TTLM
TTLM
5. Memory
Identify basic concepts related to computer memory
Internal Vs External Memory
Volatile Vs Non-Volatile Memory
Random Access Memory(RAM) specification
Memory packages
Memory Banking
6. Processor/CPU
Identify the type of CPU's manufacturer, their product types, and advantage and
limitation.
Intel
AMD
Cyrix
CPU specifications
Manufacturer
Speed
Socket type
Cause of CPU problems
Over heating
Static Discharge
Bent or Broken pins
Common CPU symptoms
Troubleshooting CPU problems
7. Storage Devices
Overview of Primary and Secondary storages
Types of storage devices
Hard Drives
Introduction to Hard Drives
Definition of different types of Hard Disk Drives, including their advantages and
Disadvantages
Hard Drives Specifications
Common Hard Drives symptoms
Floppy Disk and Drives
Introduction to Floppy disk Drives
Floppy Disk Capacities
Common Floppy Drives symptoms
Troubleshooting Floppy Drives problems
CD-R, CD-ROM, CD-RW, DVD and their Drives
Introducing CD-R, CD-ROM, CD-RW, and DVD Corresponding with their Drives
Drives Specifications
8. Drives Interfaces
Introduction to Device interfaces and their functions
SCSI
IDE/EIDE
ATA/SATA etc
9. Fans and Cooling Devices
The importance of heat management
Cooling Methodologies
10. Installing, Upgrading and Configuring Software and Span filters
Upgrading application and driver Software
Configuring Software security setting
Identify types of Spam
Install and Configure Spam filter
Install third-part utilities
Use third-party software or utilities
Evaluate and report system security
Review logs and audit reports to identify security threats
11. Working on Preventive Maintenance
Preparing Proper location and suitable Operation environment
Providing Proper electric power and protection
Develop a backup Strategy
Scheduling Preventive maintenance
Acquiring appropriate Preventive maintenance tools
Making a preventive maintenance
Hard Drive preventive maintenance
Scan your Hard Drive for errors
Check for virus
Recognize a dying Hard Drive
Defrag Hard Drive
Good PC house Keeping
Clean your computer case
Clean your mouse
Clean you monitor
Clean your CD, DVD Drives and other component
LEARNING METHODS:
Discussion
Lecture
Demonstration
Project
Practical exercise
ASSESSMENT METHODS:
1.1 External hardware components and peripherals are identified based on business
requirement
1.2 Internal hardware components are identified as needed
1.3 Requirements specified by hardware manufacturers are reviewed, recorded and
applied where appropriate.
1.4 Quality standards of hardware components and associated peripherals are
determined and recorded
1.5 Relationship of computer hardware and software is determined and established for
proper functioning of the system
1.6 Safe work practices are determined, recorded and applied, taking into account legal
and manufacturer requirements
LO2. Establish location requirements for hardware and peripherals
2.1 Suitable environmental conditions are determined and applied for hardware and
peripherals
2.2 General orientation and proper functioning of different computer platforms are
considered in locating computer
2.3 System protection devices are determined and applied to keep hardware form
damage.
2.4 Requirements are determined and applied when moving hardware.
2.5 Suitable storage principles are determined and applied for hardware and associated
peripherals and media.
2.6 Business requirements are considered and applied in respect of hardware
location
2.7 Functions of computer hardware and associated OHS standards and
environmental concerns are considered
LO3. Monitor threats to the network
3.1 Use third-party software or utilities to evaluate and report on system security
3.2 Review logs and audit reports to identify security threats
3.3 Carry-out spot checks and other security strategies to ensure that procedures are
being followed
3.4 Investigate and implement inbuilt or additional encryption facilities
3.5 Prepare and present an audit report and recommendations to appropriate person
3.6 Obtain approval for recommended changes to be made
LO4. Establish maintenance practices