0% found this document useful (0 votes)
6 views8 pages

Q4 W4 Css-Ncii G12 LMNHSV1

This module covers the knowledge and skills necessary for the preventive maintenance of computer systems and networks. It emphasizes the importance of regular inspections, cleaning, and repairs to extend the lifespan of hardware and software while reducing potential issues. Additionally, it provides guidelines for effective maintenance practices and outlines a contingency plan for maintaining computer systems.

Uploaded by

vshhaba36
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views8 pages

Q4 W4 Css-Ncii G12 LMNHSV1

This module covers the knowledge and skills necessary for the preventive maintenance of computer systems and networks. It emphasizes the importance of regular inspections, cleaning, and repairs to extend the lifespan of hardware and software while reducing potential issues. Additionally, it provides guidelines for effective maintenance practices and outlines a contingency plan for maintaining computer systems.

Uploaded by

vshhaba36
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

12

TVL - ICT
Computer Systems Servicing
(CSS NC II)
QUARTER 4 – MODULE 4

Preventive Maintenance of
Computer System and
Network

0
I. INTRODUCTION
This unit covers the knowledge, skills and attitudes needed to maintain and service
computer systems and networks.

II. CONTENTS
Content Standard: The learners demonstrate an understanding of concepts and principals in
maintaining and repairing computers systems and networks.
Performance Standard: the learners shall be able to maintain and repair computer systems
and networks based on acceptable standards in computer’s software and hardware.
Objectives: At the end this module students will be able to:
1. Perform contingency plan in maintaining computer system.
2. Determine the preventive maintenance of computer system and network.
3. Appreciate cleaning computer systems and networks.
 TLE_IACSS9-12MRCN-IIf-j-41
JOB SERVICE ORDER FORMS OR CHECKLIST

A work order form designates a job that can be allocated and scheduled to a person
or company that offers resources. There are several types of work orders that can be
requested for a company. It
could be a new job,
emergency, maintenance
that can be done monthly or
quarterly, and inspection of
the previous job that was
completed. It is used by
companies to collect
important data from the
customers such as contact
information, date of the
request for the task, location
of where the work should be
done and specifications of
the job which need to be
completed.
Other than the type of
work order, customer’s
details, the job’s
specification, and the date of
the execution, it also lays out
the quantity of materials to
be used, its estimated cost,
the price for the labor to be
administered, the number of
hours spent, and the
description for each job.
Figure 1 Sample Job Order

1
PREVENTIVE MAINTENANCE AND TROUBLESHOOTING

Preventive maintenance can be the key to keeping computer systems from


experiencing serious problems, such as data loss and hardware failures, and it also helps
systems have a longer life span. In this section, you study the need for preventive maintenance
of a computer system. Following a good preventive maintenance plan can keep computer
problems from being too troublesome.

Preventive maintenance is the regular and systematic inspection, cleaning, and


replacement of worn parts, materials, and systems. Effective preventive maintenance reduces
part, material, and system faults and keeps hardware and software in good working condition.

Benefits to Preventive Maintenance

Preventive maintenance plans are developed based on at least two factors:

 Computer location or environment: Dusty environments, such as construction sites,


require more attention than an office environment.
 Computer use: High-traffic networks, such as a school network, might require
additional scanning and removal of malicious software and unwanted files.

Regular preventive maintenance reduces potential hardware and software problems,


computer downtime, repair costs, and the number of equipment failures. It also improves data
protection, equipment life, and stability and saves money.

The following are considerations to keep dust from damaging computer components:

 Clean/replace building air filters regularly to reduce the amount of dust in the air.
 Use a cloth or a duster to clean the outside of the computer case. If using a cleaning
product, put a small amount onto a cleaning cloth and then wipe the outside of the
case.
 Dust on the outside of a computer can travel through cooling fans to the inside.
 Accumulated dust prevents the flow of air and reduces the cooling of components.
 Hot computer components are more likely to break down.
 Remove dust from the inside of a computer using a combination of compressed air, a
low-air-flow ESD (Electrostatic discharge) vacuum cleaner, and a small lint-free cloth.
 Keep the can of compressed air upright to prevent the fluid from leaking onto computer
components.
 Keep the compressed air can a safe distance from sensitive devices and components.
 Use the lint-free cloth to remove any dust left behind on the component.

CAUTION

When you clean a fan with compressed air, hold the fan blades in place. This prevents
overspinning the rotor or moving the fan in the wrong direction.

This is a basic list of components to inspect for dust and damage:

 CPU heat sink and fan assembly: The fan should spin freely, the fan power cable
should be secure, and the fan should turn when the power is on.
 RAM modules: The modules must be seated securely in the RAM (Random Access
Memory) slots. Ensure that the retaining clips are not loose.

2
 Storage devices: All cables should be firmly connected. Check for loose, missing, or
incorrectly set jumpers. A drive should not produce rattling, knocking, or grinding
sounds.
 Screws: A loose screw inside the case can cause a short circuit.
 Adapter cards: Ensure that adapter cards are seated properly and secured with the
retaining screws in their expansion slots. Loose cards can cause short circuits. Missing
expansion slot covers can let dust, dirt, or living pests inside the computer.
 Cables: Examine all cable connections. Ensure that pins are not bent or broken and
that cables are not crimped, pinched, or severely bent. Retaining screws should be
finger-tightened.
 Power devices: Inspect power strips, surge suppressors (surge protectors), and UPS
devices. Make sure the devices work properly and that there is clear ventilation.
 Keyboard and mouse: Use compressed air to clean the keyboard, mouse, and
mouse sensor.

An optimal operating environment for a computer is clean, free of potential


contaminants, and within the temperature and humidity ranges specified by the manufacturer,
as shown i and defined in the list that follows.

Follow these guidelines to help ensure optimal computer operating performance:

 Do not obstruct vents or airflow to the internal components.


 Keep the room temperature between 45 and 90 degrees Fahrenheit (between 7 and
32 degrees Celsius).
 Keep the humidity level between 10% and 80%.
 Temperature and humidity recommendations vary by computer manufacturer.
Research the recommended values for computers used in extreme conditions.

Verify that installed software is current and follow the policies of the organization when
installing security updates, operating system, and program updates.

Create a software maintenance schedule to:

 Review and install the appropriate security, software, and driver updates.
 Update the virus definition files and scan for viruses and spyware.
 Remove unwanted or unused programs.
 Scan hard drives for errors and defragment hard drives.

CLEANING COMPUTER SYSTEMS AND NETWORKS

Whether you're here to learn how to “clean up” a cluttered or infected hard drive, or
physically clean your computer's parts, read on for an easy, step-by-step guide. Basically this
article will tell you how to clean software as well as hardware component of your system. It is
a known fact that regular maintenance of your system can significantly boost your computer's
speed and life. Cleaning system files is a software job for reputable system, utilities software
that you can acquire on line by downloads.

If vents are not kept clean and get clogged with dust and fibers, the CPU (Central
Processing Unit) can overheat and cause crashes, malfunctions and damage. To clean it out,

3
you'll need to open your computer's case. For cabinet, hardware cleaning you need physical
efforts, not software.
SUGGESTED CONTINGENCY PLAN IN MAINTAINING COMPUTER SYSTEMS
1. Install Licensed Computer Anti – Virus (Total Version regardless of brand).
2. Early Detection of Issues.
3. Prevention Against intruder.
4. Speed up your computer.
5. Prevent data loss and Keep your system backed up.
6. Keep your computer up to date.
7. Clear Internet data.
8. Run maintenance on your hard drive.
9. Remove unwanted programs.
10. Consult expert Information Technologists, System Analysts and Programmers.

III. EXERCISES. Write your answer in your notebook.


A. Enumeration. Directions: Enumerate the eight list of components to inspect for dust and
damage.
1
2
3
4
5
6
7
8
B. Essay. Directions: Choose one contingency plan in maintaining computer system and
explain.

______

4
IV. SUMMATIVE TEST

(Write your answer in a clean sheet of paper to be given during retrieval, don’t forget to write
your Name, Grade Level and Section)
Note: Use the provided answer sheet template.
A. Enumeration. Directions: Enumerate 10 suggested contingency plan in maintaining
computer system and write your answer in the answer sheet.
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.

B. Identification. Directions: Based on your own understanding, identify the following


possible solution referred to in the following statements.
____________________ 1. A network situation in school that requires additional scanning
and removal of malicious software and unwanted files.

____________________ 2. A computer environment that requires more attention than an


office environment.

____________________ 3. A method to keep computer systems from experiencing serious


problems.

____________________ 4. A temperature that suggested to ensure the optimum


performance of computer systems it need.

____________________ 5. It is a form designates a job that can be allocated and scheduled


to a person or company that offers resources.

C. Essay. Directions: Explain why we need to perform software maintenance.

5
KEY ANSWER
EXERCISES
A. Enumeration

1. CPU heat sink and fan assembly


2. RAM modules
3. Storage devices
4. Screws
5. Adapter cards
6. Cables
7. Power devices
8. Keyboard and mouse

B. Essay
(Answers Vary)

REFERENCES:

A. Handouts
TESDA CSS NC II Training Regulation
DepEd Curriculum Guide in CSS NCII
CHS STVET Manual

B. Books
CISCO
IT Essentials
PC Hardware and Software Companion Guide
3rd Edition

C. Portal
https://ehs.ucsc.edu/
https://IBM.com
https://www.wikihow.com/Clean-Your-Computer-System
CompTia A+ WebSite

6
ANSWER SHEET
NAME: __________________________________ Score: ____________
Section: _________________________________
A. Enumeration
1. ______________________________________________ _______
2. ______________________________________________ _______
3. ______________________________________________ _______
4. ______________________________________________ _______
5. ______________________________________________ _______
6. ______________________________________________ _______
7. ______________________________________________ _______
8. ______________________________________________ _______
9. ______________________________________________ _______
10. ______________________________________________ _______
B. Identification.
_________________________ 1.

_________________________ 2.

_________________________ 3.

_________________________ 4.

_________________________ 5.

C. Essay

_________________________________________________________________________

_________________________________________________________________________

_________________________________________________________________________

_________________________________________________________________________

_________________________________________________________________________

_________________________________________________________________________

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy