Unit of Competency: Implementing Maintenance Procedures
Unit of Competency: Implementing Maintenance Procedures
Unit of Competency: Implementing Maintenance Procedures
Power supplies and monitors contain very high voltage. Do not wear the antistatic
wrist strap when replacing power supplies or monitors. Also, some printer parts
might become very hot when in use, and other parts can contain very high voltages.
Make sure that the printer has had time to cool before making the repair. Check
the printer manual for locations of various components that can contain high
voltages. Some components might retain high voltages even after the printer is
turned off.
Identify Safety Procedures to Protect Equipment from Damage and Data
from Loss
Static electricity is the buildup of an electric charge resting on a surface.
This buildup and sudden release of energy, called electrostatic discharge
(ESD), can be destructive to the electronics in a computer system.
ESD, harsh climates, and poor-quality sources of electricity can cause
damage to computer equipment. Follow the proper handling guidelines, be
aware of environmental issues, and use equipment that stabilizes power to
prevent equipment damage and data loss.
ESD Protection Recommendations
ESD can cause permanent damage to electrical components. Follow
these recommendations to help prevent ESD damage:
Keep all components in antistatic bags until you are ready to
install them.
Use grounded mats on workbenches and on the work area floor.
Use antistatic wrist straps when working on computers.
Avoid working on carpeted areas if possible.
Climate also affects risks when working with computer equipment. Consider the
following recommendations:
If the environment temperature is too high, equipment can overheat.
If the humidity level is too low, the chance of ESD increases.
If the humidity level is too high, equipment can suffer from moisture
damage.
Power Fluctuation Types
The following types of AC power fluctuations can cause data loss or
hardware failure:
Blackout: Loss of AC power. A blown fuse, damaged transformer, or downed
power line can cause a blackout.
Skilled use of tools and software makes the job less difficult and ensures
that tasks are performed properly and safely
In addition to hardware tools, software tools are also available that help
diagnose problems and determine which computer device is not functioning
correctly.
Identify Hardware Tools and Their Purpose
o A tool kit should contain all the tools necessary to complete hardware
repairs. Using the wrong tool for a job might lead to bodily injuries or
result in equipment damage. As you gain experience, you will learn
which tools to have available for different types of jobs. Hardware
tools are grouped into the following four categories:
ESD tools
Hand tools
Cleaning tools
Diagnostic tools
ESD Tools
There are two common ESD tools:
o Antistatic wrist strap: Protects computer
equipment from ESD damage when grounded
to a computer chassis.
o Antistatic mat: Used to stand on or to place
hardware on to prevent static electricity from building up, thereby
protecting the equipment from ESD damage.
Hand Tools
Most tools used in the computer assembly process are small hand
tools. They are available individually or as part of a computer repair
tool kit.
The list that follows describes the small hand tools that you will most
commonly use:
Flat head screwdriver: Used to loosen or tighten slotted screws.
Phillips head screwdriver: Used to tighten or loosen cross-head screws.
Torx screwdriver: Used to tighten or loosen screws that have a star-like
depression on the top, a feature that is mainly found on laptops.
4. Hex driver: Sometimes called a nut driver, this tool is used to tighten
nuts in the same way that a screwdriver tightens screws.
Disk management tools help detect and correct disk errors, prepare a
disk for data storage, and remove unwanted files.
Disk management software includes the following:
F disk: A command-line tool used to create and delete partitions on a
hard drive and set active, or boot, partitions
Format: Used to prepare a hard drive to store information
Scandisk or Chkdsk: Used to check the integrity of files and folders
on a hard drive by scanning the disk surface for physical errors
Defrag: Used to optimize space on a hard drive to allow faster
access to programs and Data
Disk Cleanup: Used to clear space on a hard drive by searching for
files that can be safely deleted
Disk Management: Used to manage hard drives and partitions,
initialize disks, create partitions, and format partitions
Protection Software Tools
Each year, viruses, spyware, and other types of malicious attacks
infect millions of computers. these malicious attacks can damage an
operating system, application, and data. Computers that have been
infected can experience hardware performance problems or
component failure.
To protect data and the integrity of the operating system and
hardware, you should use software designed to guard against attacks
and to clean out malicious programs.
Here is a list of various types of software used to protect hardware
and data. Examples of protection software tools include the following:
Windows XP Security Center: Allows you to check the status of essential
security settings on the computer. The Security Center continuously checks
to make sure that the software firewall and antivirus programs are running.
It also ensures that automatic updates are set to download and install
automatically.
Antivirus software: Protects a computer against virus attacks that can
infect other computers.
Spyware remover: Protects against software that sends information about
web surfing habits to an attacker. Spyware can be installed without the
knowledge or consent of the user.
• Baby AT
• Full-size AT
2) modern form factors:
• ATX
• Micro-ATX
• Flex ATX
Central Processing Unit
CPU, also called
microprocessor or simply
processor, is the brain of PC.
It performs the system’s data processing activity like
calculation, comparison, etc.
It is the most expensive single component in the system, costing four
or more times than the motherboard it plugs into.
The first CPU was created in 1971 by Intel. It is called the 4004.
Brain of PC: it directly or indirectly controls the functions and activities of
your computer. It transmits information between devices and tells the
devices what to do. This is done by sending control information.
Major producers of CPU are:
Intel
AMD
Cyrix
Sparc
Troubleshooting
1. If the CPU does not work, the system gives beep sounds when turned on.
The number of beeps varies
2. from BIOS to BIOS. On AMI BIOS, five beeps indicate CPU problem. Visit
the internet for list of such errors.
Replacing and Upgrading CPU
1. Upgrade: installing another device which is better than the previous one in
terms of performance. Poor upgrade may lead to total failure.
2. Replace: substitute with equivalent device in case the previous one failed.
3. One thing to consider when we replace/upgrade CPU is the CPU socket on
your motherboard.
Three most common sockets are:
Types of RAM
DRAM
This memory id dynamic. Because of this, it must be constantly refreshed
periodically (every few milliseconds). Otherwise the memory will drain and
the data is lost. During the process of refreshing, the CPU can’t access the
memory. It is called wait state.
The memory cells in DRAM use tiny capacitors that retain charge. Capacitors
are devices that can keep charge for some time until discharged. They use
one transistor per bit.
Note: there are 256million transistors in 256MB RAM chip.
SRAM
It is called because it does not require periodic refreshing unlike DRAM. It
is much faster than DRAM and able to keep pace with processor. As long as
there is power, SRAM keeps what is stored.
SRAM uses transistors for storage purpose, no capacitors are used. Because
of this, no recharging required. SRAM is used to build cache memory.
Type speed density cost
DRAM slow high low
SRAM fast low high
RAM Modules
There are two types of RAM
modules (memory packages)
Single Inline Memory
Module(SIMM)
Dual Inline Memory
Module(DIMM)
SIMM
SIMMs are available in two forms:
Apply Maintenance procedure
Maintenance procedure should be done by
- Considering organizational policy
- Considering SLA
- Referring documentation regarding their handling and maintenance
requirement.
Maintenance of computer system includes:
- Checking system event logs regularly
- Viewing post results
- Checking the dust accumulation, particularly around funs.
- Updating operating system and application software with the latest service
packs.
Maintenance schedule specifies
- Each preventive maintenance task that should be completed.
- How often task should be repeated
- An estimate of the time required to complete the task.
System documentation
- Outlines the manufacturers recommended maintenance procedures.
- Defines how often maintenance procedures should be done
- Specifies any equipment/material/ consumables that are required for the
maintenance.