0% found this document useful (0 votes)
54 views67 pages

CBLM

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views67 pages

CBLM

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 67

Competency-Based Learning Materials

Conducting
Competency Assessment

Eulogio “Amang” Rodriguez Institute of Science and Technology

EARIST
Nagtahan, Sampaloc Manila
Competency-Based Learning Materials

Conducting Competency
Assessment

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 2
01
Table of Content
Table of Content …………………………………………………………..………………
3

How to Use This Competency-Based Learning Material ………………………….


4

Module Content ………………………………………………………………………..… 6

Summary of Learning Outcome ………………………………………………….…….


8

Learning Experiences ……………………………………………………………………


9

Information Sheet 4.1-1. Plan and prepare for maintenance and repair ……..
11

Self-Check 4.1-1 ………………………………………………………..……….


17

Answer Key 4.1-1 ……………………………………………………………….


19

Information Sheet 4.1-2 Maintain computer systems and networks


………….20

Self-Check 4.1-2 …………………………………………………………………


25

Answer Key 4.1-2 ……………………………………………………………….


27

Information Sheet 4.1-3 Diagnose faults of computer systems ………………..


28

Self-Check 4.1-3 …………………………………………………………………


34

Answer Key 4.1-3 ………………………………………………………………


36

Information Sheet 4.1-4 Rectify/correct defects in computer systems ……….


37

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 3
01
Self-Check 4.1-4 …………………………………………………………………
43

Answer Key 4.1-4 ……………………………………………………………... 45

Information Sheet 4.1-5 Inspect and test the computer systems and networks
……………………………………………………………………………………………...45

Information Sheet 4.1-5.1 ……………………………………………………..48

Self-Check 4.1-5.1 ………………………………………………………………


55

Answer Key 4.1-5.1


……………………………………………………………..56

Information Sheet 4.1-5.2 …………………………………………………… 57

Self-Check 4.1-5.1 ………………………………………………………………


60

Answer Key 4.1-5.1


……………………………………………………………..61

How to Use This Competency-Based Learning Material

Welcome!

The unit of competency, “Maintain and Repair Computer Systems and


Networks”, is one of the competencies of TRAINERS METHODOLOGY I (NC
II), a course which comprises the knowledge, skills, and attitudes required
for a TVET trainer to possess.

This module Maintaining and Repairing Computer Systems and


Networks, contains training materials and activities for you to complete on
conducting assessment. It details the requirements for organizing
assessment activities, preparing the candidate, gathering and evaluating
evidence, making assessment decision, recording and providing feedback on
assessment outcome.

In this module, you are required to go through a series of learning


activities in order to complete each learning outcome. In each learning
outcome are Information Sheets, Self-Checks, Task Sheets, and Job

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 4
01
Sheets. Follow and perform the activities on your own. If you have
questions, do not hesitate to ask for assistance from your facilitator.

Remember to:

 Read information sheets and complete the Self-Checks. Suggested


references are included to supplement the materials provided in this
module.
 Perform the Task Sheets and Job Sheets until you are confident that
your outputs conform to the Performance Criteria Checklist that
follows the sheets.
 Submit outputs of the Task Sheets and Job Sheets to your facilitator
for evaluation and recording in the Achievement Chart. Outputs
shall serve as your portfolio during the Institutional Competency
Evaluation. When you feel confident that you have had sufficient
practice, ask your trainer to evaluate you. The results of your
assessment will be recorded in your Progress Chart and
Achievement Chart.

You must pass the Institutional Competency Evaluation for this


competency before moving to another competency. A Certificate of
Achievement will be awarded to you after passing the evaluation.

Training Methodology I
List of Competencies

No. Unit of Competency Module Title Code

1. Plan and Prepare for Planning and


Maintenance and Preparing for ELC724331
Repair. Maintenance and
Repair.

2. Maintain Computer Maintaining Computer


Systems and Networks. Systems and ELC724332

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 5
01
Networks.

3. Diagnose Faults of Diagnosing Faults of


Computer Systems And Computer Systems ELC724333
Networks. and Networks.

4. Rectify/Correct Defects Rectifying/Correcting


In Computer Systems Defects in Computer ELC724334
and Networks. Systems and
Networks.

5. Inspect and Test The Inspecting and


Computer Systems and Testing the Computer ELC724335
Networks Systems and
Networks

MODULE CONTENT

PROGRAM/COURSE : Trainers Methodology I

UNIT OF COMPETENCY : Maintain and Repair Computer


Systems and Networks

MODULE : Maintaining and Repairing


Computer Systems and Networks

INTRODUCTION:

This unit covers the knowledge, skills and attitudes needed to


maintain and service computer systems and networks.

LEARNING OUTCOMES

Upon completion of this module you must be able to;

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 6
01
 Plan and Prepare for Maintenance and Repair
 Maintain Computer Systems and Networks
 Diagnose Faults of Computer Systems
 Correct Defects in Computer Systems
 Inspect and Test the Computer Systems and Networks

ASSESSMENT CRITERIA:

1. Demonstrates the ability to identify maintenance and repair needs


based on system requirements.
2. Develops a comprehensive maintenance plan that includes
scheduling, resource allocation, and documentation.
3. Shows an understanding of safety protocols and considerations
during maintenance and repair activities.
4. Effectively communicates the maintenance plan to relevant
stakeholders.
5. Demonstrates proficiency in performing routine maintenance tasks,
such as software updates, antivirus scans, and system optimization.
6. Shows the ability to effectively manage software and license updates,
ensuring compliance and security.
7. Applies backup and data protection strategies to safeguard important
data and files.
8. Demonstrates knowledge of hardware maintenance, including
cleaning, component replacement, and troubleshooting.
9. Exhibits strong problem-solving skills in diagnosing hardware and
software issues.
10. Demonstrates the ability to use diagnostic tools and techniques to
identify faults accurately. Shows proficiency in analyzing error messages,
logs, and system behavior to pinpoint the root cause of issues.
11. Applies systematic approaches to troubleshoot and isolate faults in
computer systems.
12. Demonstrates the ability to apply appropriate solutions to resolve
hardware and software defects.
13. Shows proficiency in repairing or replacing faulty components in
computer systems.
14. Applies software patches, updates, and configurations to fix software-
related defects.
15. Ensures that corrections are implemented effectively and thoroughly
tested for functionality and stability.

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 7
01
16. Conducts thorough inspections of computer systems and networks to
identify potential issues or vulnerabilities.
17. Demonstrates proficiency in using testing tools and techniques to
verify the functionality and performance of computer systems.
18. Applies security testing to identify and address any vulnerabilities or
weaknesses in the system.
19. Conducts comprehensive testing after maintenance and repair
activities to ensure proper functioning.

TECHNICAL TERMS
 OHS – Occupational Health and Safety
 Port hub/Port – Is a connector on the back of a computer or other
device. A port is either a serial port or a parallel port.
 Modem – (Modulator-Demodulator) The modem is a device that
allows a given computer to share data or otherwise a device which let
computers exchange information.
 USB – Universal Serial Bus
 Scanner – Is an input device that read text or illustration printed on a
paper, translates the information into a form that a computer can
use.
 Printer – Is a piece of hardware that produces a paper copy (also
known as ‘hardcopy’) of the information generated by the computer.
 Flash drive – A portable storage device which is plug directly to the
USB port.
 Network - A group of computers and associated devices that are
connected by communication facilities.

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 8
01
 OS (Operating System) – Software that controls the allocation and
use of programs and data that a computer uses.
 Software – Programs and data that a computer uses.
 Planning – Is both the organizational process of creating and
maintaining a plan’ and the psychological process of thinking about
the activities required to create a desired future on some scale.
 Computer system – The complete computer made up of the CPU,
memory and related electronics (main cabinet), all the peripheral
devices connected to it and its operating system. Computer systems
fall into two broad divisions: clients and servers. Client machines fall
into three categories from low to high end; laptop, desktop, and
workstation. Servers range from small to large: low-end servers,
midrange servers and mainframes.
 Defragmentation – The process of reorganizing and rewriting files so
that they occupy one large continuous are on your hard disk.
 CRT – (Cathode Ray Tube) A display device used in computer
monitors and television sets.
 Boot Sector – The part of the formatted disk containing the operating
system loading a program.
 Virus – A program intended to damage your computer system without
your knowledge and permission.

Summary of Learning Outcome

Learning Outcome No.1 Organize Assessment Activities

ASSESSMENT CRITERIA
1. Demonstrates the ability to identify maintenance and repair needs
based on system requirements.
2. Shows an understanding of safety protocols and considerations
during maintenance and repair activities.
3. Demonstrates proficiency in performing routine maintenance tasks,
such as software updates, antivirus scans, and system optimization.
4. Shows the ability to effectively manage software and license
updates, ensuring compliance and security.

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 9
01
CONTENTS:
1. Plan and Prepare for Maintenance and Repair.
2. Maintain Computer Systems and Networks.
3. Diagnose Fault of Computer Systems.
4. Rectify/Correct Defects in Computer Systems.
5. Inspect and Test the Computer Systems and Networks.

CONDITIONS: The trainee must be provided with the following:


 PTQCS policies and guidelines in the conduct of assessment.
 Assessment orientation guide.
 Assessment documents, evidence plan/guides.
 Assessment instruments.
 Assessor’s guides
 List of accredited assessment center and assessor.

ASSESSMENT METHOD
 Written examination
 Oral interview
 Demonstration

LEARNING EXPERIENCES
Learning Outcome Organize Assessment
Activity
Learning Activities Special Instructions
Read Information Sheet 4.1-1.
Maintenance and Diagnosis of
faults.
Answer Self-Check 4.1-1.
Check your answer using the
Answer Key No. 4.1-1.
Answer Self-Check 4.1-2.
Check your answer using the
Answer Key No. 4.1-2.
Read Information Sheet No.

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 10
01
4.1-3. Materials
Answer Self-Check 4.1-3.
Check your answer using the
Answer Key No. 4.1-3.
Read Information Sheet No.
4.1-4. OHS policies and
procedures
Answer Self-Check 4.1-4.
Check your answer using the
Answer Key 4.1-4.
Read Information Sheet No.
4.1-5. Computer systems and
networks.
Answer Self-Check 4.1-5.
Check your answer using the
Answer Key No 4.1-5.

Information Sheet No. 4.1-1


Plan and Prepare for Maintenance and Repair

Learning Objective:

After reading this information you must be able to:


1. Demonstrates the ability to identify maintenance and repair needs
based on system requirements;
2. Develops a comprehensive maintenance plan that includes
scheduling, resource allocation, and documentation;
3. Shows an understanding of safety protocols and considerations
during maintenance and repair activities; and
4. Effectively communicates the maintenance plan to relevant
stakeholders.

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 11
01
How important is planning and conducting maintenance of computer
and network system?

 To avoid any unscheduled breakdown and downtime of equipment.


 To maintain equipment in satisfactory condition before it may cause
major problem.
 To prevents fault from occurring.
 To extend the life of the equipment.
 So that the failed equipment or system can be restored to an
operational condition.
Maintenance
It includes test, measurement, adjustment, and parts replacement
performed specifically to prevent faults from occurring.

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 12
01
Two General Type of Maintenance

A. Preventive Maintenance
Is given for maintaining equipment and
facilities in satisfactory operating condition to
extend the life of the equipment.

B. Corrective Maintenance
Is task performed to identify, isolate, and
rectify a fault so that the failed equipment or
system can be restored to an operational condition.

Sub-Group of Preventive Maintenance

A. Planned Maintenance
Is any variety of scheduled maintenance to
an object or item of equipment.

B. Condition Based Maintenance


Is a maintenance strategy that uses the
actual condition of the asset to decide what
maintenance needs to be done.

Planning Maintenance Procedures for Computer System

A. Design a systematic maintenance plan for hardware.


1. Design a monitoring, evaluating, and updating plan.
2. Place your computer in a well-ventilated area.
3. Schedule the use of computer for its longer life.
4. Move the computer only when it is turned off and unplugged.

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 13
01
5. Treat your computer properly.
6. Blow out dust inside of your computer system using
compressed air/ or a vacuum that blows air outward.
7. Don’t smoke or eat/ drink around your computer.
8. Don’t leave laptops plugged in all the time.

B. Design a systematic maintenance plan for your software.


1. Backup your files.
2. Install or secure passwords.
3. Delete temporary files.
4. Update anti-virus and spyware.

Example of Monitoring Checklist

Plan and Prepare for Maintenance and Repair – in the context of


computers refers to the process of organizing and getting ready for tasks
related to maintaining and repairing computer systems and equipment. It
involves taking proactive steps to ensure that computer maintenance and
repair activities are carried out effectively and efficiently.

In the computer domain, planning and preparing for maintenance and


repair typically includes the following:

1. Regular Maintenance Schedule


 Establishing a schedule for routine
maintenance tasks such as software updates,
antivirus scans, disk cleanup, and system
optimization. This helps prevent potential

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 14
01
issues, improve performance, and enhance the
overall stability of the computer system.

2. Backup and Data Protection


 Implementing a backup strategy to protect
important data and files. This involves
regularly backing up data to external storage
devices or cloud-based services to ensure data
integrity and quick recovery in case of
hardware failure or data loss.

3. Hardware Inventory
 Maintaining an inventory of computer
hardware components, including details such
as make, model, serial numbers, and
warranty information. This helps in tracking
hardware assets, planning for replacements or
upgrades, and ensuring timely maintenance
or repair of faulty components.

4. Software and License Management


 Keeping track of software installations,
licenses, and updates. This includes
maintaining a record of installed software,
managing license compliance, and ensuring
that software updates are applied in a timely
manner to address security vulnerabilities and
improve functionality.

5. Troubleshooting and Diagnostic Tools


 Gathering necessary troubleshooting and
diagnostic tools, both software-based and
hardware-based, to identify and resolve

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 15
01
common computer issues. This may include
diagnostic software, hardware testing tools,
and specialized utilities for system analysis
and troubleshooting.

6. Documentation and Standard Operating


Procedures
 Maintaining documentation of maintenance
and repair procedures, including step-by-step
instructions, troubleshooting guides, and best
practices. This documentation serves as a
reference for technicians and helps ensure
consistency in maintenance and repair
processes.

7. Security Measures
 Implementing security measures such as
firewalls, antivirus software, and intrusion
detection systems to protect the computer
system from malware, unauthorized access,
and other cybersecurity threats. Regular
updates and patching of security software are
also essential for maintaining a secure
computing environment.

8. Training and Knowledge Enhancement


 Providing training and development
opportunities for IT staff or users to enhance
their skills and knowledge in computer
maintenance and repair. This includes staying
updated with the latest technologies, industry
trends, and best practices in computer
maintenance and repair.

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 16
01
Self-Check 4.1-1

Direction: Choose the letter of the correct answer. Read each question
carefully.

1. What is the purpose of planning and preparing for computer maintenance


and repair?
A. To increase the cost of repairs
B. To complicate the maintenance process
C. To avoid computer maintenance altogether
D. To ensure effective and efficient maintenance and repair

2. What is an essential component of planning for computer maintenance?


A. Ignoring software updates
B. Not keeping track of hardware inventory

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 17
01
C. Establishing a regular maintenance schedule
D. Avoiding backups of important data

3. Why is it important to maintain an inventory of computer hardware


components?
A. It helps increase the complexity of repairs
B. It is not necessary for computer maintenance
C. It assists in tracking hardware assets and planning for replacements
D. It makes it easier to ignore hardware issues

4. What is the purpose of implementing a backup strategy for computer


maintenance?
A. To lose important data
B. To protect data and enable quick recovery in case of data loss
C. To make the computer system slower
D. To make maintenance more challenging

5. What should be included in documentation for computer maintenance


and repair?
A. Detailed instructions and troubleshooting guides
B. Random notes and unrelated information
C. Outdated procedures and incorrect information
D. No documentation is necessary
6. What security measures should be considered in computer maintenance
and repair?
A. No security measures are needed
B. Ignoring software updates and patches
C. Sharing passwords with everyone
D. Implementing firewalls and antivirus software

7. What is the benefit of training and knowledge enhancement in computer


maintenance and repair?
A. It increases the chances of making mistakes
B. It improves skills and knowledge for better maintenance and repair
C. It is not necessary for effective maintenance
D. It slows down the maintenance process

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 18
01
8. Why is it important to establish a regular maintenance schedule for
computers?
A. To make maintenance unpredictable and random
B. To avoid maintenance and repair altogether
C. To ensure timely updates, scans, and optimizations
D. To increase the chances of system failures

9. What is the purpose of troubleshooting and diagnostic tools in computer


maintenance?
A. To complicate the troubleshooting process
B. To make maintenance more time-consuming
C. To identify and resolve common computer issues
D. To cause more problems during repairs

10. How does planning and preparing for computer maintenance benefit an
organization?
A. It increases the cost of repairs
B. It leads to system failures
C. It improves system performance and reduces downtime
D. It makes maintenance and repair more challenging

Answer Key 4.1-1

1. D 6. D
2. C 7. B
3. C 8. C
4. B 9. C
5. A 10. C

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 19
01
Information Sheet No. 4.1-2
Maintain Computer Systems and Networks

Assessment Criteria:
1. Appropriate personal protective equipment are used in conformity
with the standard procedures.
2. Periodic maintenance of the equipment is performed following
manufacturer’s requirements.
3. Established procedures are followed in case of repair and parts
replacements.
4. Accidental events or conditions are responded to in accordance
with the established standards.

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 20
01
Tools and Equipment Used to Protect the Use and the Computer
System

Types of Personal Protective Devices


1. Anti-Static Devices
2. Power Surge Protectors
3. Personal Equipment

ESD (Electro Static Discharge)


A small amount of static electricity that can destroy small parts of
your computer.

Anti-Static Devices
Devices designed to protect the computer from static electricity.
Examples:
1. Anti-Static Wrist Strap
2. Anti-Static Mat
3. Anti-Static Bag
4. Anti-Static Spray

Power Surge Protectors


Devices designed to protect the computer from sudden power surges
from intermittent power sources.
Examples:
1. AVR (Automatic Voltage Regulators)
2. UPS (Uninterrupted Power Supply)
Personal Equipment
1. Small Paint Brush
2. Screw Drivers
3. Pliers and Tweezers
4. Compressed Air
5. Handheld Vacuum

Periodic Maintenance Scheme


Regular scheduled upkeep of your computer will keep you and your
computer in working smoothly.

Daily Schedule

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 21
01
▪ Update virus and spyware definitions.
▪ Do incremental backup – backup updated files for each date.
▪ Reboot upon crash – Reboot the computer to fix your pc upon crash.

Weekly
▪ Full virus and spyware scan.
▪ Complete backup of files.
▪ Patch up – Get latest software update for your operating system.

Monthly
▪ Clean your PC inside and out.
▪ Defrag your hard drive to speed up its operation.

Yearly
▪ Check your programs – clean up unused programs.
▪ Reformat your hard drive and reinstall the operating system.
▪ Make a full diagnostic check on hardware and software.

Sample Maintenance Scheme

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 22
01
Assessment Criteria:
1. Appropriate personal
protective equipment are used
in conformity with the
standard procedures.
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 23
01
2. Periodic maintenance of
the equipment is performed
following manufacturer’s
requirements.
3. Established procedures are
followed in case of repair and
parts replacements.
4. Accidental events or
conditions are responded to in
accordance with the
established standards.
Assessment Criteria:
1. Appropriate personal
protective equipment are used
in conformity with the
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 24
01
standard procedures.
2. Periodic maintenance of
the equipment is performed
following manufacturer’s
requirements.
3. Established procedures are
followed in case of repair and
parts replacements.
4. Accidental events or
conditions are responded to in
accordance with the
established standards.
Maintaining computer systems and networks involves overseeing,
servicing, and optimizing hardware, software, and other related systems to
ensure secure and efficient operation. Here are the main activities involved:

Hardware Maintenance
This may involve physical cleaning, replacement of damaged parts,
and ensuring that each component is functioning properly.

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 25
01
Software Maintenance: Regular updates and patches need to be installed to
keep the software up-to-date and secure. It also includes troubleshooting
software errors, maintaining servers, and ensuring data backups.

Network Maintenance
This includes monitoring network performance, ensuring network
security, resolving network issues, and upgrading network infrastructure as
required.

Proactive Monitoring
Regular checks are performed to identify potential issues and fix them
before they cause significant downtime.
Regular Backups: Maintaining consistent backups of data to prevent loss in
case of failures.

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 26
01
Securing Systems
This involves putting measures in place to protect sensitive
information from security threats.

Self-Check 4.1-2

Direction: Read each question carefully before selecting your answer.


Choose the most appropriate response from the options provided.

1. What is ESD in relation to computer systems?


A) Extra System Data

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 27
01
B) Electronic System Design
C) Electro Static Discharge
D) Enhanced System Development

2. Which device is designed to protect the computer from static electricity?


A) Power Surge Protectors
B) Personal Equipment
C) Anti-Static Devices
D) ESD Protectors

3. Which of the following is an example of an Anti-Static Device?


A) AVR (Automatic Voltage Regulators)
B) UPS (Uninterrupted Power Supply)
C) Anti-Static Wrist Strap
D) Small Paint Brush

4. What is the purpose of Power Surge Protectors?


A) Protect the computer from malware
B) Protect the computer from static electricity
C) Protect the computer from sudden power surges
D) Protect the computer from overheating

5. Which of the following is a Personal Equipment used for computer


maintenance?
A) Screw Drivers
B) Anti-Static Mat
C) Anti-Static Spray
D) Compressed Air

6. What is the purpose of periodic maintenance for a computer system?


A) To increase the speed of the computer
B) To keep the computer and user safe
C) To upgrade the hardware components
D) To install new software programs

7. Which activity should be done daily as part of computer maintenance?

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 28
01
A) Full virus and spyware scan
B) Complete backup of files
C) Reboot upon crash
D) Defrag your hard drive

8. What is recommended to be done weekly for computer maintenance?


A) Clean your PC inside and out
B) Update virus and spyware definitions
C) Patch up – Get latest software update
D) Defrag your hard drive

9. Which activity is part of the monthly maintenance schedule for a


computer?
A) Reformat your hard drive and reinstall the operating system
B) Clean your PC inside and out
C) Full virus and spyware scan
D) Update virus and spyware definitions

10. What should be done yearly as part of computer maintenance?


A) Reboot upon crash
B) Full diagnostic check on hardware and software
C) Complete backup of files
D) Patch up – Get latest software update

Answer Key 4.1-2

1. C
2. C
3. C
4. C
5. A

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 29
01
6. B
7. C
8. C
9. B
10. B

Information Sheet No. 4.1-3


Diagnose Faults of Computer Systems and Networks

Learning Objective:

After reading this information sheet, you must be able to:

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 30
01
1. Exhibits strong problem-solving skills in diagnosing hardware and
software issues;
2. Demonstrates the ability to use diagnostic tools and techniques to
identify faults accurately;
3. Shows proficiency in analyzing error messages, logs, and system
behavior to pinpoint the root cause of issues; and
4. Applies systematic approaches to troubleshoot and isolate faults in
computer systems.

Computer Diagnosis

Sometimes when the problem with a system is not totally apparent


and the problem may be intermittent, using a basic common diagnostic
procedure may help determine what is wrong. This procedure has a number
of steps that, if followed each time, can be of help.

1. Identify the symptoms and potential causes.


In this first step you define and
determine the nature of the problem. Is it the
user or computer that is problematic? Are all
websites unreachable, or just one or a few?
Is the computer consistently online or is the

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 31
01
connection flapping? Are websites
reachable by IP address but not by name?
Are there any error messages indicating what
type of error was encountered? Based on
your answers to these questions you can
begin to make educated guesses as to the
cause. Gather detailed information.

2. Identify the affected area.


This step is similar to the first step, but
here you determine the extent of the problem.
Is it affecting one computer or user, or
multiple computers or users? Are all
computers in the subnet (or all users in the
domain) affected? Is the whole network
down? If you are providing support to
another user, can you reproduce the error
yourself? Gather detailed information.

3. Establish what has changed.


This is where you try to put the
connectivity problem in some kind of time
frame. Find out if the user was ever able to
successfully do what he now cannot do.
When did the error first appear? Before the
appearance of the error were there any
programs or operating system updates
installed? How about new drivers or browser
plugins? Were
any new nodes (clients, servers, networking
devices, printers, etc) added to the network?
Any new users, user groups, or Active
Directory objects such as domains, OUs, or
sites?
4. Establish the most probable cause.

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 32
01
Use your technical expertise to isolate
and explain the cause of the problem. Some
in depth investigation and diagnostic tools
will probably be required. This step
is described in more detail below.

5. Determine if escalation is necessary.


If you believe that the connectivity error
is outside your scope of administration,
you will need to transfer responsibility for its
resolution to another entity. For example,
if you cannot connect to the Internet and you
strongly believe that the problem is not your
computer, router, or other equipment, you
will need to contact your Internet service
provider (ISP) and ask them to
investigate...perhaps one of their lines or
routers is down. Another scenario might
involve a piece of equipment on your network
that is contractually administered by a third
party.

6. Implement an action plan and solution including potential effects.

Whether the responsibility to fix the


error falls on you or if you need to transfer it
to another party, you must devise a
resolution and start checking off action
items.

7. Test the result.

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 33
01
When you believe the steps of the
action have been fulfilled, try to re-create
the error. Observe the results of the
implementation. Is the problem gone? If not,
repeat steps 4, 5, and 6.

8. Identify the results and effects of the solution.

Once a solution has been found,


ensure that normal network operation has
been restored and that no new problems have
been introduced.

9. Document the solution and process.


Describe the error conditions and the
steps taken for a solution. This will aid you
in troubleshooting the same or similar
problems in the future. Make sure you
include a sufficient amount of detail,
including operating system versions,
application versions, driver versions, software
vendor update numbers, etc.
Whether you are fixing a UTP cable, an
IPV4 configuration or folder sharing in a
network always follow the nine basic process
in diagnosing fault in your network.
An example below will be useful for your next
exercise.

Common Causes of Faulty Internet Connection

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 34
01
1. Slow connection.
Despite boasting fast connection speeds, both
wireless and wired connections can still get
down for a few reasons:
∙ Your device is located far from the router
∙ Your bandwidth is spread too thin,
especially if there are plenty of devices
connected doing data-hungry applications
and tasks
∙ Peak hours where people connect all at
once, thereby causing congestion (e.g. urban
areas, libraries, hotels, etc).

2. No connection at all.
You might lose your connection entirely due
to:
∙ Glitches in the router or modem
∙ Complete service outage, be it because of
the weather, construction work, or power
problems

3. Service fluctuations.

Internet service providers (ISPs) also


experience problems on their end,
often resulting in users not getting their
contracted internet speed 24/7.

4. Equipment failure.

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 35
01
Your modem or router can be damaged,
possibly as a result of power outages
frying the wires. You may also have outdated
equipment in your hands that
needs upgrading.

5. Operator error.

The most common operator errors that cause


faulty internet includes wires plugged into
the wrong jack, bad firewall rules set up, and
duplicating IP addresses.

Self-Check 4.1-3

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 36
01
Direction: Read each question carefully before selecting your answer.
Choose the most appropriate response from the options provided.

1. What is the first step in the basic common diagnostic procedure for
computer problems?
A) Identify the affected area
B) Establish what has changed
C) Identify the symptoms and potential causes
D) Establish the most probable cause

2. What is the purpose of identifying the affected area in computer


troubleshooting?
A) Determine the extent of the problem
B) Establish the most probable cause
C) Test the result
D) Document the solution and process

3. What is the significance of establishing what has changed in diagnosing


computer issues?
A) Identifying the affected area
B) Determining if escalation is necessary
C) Establishing the most probable cause
D) Understanding the time frame of the problem

3. When should you determine if escalation is necessary in computer


troubleshooting?
A) Before identifying the symptoms
B) After establishing the most probable cause
C) If the problem is outside your scope of administration
D) Once the action plan is implemented

4. What is the next step after establishing the most probable cause in
computer diagnosis?
A) Determine if escalation is necessary
B) Implement an action plan and solution
C) Test the result
D) Identify the results and effects of the solution

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 37
01
5. What should be done after devising a resolution in computer
troubleshooting?
A) Test the result
B) Document the solution and process
C) Identify the results and effects of the solution
D) Identify the affected area

6. Why is testing the result important in the diagnostic process?


A) To establish the most probable cause
B) To determine if escalation is necessary
C) To ensure normal network operation has been restored
D) To identify the affected area

7. What should be done after identifying the results and effects of the
solution in computer troubleshooting?
A) Establish what has changed
B) Document the solution and process
C) Test the result
D) Identify the affected area

9. Why is documenting the solution and process important in computer


diagnostics?
A) To establish the most probable cause
B) To aid in troubleshooting similar problems in the future
C) To determine if escalation is necessary
D) To identify the affected area

10. What is the purpose of the last step in the basic common diagnostic
procedure for computer problems?
A) Test the result
B) Identify the results and effects of the solution
C) Document the solution and process
D) Determine the affected area

Answer Key 4.1-3

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 38
01
1. C
2. A
3. D
4. C
5. B
6. B
7. C
8. B
9. B
10. C

Information Sheet No. 4.1-4

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 39
01
Rectify/Correct Defects in Computer Systems and Networks

Learning Objective:

After reading this information you must be able to:


1. Demonstrates the ability to apply appropriate solutions to resolve
hardware and software defects;
2. Shows proficiency in repairing or replacing faulty components in
computer systems;
3. Applies software patches, updates, and configurations to fix software-
related defects; and
4. Ensures that corrections are implemented effectively and thoroughly
tested for functionality and stability.

Rectify/Correct Defects in Computer Systems – Preventive


maintenance can be described as maintenance of equipment or systems
before fault occurs. It can be divided into two subgroups: Planned
Maintenance and Conditioned-Based Maintenance. Planned Maintenance
(PM) is any variety of scheduled maintenance to an object or item of
equipment. Specifically, PM is a scheduled service visit carried out by a
competent and suitable agent, to ensure that an item of equipment is
operating correctly to avoid any unscheduled breakdown and downtime of
equipment.

Condition Based Maintenance (CBM)


Is a maintenance strategy that uses the actual condition of the asset
to decide what maintenance needs to be done, CBM dictates that
maintenance should only be performed when certain indicators show
decreasing performance or upcoming failure. Checking a machine for these
indicators may include non-invasive measurements, visual inspection,
performance data, and scheduled tests. Condition data can be gathered at
certain intervals, or continuously.

The purpose of systematic inspection, detection, and correction of


existing/ future problems is very important to maintain equipment/facilities
in satisfactory condition before it may cause major problem. Maintenance,
including test, measurements, adjustments, and parts replacement,

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 40
01
performed specifically to prevent faults from occurring. Maintenance is
divided into (2) two general type.

A. Design a Systematic Maintenance Plan for Hardware


1. Design a monitoring, Evaluating, and Updating plan.
2. Place your computer in a well-ventilated area.
3. Schedule the use of computer for its longer life.
4. Move the computer only when it is turned off and unplugged.
5. Treat your computer properly.

B. Design a Systematic Maintenance Plan for your Software


1. Backup your files.
2. Install or secure passwords.
3. Delete temporary files.
4. Update anti-virus and spyware.

Planning Maintenance Procedures for Computer system and


Networking:
Design a systematic monitoring, evaluating, and updating plan for
hardware. Computers have significantly changed the working environment,
simplifying, and speeding up many tasks across many work areas. However,
with these advances are some potential problems and maintenance issues.
These guidelines describe how computer technicians, students and
computer users can work together to achieve a productive workplace
environment. The guidelines reflect current knowledge and best practice for
the use of computers so you can achieve maximum efficiency and safety in
your workplace.

▪ Place your computer in a well-ventilated area.


▪ This will allow proper circulation of air inside the computer unit.
▪ This will help lessen the attacks of viruses and increases the life span
of your computer. Move the computer only when it is turned off and
unplugged.
▪ To avoid damage to the computer unit always turn off and unplug it
when transferring the computer to another location. Treat your
computer properly.
▪ This means taking care of your computer. PCs and laptops should be
properly turned off.

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 41
01
Preventive Maintenance (PM)
Is given for maintaining equipment and facilities in satisfactory
operating condition to extend the life of the equipment. Corrective
maintenance is task performed to identify, isolate, and rectify a fault so that
the failed equipment or system can be restored to an operational condition
within the tolerances or limits.

Maintenance Procedures
In preparing maintenance procedure, you must consider designing a
systematic plan for both hardware and software. This saves time, money,
and frustration and ensures safe conditions to prevent injury to people and
damage to computer equipment.

Key steps involved in rectifying or correcting defects in computer systems


include:
1. Defect Identification
Identify and define the specific defect or issue that is impacting
the computer system's performance or functionality. This could be
done through user reports, system logs, error messages, or other
diagnostic tools.

2. Root Cause Analysis


Analyze the defect to determine its underlying cause. This
involves investigating the factors contributing to the issue, such as
software bugs, hardware failures, configuration errors, or
compatibility issues.
3. Troubleshooting and Diagnostics
Use various troubleshooting techniques and diagnostic tools to
isolate and pinpoint the root cause of the defect. This may involve
conducting tests, examining system components, or analyzing
system behavior.

4. Solution Development
Based on the root cause analysis, develop an appropriate
solution or corrective action plan to address the defect. This could
involve applying software patches, updating drivers, reconfiguring

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 42
01
settings, replacing faulty hardware components, or implementing
system optimizations.

5. Solution Implementation
Implement the identified solution or corrective action plan. This
may require making changes to the system configuration,
installing updates or patches, or replacing hardware components.
It is important to follow best practices and guidelines specific to
the type of defect being addressed.

6. Testing and Validation


After implementing the solution, thoroughly test the computer
system to ensure that the defect has been rectified. This involves
performing functional testing, system checks, and any necessary
performance evaluations to verify that the system is functioning as
intended.

7. Documentation and Reporting


Maintain detailed documentation of the defect, the steps taken
to rectify it, and the outcome of the resolution. This documentation
serves as a reference for future troubleshooting and helps in
tracking recurring issues. It is also important to report the
resolution to relevant stakeholders or users.

8. Continuous Monitoring
Regularly monitor the computer system after the defect has
been rectified to ensure that the solution remains effective. This
includes ongoing performance monitoring, system maintenance,
and addressing any new issues that may arise.

Do Systematic Maintenance Plan for your Computer Software. Back-up


your files.
▪ Protecting your files means creating backups, storing your file
backups on your hard drive or any removable storage device regularly.
Install of secure passwords.
▪ Installing passwords makes your files more secure. Delete temporary
files.

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 43
01
▪ Deleting the temporary files on your computer will enhance its speed
and will create more disk space for your files. Update anti-virus and
spyware.
▪ Regularly update your anti-virus for your computer protection against
viruses.

Preventing Computer Systems Failure Computers


In general, are stable, and you can usually rely on them to not fail
you. However, if you develop some basic habits, you can postpone serious
computer problems, if not avoiding them entirely.

1. Computer Issues. Know that your computer is going to fail. You need
to treat your computer as if it were a doomed failure. Always assume
that failure is imminent. A fatal error results in data loss, damage to
your computer and/or its ability to function, hardware failure, or
other serious issues.

2. Dust Issues. Preventing failure means making sure your computer is


physically clean in its operations. Make sure that there is not too
much dust inside, especially on the fans. Dust can reduce
performance and cause overheating.

3. RAM Issues. Know your computer’s specifications and its limits. RAM
runs even the PC is running idly. It consumes RAM storages capacity
making you difficult to open a program if RAM storage had been
consumed.

4. Malware Issues. Make sure that your anti-virus software is updated


to be able to scan unnecessary files that enter your PC. Do not install
programs that you’re not familiar with or if do not fully trust.

5. Hardware Issus. When something is not working properly, either


diagnose the problem yourself and fix it, to prevent further damage or
contact a professional and have them look at it for you. Take
advantage of warranties on parts if they fail.

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 44
01
6. Warning Issues. If the same error message shows up every time you
log in, be sure to investigate it. Although unlikely, these errors could
be important.
7. Usage Issues. Give your computer a break. Believe it or not, your
computer likes rest, too. Leaving it on all the time wears out hardware
and put unnecessary wear and tear on the hardware. Giving your
computer a break also saves you money (electrical bills).
8. Warranty Issues. Always take advantage of warranties. Get a
warranty to protect your hardware, so it can be replaced in case of
failure.
9. Backup Issues. Back-up everything. Run regular backup of your
important files to other disks, computers, or an online backup service.

10. Error Message Issues. If your PC fails to function, diagnose the


problem. Write down the necessary info such as error messages or things
don’t work properly. If you know how to fix it, do it, to avoid further
damage but if not hen seek for professional help.

In recent years, software defects have become the dominant cause of


customer outage, and improvements in software reliability and quality have
not kept pace with those of hardware. Yet, software defects are not well
enough understood to provide a clear methodology for avoiding or recovering
from them.

Debugging is the group of activities that software developers perform


to fix a bug, so being a good debugger is a very important part of being a
good developer. Three reasons to consider debugging one of your main
skills:
▪ We spend a lot of time debugging.
▪ There are always errors in your code.
▪ Debugging is sometimes the only way to check that some code
is working fine.
There are thousands of problems that your PC could have, from an endless
list of possible error messages to various hardware failures. Most of those
problems might have several possible causes as well. Most of these potential
issues are rare. The problems most computer users see are common errors
and failures seen by many, many others.

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 45
01
There are some of the most common PC problems:
▪ Computer will not turn on.
▪ Blue screen of death (BSOD)
▪ 404/ Page not found error

Self-Check 4.1-4

Direction: Read each question carefully before selecting your answer.


Choose the most appropriate response from the options provided.

1. What is the purpose of Preventive Maintenance (PM) in computer


systems?
A) Correcting faults after they occur
B) Extending the life of equipment by maintaining satisfactory
operating condition
C) Restoring failed equipment to operational condition
D) Identifying and rectifying faults systematically

2. What is the primary focus of Condition Based Maintenance (CBM) in


computer systems?
A) Scheduled maintenance visits
B) Maintenance based on actual asset condition
C) Random maintenance procedures
D) Emergency fault correction

3. What is the key objective of systematic maintenance in computer


systems?
A) Identifying defects
B) Preventing faults from occurring
C) Rectifying all existing faults
D) Randomly performing maintenance tasks

4. How can defects in computer systems be rectified through


maintenance procedures?
A) By ignoring the issues until they escalate
B) By conducting systematic inspection, detection, and correction
C) By replacing all hardware components

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 46
01
D) By performing maintenance only when faults occur

5. Which step is essential in the process of rectifying defects in computer


systems?
A) Identifying the results and effects of the solution
B) Continuous monitoring of the system
C) Implementation of the solution
D) Documentation and reporting of the solution

6. Why is testing and validation crucial in the process of rectifying


defects in computer systems?
A) To identify the root cause of the defect
B) To maintain detailed documentation
C) To ensure the defect has been rectified
D) To determine the affected area

7. What is the importance of documentation and reporting in computer


system maintenance?
A) To identify the root cause of defects
B) To ensure continuous monitoring
C) To track recurring issues and resolutions
D) To determine the affected area

8. Why is continuous monitoring necessary after rectifying defects in


computer systems?
A) To identify defects
B) To ensure the solution remains effective
C) To conduct troubleshooting
D) To document the solution

9. What is the significance of systematic maintenance planning for


computer software?
A) To replace all software components
B) To prevent hardware failures
C) To create backups and secure passwords
D) To ignore potential issues

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 47
01
10. How can computer system failure be prevented according to the
guidelines?
A) Assume failure is not imminent
B) Keep the computer physically dirty
C) Avoid regular backups
D) Take advantage of warranties on parts
Answer Key 4.1-4

1. B
2. B
3. B
4. B
5. C
6. C
7. C
8. B
9. C
10. D

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 48
01
Information Sheet No. 4.1-5
Inspect and Test the Computer Systems and Networks

Assessment Criteria:
1. Final inspections are undertaken to ensure that the testing conducted on
the device conforms with the manufacturer’s instruction/manual
2. Computer systems and networks are checked/tested to ensure safe
operation.
3. OHS standards and 5S principles are followed according to enterprise
policies
4. Work site is cleaned and cleared of all debris and left in safe condition in
accordance with company procedures
5. Excess components and materials are disposed of based on WEEE directives
and 3Rs waste management program.
6. Report is prepared and completed according to company requirements

Contents:
1. Testing Computer Systems
2. Occupational Health and Safety Policy

Tools, Materials and Equipment and Facilities:

Pliers (assorted), Screw drivers (assorted), Special tools, soldering iron/gun,


Wrenches, Utility knife/stripper, Hot air soldering station, LAN tester, Crimping
tools

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 49
01
LEARNING EXPERIENCES/ACTIVITIES

LO 5: Inspect and test the computer systems and networks

Learning Activities Special Instructions

1. Read the attached Information You can ask the assistance of your trainer
Sheet 4.5-1 on Testing Computer explain further the topics you cannot
System understand
2. Answer Self-Check 4.5-1 on Try to answer the Self-Check without looking
Testing Computer System at the information sheet
3. Compare your answer to
Answer Key 4.5-1
4. Read the attached Information You can ask the assistance of your trainer
Sheet 4.5-2 on Occupational explain further the topics you cannot
Health and Safety Policy understand
5. Answer Self-Check 4.5-2 on Try to answer the Self-Check without looking
Occupational Health and Safety at the information sheet
Policy
6. Compare your answer to
Answer Key 4.5-2
2

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 50
01
INFORMATION SHEET 4.5-1

Testing Computer System

Learning Objective:

After reading this INFORMATION SHEET, you must be able to:

1. Know how to test computer system

Introduction:

You’ve set up all your network switches, plugged in all the cables, and
configured all your computers. One task remains before you can declare
your network finished: You must verify that the network works as expected.

Three Major Components of Computer System:


1. Hardware
2. Software
3. Firmware

Test Your Hardware

Checking your computer hardware and its peripherals


1. Computer Monitor and its peripherals
a. Monitor and interface cables
b. Video Card
c. Monitor Power Cable

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 51
01
Monitor Power
Video Card Cord Cable

Interface Cable

2. Keyboard and Mouse


a. Keyboard Connector
b. Mouse Connector

3. I/O port and devices


a. Connection between the I/O port and the peripheral device
b. A faulty cable between the I/O port and the peripheral device
c. A faulty peripheral device
d. Incorrect settings in the system setup program
e. Incorrect settings in the system’s configuration files
f. Faulty I/O port logic on the system board

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 52
01
4. Power supply
a. Power cord
b. Fuse

Testing your Software


Check the different software installed in the computer.
1. Operating system
a. Run live updates for your operating system to get the latest
patches and protection for your OS.
b. Run registry scanners to check the OS registry configuration.

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 53
01
2. Application Software
a. Check for live updates

3. Anti-virus software
a. Run ant-virus program
b. Check for virus signature updates
c. Check for spyware updates.

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 54
01
Test Your Firmware
Firmware – it is a combination of hardware and software integrated on a
chip.
How do you test your firmware?
Example: Check for the correct configuration on your firmware, you can
accomplish this by configuring the BIOS in the computer.

Inspect and Test the Computer Systems and Networks – It refers to the
process of evaluating and examining computer systems and networks to
assess their performance, functionality, and security. It involves conducting
thorough inspections and performing various tests to ensure that the
systems and networks are operating optimally and meeting the desired
standards.

Key aspects of inspecting and testing computer systems and networks


include:

1. Inspection of Hardware

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 55
01
a. Physically examine computer hardware components
such as processors, memory modules, storage devices,
and peripheral devices to ensure they are properly
connected, functioning correctly, and free from any
physical damage or defects.

2. System Configuration Review


a. Review and verify the configuration settings of the
computer systems and networks to ensure they align
with the desired specifications and requirements. This
includes checking network settings, software
configurations, security settings, and hardware
configurations.

3. Performance Testing
a. Conduct performance tests to evaluate the speed,
responsiveness, and overall performance of the
computer systems and networks. This may involve
running benchmark tests, stress tests, or load tests to
assess the system's capabilities under different
conditions.

4. Functional Testing
a. Perform functional tests to verify that all software
applications and hardware components are
functioning as intended. This includes testing input
and output devices, software functionalities, network
connectivity, and system integration.

5. Security Assessment
a. Evaluate the security measures in place to protect the
computer systems and networks. This includes
conducting vulnerability assessments, penetration
testing, and reviewing access controls to identify any
potential security weaknesses or vulnerabilities.

6. Network Testing

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 56
01
a. Assess the performance and reliability of the network
infrastructure, including routers, switches, firewalls,
and wireless access points. This involves testing
network connectivity, bandwidth capacity, latency,
and network security protocols.

7. Documentation
a. Maintain detailed documentation of the inspection
and testing processes, including the procedures
followed, the results obtained, and any identified
issues or recommendations for improvement. This
documentation serves as a reference for future
evaluations and helps track the progress of system
performance and security over time.

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 57
01
SELF-CHECK 4.5-1
Testing Computer System

Enumeration: Enumerate the following questions carefully, write your


answer on separate sheet of pad paper.

1. Give the three (3) Major Components of Computer System.

2. Give the four (4) Computer Hardware and its peripherals for checking.

3. Give the three (3) Different Software of checking.

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 58
01
ANSWER KEY 4.5-1

1. Hardware
2. Software
3. Firmware
4. Computer Monitor and its peripherals
5. Keyboard and Mouse
6. Power Supply
7. I/O port and devices
8. Operating System
9. Application Software
10. Anti-virus software

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 59
01
INFORMATION SHEET 4.5-2

Occupational Health and Safety Policy

Learning Objective:

After reading this INFORMATION SHEET, you must be able to:

1. Practice safety practices.

2. Improve his/her working habits.

3. Observe safety precautions on handling the equipment

Introduction:

Before we start to install and assemble pc part, we must observe some


procedures on handling parts and general assembly guidelines.

Occupational Health and Safety Policy

Occupational health and safety is a cross-disciplinary area concerned with


protecting the safety, health and welfare of people engaged in work. The goal
of all occupational health protect co-workers, family members, employers,
customers, suppliers, nearby communities, and other members of the
public who are impacted by the workplace environment. It may involve
interactions among many subject areas, including occupational medicine,
occupational (or industrial) hygiene, public health, safety engineering,
chemistry, health and physics.

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 60
01
Safety practices should be learned early and always adhered to when
working with any electrical device, including personal computers and
peripherals. This is for the protection of not only the people working with
them, but also for the devices themselves. The basic for this process begins
with your Occupational Health and Safety Policies.
Personal Safety While Working Along with PC’s

While working inside your computer, do not attempt to service the computer
except as explained in this guide and elsewhere in product documentation.
Always follows the instructions closely.

Computer equipment can be dangerous, and you or others can be injured or


even killed if you don’t follow proper safety guidelines when working along
PC’s.

The following are some precautionary measures to take before working with
any computer equipment:

Before you start to work on the computer, perform the following steps
in the sequence indicated:

1. Turn off the computer and all peripherals.


2. Touch an unpainted metal surface on the computer chassis, such as
the metal around the card-slot openings at the back of your
computer, before touching anything inside your computer.
3. Disconnect the computer and peripherals from their electrical
outlets. Doing so reduces the potential for personal injury or shock.
Also disconnect any telephone or telecommunication lines from the
computer.

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 61
01
Note: Before disconnecting a peripheral from the system or removing a
component form the system board, verify that the standby power light-
emitting diode (LED) on the system board has turned off.

While you work, periodically touch an unpainted metal surface on the


computer chassis to dissipate any static electricity that might harm
internal components.

In addition, it is recommended that you periodically review the safety


instructions in your System Information Guide.

Additional Safety tips:

 Were shoes with non-conductive rubber soles to help reduce the


chance of being shocked or seriously injured in an electrical accident.
 Do not work on components that are plugged into their power source.
 Do not remove expansion cards from a computer when it is turned on.
 Remove all jewelry when working inside any computer related
equipment.
 Be sure not to mix electronic components and water.
 When you shut down your computer, be sure to shut it down
properly. Do not turn it off with the case switch.
 Don’t eat or drinks while working.

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 62
01
SELF-CHECK 4.5-2
Occupational Health and Safety Policy

Directions: Identify at least 10 Occupational health and safety (OHS)


policies and procedures in Computer System Servicing NC II.

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 63
01
9

10
.

ANSWER KEY 4.5-2


10 Occupational health and safety (OHS) policies and procedures in
Computer System Servicing NC II.

1 Disconnect the computer and peripherals from their electrical


outlets.

Touch an unpainted metal surface on the computer chassis, such


2 as the metal around the card-slot openings at the back of your
computer, before touching anything inside your computer.

Turn off the computer and all peripherals.


3

Were shoes with non-conductive rubber soles to help reduce the


4 chance of being shocked or seriously injured in an electrical
accident.

Do not work on components that are plugged into their power


5 source.

Do not remove expansion cards from a computer when it is turned


6 on.

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 64
01
Remove all jewelry when working inside any computer related
7 equipment.

Be sure not to mix electronic components and water.


8

When you shut down your computer, be sure to shut it down


9 properly. Do not turn it off with the case switch.

Don’t eat or drinks while working.


10
.

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 65
01
Reference

MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS


12.pptx. (2024, January 29). [Slide show]. SlideShare.
https://www.slideshare.net/slideshow/maintaining-and-repairing-
computer-systems-and-networks-12pptx/265911735

Rodriguez, J. P. (n.d.). L.O 5. Inspect and test the computer systems and
network.docx. Scribd.
https://www.scribd.com/document/471697688/L-O-5-Inspect-and-
Test-the-Computer-Systems-and-Network-docx

SACATA NATIONAL HIGH SCHOOL. (n.d.). IreneRPitlongay. Scribd.


https://www.scribd.com/document/581214313/IreneRPitlongay

Studocu. (n.d.-b). Maintaining of computer systems and networks - PC


HARDWARE SERVICING the strengthened - StudoCu.
https://www.studocu.com/ph/document/metro-manila-
college/bachelors-of-science-in-business-administration/maintaining-
of-computer-systems-and-networks/23882299

Studocu. (n.d.). CSS-9 Q4-W1-2-Mod1 Plan-and-Prepare-For-Maintenance-


and- Repair - ####### 444 Technical Vocational - Studocu.
https://www.studocu.com/ph/document/wesleyan-university-
philippines/accounting-information-system/css-9-q4-w1-2-mod1-
plan-and-prepare-for-maintenance-and-repair/32402264

Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 66
01
Document No:
CBLMs on Date Developed:
Assessment Learning April 2024 Issued by:
2 w/ Focus on Page
Trainer’s
Methodology 1 and 2
Developed by:
KC ALECKS V. BALIWAS
Revision No. pg. 67
01

You might also like