gavan pts 8 cblm

Upload: allanjules

Post on 05-Jul-2018

359 views

Category:

Documents


33 download

TRANSCRIPT

  • 8/15/2019 Gavan Pts 8 Cblm

    1/32

    COMPETENCY BASED LEARNING MATERIAL

    Sector Information and Communication Technology (ICT)

    Qualification Title Computer Hardware Servicing

    Unit of Competency Maintain Computer System and Network

    Module Title Maintaining Computer Systems and Networks

  • 8/15/2019 Gavan Pts 8 Cblm

    2/32

    Computer HardwareServicing

    Maintaining ComputerSystem and Networks

    Date Developed: Document No. Issued by:

    Page 2 of 32 Developed by:

    Ma. Louella B. GavanRevision # 00

    HOW TO USE THE MODULE

    This module contains training materials and activities for you to complete.

    The unit of competency “Maintain Computer System and Networks” contains knowledge, skills and attitudes required for a Computer HardwareServicing NC II Qualification.

    You are required to go through a series of learning activities in order tocomplete each of the learning outcomes of the module. In each learning outcomethere are Information Sheets, Job Sheets, Operation Sheets , and ActivitySheets . Follow these activities on your own and answer the Self-Check at theend of each learning activity.

    If you have questions, don’t hesitate to ask your facilitator or trainer for

    assistance.

    Recognition of Prior Learning (RPL)

    You may already have some of the knowledge and skills covered in thismodule because you have:

    been working for some timealready have completed training in this area.

    If you can demonstrate to your trainer that you are competent in aparticular skill or skills, talk to him/her about having them formally recognizedso you don’t have to do the same training again. If you have a qualification orCertificate of Competency from previous trainings show it to your trainer. If theskills you acquired are still current and relevant to this module, they maybecome part of the evidence you can present for RPL. If you are not sure aboutthe currency of your skills, discuss it with your trainer.

    Remember to:

    Work through all the information and complete the activities in each

    section.Read information sheets and complete the self-check. Suggested

    references are included to supplement the materials provided in this module.

  • 8/15/2019 Gavan Pts 8 Cblm

    3/32

    Computer HardwareServicing

    Maintaining ComputerSystem and Networks

    Date Developed: Document No. Issued by:

    Page 3 of 32 Developed by:

    Ma. Louella B. GavanRevision # 00

    Most probably your trainer will also be your supervisor or manager.He/she is there to support you and show you the correct way to do things.

    You will be given plenty of opportunity to ask questions and practice onthe job. Make sure you practice your new skills during regular work shift. Thisway you will improve both your speed and memory and also your confidence.

    Use the Self-checks, Operation Sheets or Job Sheets at the end of eachsection to test your own progress.

    After completing this module ask your trainer to assess your competency.Result of your assessment will be recorded in your competency profile. All thelearning activities are designed for you to complete at your own pace.

    Inside this module you will find the activities for you to complete followedby relevant information sheets for each learning outcome. Each learningoutcome may have more than one learning activity.

  • 8/15/2019 Gavan Pts 8 Cblm

    4/32

    Computer HardwareServicing

    Maintaining ComputerSystem and Networks

    Date Developed: Document No. Issued by:

    Page 4 of 32 Developed by:

    Ma. Louella B. GavanRevision # 00

    SUMMARY OF COMPETENCY-BASED LEARNING MATERIALS

    List of CompetenciesNo. Unit of Competency Module Title Code

    Install computer systemsand networks

    Installing computersystems andnetworks

    ELC724318

    Diagnose and troubleshootcomputer systems

    Diagnosing andtroubleshootingcomputer systems

    ELC724319

    Configure computer systemsand networks

    Configuringcomputer systemsand networks

    ELC724320

    Maintain computersystems and networks

    Maintainingcomputer systemsand networks

    ELC724321

  • 8/15/2019 Gavan Pts 8 Cblm

    5/32

    Computer HardwareServicing

    Maintaining ComputerSystem and Networks

    Date Developed: Document No. Issued by:

    Page 5 of 32 Developed by:

    Ma. Louella B. GavanRevision # 00

    Table of Contents

    HOW TO USE THIS COMPETENCY-BASEDLEARNING MATERIALS--------------------------------------------------------------- 1LIST OF COMPETENCIES-------------------------------------------------------------4

    TABLE OF CONTENTS------------------------------------------------------------------5MODULE CONTENT----------------------------------------------------------------------6TECHNICAL TERMS---------------------------------------------------------------------7LEARNING OUTCOME #3--------------------------------------------------------------9LEARNING EXPERIENCES------------------------------------------------------------10INFORMATION SHEET 4.3-1 Maintenance and Service Safety --- ----11

    SELF CHECK 4.3-1--------------------------------------------------------19 ANSWER KEY 4.3-1--------------------------------------------------------20INFORMATION SHEET 4.3-2 Network Cabling -------- ---------------------21

    SELF CHECK 4.3-2---------------------------------------------------------26 ANSWER KEY 4.3-2---------------------------------------------------------27

    TASK SHEET 4.3-1----------------------------------------------------------28PERFORMANCE CRITERIA CHECKLIST 4.3-1--------------------------29

    INFORMATION SHEET 4.3-5 Documentation------------------------------------30SELF CHECK 4.3-3-----------------------------------------------------------32ANSWER KEY 4.3-3-----------------------------------------------------------33

  • 8/15/2019 Gavan Pts 8 Cblm

    6/32

    Computer HardwareServicing

    Maintaining ComputerSystem and Networks

    Date Developed: Document No. Issued by:

    Page 6 of 32 Developed by:

    Ma. Louella B. GavanRevision # 00

    MODULE CONTENT

    QUALIFICATION COMPUTER HARDWARE SERVICING NC IIUNIT OF

    COMPETENCY Maintain Computer Systems and Networks

    MODULE TITLE Maintaining Computer Systems and Networks

    INTRODUCTION: This module deals with the knowledge, skills, and application

    towards Maintaining Computer Systems and Networks.

    NOMINAL DURATION:

    LEARNING OUTCOMES:

    Plan and prepare for the maintenance of computer systems and networks.Maintain computer systems and networksInspect and test configured/repaired computer system and networks

    ASSESSMENT CRITERIA:Plan and prepare maintenance with OHS policies and procedures.Obtain and check the materials, tools, equipment and testing devices.Check, identify and maintain computer system and networks with

    specifications and requirements to conform to manufacturers.Check and test the normal functions of computer systems.Perform the scheduled/periodic maintenance and cleaning.Check and test the normal functions of network systems.Perform the scheduled/periodic maintenance and cleaning.Check to ensure safe operation of computer system and network.Final inspection and testing taken to conform to manufacturer

    specifications.Reports prepared and completed to company regulations.

    Prerequisite: PC Operation

    Technical Terms OHS – Occupational Health and Safety LAN Card – Local area network interface card.

  • 8/15/2019 Gavan Pts 8 Cblm

    7/32

    Computer HardwareServicing

    Maintaining ComputerSystem and Networks

    Date Developed: Document No. Issued by:

    Page 7 of 32 Developed by:

    Ma. Louella B. GavanRevision # 00

    Server – is a part of a network. It is a special computer that users on thenetwork can assess to carry out a particular job.

    Port hub /Port – is a connector on the back of a computer or other device.A port is either a serial port or a parallel port.

    Modem - (Modulator-Demodulator) The modem is a device that allows a

    given computer to share data or otherwise a device which let computersexchange information USB – (Universal Serial Port) Scanner - it is an input device that read text or illustration printed on

    paper, translates the information into a form that a computer can use. Printer - It is a piece of hardware that produces a paper copy (also known

    as ‘hardcopy’) of the information ge nerated by the computer. Flash drive – a portable storage device which is plug directly to the USB

    port. Network – a group of computers and associated devices that are connected

    by communications facilities.

    OS (Operating system) software that controls the allocation and use ofprograms and data that a computer uses.

    Software – programs and data that a computer uses. Motherboard – contains the CPU, BIOS, Memory, mass storage interfaces,

    serial and parallel ports, expansion slot and all the controllers required tocontrol standard peripheral devices such as the display screen, keyboard anddisk drive

    UTP – (Unshielded Twisted Pair) least expensive and most popular networkmedia.

    LAN – Local Area Network, the connection of computers within anorganization or a building.

    MAN – Metropolitan Area Network, the establishment of connection amongcomputers within a country or municipality.

    WAN – Wide Area Network, global connection of networked computers.Otherwise known as the internet.

    Maintenance - i s the testing and cleaning of equipment. Planning – is both the organizational process of creating and maintaining a

    plan; and the psychological process of thinking about the activities requiredto create a desired future on some scale

    Computer System - The complete computer made up of the CPU, memoryand related electronics (main cabinet), all the peripheral devices connectedto it and its operating system. Computer systems fall into two broaddivisions: clients and servers. Client machines fall into three categories fromlow to high end: laptop, desktop and workstation. Servers range from smallto large: low-end servers, midrange servers and mainframes.

  • 8/15/2019 Gavan Pts 8 Cblm

    8/32

    Computer HardwareServicing

    Maintaining ComputerSystem and Networks

    Date Developed: Document No. Issued by:

    Page 8 of 32 Developed by:

    Ma. Louella B. GavanRevision # 00

    LEARNING OUTCOME SUMMARY

    LEARNING OUTCOME #3INSPECT AND TEST COMPUTER SYSTEM ANDNETWORKS

    CONTENTS: Maintenance and service safety Network Cabling Documentation

    ASSESSMENT CRITERIA:Computer system and network checked to ensure safe operation.Final inspection and testing taken to conform to manufacturer’s

    specification.Reports prepared and completed to company regulations.

    CONDITION: Trainees must be provided with the following:

    - PC specification- Diagnostics software and CDROM- Books/manuals/magazines- Tools and test equipment- Slotted head screwdriver- Philips head screwdriver- Long nosed pliers- Allen bit wrench

    - Cable tester- Crimping Tool

    EVALUATION METHOD:Hands-onDirect observationPractical demonstration

  • 8/15/2019 Gavan Pts 8 Cblm

    9/32

    Computer HardwareServicing

    Maintaining ComputerSystem and Networks

    Date Developed: Document No. Issued by:

    Page 9 of 32 Developed by:

    Ma. Louella B. GavanRevision # 00

    LEARNING EXPERIENCES

    Learning Outcome 3: INSPECT AND TEST COMPUTER SYSTEMS ANDNETWORKS

    Learning Activities Special Instructions 1. Read information sheet 4.3-1 “ Maintenance and ServiceSafety ”

    Work through all the information andcomplete the activities in each section.

    Read information sheets and complete theself-check. Suggested references areincluded to supplement the materialsprovided in this module.

    2. Answer self-check 4.3-13. Read information sheet 4.3-2 “Network Cabling ”

    4. Answer self-check 4.3-2

    5 . View Video on “How to Make a Category 5 NetworkCable”

    6. Answer oral questions

    7. Observe Demonstration on“Network Cabling”

    8. Perform Task Sheet 4.3-1“Network Cabling”

    9. Read information sheet 4.3-3 “ Documentation ”

    10. Answer self-check 4.3-3Congratulations on a Job well done!!! You have now successfullycompleted the last competency for this qualification and is now readyfor the National Assessment. Good luck and use what you have learnedhere well!!!

    INFORMATION SHEET 4.3-1

  • 8/15/2019 Gavan Pts 8 Cblm

    10/32

    Computer HardwareServicing

    Maintaining ComputerSystem and Networks

    Date Developed: Document No. Issued by:

    Page 10 of32

    Developed by:

    Ma. Louella B. GavanRevision # 00

    Maintenance and Service Safety

    Learning Objectives : After reading this information sheet, you will be able to inspect and record the condition, and other vital information of the computer

    systems and networks.

    Introduction:

    Keeping track of the conditions of all the computers and network will helpus maintain the smooth and effective operation of the facility, assessment center,computer laboratory, office, and company. Since computers and networks areimportant to us, effective inspection of these equipment will help us prolong theirusability and save us a lot of time and effort on fixing things again and again.

    How to Maintain Your Computer

    A properly maintained computer will provide you with substantially higherspeeds, both via RAM and on the internet, regardless of your hardware setupand configurations. The second law of thermodynamics states that all systemsatrophy (degrade) over time - well, here are a few tips on how delay the inevitable.

    Software/Hard drive

    1. Clean out all the junk left behind by browsers. To do this, you can usethe Disk Cleanup utility included on the Windows systems, or download

    a freeware program such as CCleaner to do it for you. In Linux you can

    use Kleansweep or Bleachbit. Cookies and cache left behind by browsers

    http://www.wikihow.com/Image:Maintain-Your-Computer-Step-1.jpg

  • 8/15/2019 Gavan Pts 8 Cblm

    11/32

    Computer HardwareServicing

    Maintaining ComputerSystem and Networks

    Date Developed: Document No. Issued by:

    Page 11 of32

    Developed by:

    Ma. Louella B. GavanRevision # 00

    can amount up to gigabytes of wasted space, so it is imperative they're

    deleted.

    2. Search and destroy spyware and/or viruses on your PC. There is amyriad of tools available to do this. AVG Anti Virus is a good one to use.

    Download.com is a great place to legally obtain these tools.

    3. Defragment your hard drive monthly to keep your computer running

    smoothly. Windows XP includes a utility to do this, but a tool called

    Magical Defrag also exists, which automatically defrags your system

    during periods of inactivity.

    http://www.wikihow.com/Image:Maintain-Your-Computer-Step-3.jpghttp://www.wikihow.com/Image:Maintain-Your-Computer-Step-2.jpg

  • 8/15/2019 Gavan Pts 8 Cblm

    12/32

  • 8/15/2019 Gavan Pts 8 Cblm

    13/32

    Computer HardwareServicing

    Maintaining ComputerSystem and Networks

    Date Developed: Document No. Issued by:

    Page 13 of32

    Developed by:

    Ma. Louella B. GavanRevision # 00

    a. For Windows, select Performance and Maintenance and then choose"Rearrange items on your hard disk..." and "Free up space on your

    hard disk."

    b. For Mac, go to the Applications Folder, select Utilities Folder thenlaunch Disk Utility.

    http://www.wikihow.com/Image:Maintain-Your-Computer-Step-6Bullet2.jpghttp://www.wikihow.com/Image:Maintain-Your-Computer-Step-6Bullet1.jpg

  • 8/15/2019 Gavan Pts 8 Cblm

    14/32

    Computer HardwareServicing

    Maintaining ComputerSystem and Networks

    Date Developed: Document No. Issued by:

    Page 14 of32

    Developed by:

    Ma. Louella B. GavanRevision # 00

    Hardware/CPU

    1. Always run your computer on a UPS as this will help protect it from

    electric surges. Phone lines for modems and cat 5 or cat 6 network linesalso need surge suppression as they can and will take out your network

    card or modem in an electric storm.

    2. Your computer can grow dusty in less than a year, depending onwhere it is stored. Open it up depending on how dusty your house is. If

    it's not too dusty, then check every few months, but if it's super

    dusty(your house), then be much more proactive about it. Remove thedust on the bottom with a vacuum (or cloth), then spray with

    http://www.wikihow.com/Image:Maintain-Your-Computer-Step-8.jpghttp://www.wikihow.com/Image:Maintain-Your-Computer-Step-7.jpg

  • 8/15/2019 Gavan Pts 8 Cblm

    15/32

    Computer HardwareServicing

    Maintaining ComputerSystem and Networks

    Date Developed: Document No. Issued by:

    Page 15 of32

    Developed by:

    Ma. Louella B. GavanRevision # 00

    compressed canned air. Pay special attention to the CPU heat sink and

    CPU fan. Hold the fan still while spraying it as you can cause it to spin

    out and on reboot it may have more noise. Spray the intakes to the

    Power supply fan also. Since you have the cover off reboot and listen for

    noisy fans make sure all fans are working. Replace the fan if it stops

    spinning or starts making unnatural sound or you can try to lubricate

    the bearing, this might help.

    3. Be careful when plugging in USB, Ethernet, speakers, printer etc. into your computer. Ports such as USB and Ethernet can easily be damagedfrom careless placement. These repairs can be costly and these ports area necessity.

    4. Underclock your CPU for the ultimate in longevity.

    Checking the Maintained Computer Systems:

    The effectiveness of checking maintained computers depends on thequality of inspection. A quality inspection of computer systems must includethe following:

    http://www.wikihow.com/Image:Maintain-Your-Computer-Step-9.jpg

  • 8/15/2019 Gavan Pts 8 Cblm

    16/32

    Computer HardwareServicing

    Maintaining ComputerSystem and Networks

    Date Developed: Document No. Issued by:

    Page 16 of32

    Developed by:

    Ma. Louella B. GavanRevision # 00

    Powering On the Computer Testing all the computers’ devices Check if all the devices are working properly Checking the computers’ performance Check if the computer is performing at its best Inspecting the cables attached on the computer Check if the Cables are fixed properly

    Power Cables LAN (Local Area Network) Cables PS2 Cables USB (Universal Serial Bus) Cables Monitor Cables

    Having a checklist will help us on what things to consider so that we canbe sure that the computer systems and networks are in good working conditionor not.

    Inspection Checklist TemplateINSPECTION CHECKLISTEquipment Type : Desktop ComputerProperty Code : WTCA-123456Number : P.C.#1Location : Computer Laboratory/E-learning Area

    YES NO N/A INSPECTION ITEMS 1. Does the machine operate normally?2. Are accessories checks for damage?

    3. Are all device driver installed and configuredproperly?

    4. Are the display properties configured correctly?5. Is the sound functioning?6. Is the pc connected to the server?7. Is the printer installed shared?8. Is IP address configured correctly?9. Is their internet connection?10. Is desired workgroup followed11. Is internal parts cleaned?12. Is external parts cleaned?13. Is check disk performed14. Is unwanted programs removed

  • 8/15/2019 Gavan Pts 8 Cblm

    17/32

    Computer HardwareServicing

    Maintaining ComputerSystem and Networks

    Date Developed: Document No. Issued by:

    Page 17 of32

    Developed by:

    Ma. Louella B. GavanRevision # 00

    15. Is necessary files back-upped16. Is anti-virus program updated and run17. Is disk defragment performedSummary of Inspections

    Area to beInspected Goodrunningcondition

    BadrunningCondition

    Remarks

    HARDWARE No malfunctioned hardware

    SOFTWARE Drivers and Application are up todate

    NETWORK Network connection is stable

  • 8/15/2019 Gavan Pts 8 Cblm

    18/32

  • 8/15/2019 Gavan Pts 8 Cblm

    19/32

    Computer HardwareServicing

    Maintaining ComputerSystem and Networks

    Date Developed: Document No. Issued by:

    Page 19 of32

    Developed by:

    Ma. Louella B. GavanRevision # 00

    Answer Key 4.3-1

    1. T

    2. T3. F4. F5. T

  • 8/15/2019 Gavan Pts 8 Cblm

    20/32

    Computer HardwareServicing

    Maintaining ComputerSystem and Networks

    Date Developed: Document No. Issued by:

    Page 20 of32

    Developed by:

    Ma. Louella B. GavanRevision # 00

    INFORMATION SHEET 4.3-2

    Network Cabling

    Learning Objectives : After reading this information sheet, you will be able to

    know and understand network cabling and make the two wiring standards usedfor wired Ethernet networks and their uses.

    Introduction:

    The physical pathway used to connect two or more computers together asa network includes the transmission media. The quality of the network systemdependent on its transmission media. The most common forms of electrical andelectronic transmission are solid and composite wire cables. There are severaltypes of cable, including coaxial, unshielded twisted-pair and fiber optic. Eachtype adheres to standards set by the Institute of Electrical and ElectronicsEngineers (IEEE).

    The Telecommunications Industry Association (TIA) and the ElectronicIndustries Association (EIA) standards govern all aspects of cable installation,such as regulations on cabling distances and connector configurations.

    In choosing cabling for a network, there are several factors to consider:cost, expansion capabilities, bandwidth, signal attenuation, and EMI (Electro-Magnetic Interference). Each type of cable has different specifications that affectthese factors, and each organization has different needs. Considering cablesystem factors is very important for building a network system that meets anorganization’s needs.

    The effectiveness of running computer to computer communications is tomake sure that the computers in a network is connected properly for effectiveand easier sharing of files, information and other resources.

    Common Network Cable Types

    1. Coaxial Cable it consists of a copper wire surrounded first by a layer ofplastic, then a layer of metal mesh and a final layer of protective plastic.It is used for peer-to-peer networking.

  • 8/15/2019 Gavan Pts 8 Cblm

    21/32

    Computer HardwareServicing

    Maintaining ComputerSystem and Networks

    Date Developed: Document No. Issued by:

    Page 21 of32

    Developed by:

    Ma. Louella B. GavanRevision # 00

    2. Unshielded Twisted Pair is network cable that consists of up to 4 pairsof wires. Each pair is twisted around each other at a different rate andthe entire cable is encased in a protective plastic covering.

    3. Fiber Optic cable uses light to transmit information across a network. The core of the cable is made of glass, which is protected by a layer ofgel or plastic. A plastic cover surrounds the entire cable.

    UTP characteristics Unshielded Twisted (why?) pairs of insulated conductors

    Covered by insulating sheath

    UTP Categories

    Category 1 Voice only (Telephone)

    Category 2 Data to 4 Mbps (Localtalk)

    Category 3 Data to 10Mbps (Ethernet)

    Category 4 Data to 20Mbps (Token ring)

  • 8/15/2019 Gavan Pts 8 Cblm

    22/32

    Computer HardwareServicing

    Maintaining ComputerSystem and Networks

    Date Developed: Document No. Issued by:

    Page 22 of32

    Developed by:

    Ma. Louella B. GavanRevision # 00

    Cat5e cable

    1000Mbps data capacity For runs of up to 90 meters Solid core cable ideal for structural installations (PVC or Plenum) Stranded cable ideal for patch cables Terminated with RJ-45 connectors

    Making connections – Tools Cat5e cable RJ45 connectors Cable stripper Scissors Crimping tool

    Making connections - Steps Step 1 – Strip cable end

    Strip 1 – 1½” of insulating sheath Avoid cutting into conductor insulation

    Step 2 – Untwist wire ends Sort wires by insulation colors

    Category 5

    Category 5e

    Data to 100Mbps (Fast Ethernet)Data to 1000Mbps (Gigabit Ethernet)

    Category 6 Data to 2500Mbps (Gigabit Ethernet)

  • 8/15/2019 Gavan Pts 8 Cblm

    23/32

    Computer HardwareServicing

    Maintaining ComputerSystem and Networks

    Date Developed: Document No. Issued by:

    Page 23 of32

    Developed by:

    Ma. Louella B. GavanRevision # 00

    Step 3 – Arrange wires TIA/EIA 568A: GW-G OW-Bl BlW-O BrW-Br (Straight through) TIA/EIA 568B: OW-O GW-Bl BlW-G BrW-Br (Crossover)

    Step 4 – Trim wires to size Trim all wires evenly Leave about ½” of wires exposed

    Step 5 – Attach connector

    Maintain wire order, left-to-right, with RJ45 tab facing downward

    Step 6 - Check Do all wires extend to end? Is sheath well inside connector?

  • 8/15/2019 Gavan Pts 8 Cblm

    24/32

    Computer HardwareServicing

    Maintaining ComputerSystem and Networks

    Date Developed: Document No. Issued by:

    Page 24 of32

    Developed by:

    Ma. Louella B. GavanRevision # 00

    Step 7 – Crimp

    Squeeze firmly to crimp connecter onto cable end (8P)

    Step 8 – Test

    Does the cable work?

  • 8/15/2019 Gavan Pts 8 Cblm

    25/32

    Computer HardwareServicing

    Maintaining ComputerSystem and Networks

    Date Developed: Document No. Issued by:

    Page 25 of32

    Developed by:

    Ma. Louella B. GavanRevision # 00

    Self-check 4.3-2

    TRUE OR FALSE: Write T if the statement is True and F if it is false.

    1. UTP is network cable that consists of up to 4 pairs of wires.2. CAT5e cable has 100Mbps data capacity.3. Fiber Optic cable uses light to transmit information across a network.4. UTP is covered by insulating sheath.5. The CAT5e cable runs of up to 90 meters.

  • 8/15/2019 Gavan Pts 8 Cblm

    26/32

    Computer HardwareServicing

    Maintaining ComputerSystem and Networks

    Date Developed: Document No. Issued by:

    Page 26 of32

    Developed by:

    Ma. Louella B. GavanRevision # 00

    Answer Key 4.3-2

    1. T2. F3. T

    4. T5. T

  • 8/15/2019 Gavan Pts 8 Cblm

    27/32

    Computer HardwareServicing

    Maintaining ComputerSystem and Networks

    Date Developed: Document No. Issued by:

    Page 27 of32

    Developed by:

    Ma. Louella B. GavanRevision # 00

    Task Sheet 4.3-1

    Title: How to Make a Category 5 Network Cable

    Performance Objective: Create a category 5 Network cable (straight throughand crossover) in order to connect the computer to the network.

    Supplies, Tools &Equipment :1. LAN Cable(about 2-5 meters)2. Wire stripper3. Wire cutter4. Crimper5. RJ 45

    Steps/ Procedure:1. Prepare all the materials needed for this task.2. Ensure safety when performing this task.3. Strip cable end. Strip 1 – 1½” of insulating sheath. Avoid cutting into

    conductor insulation.4. Untwist wire ends. Sort wires by insulation colors.5. Flatten wires.6. Arrange wires. TIA/EIA 568A: GW-G OW-Bl BlW-O BrW-Br

    TIA/EIA 568B: OW-O GW-Bl BlW-G BrW-BrStraight Through- both ends have the same color configurationCrossover-use 568A on one end and 568B on the other end.7. Trim wires to size. Trim all wires evenly. Leave about ½” of wires

    exposed.

    8.

    Attach connector.9. Maintain wire order, left-to-right, with RJ45 tab facing downward.10. Check.11. Crimp. Squeeze firmly to crimp connecter onto cable end.12. Test

    Assessment Method:Demonstration , Performance Criteria checklist

  • 8/15/2019 Gavan Pts 8 Cblm

    28/32

    Computer HardwareServicing

    Maintaining ComputerSystem and Networks

    Date Developed: Document No. Issued by:

    Page 28 of32

    Developed by:

    Ma. Louella B. GavanRevision # 00

    PERFORMANCE CRITERIA CHECKLIST 4.3-1

    Performance CriteriaDid you… Yes No

    1. Prepare all the materials needed for this task.

    2. Follow safety procedures while performing inspection

    3. Strip the cable end without cutting into the conductor

    4. Arrange the wires according to the insulation colors forstraight through cable

    5. Arrange the wires according to the insulation colors for

    crossover cable6. Trim wires to size.

    7. Attach the connector.

    8. Maintain wire order, left-to-right.

    9. Check the wire order and

    10. Crimp and squeeze firmly to crimp connecter onto cable

    end.11. Get the correct result when testing the cable.

  • 8/15/2019 Gavan Pts 8 Cblm

    29/32

    Computer HardwareServicing

    Maintaining ComputerSystem and Networks

    Date Developed: Document No. Issued by:

    Page 29 of32

    Developed by:

    Ma. Louella B. GavanRevision # 00

    INFORMATION SHEET 4.3-3Documentation

    Learning Objectives : After reading this information sheet, you are to record the

    events and create documentation or logs. You will be able to learn the importanceof logging.

    IntroductionCreating a event/incident summary report on the maintenance of

    computer system and network will help us maintain our computer systems andnetworks. Together with the efficient inspection of these equipment, the life ofthese devices will be extended. Having a complete report on the events/incidentshappening to our devices will also help us to trace easily the defects andtroubleshoot and fix them.

    What is a report?

    In writing, a report is a document characterized by information or othercontent reflective of inquiry or investigation, which is tailored to the context ofa given situation and audience. The purpose of reports is usually to inform.However, reports may include persuasive elements, such as recommendations,suggestions, or other motivating conclusions that indicate possible futureactions the report reader might take. Reports can be public or private, andoften address questions posed by individuals in government, business,education, and science. Reports often take the structure of scientificinvestigation: Introduction, Methods, Results and Discussion (IMRAD). Theymay sometimes follow a problem-solution structure based on the audience'squestions or concerns. As for format, reports range from a simpler format withheadings to indicate topics, to more complex formats including charts, tables,figures, pictures, tables of contents, abstracts, summaries, appendices,footnotes, hyperlinks, and references.

    The purpose of a report is to show information collected to the readerabout certain topics, usually to set targets or to show a general view on thesubject in hand. Another purpose is to discuss and analyze ideas and thoughtson any problems or improvements to be made and to inform the audience. Theycan either persuade, suggest or to motivate conclusions.

    A report is an extended formal document with lots of pages that shows

  • 8/15/2019 Gavan Pts 8 Cblm

    30/32

    Computer HardwareServicing

    Maintaining ComputerSystem and Networks

    Date Developed: Document No. Issued by:

    Page 30 of32

    Developed by:

    Ma. Louella B. GavanRevision # 00

    different types of information with details of the findings like e.g. Methodology,findings and added Appendices. The document structure is easily navigated byusing a table of contents, so the audience can easily find specific informationby clear headings and a set structure of text and images.

    Types of reports include:

    Scientific reports, recommendation reports, white papers, annualreports, auditor's reports, workplace reports, census reports, trip reports,progress reports, investigative reports, budget reports, policy reports,demographic reports, credit reports, appraisal reports, inspection reports,military reports, bound reports, etc.

    Many textbooks discuss reports in greater detail. See minority report,final report, majority report, environmental resources reports, error and otherreports from software systems, etc. With the dramatic expansion of informationtechnology, and the desire for increased competitiveness in corporations, there

    has been an increase in the use of computing power to produce unified reportswhich join different views of the enterprise in one place. Termed EnterpriseReporting, this process involves querying data sources with different logicalmodels to produce a human readable report. A computer user has to query theHuman Resources databases and the Capital Improvements databases to showhow efficiently space is being used across an entire corporation.Incident- an event which is either unpleasant or unusual.Failure- when something does not work or stops working as well as it should.Benefits

    – Reports provide clues about performance issues, application functionproblems, intrusion and attack attempts etc.

    – The reports provide vital inputs for managing the computer securityincidents, both for Incident Prevention and Incident Response

    – When responding to computer security incident, reports provide leads tothe activities performed over the system

    Importance of Making a ReportIt enables you to practice your skills of presentation, argument, evaluation, andcalculation, and provides a permanent record of your work.

    Things that we usually record in a reportWe record the events occurrence of the following

    -

    Hardware failure- Network failure- Software failure

  • 8/15/2019 Gavan Pts 8 Cblm

    31/32

    Computer HardwareServicing

    Maintaining ComputerSystem and Networks

    Date Developed: Document No. Issued by:

    Page 31 of32

    Developed by:

    Ma. Louella B. GavanRevision # 00

    Self-check 4.3-3

    TRUE OR FALSE: Write T if the statement is True and F if the statement isfalse.

    1. A Report is a piece of information describing, or an account of certainevents given or presented to someone

    2. Making a report enables you to practice your skills of presentation,argument, evaluation, and calculation, and provides a permanent recordof your work.

    3. A report is an event which is either unpleasant or unusual4. Failure is when something does not work or stops working as well as it

    should.5. Record the events’ occurrence only of the following:

    a. Hardware failureb. Software failure

  • 8/15/2019 Gavan Pts 8 Cblm

    32/32

    Computer HardwareServicing

    Maintaining ComputerSystem and Networks

    Date Developed: Document No. Issued by:

    Page 32 of32

    Developed by:

    Ma. Louella B. GavanRevision # 00

    Answer Key 4.3-3

    1. T2. T3. F4. T5. F