CBLM
CBLM
Conducting
Competency Assessment
EARIST
Nagtahan, Sampaloc Manila
Competency-Based Learning Materials
Conducting Competency
Assessment
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 2
01
Table of Content
Table of Content …………………………………………………………..………………
3
Information Sheet 4.1-1. Plan and prepare for maintenance and repair ……..
11
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 3
01
Self-Check 4.1-4 …………………………………………………………………
43
Information Sheet 4.1-5 Inspect and test the computer systems and networks
……………………………………………………………………………………………...45
Welcome!
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 4
01
Sheets. Follow and perform the activities on your own. If you have
questions, do not hesitate to ask for assistance from your facilitator.
Remember to:
Training Methodology I
List of Competencies
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 5
01
Networks.
MODULE CONTENT
INTRODUCTION:
LEARNING OUTCOMES
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 6
01
Plan and Prepare for Maintenance and Repair
Maintain Computer Systems and Networks
Diagnose Faults of Computer Systems
Correct Defects in Computer Systems
Inspect and Test the Computer Systems and Networks
ASSESSMENT CRITERIA:
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 7
01
16. Conducts thorough inspections of computer systems and networks to
identify potential issues or vulnerabilities.
17. Demonstrates proficiency in using testing tools and techniques to
verify the functionality and performance of computer systems.
18. Applies security testing to identify and address any vulnerabilities or
weaknesses in the system.
19. Conducts comprehensive testing after maintenance and repair
activities to ensure proper functioning.
TECHNICAL TERMS
OHS – Occupational Health and Safety
Port hub/Port – Is a connector on the back of a computer or other
device. A port is either a serial port or a parallel port.
Modem – (Modulator-Demodulator) The modem is a device that
allows a given computer to share data or otherwise a device which let
computers exchange information.
USB – Universal Serial Bus
Scanner – Is an input device that read text or illustration printed on a
paper, translates the information into a form that a computer can
use.
Printer – Is a piece of hardware that produces a paper copy (also
known as ‘hardcopy’) of the information generated by the computer.
Flash drive – A portable storage device which is plug directly to the
USB port.
Network - A group of computers and associated devices that are
connected by communication facilities.
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 8
01
OS (Operating System) – Software that controls the allocation and
use of programs and data that a computer uses.
Software – Programs and data that a computer uses.
Planning – Is both the organizational process of creating and
maintaining a plan’ and the psychological process of thinking about
the activities required to create a desired future on some scale.
Computer system – The complete computer made up of the CPU,
memory and related electronics (main cabinet), all the peripheral
devices connected to it and its operating system. Computer systems
fall into two broad divisions: clients and servers. Client machines fall
into three categories from low to high end; laptop, desktop, and
workstation. Servers range from small to large: low-end servers,
midrange servers and mainframes.
Defragmentation – The process of reorganizing and rewriting files so
that they occupy one large continuous are on your hard disk.
CRT – (Cathode Ray Tube) A display device used in computer
monitors and television sets.
Boot Sector – The part of the formatted disk containing the operating
system loading a program.
Virus – A program intended to damage your computer system without
your knowledge and permission.
ASSESSMENT CRITERIA
1. Demonstrates the ability to identify maintenance and repair needs
based on system requirements.
2. Shows an understanding of safety protocols and considerations
during maintenance and repair activities.
3. Demonstrates proficiency in performing routine maintenance tasks,
such as software updates, antivirus scans, and system optimization.
4. Shows the ability to effectively manage software and license
updates, ensuring compliance and security.
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 9
01
CONTENTS:
1. Plan and Prepare for Maintenance and Repair.
2. Maintain Computer Systems and Networks.
3. Diagnose Fault of Computer Systems.
4. Rectify/Correct Defects in Computer Systems.
5. Inspect and Test the Computer Systems and Networks.
ASSESSMENT METHOD
Written examination
Oral interview
Demonstration
LEARNING EXPERIENCES
Learning Outcome Organize Assessment
Activity
Learning Activities Special Instructions
Read Information Sheet 4.1-1.
Maintenance and Diagnosis of
faults.
Answer Self-Check 4.1-1.
Check your answer using the
Answer Key No. 4.1-1.
Answer Self-Check 4.1-2.
Check your answer using the
Answer Key No. 4.1-2.
Read Information Sheet No.
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 10
01
4.1-3. Materials
Answer Self-Check 4.1-3.
Check your answer using the
Answer Key No. 4.1-3.
Read Information Sheet No.
4.1-4. OHS policies and
procedures
Answer Self-Check 4.1-4.
Check your answer using the
Answer Key 4.1-4.
Read Information Sheet No.
4.1-5. Computer systems and
networks.
Answer Self-Check 4.1-5.
Check your answer using the
Answer Key No 4.1-5.
Learning Objective:
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 11
01
How important is planning and conducting maintenance of computer
and network system?
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 12
01
Two General Type of Maintenance
A. Preventive Maintenance
Is given for maintaining equipment and
facilities in satisfactory operating condition to
extend the life of the equipment.
B. Corrective Maintenance
Is task performed to identify, isolate, and
rectify a fault so that the failed equipment or
system can be restored to an operational condition.
A. Planned Maintenance
Is any variety of scheduled maintenance to
an object or item of equipment.
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 13
01
5. Treat your computer properly.
6. Blow out dust inside of your computer system using
compressed air/ or a vacuum that blows air outward.
7. Don’t smoke or eat/ drink around your computer.
8. Don’t leave laptops plugged in all the time.
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 14
01
issues, improve performance, and enhance the
overall stability of the computer system.
3. Hardware Inventory
Maintaining an inventory of computer
hardware components, including details such
as make, model, serial numbers, and
warranty information. This helps in tracking
hardware assets, planning for replacements or
upgrades, and ensuring timely maintenance
or repair of faulty components.
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 15
01
common computer issues. This may include
diagnostic software, hardware testing tools,
and specialized utilities for system analysis
and troubleshooting.
7. Security Measures
Implementing security measures such as
firewalls, antivirus software, and intrusion
detection systems to protect the computer
system from malware, unauthorized access,
and other cybersecurity threats. Regular
updates and patching of security software are
also essential for maintaining a secure
computing environment.
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 16
01
Self-Check 4.1-1
Direction: Choose the letter of the correct answer. Read each question
carefully.
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 17
01
C. Establishing a regular maintenance schedule
D. Avoiding backups of important data
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 18
01
8. Why is it important to establish a regular maintenance schedule for
computers?
A. To make maintenance unpredictable and random
B. To avoid maintenance and repair altogether
C. To ensure timely updates, scans, and optimizations
D. To increase the chances of system failures
10. How does planning and preparing for computer maintenance benefit an
organization?
A. It increases the cost of repairs
B. It leads to system failures
C. It improves system performance and reduces downtime
D. It makes maintenance and repair more challenging
1. D 6. D
2. C 7. B
3. C 8. C
4. B 9. C
5. A 10. C
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 19
01
Information Sheet No. 4.1-2
Maintain Computer Systems and Networks
Assessment Criteria:
1. Appropriate personal protective equipment are used in conformity
with the standard procedures.
2. Periodic maintenance of the equipment is performed following
manufacturer’s requirements.
3. Established procedures are followed in case of repair and parts
replacements.
4. Accidental events or conditions are responded to in accordance
with the established standards.
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 20
01
Tools and Equipment Used to Protect the Use and the Computer
System
Anti-Static Devices
Devices designed to protect the computer from static electricity.
Examples:
1. Anti-Static Wrist Strap
2. Anti-Static Mat
3. Anti-Static Bag
4. Anti-Static Spray
Daily Schedule
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 21
01
▪ Update virus and spyware definitions.
▪ Do incremental backup – backup updated files for each date.
▪ Reboot upon crash – Reboot the computer to fix your pc upon crash.
Weekly
▪ Full virus and spyware scan.
▪ Complete backup of files.
▪ Patch up – Get latest software update for your operating system.
Monthly
▪ Clean your PC inside and out.
▪ Defrag your hard drive to speed up its operation.
Yearly
▪ Check your programs – clean up unused programs.
▪ Reformat your hard drive and reinstall the operating system.
▪ Make a full diagnostic check on hardware and software.
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 22
01
Assessment Criteria:
1. Appropriate personal
protective equipment are used
in conformity with the
standard procedures.
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 23
01
2. Periodic maintenance of
the equipment is performed
following manufacturer’s
requirements.
3. Established procedures are
followed in case of repair and
parts replacements.
4. Accidental events or
conditions are responded to in
accordance with the
established standards.
Assessment Criteria:
1. Appropriate personal
protective equipment are used
in conformity with the
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 24
01
standard procedures.
2. Periodic maintenance of
the equipment is performed
following manufacturer’s
requirements.
3. Established procedures are
followed in case of repair and
parts replacements.
4. Accidental events or
conditions are responded to in
accordance with the
established standards.
Maintaining computer systems and networks involves overseeing,
servicing, and optimizing hardware, software, and other related systems to
ensure secure and efficient operation. Here are the main activities involved:
Hardware Maintenance
This may involve physical cleaning, replacement of damaged parts,
and ensuring that each component is functioning properly.
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 25
01
Software Maintenance: Regular updates and patches need to be installed to
keep the software up-to-date and secure. It also includes troubleshooting
software errors, maintaining servers, and ensuring data backups.
Network Maintenance
This includes monitoring network performance, ensuring network
security, resolving network issues, and upgrading network infrastructure as
required.
Proactive Monitoring
Regular checks are performed to identify potential issues and fix them
before they cause significant downtime.
Regular Backups: Maintaining consistent backups of data to prevent loss in
case of failures.
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 26
01
Securing Systems
This involves putting measures in place to protect sensitive
information from security threats.
Self-Check 4.1-2
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 27
01
B) Electronic System Design
C) Electro Static Discharge
D) Enhanced System Development
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 28
01
A) Full virus and spyware scan
B) Complete backup of files
C) Reboot upon crash
D) Defrag your hard drive
1. C
2. C
3. C
4. C
5. A
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 29
01
6. B
7. C
8. C
9. B
10. B
Learning Objective:
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 30
01
1. Exhibits strong problem-solving skills in diagnosing hardware and
software issues;
2. Demonstrates the ability to use diagnostic tools and techniques to
identify faults accurately;
3. Shows proficiency in analyzing error messages, logs, and system
behavior to pinpoint the root cause of issues; and
4. Applies systematic approaches to troubleshoot and isolate faults in
computer systems.
Computer Diagnosis
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 31
01
connection flapping? Are websites
reachable by IP address but not by name?
Are there any error messages indicating what
type of error was encountered? Based on
your answers to these questions you can
begin to make educated guesses as to the
cause. Gather detailed information.
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 32
01
Use your technical expertise to isolate
and explain the cause of the problem. Some
in depth investigation and diagnostic tools
will probably be required. This step
is described in more detail below.
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 33
01
When you believe the steps of the
action have been fulfilled, try to re-create
the error. Observe the results of the
implementation. Is the problem gone? If not,
repeat steps 4, 5, and 6.
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 34
01
1. Slow connection.
Despite boasting fast connection speeds, both
wireless and wired connections can still get
down for a few reasons:
∙ Your device is located far from the router
∙ Your bandwidth is spread too thin,
especially if there are plenty of devices
connected doing data-hungry applications
and tasks
∙ Peak hours where people connect all at
once, thereby causing congestion (e.g. urban
areas, libraries, hotels, etc).
2. No connection at all.
You might lose your connection entirely due
to:
∙ Glitches in the router or modem
∙ Complete service outage, be it because of
the weather, construction work, or power
problems
3. Service fluctuations.
4. Equipment failure.
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 35
01
Your modem or router can be damaged,
possibly as a result of power outages
frying the wires. You may also have outdated
equipment in your hands that
needs upgrading.
5. Operator error.
Self-Check 4.1-3
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 36
01
Direction: Read each question carefully before selecting your answer.
Choose the most appropriate response from the options provided.
1. What is the first step in the basic common diagnostic procedure for
computer problems?
A) Identify the affected area
B) Establish what has changed
C) Identify the symptoms and potential causes
D) Establish the most probable cause
4. What is the next step after establishing the most probable cause in
computer diagnosis?
A) Determine if escalation is necessary
B) Implement an action plan and solution
C) Test the result
D) Identify the results and effects of the solution
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 37
01
5. What should be done after devising a resolution in computer
troubleshooting?
A) Test the result
B) Document the solution and process
C) Identify the results and effects of the solution
D) Identify the affected area
7. What should be done after identifying the results and effects of the
solution in computer troubleshooting?
A) Establish what has changed
B) Document the solution and process
C) Test the result
D) Identify the affected area
10. What is the purpose of the last step in the basic common diagnostic
procedure for computer problems?
A) Test the result
B) Identify the results and effects of the solution
C) Document the solution and process
D) Determine the affected area
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 38
01
1. C
2. A
3. D
4. C
5. B
6. B
7. C
8. B
9. B
10. C
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 39
01
Rectify/Correct Defects in Computer Systems and Networks
Learning Objective:
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 40
01
performed specifically to prevent faults from occurring. Maintenance is
divided into (2) two general type.
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 41
01
Preventive Maintenance (PM)
Is given for maintaining equipment and facilities in satisfactory
operating condition to extend the life of the equipment. Corrective
maintenance is task performed to identify, isolate, and rectify a fault so that
the failed equipment or system can be restored to an operational condition
within the tolerances or limits.
Maintenance Procedures
In preparing maintenance procedure, you must consider designing a
systematic plan for both hardware and software. This saves time, money,
and frustration and ensures safe conditions to prevent injury to people and
damage to computer equipment.
4. Solution Development
Based on the root cause analysis, develop an appropriate
solution or corrective action plan to address the defect. This could
involve applying software patches, updating drivers, reconfiguring
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 42
01
settings, replacing faulty hardware components, or implementing
system optimizations.
5. Solution Implementation
Implement the identified solution or corrective action plan. This
may require making changes to the system configuration,
installing updates or patches, or replacing hardware components.
It is important to follow best practices and guidelines specific to
the type of defect being addressed.
8. Continuous Monitoring
Regularly monitor the computer system after the defect has
been rectified to ensure that the solution remains effective. This
includes ongoing performance monitoring, system maintenance,
and addressing any new issues that may arise.
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 43
01
▪ Deleting the temporary files on your computer will enhance its speed
and will create more disk space for your files. Update anti-virus and
spyware.
▪ Regularly update your anti-virus for your computer protection against
viruses.
1. Computer Issues. Know that your computer is going to fail. You need
to treat your computer as if it were a doomed failure. Always assume
that failure is imminent. A fatal error results in data loss, damage to
your computer and/or its ability to function, hardware failure, or
other serious issues.
3. RAM Issues. Know your computer’s specifications and its limits. RAM
runs even the PC is running idly. It consumes RAM storages capacity
making you difficult to open a program if RAM storage had been
consumed.
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 44
01
6. Warning Issues. If the same error message shows up every time you
log in, be sure to investigate it. Although unlikely, these errors could
be important.
7. Usage Issues. Give your computer a break. Believe it or not, your
computer likes rest, too. Leaving it on all the time wears out hardware
and put unnecessary wear and tear on the hardware. Giving your
computer a break also saves you money (electrical bills).
8. Warranty Issues. Always take advantage of warranties. Get a
warranty to protect your hardware, so it can be replaced in case of
failure.
9. Backup Issues. Back-up everything. Run regular backup of your
important files to other disks, computers, or an online backup service.
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 45
01
There are some of the most common PC problems:
▪ Computer will not turn on.
▪ Blue screen of death (BSOD)
▪ 404/ Page not found error
Self-Check 4.1-4
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 46
01
D) By performing maintenance only when faults occur
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 47
01
10. How can computer system failure be prevented according to the
guidelines?
A) Assume failure is not imminent
B) Keep the computer physically dirty
C) Avoid regular backups
D) Take advantage of warranties on parts
Answer Key 4.1-4
1. B
2. B
3. B
4. B
5. C
6. C
7. C
8. B
9. C
10. D
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 48
01
Information Sheet No. 4.1-5
Inspect and Test the Computer Systems and Networks
Assessment Criteria:
1. Final inspections are undertaken to ensure that the testing conducted on
the device conforms with the manufacturer’s instruction/manual
2. Computer systems and networks are checked/tested to ensure safe
operation.
3. OHS standards and 5S principles are followed according to enterprise
policies
4. Work site is cleaned and cleared of all debris and left in safe condition in
accordance with company procedures
5. Excess components and materials are disposed of based on WEEE directives
and 3Rs waste management program.
6. Report is prepared and completed according to company requirements
Contents:
1. Testing Computer Systems
2. Occupational Health and Safety Policy
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 49
01
LEARNING EXPERIENCES/ACTIVITIES
1. Read the attached Information You can ask the assistance of your trainer
Sheet 4.5-1 on Testing Computer explain further the topics you cannot
System understand
2. Answer Self-Check 4.5-1 on Try to answer the Self-Check without looking
Testing Computer System at the information sheet
3. Compare your answer to
Answer Key 4.5-1
4. Read the attached Information You can ask the assistance of your trainer
Sheet 4.5-2 on Occupational explain further the topics you cannot
Health and Safety Policy understand
5. Answer Self-Check 4.5-2 on Try to answer the Self-Check without looking
Occupational Health and Safety at the information sheet
Policy
6. Compare your answer to
Answer Key 4.5-2
2
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 50
01
INFORMATION SHEET 4.5-1
Learning Objective:
Introduction:
You’ve set up all your network switches, plugged in all the cables, and
configured all your computers. One task remains before you can declare
your network finished: You must verify that the network works as expected.
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 51
01
Monitor Power
Video Card Cord Cable
Interface Cable
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 52
01
4. Power supply
a. Power cord
b. Fuse
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 53
01
2. Application Software
a. Check for live updates
3. Anti-virus software
a. Run ant-virus program
b. Check for virus signature updates
c. Check for spyware updates.
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 54
01
Test Your Firmware
Firmware – it is a combination of hardware and software integrated on a
chip.
How do you test your firmware?
Example: Check for the correct configuration on your firmware, you can
accomplish this by configuring the BIOS in the computer.
Inspect and Test the Computer Systems and Networks – It refers to the
process of evaluating and examining computer systems and networks to
assess their performance, functionality, and security. It involves conducting
thorough inspections and performing various tests to ensure that the
systems and networks are operating optimally and meeting the desired
standards.
1. Inspection of Hardware
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 55
01
a. Physically examine computer hardware components
such as processors, memory modules, storage devices,
and peripheral devices to ensure they are properly
connected, functioning correctly, and free from any
physical damage or defects.
3. Performance Testing
a. Conduct performance tests to evaluate the speed,
responsiveness, and overall performance of the
computer systems and networks. This may involve
running benchmark tests, stress tests, or load tests to
assess the system's capabilities under different
conditions.
4. Functional Testing
a. Perform functional tests to verify that all software
applications and hardware components are
functioning as intended. This includes testing input
and output devices, software functionalities, network
connectivity, and system integration.
5. Security Assessment
a. Evaluate the security measures in place to protect the
computer systems and networks. This includes
conducting vulnerability assessments, penetration
testing, and reviewing access controls to identify any
potential security weaknesses or vulnerabilities.
6. Network Testing
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 56
01
a. Assess the performance and reliability of the network
infrastructure, including routers, switches, firewalls,
and wireless access points. This involves testing
network connectivity, bandwidth capacity, latency,
and network security protocols.
7. Documentation
a. Maintain detailed documentation of the inspection
and testing processes, including the procedures
followed, the results obtained, and any identified
issues or recommendations for improvement. This
documentation serves as a reference for future
evaluations and helps track the progress of system
performance and security over time.
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 57
01
SELF-CHECK 4.5-1
Testing Computer System
2. Give the four (4) Computer Hardware and its peripherals for checking.
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 58
01
ANSWER KEY 4.5-1
1. Hardware
2. Software
3. Firmware
4. Computer Monitor and its peripherals
5. Keyboard and Mouse
6. Power Supply
7. I/O port and devices
8. Operating System
9. Application Software
10. Anti-virus software
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 59
01
INFORMATION SHEET 4.5-2
Learning Objective:
Introduction:
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 60
01
Safety practices should be learned early and always adhered to when
working with any electrical device, including personal computers and
peripherals. This is for the protection of not only the people working with
them, but also for the devices themselves. The basic for this process begins
with your Occupational Health and Safety Policies.
Personal Safety While Working Along with PC’s
While working inside your computer, do not attempt to service the computer
except as explained in this guide and elsewhere in product documentation.
Always follows the instructions closely.
The following are some precautionary measures to take before working with
any computer equipment:
Before you start to work on the computer, perform the following steps
in the sequence indicated:
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 61
01
Note: Before disconnecting a peripheral from the system or removing a
component form the system board, verify that the standby power light-
emitting diode (LED) on the system board has turned off.
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 62
01
SELF-CHECK 4.5-2
Occupational Health and Safety Policy
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 63
01
9
10
.
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 64
01
Remove all jewelry when working inside any computer related
7 equipment.
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 65
01
Reference
Rodriguez, J. P. (n.d.). L.O 5. Inspect and test the computer systems and
network.docx. Scribd.
https://www.scribd.com/document/471697688/L-O-5-Inspect-and-
Test-the-Computer-Systems-and-Network-docx
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 66
01
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 67
01