Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
17 views6 pages

TTLM

The document outlines a 60-hour learning module for Information Technology Support Service Level II, focusing on the maintenance of computer hardware. It covers topics such as identifying hardware components, establishing location requirements, monitoring network threats, and implementing maintenance practices. The module includes various learning and assessment methods to ensure competency in caring for network and computer hardware.

Uploaded by

dereje
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views6 pages

TTLM

The document outlines a 60-hour learning module for Information Technology Support Service Level II, focusing on the maintenance of computer hardware. It covers topics such as identifying hardware components, establishing location requirements, monitoring network threats, and implementing maintenance practices. The module includes various learning and assessment methods to ensure competency in caring for network and computer hardware.

Uploaded by

dereje
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

LEARNING MODULE 04

TVET PROGRAMME TITLE: Information Technology Support Service Level II


MODULE TITLE: Caring for network and computer hardware
MODULE CODE: ICT ITS2 04 0514
MODULE DURATION: 60Hr
MODULE DESCRIPTION:
This module defines the competence required to maintain computer hardware. It includes
locating sitting of hardware for safe and efficient utilization and reducing risk of infection.
LEARNING OUTCOMES: At the end of the module the learner must be able to:
 Identify computer hardware components
 Establish location requirements for hardware and peripherals
 Monitor threats to the network
 Establish maintenance practices
MODULE CONTENTS:
1. Hardware basics
Overview Computer system components
Hardware
Software
Overview of Hardware components
Peripherals devices
Input devices
I/O devices
Output devices
Ports , Connectors, and Cables
Internal Vs External ports
Serial Vs Parallel ports
Identifying port’s gender
Male Ports
Female Ports
PS/2, RJ-11, RJ-45 and VGA ports.
USP ports
Identify cables and their functions
Keyboard and mouse
Standard keyboard layout
Keyboard Interfaces
Introduce mouse types
Mouse interfaces
Common keyboard and mouse symptoms
Troubleshooting mouse and keyboard problems
An inside look of a system unit
Power Supply
Motherboard
Processor/CPU
Memory

2. Power Supply Unit


Understanding a Power supply unit
Identifying a power supply unit and its function
Define the current and voltage requirement for a computer power supply unit.
Identifying power problems and protection
Common power problems
Power Quality Problem
Power fluctuation
Electromagnetic Interference
Too Much Power
Power Spike
Power Surge
No-enough Power
Power Sag
Brownout
Blackout
Protection against power problems
Line conditioner
Stabilizer
Surge suppressor
Uninterruptible Power Supply(UP)
Stand by UPS
On line UPS
The typical voltages supplied by the power supply
3.3 volts
± 5 volts
± 12 volts
3. Motherboard and chipsets
Introduction to Motherboard and their components
Motherboard form factors
AT[ full and baby]
ATX
Cause of a motherboard problems
Safely remove and replace a motherboard
4. Expansion slots and Expansion Cards
Identify the different types of Expansion bus.
ISA
PCI
IDE
USB
AGP
Working on Expansion slots
ISA and EISA
PCI
AGP
Identify the most common expansion cards and their function
Modems Card
Ethernet Network Cards
Graphics Cards
Sound Card
TV card
Add and remove the common expansion cards
Common Expansion cards and slots symptoms

5. Memory
Identify basic concepts related to computer memory
Internal Vs External Memory
Volatile Vs Non-Volatile Memory
Random Access Memory(RAM) specification
Memory packages
Memory Banking
6. Processor/CPU
Identify the type of CPU's manufacturer, their product types, and advantage and
limitation.
Intel
AMD
Cyrix
CPU specifications
Manufacturer
Speed
Socket type
Cause of CPU problems
Over heating
Static Discharge
Bent or Broken pins
Common CPU symptoms
Troubleshooting CPU problems
7. Storage Devices
Overview of Primary and Secondary storages
Types of storage devices
Hard Drives
Introduction to Hard Drives
Definition of different types of Hard Disk Drives, including their advantages and
Disadvantages
Hard Drives Specifications
Common Hard Drives symptoms
Floppy Disk and Drives
Introduction to Floppy disk Drives
Floppy Disk Capacities
Common Floppy Drives symptoms
Troubleshooting Floppy Drives problems
CD-R, CD-ROM, CD-RW, DVD and their Drives
Introducing CD-R, CD-ROM, CD-RW, and DVD Corresponding with their Drives
Drives Specifications
8. Drives Interfaces
Introduction to Device interfaces and their functions
SCSI
IDE/EIDE
ATA/SATA etc
9. Fans and Cooling Devices
The importance of heat management
Cooling Methodologies
10. Installing, Upgrading and Configuring Software and Span filters
Upgrading application and driver Software
Configuring Software security setting
Identify types of Spam
Install and Configure Spam filter
Install third-part utilities
Use third-party software or utilities
Evaluate and report system security
Review logs and audit reports to identify security threats
11. Working on Preventive Maintenance
Preparing Proper location and suitable Operation environment
Providing Proper electric power and protection
Develop a backup Strategy
Scheduling Preventive maintenance
Acquiring appropriate Preventive maintenance tools
Making a preventive maintenance
Hard Drive preventive maintenance
Scan your Hard Drive for errors
Check for virus
Recognize a dying Hard Drive
Defrag Hard Drive
Good PC house Keeping
Clean your computer case
Clean your mouse
Clean you monitor
Clean your CD, DVD Drives and other component
LEARNING METHODS:
 Discussion
 Lecture
 Demonstration
 Project
 Practical exercise
ASSESSMENT METHODS:

 Continuous assessment(test, group work, etc)


 Quiz
 Assignments
 Project work
 Final-exam
ASSESSMENT CRITERIA
LO1. Identify computer hardware components

1.1 External hardware components and peripherals are identified based on business
requirement
1.2 Internal hardware components are identified as needed
1.3 Requirements specified by hardware manufacturers are reviewed, recorded and
applied where appropriate.
1.4 Quality standards of hardware components and associated peripherals are
determined and recorded
1.5 Relationship of computer hardware and software is determined and established for
proper functioning of the system
1.6 Safe work practices are determined, recorded and applied, taking into account legal
and manufacturer requirements
LO2. Establish location requirements for hardware and peripherals

2.1 Suitable environmental conditions are determined and applied for hardware and
peripherals
2.2 General orientation and proper functioning of different computer platforms are
considered in locating computer
2.3 System protection devices are determined and applied to keep hardware form
damage.
2.4 Requirements are determined and applied when moving hardware.
2.5 Suitable storage principles are determined and applied for hardware and associated
peripherals and media.
2.6 Business requirements are considered and applied in respect of hardware
location
2.7 Functions of computer hardware and associated OHS standards and
environmental concerns are considered
LO3. Monitor threats to the network

3.1 Use third-party software or utilities to evaluate and report on system security
3.2 Review logs and audit reports to identify security threats
3.3 Carry-out spot checks and other security strategies to ensure that procedures are
being followed
3.4 Investigate and implement inbuilt or additional encryption facilities
3.5 Prepare and present an audit report and recommendations to appropriate person
3.6 Obtain approval for recommended changes to be made
LO4. Establish maintenance practices

4.1 Maintenance requirements specified by the equipment manufacturer are


determined.
4.2 Maintenance schedules including removal of dust and grease build -up are
produced
4.3 Diagnostic functions including replacing suspect components with other
serviceable components and reloading of associated software are performed
4.4 Software security settings to prevent destructive software from infecting the
computer are configured
4.5 Unserviceable components are determined whether replaceable through warranty,
replacement or upgrade
4.6 Diagnostic functions are performed using the operating system and third-party
diagnostic tools

You might also like