HARAR POLY TECHNIC COLLAGE
Ethiopian TVET-System
INFORMATION
TECHNOLOGY SUPPORT
SERVICE
Level II
Learning Guide #4
Unit of Competence: Care for Network and Computer
Hardware
Module Title: Caring for Network and Computer
Hardware
LG Code: ICT ITS2 M04 LO2-04
TTLM Code: ICT ITS2 TTLM4 0312
TTLM Development Manual Date: 10-2011 Page 1
of 17
Author: ICT Sector Trainer Cezar B. Simon
HARAR POLY TECHNIC COLLAGE
LO1: Establish location requirements for
hardware and peripherals
LO1- Establish location requirements
Instruction
for hardware and peripherals
This learning guide is developed to provide you the necessary information regarding the
Following content coverage and topics –
Purposes and general requirements of peripheral devices
System development life cycle
Planning for client needs
Analyzing client requirements
Designing and verifying client requirements
Warranty and support agreements.
This guide will also assist you to attain the learning outcome stated in the cover page.
Specifically, upon completion of this Learning Guide, you will be able to –
Identify and confirm client peripherals in accordance with organizational standards.
Document the client requirements and peripherals in line with organizational standards
and findings are reported to the appropriate person.
Verify the client requirements with appropriate person in line with organizational
standards and reporting procedures
Ensure client support expectations are covered by vendor and support services.
Learning Activities
1. Read the specific objectives of this Learning Guide.
2. Read the information written in the “Information Sheet 1”.
3. Accomplish the “Self-check 1” in page 7.
4. Submit your accomplished Self-check 1. This will form part of your training portfolio.
5. Read and perform the “Operation Sheet” in page 8.
6. Read the information written in the “Information Sheet 2”.
6. Accomplish the “Self-check 2” in page 16.
7. Submit your accomplished Self-check 2. This will form part of your training portfolio
8. If you earned a satisfactory evaluation proceed to LAP Test.
However, if your rating is unsatisfactory, see your teacher for further instructions.
9. Do the “LAP test” in page 17 (if you are ready) and show your output to your teacher.
TTLM Development Manual Date: 10-2011 Page 2
of 17
Author: ICT Sector Trainer Cezar B. Simon
HARAR POLY TECHNIC COLLAGE
*Your teacher will evaluate your output either satisfactory or unsatisfactory. If
unsatisfactory, your teacher shall advice you on additional work. But if satisfactory
you can proceed to the next topic.
Computer platforms and Establishing safe
Information Sheet – 1 work practices
Computer platforms
A platform consists of an operating system, the computer system's coordinating program, which in
turn is built on the instruction set for a processor or microprocessor, the hardware that performs logic
operations and manages data movement in the computer. The operating system must be designed to
work with the particular processor's set of instructions. As an example, Microsoft's Windows 2000 is
built to work with a series of microprocessors from the Intel Corporation that share the same or similar
sets of instructions. There are usually other implied parts in any computer platform such as a
motherboard and a data bus, but these parts have increasingly become modularized and
standardized.
Establish safe work practices
Computer hardware devices
There is a range of computer hardware devices which may be found in a workplace.
Where two or more computers are connected together, this is known as a network. The computers
may be connected by cable or be connected wirelessly. Networks enable the sharing of resources
such as data, programs, files, printers and an internet connection.
Networks can be classified by the scale of the geographic area that they serve:
Local Area Network (LAN) is a computer network limited to a small geographic area such as a
school or office building. Usually the network equipment and cabling is owned by the
organization.
Wide Area Network (WAN) is a computer network that covers a wide geographic area. Some
WANs are privately owned but many will use leased communication lines and equipment.
Computer hardware devices include:
TTLM Development Manual Date: 10-2011 Page 3
of 17
Author: ICT Sector Trainer Cezar B. Simon
HARAR POLY TECHNIC COLLAGE
Server – a computer which is usually dedicated to managing user access to shared network
resources. A server provides services such as file and print sharing, e-mail and web serving.
The term “server” can describe the software application that provides the service, the computer
that runs the software application or the combination of the two.
Switch – a hardware device used to connect segments of a computer network.
Workstation – a computer designed to be used by one person to perform work-related tasks.
Workstations are commonly connected to a computer network. The term “workstation” is also
used to describe the workspace of a person, including the desk, chair and other equipment
used to perform tasks.
Modem – a hardware device that enables a computer to transmit data over telephone or cable
lines. For high speed internet connections, DSL (Digital Subscriber Line) or cable modem
services are used.
Router – a hardware device that connects two or more computer networks and selectively
forwards data from one network to another.
Peripheral devices are hardware devices which are added to a host computer in order to expand its
abilities. They may be internal or external to the computer. Commonly they are classified by their
purpose:
Input devices such as keyboards and scanners.
Output devices such as printers.
Storage devices such as external hard drives.
To determine the appropriate methods of working with these devices, knowledge of the following is
required:
Manufacturer’s requirements
Occupational Health and Safety (OH & S) requirements and safe work practices
Manufacturer’s requirements
Computer hardware will usually come with a user manual or guide, either in a hard copy or soft copy
format. Another source for this information is the manufacturer’s website. Information in the user
guide may include:
Installation instructions including required environmental conditions
Handling precautions
Software installation guide
Instructions on how to use the hardware
Maintenance instructions
Fault finding guide
Establish location requirements
Environmental considerations
TTLM Development Manual Date: 10-2011 Page 4
of 17
Author: ICT Sector Trainer Cezar B. Simon
HARAR POLY TECHNIC COLLAGE
Computer hardware is designed for operation within a set range of environmental conditions, and
operation of computer hardware outside these conditions will damage the hardware or reduce the
working life of the hardware.
The manufacturer’s recommendations for operating a specific computer hardware device will be
found in the user manual or specifications.
Temperature
The ambient temperature of the environment is the temperature at which computer hardware should
be maintained and should fall within the recommended range. If the temperature exceeds the upper
limit of this range, the life of the electronic components will be shortened, and the reliability of the
device decreased. The optimum temperature range for computer hardware is usually from 15 to 24
deg C.
To maintain the ambient temperature within an acceptable range, the room containing the computer
hardware is often air conditioned. Air conditioning will also maintain the relative humidity levels in the
room, and also improve the air quality by filtering out dust particles.
Humidity and moisture
If the relative humidity where computer hardware devices are operated is too high, problems can
occur through water condensation. If the relative humidity is too low, the devices are much more
susceptible to electrostatic discharge.
Computer hardware devices should be located away from sources of moisture such as open
windows. Eating and drinking should not be allowed anywhere near a computer hardware device.
Dust
As discussed above, it is important hardware devices operate within a set temperature range. Over
time fans and ventilation vents become clogged with dust reducing their cooling efficiency. If the
hardware device is to be operated in a dusty area such as an industrial environment, the device will
need to be cleaned more frequently than a device in an office environment. Shields and housings are
available to reduce the intake of dust in a dusty environment.
Physical security
Physical security refers to making sure only authorized people have physical access to computer
hardware. Examples of physical security include:
Servers located in a server room secured with locks, key cards or keypad access.
Workstations protected by a key lock on the system case and/or a cable lock between the
system case and the desk.
Electrical system protection devices
TTLM Development Manual Date: 10-2011 Page 5
of 17
Author: ICT Sector Trainer Cezar B. Simon
HARAR POLY TECHNIC COLLAGE
The correct operation of computer hardware devices is dependent on a continuous supply of
electrical power within set conditions. If the electrical supply is outside those conditions, the operation
of computer hardware can be adversely affected.
Electrical problems
Common electrical problems are listed below:
Blackout – total loss of electrical power. Hardware devices will not operate.
Brownout – the electrical power is delivered below the set conditions for the computer hardware.
Computer hardware may turn off without notice or may not operate.
Surges and spikes – the electrical power is delivered above the set conditions, commonly only for a
short period of time. Surges and spikes commonly occur when there is lightning. Computer hardware
(and other electronic equipment) may be damaged.
Electrical noise – the electrical power is delivered with additional electrical signals which may affect
the correct operation of computer hardware. One source of electrical noise is electrical machinery
such as welders.
Protection devices
To provide protection for computer hardware devices from electrical problems, the following devices
can be installed.
Surge protectors – a device designed to protect against electrical surges and spikes. It provides no
protection against blackouts or brownouts.
Uninterruptible Power Supply (UPS) – a device designed to protect against blackouts. A UPS
provides power automatically during a blackout and is designed to provide battery power for a
relatively short period of time – around ten to twenty minutes. This provides time to save all data and
shut down the computer correctly.
Most UPS devices also provide protection against brownouts, surges and spikes depending on their
design.
Generators – where an organization requires the computer hardware to be powered for an extended
length of time, a generator may be installed in addition to a UPS. This is a relatively costly option and
would be considered where the operation of the computer hardware is considered critical to the
organization.
Maintenance and testing
These devices should be regularly tested and maintained to ensure they will function correctly in the
event of an electrical problem. Refer to the user manual for the device.
TTLM Development Manual Date: 10-2011 Page 6
of 17
Author: ICT Sector Trainer Cezar B. Simon
HARAR POLY TECHNIC COLLAGE
System protection
Once the hardware device is installed, the device (and data stored on it) can be further protected by
the following system protection measures.
User accounts
Users should be given individual user accounts with enough rights and permissions to be able to
perform their work duties and no more.
For example, users in a Microsoft Windows environment may be a standard user or an administrator.
Administrators can change security settings, install software and hardware, and access all files on the
computer. Administrators can also make changes to other user accounts. Standard users have
limited access.
Access control lists
An Access Control List (ACL) is a list of permissions for objects such as files or folders. This list tells
the computer operating system which access rights each user has to the file or folder. Depending on
the operating system, these access rights include:
Read – users can open a folder, list the files in the folder, open a file and view the contents
Write – as for Read and in addition users can create new files and modify existing files
Full – users have all rights
Execute – users can execute (run) files if they are scripts or program files
Users should only be given enough rights to files and folders that are necessary for them to be able to
perform their work duties and no more.
Antivirus software
Antivirus software should be installed and the software and virus definitions should be regularly
updated. Computers with an internet connection can be set up to download these updates
automatically.
Firewalls
A firewall is a hardware or software device designed to block unauthorised access to or from a private
computer network.
Data backup
To protect against data loss, it is important that a data backup and recovery plan is developed and
implemented. The backup plan can protect against accidental loss of user data, database corruption,
hardware failures and natural disasters. Typically two copies of the backup are made. One copy is
TTLM Development Manual Date: 10-2011 Page 7
of 17
Author: ICT Sector Trainer Cezar B. Simon
HARAR POLY TECHNIC COLLAGE
stored on-site and the other copy is stored off-site to protect against a disaster such as a fire
happening at the site.
Software updates
Updates for operating systems and application software are regularly released by the manufacturers
to update features or fix problems with the software. The most recent versions of operating systems
have built-in facilities which automate the process of checking for updates.
Redundancy
Redundancy helps protect an information system against the failure of a hardware device. A
secondary hardware device is installed and this secondary hardware device will take over the function
of the primary device if it fails.
An example of redundancy is the use of Redundant Array of Independent (or Inexpensive) Disks,
commonly known as RAID.
Maintain computer hardware
It is important that computer hardware devices are regularly maintained. Computer maintenance can
be loosely classified as one of two types.
Preventive maintenance is maintenance which is carried out, usually at regular intervals, to prevent
equipment failures or the slowing of a service.
Corrective maintenance is maintenance which is carried out to correct a failure which has occurred.
Preventive maintenance
Cleaning materials
One of the main preventive maintenance tasks for computer hardware devices is cleaning to remove
dust and debris build up.
Computer cleaning supplies in a cleaning kit should include:
a lint-free cloth
Ammonia-free glass cleaner. (Products with ammonia are suitable for CRT monitors which
have a glass screen but are not suitable for LCD monitors).
a small brush for cleaning dust
a can of compressed air for blowing away dust
antistatic wrist strap for use when working inside a computer case
mild detergent
TTLM Development Manual Date: 10-2011 Page 8
of 17
Author: ICT Sector Trainer Cezar B. Simon
HARAR POLY TECHNIC COLLAGE
There are also specialised computer cleaning kits available. For information about the different types
of kits available use the internet to search for “computer cleaning kit”.
Cleaning
Devices which need regular cleaning include:
keyboard
mouse
monitor
optical drives
printers
Computer hard drives are sealed devices and the hard drive assembly is designed to exclude dust
particles. They do not require any cleaning.
For all devices refer to the user manual for any specific manufacturer’s cleaning instructions.
Read the instructions on any specialized computer cleaning kits before use.
Hard drive maintenance
Hard drive maintenance tasks include:
Uninstall unwanted programs - For a Windows computer use Add/Remove Programs.
Remove unused files - For a Windows computer use Disk Cleanup. This utility searches for
unnecessary files such as Temporary Internet files and the Recycle bin and then deletes them.
Check for disk errors - For a Windows computer, open Windows Explorer and right click the drive
you want to check. Select Properties from the drop down menu and then select the Check Now
button in the Error-checking frame.
Defrag the hard drive - For a Windows computer, open Windows Explorer and right click the drive
you want to check. Select Properties from the drop down menu and then select the Defrayment Now
button in the Defragmentation frame.
Installing additional memory
One of the most cost effective upgrades which can be made to a computer is to install additional
memory (RAM). Consult your computer user manual to determine the correct RAM type for your
computer.
1. The computer should be on a flat location, clear of clutter.
2. Turn off the computer.
3. At the power point, turn off the switch and unplug the power cord.
TTLM Development Manual Date: 10-2011 Page 9
of 17
Author: ICT Sector Trainer Cezar B. Simon
HARAR POLY TECHNIC COLLAGE
4. Disconnect and remove peripheral devices.
5. Remove the computer cover.
6. Put the antistatic wrist strap on your wrist and connect the alligator clip to a metallic surface on
the computer case.
7. Hold the RAM module by the edges at each end, being careful not to touch the gold electrical
contacts on the bottom edge.
8. Align the notches in the memory module with the memory slot, and press down firmly at both
ends of the modules until the module is locked in.
9. Replace the computer cover.
10. Connect peripheral devices.
11. Turn power on at the power point.
12. Boot the computer.
13. Use an operating system utility to check that the new memory has been recognised. For a
windows computer use System Information.
Figure 1 – Adding additional memory
Corrective maintenance
Corrective maintenance is performed when a component or system is not working as expected.
Possible causes include:
hardware faults
software faults and issues
user error
TTLM Development Manual Date: 10-2011 Page
10 of 17
Author: ICT Sector Trainer Cezar B. Simon
HARAR POLY TECHNIC COLLAGE
Before proceeding with any maintenance, it is important you are aware of the conditions of any
warranty or service level agreements. With hardware devices you may void the warranty if you
attempt to replace internal hardware components.
Troubleshooting
Identify the possible cause of the problem
Ask questions to help you identify the possible cause. Questions to ask include:
What are the symptoms?
Are there any error messages or error tones? Some devices may report the fault and the
action to take.
Has any new software or hardware been added recently?
Basic checks
some basic checks to perform first include:
Is the device powered on – check power point is on and power leads are securely seated. If
the device has a power indicator, check it is on.
Check that signal cables are securely seated.
If the device is networked, check that the network cable is securely seated.
Hardware faults
If you suspect the problem is with a faulty hardware component, the most common method of testing
is to replace the component with a known good component.
Diagnostic tools
There is a range of diagnostic tools which can aid in troubleshooting. One of the best “tools” is a good
understanding of the processes which occur within a computer system, particularly the boot process
from turning the power switch on, to loading the operating system and software applications.
Power On Self Test (POST)
During POST, the BIOS performs testing of hardware components. If a device is faulty an error
message may be displayed. At this stage you can also check the computer’s BIOS settings to see if
the settings are the cause of the problem.
Operating system diagnostics
Once the operating system is loaded, it will also perform its own hardware test and load device
drivers for peripheral devices. If you are using a Windows operating system, Device Manager reports
on devices connected and their status.
TTLM Development Manual Date: 10-2011 Page
11 of 17
Author: ICT Sector Trainer Cezar B. Simon
HARAR POLY TECHNIC COLLAGE
Select computer hardware
When considering the purchase of computer hardware, it is important to firstly identify the needs of
the business. Once the business requirements have been identified, the technical specifications for
the computer hardware device can be used to compare different products.
Business requirements
When selecting computer hardware it is important to firstly identify the tasks the computer hardware is
required to perform. For example, a workstation required for video editing will have different
requirements to a workstation required for standard office applications, such as word processing.
Another example is a server - the processing power and storage capacity of the server will be
determined by the number of users it is required to service.
Warranty
When computer hardware devices are purchased, the supplier provides a guarantee that if a fault
develops in the equipment within a certain time, they will repair or replace it free of charge.
Organizations need to consider the warranty conditions before purchasing to ensure their business
needs will be met. Common warranty conditions include:
The length of the warranty – typically one or more years.
The actions needed to have the repairs undertaken. Either the repairs will be done on-site or
the equipment will need to be returned to the supplier, known as return-to-base.
How long the supplier has to make good any required repairs
Any exclusions to the warranty, such as damage caused to hardware by accidental damage.
Many computer hardware suppliers offer extended warranties at additional cost. For example, the
extended warranty may extend the period of cover from one year to three years. The level of service
purchased by an organisation will depend on how critical the device is to the IT system.
A Service Level Agreement (SLA) is an agreement which sets out the level of service and
maintenance to be provided.
Organizational policies
Some organizations have a policy of using preferred suppliers for computer hardware purchases.
This ensures the quality and consistency of computer hardware devices is maintained throughout an
organization.
A standard operating environment is a specification for computer hardware and software which
organizations develop to maintain consistency and reduce support costs. Many organizations such
as universities, publish their standard operating environment policies on the internet. For an example,
visit the Edith Cowan University Standard Operating Environment website
TTLM Development Manual Date: 10-2011 Page
12 of 17
Author: ICT Sector Trainer Cezar B. Simon
HARAR POLY TECHNIC COLLAGE
Total cost of ownership
The initial purchase price of a computer hardware device is only part of the total cost of the device,
over the lifetime of the device. Additional costs will include:
costs of hardware and software upgrades
costs of consumables. For devices such as printers, the cost of replacement print cartridges
over the lifetime of the device can often be greater than the initial purchase price.
maintenance costs
cost of technical support
cost of training
Support
Technical support is provided by manufacturers for users after the purchase of a computer hardware
device. Access to this support is commonly limited to users who have registered the purchase of the
product. Forms of technical support include:
telephone support
email support (usually with a guaranteed response time)
access to support on internet such as:
o frequently asked questions (FAQs)
o troubleshooting guide
o downloads of latest drivers and software updates
Compatibility
Compatibility is the ability of a system or a product to work with other systems or products without
special effort on the part of the customer. One way products achieve interoperability is to comply with
industry interface standards. For example, a memory module is compatible with a motherboard
because the manufacturer of the memory module and the motherboard both work to the same
industry standard.
Technical specifications
Once the business requirements have been considered, the technical specifications of the hardware
device need to be evaluated. Areas for evaluation include the following:
processing speed of the CPU
storage capacity of the hard drive
size of memory (RAM)
software capabilities
compatibility with existing systems
upgradeability
TTLM Development Manual Date: 10-2011 Page
13 of 17
Author: ICT Sector Trainer Cezar B. Simon
HARAR POLY TECHNIC COLLAGE
The technical specifications to be considered will depend on the computer hardware device to be
purchased. For example, technical specifications to be considered for a printer include:
interface – USB or network
resolution – measured in dots per inch
printing speed – measured in pages per minute
memory
paper capacity
Occupational Health and Safety (OH&S) Requirements and safe work
practices
In NSW, the OH&S legislation includes the Occupational Health and Safety Act 2000 and the
Occupational Health and Safety Regulation 2001. Work cover NSW has the responsibility for
administering this legislation.
Employers have a responsibility to provide a safe and healthy workplace for all employees. It also
requires all workers to be aware that they have a duty to follow safe work practices to prevent injuries
to themselves or other workers.
Organizations will develop procedures for safe working practices as a tool for implementing their
OH&S policies and training staff.
For further information click on the following link: Apply occupational health and safety procedures
Manual handling
Computer hardware devices and consumables such as printer paper boxes can be very heavy and
care should be taken when manually handling these objects.
Manual handling is one of the most common causes of accidents in the workplace. Workcover NSW
<<link to http://www.smartmove.nsw.gov.au >>
defines manual handling as:
“any activity that involves lifting, lowering, carrying, pushing, pulling, holding or restraining. It may also
include stretching, bending, sustained and awkward postures, and repetitive movements.”
Recommendations on practices to reduce the risk of manual handling injury at work include:
hold the load close to your body
store loads close to where they will be used
store heavy loads near waist height
use mechanical aids such a trolley when lifting heavy loads
don’t lift heavy loads when sitting down
TTLM Development Manual Date: 10-2011 Page
14 of 17
Author: ICT Sector Trainer Cezar B. Simon
HARAR POLY TECHNIC COLLAGE
To find the weight of a device refer to the device specifications in the user manual. Always check the
manufacturer’s recommendations before handling.
Safe electrical work practices
Computer hardware should be located close to a suitable electrical outlet. The use of long extension
cords is a trip hazard. If no power outlet is available, a new fixed power outlet may need to be
installed. Any fixed electrical installation is required by law to be installed by a licensed electrician.
Cables should be kept away from the floor, and a person’s workspace. Cables on the floor are easily
damaged by trolleys and chair castors.
Use switched power boards and not double adapters or piggy backed plugs.
Routinely inspect cables for any damage. Damaged cables should be disconnected and removed.
Testing and tagging refers to the practice of testing electrical equipment (which is designed for
connection by a flexible cord), by an appropriate person. If the equipment is compliant a tag is
attached which is marked with the name of the person or company who performed the test, and the
test date or retest date.
Any component such as a computer power supply which has a mains (240 volt) power connection
can only be opened and repaired by a qualified technician. CRT monitors can have very high
electrical potential levels even after they have been switched off and must only be opened by a
qualified technician.
Electrical circuits for fixed wiring are protected from overload by a circuit breaker. The circuit breaker
will trip if the circuit is overloaded. If this happens, it is an indication that the number of electrical
appliances on that circuit should be reduced.
TTLM Development Manual Date: 10-2011 Page
15 of 17
Author: ICT Sector Trainer Cezar B. Simon
HARAR POLY TECHNIC COLLAGE
Self Check 1 Written Test
Name:____________________ Date:_________________
Instruction: Answer all the questions listed below, if you have some clarifications- feel free to ask your
teacher.
Match the most appropriate peripheral device to A column from B column.
Column A Column B
1. System protection
2. Preventive Maintenance A. Generator
3. Protective Device B. Antivirus Programs
4. Electrical Problem C. Anti mal ware programs
5. Environmental Problem D. Surge protector
E. User Account
F. UPS
G. Update
H. Back up
I. Cleaning
J. Firewall
K. Black out
L. Brownout
M. Temperature
TTLM Development Manual Date: 10-2011 Page
16 of 17
Author: ICT Sector Trainer Cezar B. Simon
HARAR POLY TECHNIC COLLAGE
TTLM Development Manual Date: 10-2011 Page
17 of 17
Author: ICT Sector Trainer Cezar B. Simon