Install Computer Systems and Networks
Install Computer Systems and Networks
Install Computer Systems and Networks
computer
systems
and
networks
Plan and
prepare for
installation
Learning objective:
Upon completion of this chapter, you will be able to answer the following
questions:
1. Identify 5S of good housekeeping2.
2. Recognize safety rules and regulations3.
3. Plan installation of computer systems and networks according to
industry standards
SAFETY PROCEDURE is a common task. It is a general knowledge in our
workplace. In most cases, one must be trained to apply safety procedures in
particular place or in an environment of a certain work, such as factory where
there is heavy machineries, electronics and high voltage facilities.
SAFETY PROCEDURES may be able to promote a great stability of
accompany, to ensure safety of their own products, their facilities and most
especially their personnel during and after work responsibility. Therefore, it is
our goal and responsibility as a worker, in any field of our skills and even in
our great profession, to have these skill and knowledge for future application
in our workplace.
5S OF GOOD HOUSE KEEPING
S- sieri
/Sort
o Take out unnecessary items and dispose
S- seiton /Systematize
o Arrange necessary items in good order for use
S- seiso/ Sweep
o Clean your workplace
S- seiketsu/ Sanitize
o Maintain high standard of housekeeping
S- Shitsuke/ Self- discipline
o Do things spontaneously without being told
2. Remove and replace fuses only after the power to the circuit has been de
energized.
3. Make sure all equipment is properly grounded.
4. Use extreme caution when removing or installing batteries containing
acid.
5. Use cleaning fluids only in well- ventilated spaces.
6. Dispose of cleaning rags and other flammable materials in tightly closed
metal containers.
7. In case of an electrical fire, de energize the circuit and report it
immediately to the appropriate authority.
HIGH VOLTAGE SAFETY PRECAUTIONS
1. Consider the result of each act.
2. Keep away from live circuits.
3. Do not work alone.
4. Do not tamper with interlocks.
5. Do not ground yourself.
6. Never energize equipment in the presence of water leakage.
PERSONAL SAFETY PRECAUTIONS
1. Work only in clean dry areas.
2. Do not wear loose or flapping clothing.
3. Wear only nonconductive shoes.
4. Remove all rings, wristwatches, bracelets, ID chains and tags, and
similar metal items.
5. Do not use bare hands to remove hot parts.
6. Use a shorting stick to remove high voltage charges on capacitors.
7. Make certain that the equipment being used is properly grounded.
8. Remove power to a circuit prior to connecting alligator clips.
9. When measuring voltages over 300 volts, do not hold the test probes.
General Safety Safe working conditions help prevent injury to people and
damage to computer equipment. A safe workspace is clean, organized, and
properly lighted. Everyone must understand and follow safety procedures.
Follow the basic safety guidelines to prevent cuts, burns, electrical shock, and
damage to eyesight. As a best practice, make sure that a fire extinguisher and
first-aid kit are available in case of fire or injury. Poorly placed or unsecured
cables can cause tripping hazards in a network installation. Cables should be
installed
in
conduit
or
cable
trays
to
prevent
hazards.
There are certain procedures you should follow when you are installing items
in your system. Below is information to avoid damage to your system or/and
yourself.
Before entering the computer, move computer off the carpet (for static
purposes). If youre not able to then try not to move on the carpet to
keep the static from building.
Disconnect all cables including power cord. I can't stress this enough.
Remove the power cord, monitor, keyboard, mouse, phone line, network
cable, speakers, printer, scanner, USB cables, cable modem, DSL
modem and anything else that is connected. (it should look similar to
the picture below)
With everything disconnected, push the power button for 5 seconds.
(with power cord disconnected). The computer can store power even with
the power cord disconnected. Pushing the power button drains that
power (only if the power cord is disconnected). VERY IMPORTANT!!!
Touch something metal on the case of the system to release any static
build up in your body.
Computers are the best dust collectors. Do not blow on the dust with
your breath. Your breath has moisture and electronics hate moisture.
If you want to clean the inside of the system of dust, use compressed air
that is designed for electronics.
While using the compressed air, do not hold down the button. Not only
will they can get cold, moisture will also form. Use quick short bursts.
When handling parts, do not touch the bronze teeth. Hold the parts on
the edges if at all possible.
If you are troubleshooting noise issue, some people will stick a pencil or
other objects in the fan to stop the fan from turning to see if the noise
goes away. DON'T DO THAT! The fan might shatter the pencil, cause a
fire, cause electrical shock or short.
If you disconnect the cable that goes to the processor fan to check for
noise, do not leave system on for long with it disconnected.
Be careful while inside system, the system has sharp edges.
Never put your hands inside system when the system is either plugged
in or turned on.
Some computer desks have a compartment that you can put your
computer in. Make sure that compartment is well ventilated. If it is not
ventilated, it can fry the system. If it is not well ventilated, you can drill
holes in the desk to give it ventilation, or you can install a small fan in
the desk that will circulate air.
Do not connect or disconnect cables while the system or device is turned
on. (unless it is USB. USB can be disconnected or connected while
system is on). Equipment can be damaged by this.
****VERY VERY IMPORTANT NOTE****
If you have access to your personal files, make sure they are backed up before
tinkering with the system. Sometimes there can be more than one issue and
one of the issues may not show till you start tinkering with the system. For
example, I have seen a hard drive be bad but it works as long as the system is
on. However when you turn the system off, the hard drive doesn't work
anymore. Once that happens, you can't get access to your files.
damage.
ESD and EMI Electrostatic discharge (ESD), harsh climates, and poorquality sources of electricity can cause damage to computer equipment. Follow
proper handling guidelines, be aware of environmental issues, and use
equipment that stabilizes power to prevent equipment damage and data loss.
Static electricity is the buildup of an electric charge resting on a
surface. Electrostatic discharge (ESD) occurs when this buildup jumps to a
component and causes damage. ESD can be destructive to the electronics in a
computer system.
At least 3000 volts of static electricity must build up before a person can feel
ESD. For example, static electricity can build up on you as you walk across a
carpeted floor. When you touch another person, you both receive a shock. If
the discharge causes pain or makes a noise, the charge was probably above
10,000 volts. By comparison, less than 30 volts of static electricity can
damage a computer component.
ESD can cause permanent damage to electrical components. Follow these
recommendations to help prevent ESD damage:
Keep all components in antistatic bags until you are ready to install
them.
Use grounded mats on workbenches.
Use grounded floor mats in work areas.
Use antistatic wrist straps when working on computers.
Power Fluctuation Types Voltage is the force that moves electrons through a
circuit. The movement of electrons is called current. Computer circuits need
voltage and current to operate electronic components. When the voltage in a
computer is not accurate or steady, computer components might not operate
correctly. Unsteady voltages are called power fluctuations.
The following types of AC power fluctuations can cause data loss or hardware
failure:
caused by lightning strikes, but can also occur when the electrical
system comes back on after a blackout.
Power surge: Dramatic increase in voltage above the normal flow of
electrical current. A power surge lasts for a few nanoseconds, or onebillionth of a second.
CAUTION
UPS manufacturers suggest never plugging in a laser printer to a UPS because
the printer could overload the UPS.
Learning objective:
Upon completion of this module, the students will be able to
1. Identify different parts of the computer.
2. Define computer terms
ALU
Arithmetic Logic Unit, part of a microprocessor. It does all
arithmetic functions and calculation in the CPU.
ASCII
American Standard Code for Information Interchange, code
representing the character symbols possible for specific hexadecimal codes.
BIOS
Basic Input/Output System, the part of the operating system
that controls the input and output functions.
Bit
Board
a shortened reference to a printed circuit board or the insulated
surface on which circuit components are mounted and soldered in place.
Boot
Byte
Control Unit
decodes each instruction that enters the computer. It then
generates the necessary pulses to carry out the functions specified.
CP/M
Control Program for Microprocessors, the first operating
system developed for microcomputers.
CPU
Central Processing Unit, the heart of a system. It controls all
data transfer and devices in a microcomputer system.
DMA
Direct Memory Access, data transfer involving large blocks of
information directly between the memory and disk drives. DMA is controlled
by other processors which speeds up data transfer and unloads the central
processors of this function.
DOS
Disk Operating System, a software program used to set certain
parameters involving the operation of the computer system. To start it up
especially data transfer and the disk drives.
Hardcopy a print out or a visual copy on paper.
I/O
short for Input/Output, any operation or device that sends or
receives data from or to the CPU.
IC
short for Integrated Circuit, building blocks of a computer
system or other electronics devices comprising many electronics parts such as
transistors, resistors, etc. in a single package.
Interrupt an input signal to the processors that sets the order to initialize
all system devices for operation.
Kilo
LSI
Large Scale Integration, describes the intensity of integration
commonly used in microprocessors, comprising many ICs.
Mainframe computers the largest and most expensive computers designed
specifically to serve business, industry, and government in applications that
require mass storage and fast retrieval.
Example: Banks, airlines, and the Internal Revenue Service use mainframe
Computers
Mega
Memory
the part of a computer that stores vital information for the
computers operation.
Microcomputers the smallest and least expensive computers, designed for
desktop or portable use by an individual at home, yet versatile enough for
applications in business, industry, and government
Example:
Microcomputers enjoyed early popularity in the home for both
educations and playing electronic games, but as microcomputers expand in
powers such as multi-tasking and multi-user applications, their use in
business and industry increases.
Microprocessor the arithmetic logic unit, registers, and timing and
decoding circuitry usually contained in a single integrated circuit that controls
computer activities.
Minicomputers medium-sized and medium-priced computers that rival
the storage capacity and operating speed of smaller main-frames, and are
used in business, industry, and government where they perform mostly
dedicated or single-task activities.
Example: Food processors, laboratories, and hospitals use minicomputers
Peripheral any device or accessory such as a disk drive, printer, modem, or
video display added to a microcomputer to provide increased capacity for
handling, storing, or presenting data.
POR
Power On Reset, or power on routing, term to describe the
sequence of operations of a machine during power up.
Programs contain the instructions that tell the computer what to do. It is
a sequential set of instructions to solve a particular problem.
Prototype the first of its kind, the original from which later models are
patterned.
RAM
Random Access Memory, data can either be read from or written
to (read/write).
Read
Reset
a short pulse during power up of perform control function in
computer, used to initialize all system devices for operation.
ROM
Read Only Memory, data can only be read from this type of
memory. It cannot be altered and contains the basic operating instruction of
the computer.
Unix
the operating system used by the IBM PC, having a more
powerful command structure and greater expandability than CP/M
Write
to put data into a device.
Computer Acronyms
ACE
- Asynchronous Communication Element
ACPI
- Advance Configuration and Power Interface
ADC
- Analog-to-Digital Converter
ADO
- Active Data Object
ADSL
- Asymmetric Digital Subscriber Line (variant of DSL)
AGP
- Accelerated Graphics Port
ALU
- Arithmetic Logic Unit
AMR
- Audio Modem Riser
API
- Application Programming Interface
ASCII
- American Standard Code for Information Interchange
ATA
- Advanced Technology Attachment
BCD
- Binary Coded Decimal
BEDO RAM - Burst EDORAM
BIOS
- Basic Input Output System
BIU
- Bus Interface Unit
CGI
- Common Gateway Interface
CAD
- Computer Aided Design
CMOS
CPU
CRT
DMA
DTE
DDR
DIMM
DLL
DNS
DOS
DRAM
DSL
DVD
EDO
EPROM
FAT
FRAM
FDD
FSB
FTP
GIF
GPRS
GSM
GUI
HDD
HTML
HTTP
IC
IBM
ICT
IDE
I/O
IP
IRQ
IT
ISA
JFET
JPEG
LAN
LED
LBA
LSB
MAN
MB
MHz
MIDI
MPEG
MODEM
MPU
NTFS
OCR
OS
PATA
PC
PCB
PCI
PIC
PPI
PDF
PNG
PnP
PS/2
RAID
RAM
RMW
R/W
ROM
RGB
SATA
SCSI
SDRAM
SRAM
SVGA
SMART
SSRAM
TCP/IP
URL
USB
VGA
VIRUS
WAN
WAP
Wi-Fi
WLAN
www
Speakers
deliver
voice,
Ventilation characteristics
Total drive capacity
Portability
Mounting methods for the printed Circuit boards
Footprint(the amount of desk space the case takes up)
With this list of characteristics. PC case designs fall into four basic styles:
3. Towers Tower cases are designed to sit vertically on the floor beneath
a desk to provide more usable workspace on the desktop. Mini towers
and mid towers are short towers designed to take up less vertical
space. Tower cases also can be placed on a desktop. Internally, their
design resembles a vertical desktop unit. They are considerably less
expensive than the larger towers because of the smaller amount of
materials needed to produce them. Unlike their taller relatives, mini
towers do not provide abundant space for internal add-ons or disk
drivers.
4. Portables
(laptops) To free
users from the
desk, an array of
portable PCs have
been
developed
these
units
package
the
system unit, input
units, and output unit into a
single, lightweight package that can be carried along with the user. The
capabilities of modern portable computers make them the equivalent of
desktop or tower units in most respects.
Adapter cards Interface cards used to enhance the basic system with
additional functions. Examples of common adapter cards include video
display adapters, modems, and Local Area Network (LAN) cards.
Form factor
Form factor is a term used to describe specifications for physical dimensions
and electrical compatibility that enables components from different
manufactures to work together.
In a PC, from factor is used to describe system board and adapter card sizes,
mounting hole patterns for system boards and power supplies, microprocessor
placement, and airflow.
These factors determine whether component
(Such as a system board) will fit properly with component
(Such as a system unit case) and connect to component
(Such as a power supply).
You should be aware of the three major active form factors: ATX, BTX, and
NLX.
1. The Advanced Technology Extended (ATX) form factor was introduced
in the mid 1990s as an upgrade to the IBM PC-AT standard that had
become the pseudo standard form factor for PCs. It continues to be
most widely used form factor currently in use with PC components.
2. The Balanced Technology Extended (BTX) form factor is a newer
scalable form factor specification that provides for a wide range of
system sizes and profiles. Its main goal is to establish components
Process Management
Main Memory Management
File Management
I/O System Management
Secondary Management
Networking
Protection System
Command-Interpreter System
PROCESS MANAGEMENT
A process is a program in execution: (A program is passive, a process active.)
A process has resources (CPU time, files) and attributes that must be
managed.
Management of processes includes:
Communication
Deadlock handling
Debugging
FILE MANAGEMENT
A file is a collection of related information defined by its creator. Commonly,
files represent programs (both source and object forms) and data.
The operating system is responsible for the following activities in connections
with file management:
File creation and deletion.
Directory creation and deletion.
Support of primitives for manipulating files and directories.
Mapping files onto secondary storage.
File backup on stable (nonvolatile) storage media.
I/O MANAGEMENT
NETWORKING
PROTECTION
SYSTEM PROGRAMS
Modifying the Operating System program for a particular machine. The goal is
to include all the necessary pieces, but not too many extra ones.
System Calls
A System Call is the main way a user program interacts with the Operating
System.
Shared Memory
Example of MS-DOS.
Application Programming
Resident System Programming
MS-DOS Drivers
ROM - BIOS Device Drivers
A LAYERED STRUCTURE:
Example of Windows 2000
System Services
Windows
Security
VM
Process
MGR
Reference
Manager Manager
& GDI
Monitor
IO
Graphics
Manager
Device
Windows 2000 Kernel
Drivers
Hardware Abstraction Layer (HAL)
Virtual Machine
In a Virtual Machine - each process "seems" to execute on its own processor
with its own memory, devices, etc.
The resources of the physical machine are shared. Virtual devices are
sliced out of the physical ones. Virtual disks are subsets of physical
ones.
Useful for running different OS simultaneously on the same machine.
Virtual User
Virtual Machine
Monitor Mode
Physical User
Physical Machine
DOS APPLICATION
BIOS DRIVERS Physical
Windows XP
User
Physical
Machine
Install
Equipment
Device
System
You have a new computer and are ready to set it up. While this may seem like
an overwhelming and difficult task, it is actually quite simple. It doesn't
matter what brand of computer you have because most computers are set up
in a similar way.
If you're setting up a newly purchased computer that's still in the box, you'll
probably find a how-to guide in the packaging that includes step-by-step
details. However, even if it didn't include instructions you can still set up the
computer in a few easy steps. In this lesson, we'll go through the different
steps needed to set up a typical computer.
Setting up a desktop computer
Step 1
Unpack the monitor and computer case from the box. Remove any plastic
covering or protective tape. Place the monitor and computer case where you
want on a desk or work area.
Step 2
Locate
the
image
cable,
you
Step 3
covered
it.
Many
way.
you
Step 4
Step 5
Unpack the mouse and determine
whether it uses a USB (rectangular)
connector or a PS/2 (round)
connector. If it uses a USB connector,
plug it into any of the USB ports on
the back of the computer. If it uses a
PS/2 connector, plug it into
the green mouse port on the back of
the computer.
If your keyboard has a USB port, you
can connect your mouse to the
keyboard instead of connecting it
directly to your computer.
If you have a wireless mouse or keyboard, you may need to connect a
Bluetooth dongle (USB adapter) to your computer. However, many computers
have built-in Bluetooth, so a dongle may not be necessary.
Step 6
If you have external speakers or headphones, you can connect them to your
computer's audio port (either on the front or the back of the computer case).
Many computers have color-coded ports.
Setup complete
Your basic computer hardware is now set up. Before you start it up, spend
some time arranging your workspace. A workspace that is arranged well
can improve your productivity and promote health.
Challenge!
1. When the computer power on, black screen appear on you monitor, wait
until the message appears briefly at the bottom of the screen.
example of the massage at the bottom of the computer boot up screen:
2. From the boot up screen message above, we know that the key need to
press to enter the BIOS setup is [F2] key. Now press [F2] key to enter the setup
program. This key may be vary from one machine to other machine, because
this is key base on the manufacture of the BIOS Setup program.
Note: Other key that commonly used to enter the CMOS setup (BIOS setup)
Delete key.
Esc key.
F1 key.
F2 key.
F3 and F2 key.
F10 key.
Ctrl + Alt + Esc key.
Ctrl + Alt + S key.
How to change the boot sequence.
3. Press [F2] key until you see the BIOS Setup Utility screen, then go to
the Boot Option tab then change the Boot sequence to CD-ROM drive as the
first boot device.
NOTE: Use the < + > key to move the CD-ROM Drive up. Make sure that you
read help menu on or blow the window screen
B. Processing
D. Storing
It is the process of storing or retaining the data or information or
instructions, so that the user can retain and retrieve it whenever required.
Capability to store information after processing.
Storage are used to store programs and data when they are not being used in
memory.
E. Controlling
It is the process of directing the manner and sequence in which all the
operations are to be performed.
Background programs
One of the most common reasons for a slow computer are programs running
in thebackground. Remove or disable any TSRs and startup programs that
automatically start each time the computer boots.
Tip: To see what programs are running in the background and how much
memory and CPU they are using, open Task Manager. If you are
running Windows 7 or higher, run Resmon to get a better understanding of
how your computer is being used.
If you have an antivirus scanner on the computer, spyware protection
program, or another security utility, make sure it is not scanning your
computer in the background. If a scan is in progress, it can decrease the
overall performance of your computer. If this is the case, allow the scan to
complete and the computer's performance should improve afterwards.
Delete temp files
Today, spyware and other malware is a big cause of many computer problems,
including a slow computer. Even if an antivirus scanner is installed on the
computer, we recommend running a malware scan on the computer. Use the
free version ofMalwarebytes to scan your computer for malware.
Scan for viruses
If your computer is infected with one or more viruses, this can cause your
computer to run slow. If your computer does not have an antivirus program
installed, you can run Trend Micro's free Housecall online utility to scan for
viruses on your computer, as well as remove them. It is also recommended
that you install an antivirus program for active protection against viruses.
Hardware conflicts
Verify that the Device Manager has no conflicts. If any exist, resolve
these issues as they could be the cause of your problem.
Update Windows
Make sure you have all the latest Windows updates installed on the
computer.
If you are on the Internet when your computer is slow,make sure all
browser plugins are up-to-date. You can also try disabling browser plugins to see if one of them is causing the slowness.
Update your drivers
Make sure you have the latest drivers for your computer hardware, especially
the latest video drivers. Having out-of-date drivers can cause an assortment of
issues, including slow performance.
Reboot computer again
If you have done any of the above steps but your computer is still acting slow
try rebooting the computer again at this point.
Memory upgrade
If you have had your computer for more than two years, you may need more
memory. Today, we suggest computers have a minimum of 1GB ofmemory
(RAM) for 32-bit system and 2GB for a 64-bit system. By having enough
memory for programs to run within memory, your computer will not need to
computer have?
What type of computer memory to use in a memory upgrade?
all the above options do not work to speed up your computer, it will just run
slower than a newer computer.
Windows 8
1. Open the Control Panel
2. Click the "Taskbar" icon.
3. On the "Taskbar" tab, click the
"Customize"
button
next
to
"Notification area".
4. Scroll down in the list until you see the "Volume" option and speaker
icon. On the right side, in the drop-down list, make sure "Show icon and
notifications" is selected. If it is not, select this option.
If the drop-down list is grayed out, uncheck the box for "Always show all
icons and notifications on the taskbar" to allow you to change the dropdown list selection.
5. If you changed the selection in the drop-down list, click OK in that
window and the Taskbar Properties window and close out of the Control
Panel.
Windows Vista or 7
1. Open the Control Panel
2. Click the "Taskbar and Start Menu" icon.
3. On the "Taskbar" tab, in the "Notification area" section, click the
"Customize" button.
4. Scroll down in the list until you see the "Volume" option and speaker
icon. On the right side, in the drop-down list, make sure "Show icon and
notifications" is selected. If it is not, select this option.
If the drop-down list is grayed out, uncheck the box for "Always show all
icons and notifications on the taskbar" to allow you to change the dropdown list selection.
5. If you changed the selection in the drop-down list, click OK in that
window and the "Taskbar and Start Menu Properties" window and close
out of the Control Panel.
Windows XP
1. Open the Control Panel
2. Open the "Sounds and Audio Devices" icon.
3. Verify the "Place volume icon in the taskbar" checkbox is checked. If this
option is not available or is grayed out, skip to the next section of this
document.
4. If you were able to check this box, click OK and close out of this window
and the Control Panel.
5. Double-click the sound icon in the Systray and verify that all the sound
volumes are mid-way or higher.
Conflicts section
If conflicts exists with your sound card or other devices installed in your
computer, it is likely that either the drivers are not properly installed for that
device or the sound card or other devices are conflicting. If you open the
properties of the device that is conflicting and view the properties, additional
details about the conflict can be found. Additional information about error
codes, as well as help with Device Manager, can be found on our Device
Manager section.
If you are unable to locate additional information about your issue or are
unable to resolve the issue, follow the steps below.
1. Under "Sound, video and game controllers", highlight each device
and press the delete key to remove the device.
2. Reboot the computer.
3. As the computer is booting, the system will detect the sound card and
any of its devices and reinstall those devices. If prompted for a location
of drivers, try pointing it to your sound card CD or your Windows CD. If
this does not work or is unable to locate the proper files, you need to get
the latest sound drivers from your sound card manufacturer.
Other devices section
If Other devices are listed, these could be the sound card or another
conflicting device. If any other devices are listed, it is recommended you
remove those devices, reboot the computer and let Windows re-detect the
devices.
If this does not work, determine what device is not being detected and resolve
that issue first.
Missing sound card section.
If you are missing the "Sound, video and game controllers" category in Device
Manager, it is likely that the sound card drivers are not installed properly,
sound card has been disabled, sound card is bad, or no sound card is
available in the computer. First, verify no conflicts or other devices are present
in the Device Manager. If these are present, it is likely they are the sound card
or devices causing the sound card not to be detected. Second, verify that the
computer has a sound card and that the sound card is enabled on the
computer.
If this is an on-board sound card, you can verify that it is enabled in
the CMOS setup.
If you have no adapters or cannot click the down arrow to select the correct
adapter, close out of this window. In the Control Panel, double-click the
System icon, click theDevice Manager tab within Device Manager, and ensure
there are no yellow ! or red X.
If you have either of these on any of your sound devices, remove everything
under "Sound, video and game controllers" and reboot the computer. If after
rebooting the computer you still have the same conflicts, double-click on the
conflicting device and refer to our Device Manager error code section for
additional information on the error code you are experiencing.
Verify speaker connections
Verify the speaker settings and speakers are not at fault by running
through computer speaker troubleshooting.
If your computer monitor was on and you stepped away from the computer,
then upon returning, it was black, it is likely that the computer is asleep. Try
moving your mouse, clicking the mouse buttons, or pressing any key (space
bar) on the keyboard to wake it up.
3. Connections not properly connected
If the monitor has a light on the front, but that status light is orange or
flashing, make sure the monitor is not in a suspend mode by moving the
mouse or pressing a key on the keyboard. If this does not help, turn the
computer and monitor off and reconnect the data cable on the back of the
computer and, if removable, on the back of the monitor. Turn the computer
and monitor back on. If you still encounter the same issue, continue reading
through the other possibilities.
6. Hardware Issue
If you have followed the above recommendations and still have the same issue,
your computer may have either a bad video card or monitor. The best method
of determining this is to do one or both of the suggestions below.
Disconnect your monitor and connect it to another computer. For
example, try connecting it to a friend or family's computer or a computer
at a service center.
Borrow a computer monitor and connect it to your computer.
If your monitor works on another computer, it is safe to assume that the video
card or potentially the motherboard in the computer is bad.
In addition to testing the printer using the printer self-test Microsoft Windows
users can also perform a software self-test to determine if their computer can
see the printer and it's able to print. Follow the steps below to perform this
test.
A.
frozen
Computer
F. Hardware issues
1. Bad Port
If the previous solutions did not solve the problem, try another mouse. If that
mouse works, try the mouse that is not working with another computer. If
multiple mice do not work, the likely issue is the port you are connecting the
mouse to. If you are using the PS/2 or USB port on the back of the computer,
the motherboard is potentially bad and would need to be replaced.
2. Bad Mouse
If the mouse does not work with more than one computer, the mouse is bad
and should be replaced. If you are using a wired mouse, check the mouse
wire. If the wire has been partially cut or is frayed, this is likely the cause of
the mouse not working. Replace the mouse if this is the case.
G. Corrupt operating system files
If all of the above solutions do not resolve the issue, there is a possibility of
corrupt system files in the operating system. You may need to run an
operating system repair using the system installation disc.
Another option, and possibly less drastic, is to activate a restore point in the
operating system prior to when the mouse stopped working. This restore point
can restore the corrupt system files to a working state and resolve the issue.
B. Third-party hardware
D. Bad battery
If your computer is a laptop or portable computer that utilizes a battery for
mobility, it may be causing your issue.
If your computer powers on when the cable is connected to the portable
computer, but not when it is disconnected, we recommend you purchase
a new battery.
If your computer does not power on when the battery is connected and
when the power cable or charger cable is connected, try removing the
battery and seeing if the computer can power on with only the power
cable connected. If no power is still received, skip to the final section.
Adapter resources
Verify that the network adapter is properly installed and detected by the
computer with no conflicts. If you're using Microsoft Windows check in Device
Manager and verify there are no errors and "Network adapters" is present with
each network adapter installed in the computer listed, similar to the example
on the right.
Verify connections
Wired Network
Adapter functionality
Verify that the network card is capable of pinging itself by using the ping
command. Windows users can ping the computer from a Windows command
line. Unix and Linux users can ping from the shell.
To ping the card or the localhost, type either
ping 127.0.0.1
or
ping localhost
Doing either of the above commands should get replies from the network card.
If you receive an error or if the transmission fails the network card is not
physically installed into the computer correctly, has the incorrect drivers, or
that the card is bad.
ping 192.168.1.1
If you get replies back from the router, the connection between your router and
computer are good, and you can skip to the next step.
If you do not receive any replies back from the router either the router is not
setup properly or your connection between the router and the computer are
not correct. Reset your router to make sure it is not a problem with your
router by following the steps below.
ping google.com
Running the above command should get a reply from Google. If you get a reply,
this is an indication that the Internet is working, but you may be encountering
a problem with the Internet browser you are using to browse the Internet. Try
an alternative browser such as Firefox or Chrome.
If you're getting no reply from Google, your router or modem is not reaching
the Internet. If you have a router, make sure your router has DHCP enabled
and that theWAN or Gateway address is the proper ISP address.
Finally, after verifying all of the above settings if your Internet is still not
working we suggest contacting the ISP to make sure it is not a problem on
their end and to assist you further with any special configurations that may
not be mentioned in this document.
Additional troubleshooting
Another method of determining network issues is to use the tracert
command if you are a Windows user or the traceroute command if you are a
Linux or Unix variant user. This command gives you an overview of each of the
devices (routers) a packet travels (hops) over a network and can give you an
idea of where a problem exists in your network or outside of your network.
To use this command you must be at the command line and type one of the
below commands depending on your operating system.
tracert google.com
or
traceroute google.com
If run successfully you should begin to see each hop between the computer
and network devices. When the connection fails, determine what device is
causing the issue by reviewing the traceroute listing.
working just fine, but now, seemingly without reason, it is doing something
strange.
For instance, your Word document will no longer show the top margin of
your document. It still says it's there, and when you print it, there's not a
problem. You just can't see it on your monitor. If this is happening, you
may want to restart your computer. Conducting an internet search for the
type of problem you're experiencing or consulting your user manual may
help you as well.
Using System Repair Software
If you have computer problems, chances are, system repair software can help
you fix it. Most of these applications can repair operating system problems
that lead to the Blue Screen of Death. They can also replace missing or
damaged DLL files. System repair software can also free up space you need for
another application, and it can optimize your computer so it runs faster. It
may even identify problems you're having with applications, but it depends on
the software you use and the application that's having problems.
POST stands for Power On Self Test. This is generally the first or second thing
that appears on a computer after turning on the power. This appears before
the operating system begins to load. The POST will display any problems found
with hardware that makes the computer unable to boot, POST may also
display problems with hardware that allow the computer to boot, but not
operate at its full capacity during operation.
Step 2: Notice the load time of the OS (operating system). A longer than
usual load time may indicate seek errors (or other errors) in the hard drive.
Step 3: Notice any graphics problems once the OS has loaded. Reduced
graphics may indicate driver failures or hardware failures with graphic cards.
Step 6: Check any newly installed software. Software may require more
resources than the system can provide. Chances are that if a problem begins
after software starts, the software is causing it. If the problem appears directly
upon startup, it may be caused by software that starts automatically on boot.
Step 10: Check for the problem in safe mode. As a last ditch effort, check
the problem in safe mode. To enter safe mode, tap F8 repeatedly during POST
(this works on most systems). If the problem persists in safe mode, it is a fair
bet that the operating system itself is to blame.
4. The microphone that came in the motherboard box can be plugged into
the pink jack that matches it's pink plug.
5. If you will be using a wireless home network be sure to connect the WiFi antenna into the Wi-Fi Antenna In jack at the bottom of the I/O panel.
The antenna came in the motherboard box.
Most motherboards do not come with a wireless antenna, which means
you would have to buy and install a separate wireless network card in
your computer.
That is another great reason I recommend the Asus M2N32
motherboard.
Most scanners and printers are connected via a USB cable to a USB jack
on the I/O panel.
6. Connect the printer through a USB port or through a parallel port.
7. Attach the monitor.
If you are using an old, bulky CRT monitor you will attach the monitor
cable to the analog jack on the externally exposed panel of the video
card.
If you are using a flat-panel LCD monitor you should use the provided
DVI cable to plug in to the DVI jack on the video card.
Some monitors come with a DVI adapter to add to the end of the monitor
cable in order to plug into the DVI jack.
You can attach a flat-panel monitor to the analog jack, but the picture
quality won't be nearly as good so don't do that.
You have now installed all the components. You computer is essentially fully
assembled. You are not done yet however. There are still plenty of things to do
before your computer is ready for use.
The next thing we need to do is take the computer for a short spin to make
sure everything works properly.
DIAGNOSING
AND
TROUBLESHO
OTING
COMPUTER
SYSTEM
Plan and
prepare for
diagnosis
of faults of
computer
systems
Peopleware
Firmware
Software
Hardware
Static(ESD)
Electricity
Peopleware
Untrained personnel would probably damage programs in PC.
Firmware
Programs or software burnt in chips may be corrupted.
Software
Corrupted operating systems would cause the system to fail.
Hardware
Defective hardware components would lead to computer
malfunction.
Hardware conflicts and viruses can hinder your computers
performance.
ESD (Electro Static Discharge)
Electro static discharge can easily damage sensitive components
in your computer.
Electricity
Incoming supply from AC outlet must be regulated, power surges
can damage computer units.
Problem Isolation
Component Isolation
This section will aid in determining components in your system
which are failing. First, most systems have 3 major components;
monitor, system unit, and printers. Some have multiple external
devices. To troubleshoot, you need to isolate major components
which are failing to operate.
Anti-static mat
Hand Tools
A hand tool is a device for performing work on a material or a physical system
using only hands. The hands tools can be manually used employing force, or
electrically powered, using electrical current. Examples of Hand Tools:
Hex driver - sometimes called a nut driver, is used to tighten nuts in the same
way that a screwdriver tightens screws.
Needle-nose plier
Wire cutter
Part retriever
Part retriever - used to retrieve parts from location that are too small for your
hand to fit.
Flashlight
Lint-free cloth
Compressed air - used to blow away dust and debris from different computer
parts without touching the components.
Cable ties
Cable ties - used to bundle cables neatly inside and outside of a computer.
Parts organizer
Parts organized - used to hold screw, jumpers, fasteners and other small parts
and prevents them from getting mixed together.
Diagnostic Tools
Computers are easier to use and more dependable with each new generation of
hardware and operating system update, but that doesn't mean they're
problem-free. Here's the most popularb tools for diagnosing your computer
problems:
Multimeter
Multimeter -used to test the integrity of circuits and the quality of electricity in
computer components.
Loopback Adapter
A multimeter
A multimeter or a multitester, also
An eraser can be used of cleaning the RAM, a memory chip of the PC.
Paint brush
brush 1 (brsh)
n.
1. a. A device consisting of bristles fastened into a handle, used in scrubbing,
polishing, or painting.
b. The act of using this device.
2. A light touch in passing; a graze.
3. An instance of contact with something undesirable or dangerous: a brush
with the law; a brush with death.
4. A bushy tail: the brush of a fox.
5. A sliding connection completing a circuit between a fixed and a moving
conductor.
6. A snub; a brush off.
A vacuum
2.
To vacuum is to clean using a tool that sucks dirt or other elements into a
storage container. (verb)
An example of vacuum is to clean the dirt off the carpet using a vacuum cleaner.
A soldering gun
A Phillips screw driver is primarily used to fasten and unfasten screws with a
star-like hole in their heads.
A screwdriver
A screwdriver is a tool for driving screws or bolts with special slots, and
sometimes for rotating other machine elements with the mating drive system.
The screwdriver is made up of a head or tip, which engages with a screw,
a mechanism to apply torque by rotating the tip, and some way to position and
support the screwdriver. A typical hand screwdriver comprises an
approximately cylindrical handle of a size and shape to be held by a human
hand, and an axial shaft fixed to the handle, the tip of which is shaped to fit a
particular type of screw. The handle and shaft allow the screwdriver to be
positioned and supported and, when rotated, to apply torque. Screwdrivers are
made in a variety of shapes, and the tip can be rotated manually or by
an electric motor or other motor.
The flat head is also one of the most abused tools, often substituted for any
number of other tools that might not be available. The fact is the flat head
screwdriver is quite useful for more than tightening screws. Used for light
prying, scraping, nudging or holding it can be pretty versatile. Treat it too
badly, though, and it'll snap, leaving you with a fishing weight in your
toolbox.
Goggles or safety glasses
Goggles or safety glasses are forms of protective eyewear that usually enclose
or protect the area surrounding the eye in order to prevent particulates, water
or chemicals from striking the eyes. They are used in chemistry laboratories
and in woodworking. They are often used in snow sports as well, and
in swimming. Goggles are often worn when using power tools such
as drills or chainsaws to prevent flying particles from damaging the eyes. Many
types of goggles are available as prescription goggles for those with vision
problems.
A glove
A glove (Middle English from Old English glof) is
a garment covering the whole hand. Gloves have
separate sheaths or openings for each finger and
the thumb; if there is an opening but no covering
sheath for each finger they are called "fingerless
gloves". Fingerless gloves with one large opening
rather than individual openings for each finger are
sometimes called gauntlets. Gloves which cover the
entire hand or fist but do not have separate finger
openings or sheaths are called mittens. Mittens
are warmer than gloves made of the same material
because fingers maintain their warmth better
when they are in contact with each other. Reduced
surface area reduces heat loss.
LAN tester
An antistatic
wrist
strap, ESD
wrist
strap,
or ground
bracelet is
an antistatic device used to
safely ground a
person
working
on
very
sensitive electronic equipme
nt, to prevent the buildup
of static electricity on their
body, which can result
in electrostatic
discharge (ESD). It is used
in the electronics industry
by workers working on electronic devices which can be damaged by ESD, and
also sometimes by people working around explosives, to prevent electric
sparks which could set off an explosion. It consists of a stretchy band of
fabric with fine conductive fibers woven into it, attached to a wire with a clip
on the end to connect it to a ground conductor. The fibers are usually made of
carbon or carbon-filled rubber, and the strap is bound with a stainless steel
clasp or plate. They are usually used in conjunction with an antistatic mat on
the workbench, or a special static-dissipating plastic laminate on the
workbench
surface.
A crimping tool
A crimping tool is a tool designed to crimp or connect a
connector to the end of a cable. For example, network
cables and phone cables are created using a crimping
tool to connect the RJ-45 and RJ-11 connectors to the
end of the cable. In the picture to the right, is an
example of what a crimping tool looks like. This example
shows a tool capable of crimping both RJ-11 and RJ-45
connectors.
A soldering iron
Safety precautions
Proper preparation is the key to a successful built. Before you
begin, make sure that you have the tool you will need, and secure a
clear well-lit workplace. Gather all the components youll be using
and unpack them at the same time. Find a dry, well-ventilated
place to do your work, you should choose an area without carpets,
because it tends to create static electricity. Always keep in mind
that personal protection is one of the traits of a good technician.
Preventive Maintenance
Maintenance is keeping something in working order. It includes
repair, testing, adjusting, and replacing parts of a computer or a
peripheral.
Types of Preventive Maintenance
Active
Passive
Active this is carried out before problems develop in a computer
unit.
Passive this is carried after problems have developed in the
computer unit.
Accident reports
Forms used to give specific details with regards to the accidents happed
in the laboratory during experiments.
Accident reports contain the following details:
Name of the person injured
Date and time of the accident
Type of injury
First aid given
Action taken to prevent further accidents
Electrical safety