Preventive Maintenance

Slides:



Advertisements
Similar presentations
IT Ess I v.4x Chapter 1 RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Advertisements

Maintaining and Protecting Your PC David Cox Region VI Facilitator.
Fragmentation is the degree to which pieces that make up files are spread across the hard disk.
IT Essentials I v. 3.1 Module 12 Preventive Maintenance and Upgrading
IT Essentials: PC Hardware and Software v4.0. Chapter 2 Objectives 2.1 Explain the purpose of safe working conditions and procedures 2.2 Identify tools.
Assembly / Disassembly / Reassembly Computers. Chapter Objectives After completing this chapter you will: Understand how static electricity can damage.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Jianxin Tang IT 1 V4.0 Ch2. Safe Lab Procedures and Tool Use.
CIT In this chapter you will learn how to:  Care for the external parts of the computer  Describe methods for keeping the inside of the case problem-free.
Chapter 2 Safe Lab Procedures & Tool Use
If you use your computer more than a few hours per day, we suggest you not to turn off your computer at the end of the day. Instead turn off only the.
Computer Maintenance Power Quality and Protection Copyright © Texas Education Agency, All rights reserved. 1.
HOW WELL DO YOU KNOW THE BASICS OF USING YOUR COMPUTER?
Maintaining and Troubleshooting Computer Systems Computer Technology.
Power Supplies Chapter 6. Understanding Electricity Electricity is simply a flow of negatively charged particles, called electrons, through matter Materials.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Chapter 8Basic Computer Maintenance  8.1Preventive Maintenance 8.1Preventive Maintenance 8.1Preventive Maintenance  8.2Monitoring System Performance.
IT Essentials: PC Hardware and Software v4.0.  List of chapter objectives  Overview of the chapter contents, including ◦ student worksheets ◦ student.
MAINTAINING AND TROUBLESHOOTING COMPUTER SYSTEMS UNIT 6.
Disassembly and Power Chapter 4. Disassembly Overview Disassembling the computer outside the case may help with grounding problems. A grounding problem.
David white. List objectives for the chapter identify problems that can occur if hardware is not properly maintained. Identify routine maintenance that.
Chapter Five Maintaining a Computer Part I: Cleaning a Computer.
By: Marideth Bradley. OBJECTIVES Identify problems that can occur if hardware is not properly maintained. Identify routine maintenance that can be performed.
PC Maintenance: Preparing for A+ Certification Chapter 2: Safety and Preventive Maintenance.
PC Repair Fundamentals 1. Objectives Learn about tools you’ll need as a computer support technician Learn how to develop a preventive maintenance plan.
Elizabeth Wilmoth Period 2.  Identify problems that can occur if hardware is not properly maintained.  Identify routine maintenance that can be performed.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 2 1 Chapter 2: Safe Lab Procedures and Tool Use IT Essentials: PC Hardware.
IT Essentials: PC Hardware and Software 1 Chapter 10 Preventative Maintenance.
Unit 4- Maintaining & Protecting Hardware.  Identify the importance of keeping a computer clean.  Explain what is needed to clean a PC.  Identify the.
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 2 1 Chapter 2: Safe Lab Procedures and Tool Use IT Essentials:
Guide to Linux Installation and Administration, 2e 1 Chapter 9 Preparing for Emergencies.
COMPUTER CARE & MAINTENANCE. Protecting Your Computer From Damage Like any kind of equipment, your computer requires care and maintenance to run smoothly.
1 Safety and Preventative Maintenance. 2 MB, One megabyte - MB or M-byte - represents about 1 million (10 6 ) bytes. Precisely, 1 MB = = 1 kB x 1 kB =
Tools.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Chapter 11 Bruce Gaffield Randy Binns Scott Thrush Kristi Partney Edited by Richard Goldman.
Objectives: Identify problems that can occur if hardware is not properly maintained Identify routine maintenance that should be performed by users Identify.
LESSON 4 COMPUTER MAINTENANCE BY: Morgan Bradley.
Lesson 4 By: Matthew Cheser. Objectives Identify problems that can occur if hardware is not properly maintained. Identify routine maintenance that can.
Safety. Outcomes  Potential health hazards when working with computer equipment.  Precautions to take to prevent injuries.  Steps and techniques for.
By Nick Paige.  Identify problems that can occur if hardware is not properly maintained  Identify routine maintenance that can be performed by users.
 Indentify problems that can occur if hardware is not properly maintained.  Identify routine maintenance that can be performed by users.  Identify.
IT Essentials: PC Hardware and Software 1 Chapter 11 Troubleshooting PC Hardware.
Derek Emerson.  Identify problems that can occur if hardware is not properly maintained.  Identify routine maintenance that can be performed by users.
IT Essentials PC Hardware & Software v4.1 Chapter 2 – Tools & Safety Procedures Jeopardy Review v1 Darren Shaver Kubasaki High School Okinawa, Japan Chapter.
POWER FLUCTUATIONS Computer Systems. Power Fluctuations Voltage is the force that moves electrons through a circuit Unsteady voltages are called power.
Safe Lab Procedures and Tool Use
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: Safe Lab Procedures and Tool Use IT Essentials 5.0.
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 2 1 Chapter 2: Safe Lab Procedures and Tool Use IT Essentials:
HOW NOT TO INCORRECTLY CARE FOR COMPUTER HARDWARE HANDLING AND STORAGE BY BLAINE AND ZACH.
CONDUCTING TEST ON THE INSTALLED COMPUTER SYSTEM
Chapter 2: Introduction to Lab Procedures and Tool Use
IC3 GS3 Standard COMPUTING FUNDAMENTALS Module
Chapter Objectives In this chapter, you will learn:
Chapter Objectives In this chapter, you will learn:
Chapter 4: Overview of Preventive Maintenance
HOW WELL DO YOU KNOW THE BASICS OF USING YOUR COMPUTER?
UNIT 19 Data Security 2.
Computer Technician Technicians’ Tools Trade & Industrial Education
Firewalls.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: Safe Lab Procedures and Tool Use IT Essentials 5.0.
Environmental Maintenance & Cleaning
Introduction to Computers
HOW WELL DO YOU KNOW THE BASICS OF USING YOUR COMPUTER?
Personal Computers and Applications
Chapter 6 Purchasing and Maintaining a Computer
Lesson 4 Computer Maintenance
Personal Computer Maintenance
IT Essentials PC Hardware and Software 4
Electrostatic Discharge
IT Essentials PC Hardware and Software 4
Presentation transcript:

Preventive Maintenance Preventing System Failure

System Failure failure that occurs because of a hardware failure or a severe software issue. Commonly, a system failure will cause the system to freeze, reboot, and/or stop functioning altogether. Is the prolonged malfunction of a computer. It may result from loss of hardware, software, data, or information.

System Failure May result from a variety of causes: Aging hardware Natural disasters Random events such as electrical power variation

What is PM Preventive maintenance is a schedule of planned maintenance actions aimed at the prevention of breakdowns and System failures..

Preventive Maintenance Program The main goal of any preventive maintenance program is to pre-empt problems before they happen. There are three questions that need to be addressed when developing a preventive maintenance program. This means asking when, why, and how? When is the best time to prevent problems from happening? Why is this maintenance being done now? How is this system to be maintained?

Long-term benefits of preventive maintenance include: Improved system reliability. Decreased cost of replacement. Decreased system downtime. Better spares inventory management. Long-term effects and cost comparisons usually favor preventive maintenance over performing maintenance actions only when the system fails.

Tools and Equipment A technician should have a toolbox that contains the basic tools as shown in the graphic. A toolkit should also include the following: Flat-head screwdriver Phillips-head screwdriver Nut drivers Needle-nose pliers Diagonals or crosscut pliers Mirror to help see in tight places Digital multimeter Flashlight

Tools and Equipment The toolset should also include a digital multimeter (DMM). A DMM can perform electrical tests and measure voltage, amps, and ohms in both alternating and direct current. A DMM can be used to test power supplies, DC/AC voltage and polarity, resistance, diodes, continuity, coaxial cable, fuses, and batteries.

Electrostatic Discharge (ESD) Static electricity is the buildup of an electric charge resting on a surface. ESD is the worst enemy of the fine electronics found in computer systems. At least 3000 volts must be built up before a person can feel an ESD. If the discharge causes pain or makes a noise, then the charge was probably above 10,000 volts. Most computer chips run on less than five volts of electricity. A computer component could be damaged by less than 3000 volts of static buildup.

Electrostatic Discharge (ESD) Special packing materials are used with microchips and Printed Circuit Boards (PCBs). Do not remove any component from special packaging until it is ready to be installed.

Electrostatic Discharge (ESD) When working on a computer or the individual components, some tools should be used to reduce the risk of ESD. A grounding wrist strap provides a place for the static to go before it attacks a sensitive computer component. Note: A wrist strap should not be worn when working with high-voltage equipment, such as a power supply or a CRT monitor.

Wrist Strap

Cleaning Peripheral Devices When cleaning a display (monitor), make sure the device is unplugged from the wall. Use a damp cloth with a mild detergent to wipe down the entire display unit and remove any dust buildup. Dampen another cloth with water to remove any cleaner residue on the surface of the monitor. After cleaning the display, use a dry cloth to complete the job.

Cleaning Peripheral Devices A mechanical mouse may not function properly if it becomes dirty. When dust settles on the mouse pad, it gets swept up into the moving parts of the mouse. This causes a buildup on the rollers inside the mouse. The fastest way to clean it is to remove the plate on the bottom of the mouse, remove the ball, and then gently scrape the dust buildup from the rollers.

Cleaning Peripheral Devices Keyboards are also exposed to the environment, which allows dust to build up on the keyboard over time. Periodic cleaning of the keyboard will prolong the lifespan and prevent malfunction. The keys on a keyboard can be removed to allows easy access to the areas where dust collects. A soft brush or cotton swab can be used to remove dirt from under the keys. Compressed air can be used to blow out dust from below the keys.

Cleaning Peripheral Devices Printers have many moving parts within them. They require a higher level of maintenance. Printers also produce impurities that collect on the components within the device. Over time, these impurities need to be cleaned out. Otherwise, they may cause the printer to malfunction.

Utilities There are several utilities included with DOS and Windows that help maintain system integrity. If used on a regular basis, the following utilities can increase system speed and efficiency. ScanDisk – This utility is used to check the integrity of files and folders or to thoroughly check the system by scanning the disk for physical errors. Defrag – This utility optimizes space on the hard drive to allow programs to execute faster. CHKDSK /f – This command is used to check the file system for errors and can be compared to the ScanDisk for Windows 2000 and XP. REGEDIT – provides access to the Registry in a view similar to Windows Explorer.

User Responsibilities There are a few things that the end user of a computer can do in order to make the system work properly. Using the system utilities are one way of making a system run smoother. Managing applications Managing files and folders Backing up the work

Firewalls Security breaches on a home computer may allow a hacker to steal stored data or use the computer to hack into other computers. A home firewall can be used to prevent hacker attacks on a home computer. A firewall is a hardware or software system that is used to prevent unauthorized people from accessing sensitive data.

Firewalls A typical home firewall system also includes the following features: Closes the broadband connection after detecting any attempts to hack into a digital appliance Allows different family members to set their own levels of security Records all broadband Internet access events All data, video, and voice traffic between these two networks is examined by the firewall.

Firewalls After installing a firewall, certain ports will need to be opened to use e-mail and the Internet. SMTP uses port 25 and POP uses port 110 to transmit and receive e-mail. Port 80 will also need to be opened for HTTP, the standard protocol that supports the exchange of information on the World Wide Web.

Firewalls Windows XP has a built in firewall called Internet Connection Firewall (ICF) ICF is a software component that blocks unsolicited traffic from the Internet. ICF monitors all the outbound and inbound communications of a computer. If ICF does not recognize a packet being sent or received, the packet is dropped.

Power Issues Computers components are vulnerable to various kinds electrical fluctuations and can be damaged by electrical discharges because of the delicate nature of the internal components. Blackouts, brownouts, noise, spikes, and surges are all examples of power interruptions that can cause system malfunctions or even complete system failure.

Power Issues Computers components are vulnerable to various kinds electrical fluctuations and can be damaged by electrical discharges because of the delicate nature of the internal components. Blackouts, brownouts, noise, spikes, and surges are all examples of power interruptions that can cause system malfunctions or even complete system failure.

Power Issues Blackouts – Blackouts are the complete loss of power for any amount of time Brownouts/Sags – Sags and brownouts are a drop in power A sag is a brownout that lasts less than a second. Brownouts occur when voltage on the power line falls below 80 percent of the normal voltage. Noise – Noise is caused by interference from radio broadcasts, generators, and lighting.

Power Issues Spikes – Spikes are sudden increases in voltage that are much higher than normal levels. If the event lasts one or two seconds, it is called a spike. These are usually caused by lightning strikes. Power Surge – Is a dramatic increase in voltage above the normal flow of electrical current.

SURGE PROTECTOR All computers have some surge protection built in, but this protection is not always enough. External surge protectors come in the form of a unit that plugs into the wall, with outlets for several electrical plugs. However, not all outlet bars have surge protection.

Surge Suppressors Uninterruptible Power Supplies Surge suppressors, also known as surge protectors can help guard against electrical surges and spikes. A surge suppressor works by diverting the extra voltage to the ground. A surge suppressor is useless during brownouts or blackouts. Uninterruptible Power Supplies A UPS runs off the battery power the entire time it is in use. A UPS can help guard against power sags or brownouts.

UNINTERRUPTIBLE POWER SUPPLY / UPS A UPS is not necessary on most computer systems, but can be important on systems that need to be up 24 hours a day, such as servers.

Surge Suppressors Uninterruptible Power Supply

ANY QUESTIONS? Please read Chapters See you next class!!!