance and data
protection. By performing regular maintenance routines, you can
reduce potential hardware and software problems. Regular
maintenance routines reduce computer downtime and repair costs.
The following are the benefits of preventive maintenance:
Increases data protection
Extends the life of the components
Increases equipment stability
Reduces repair costs
Reduces the number of equipment failures
44
Identify the Steps of the Troubleshooting Process (1)
Troubleshooting requires an organized and logical approach to
problems with computers and other components.
A logical approach to troubleshooting allows you to eliminate variables
in a systematic order. Asking the right questions, testing the right
hardware, and examining the right data helps you understand the
problem. This helps you form a proposed solution to try.
45
Identify the Steps of the Troubleshooting Process (2)
The following troubleshooting process is a guideline that you can modify
to fit your needs.
Explain the purpose of data protection.
Identify the problem.
Establish a theory of probable causes.
Test the theory to determine the exact cause.
Establish a plan of action to resolve the problem and implement the solution.
Verify the full system functionality, and if applicable, implement preventive
measures.
Document finding, actions and outcomes.
End of Chapter One