Académique Documents
Professionnel Documents
Culture Documents
Remove your watch and any other jewelry and secure loose clothing.
Turn off the power and unplug equipment before performing service.
Cover any sharp edges inside the computer case with tape.
Never open a power supply or a monitor.
Do not touch areas in printers that are hot or that use high voltage.
Know where the fire extinguisher is located and how to use it.
Keep food and drinks out of the workspace.
Keep your workspace clean and free from clutter.
Bend your knees when lifting heavy objects to avoid injury at your back.
Each type of fire extinguisher has specific chemicals to fight different types of fires:
It is important to know how to use a fire extinguisher. Use the memory aid P-A-S-S to help you remember
the basic rules of fire extinguisher operation:
Electrostatic discharge (ESD), harsh climates, and poor-quality sources of electricity can cause damage to
computer equipment. Follow proper handling guidelines, be aware of environmental issues, and use
equipment that stabilizes power to prevent equipment damage and data loss.
The following types of AC power fluctuations can cause data loss or hardware failure:
Blackout – complete loss of AC power. A blown fuse, damaged transformer, or downed power line can
cause a blackout.
Brownout – reduced voltage level of AC power that lasts for a period of time. Brownouts occur when the
power line voltage drops below 80% of the normal voltage level. Overloading electrical circuits can cause a
brownout.
Noise – interference from generators and lightning. Noise results in unclean power, which can cause errors
in a computer system.
Spike – sudden increase in voltage that lasts for a very short period and exceeds 100% of the normal
voltage on a line. Spikes can be caused by lightning strikes, but can also occur when the electrical system
comes back on after a blackout.
Power surge – dramatic increase in voltage above the normal flow of electrical current. A power surge lasts
for a few nanoseconds, or one-billionth of a second.
Surge Suppressor – helps protect against damage from surges and spikes. A surge suppressor diverts
extra electrical voltage on the line to the ground.
Uninterruptible Power Supply (UPS) – helps protect against potential electrical power problems by
supplying electrical power to a computer or other device. The battery is constantly recharging while the UPS
is in use. The UPS is able to supply a consistent quality of power when brownouts and blackouts occur.
Many UPS devices are able to communicate directly with the operating system on a computer. This
communication allows the UPS to safely shut down the computer and save data prior to the UPS losing all
electrical power.
Standby Power Supply (SPS) – helps protect against potential electrical power problems by providing a
backup battery to supply power when the incoming voltage drops below the normal level. The battery is on
standby during the normal operation. When the voltage decreases, the battery provides DC power to a
power inverter, which converts it to AC power for the computer. This device is not as reliable as a UPS
because of the time it takes to switch over to the battery. If the switching device fails, the battery will not be
able to supply power to the computer. Figure 2 shows some examples of surge suppressors, UPS, and SPS
devices.
ESD TOOLS
HAND TOOLS
CLEANING TOOLS
Soft cloth
Compressed air
Cable ties
Parts organizer
DIAGNOSTIC TOOLS
Digital multimeter
Loopback adapter
Fdisk or Disk Management – used to create and delete partitions on a hard drive
Format – used to prepare a hard drive to store information
Scandisk or Chkdsk – used to check the integrity of files and folders on a hard drive by scanning
the file system. They may also check the disk surface for physical errors
Defrag – used to optimize space on a hard drive to allow faster access to programs and data
Disk Cleanup – used to clear space on a hard drive by searching for files that can be safely deleted
Disk Management – a system utility used to manage hard drives and partitions, which peforms
tasks such as initializing disks, creating partitions, and formatting partitions
System File Checker (SFC) – a command-line utility that scans the operating system critical files
and replaces any files that are corrupted
Windows XP Security Center – allows you to check the status of essential security settings on the
computer. The Security Center continuously checks to make sure that the software firewall and antivirus
programs are running. It also ensures that automatic updates are set to download and install automatically.
Antivirus Program – protects a computer against virus attacks.
Spyware Remover – protects against software that sends information about web surfing habits to an
attacker. Spyware can be installed without the knowledge or consent of the user.
Firewall – a program that runs continuously to protect against unauthorized communications to and from
your computer.
HARDWARE MAINTENANCE
SOFTWARE MAINTENANCE
TROUBLESHOOTING PROCESS
Multi-user – Two or more users can work with programs and share peripheral devices, such as printers, at
the same time.
Multi-tasking – The computer is capable of operating multiple applications at the same time.
Multi-processing – The computer can have two or more central processing units (CPUs) that programs
share.
Multi-threading – A program can be broken into smaller parts that can be loaded as needed by the operating
system. Multi-threading allows individual programs to be multi-tasked.
Start > All Programs > Accessories > System Tools > Windows Update
You should also verify that all hardware is installed correctly. As shown in Figure 3, you can use Device Manager to
locate problems and to install the correct or updated drivers using the following path:
Start > Control Panel > System > Hardware > Device Manager
In Device Manager, warning icons are represented by a yellow exclamation point or a red “X”. A yellow
exclamation point represents a problem with the device. To view the problem description, right-click the device
and select Properties. A red “X” represents a device that has been disabled. To enable the device, right-click
the disabled device and select Enable. To open a category that is not yet expanded, click the plus (+) sign.
Device Manager
The Device Manager, shown in Figure 1, allows you to view all of the settings for devices in the computer. A
common task for technicians is to view the values assigned for the IRQ, I/O address, and the DMA setting for all of
the devices in the computer. To view the system resources in the Device Manager, use the following path:
Start > Control Panel > System > Hardware > Device Manager > View > Resources
Task Manager
The Task Manager, shown in Figure 2, allows you to view all applications that are currently running and to close any
applications that have stopped responding. The Task Manager allows you to monitor the performance of the CPU
and virtual memory, view all processes that are currently running, and view information about the network
connections. To view information in the Task Manager, use the following path:
Event Viewer
The Event Viewer, shown in Figure 3, logs a history of events regarding applications, security, and the system.
These log files are a valuable troubleshooting tool. To access the Event Viewer, use the following path:
Start > Control Panel > Administrative Tools > Event Viewer
Remote Desktop
The Remote Desktop allows one computer to remotely take control of another computer. This troubleshooting
feature is only available with Windows XP Professional. To access the Remote Desktop, use the following path:
Start > All Programs > Accessories > Communications > Remote Desktop Connection
Performance Settings
To enhance the performance of the operating system, you can change some of the settings that your computer
uses, such as virtual memory configuration settings, which are shown in Figure 4. To change the virtual memory
setting, use the following path:
Start > Control Panel > System > Advanced > Performance area > Settings button
Add an Application
If a program or application is not automatically installed when the CD is inserted, you can use the Add or Remove
Programs applet to install the application, as shown in Figure 2. Click the Add New Programs button and select the
location where the application is located. Windows will install the application for you.
Once the application is installed, the application can be started from the Start menu or a shortcut icon that the
application installs on the desktop. Check the application to ensure that it is functioning properly. If there are
problems with the application, make the repair or uninstall the application. Some applications, such as Microsoft
Office, provide a repair option in the install process. You can use this function to try to correct a program that is not
working properly.
Uninstall an Application
If an application is not uninstalled properly, you may be leaving files on the hard drive and unnecessary settings
in the registry. Although this may not cause any problems, it depletes available hard drive space, system
resources, and the speed at which the registry is read. Figure 3 shows the Add or Remove Programs applet to
use to uninstall programs that you no longer need. The wizard will guide you through the software removal
process and remove every file that was installed
Start > All Programs > Accessories > System Tools > Scheduled Tasks
Both of these tools allow users to set commands to run at a certain time just once, or to repeat at selected days or
times. The Windows Task Scheduler, shown in Figure 1, is easier to learn and use than the AT command,
especially when it comes to recurring tasks and deleting tasks already scheduled.
System Utilities
There are several utilities included with DOS and Windows that help maintain system integrity. Two utilities that are
useful tools for preventive maintenance are:
ScanDisk or CHKDSK – ScanDisk (Windows 2000) and CHKDSK (Windows XP) check the integrity of files
and folders and scan the hard disk surface for physical errors. Consider using them at least once a month
and also whenever a sudden loss of power causes the system to shut down.
Defrag – As files increase in size, some data is written to the next available space on the disk. In time, data
becomes fragmented, or spread all over the hard drive. It takes time to seek each section of the data. Defrag
gathers the noncontiguous data into one place, making files run faster.
Start > All Programs > Accessories > System Tools > Disk Defragmenter
Automatic Updates
If every maintenance task had to be scheduled every time it was run, repairing computers would be much harder
than it is today. Fortunately, tools such as the Scheduled Task Wizard allow many functions to be automated. But
how can you automate the update of software that has not been written?
Operating systems and applications are constantly being updated for security purposes and for added functionality.
It is important that Microsoft and others provide an update service, as shown in Figure 2. The update service can
scan the system for needed updates and then recommend what should be downloaded and installed. The update
service can download and install updates as soon as they are available, or it can download updates as required,
and install them when the computer is next rebooted. The Microsoft Update Wizard is available at this path:
Most anti-virus software contains its own update facility. It can update both its application software and its database
files automatically. This feature allows it to provide immediate protection as new threats develop.
Restore Point
An update can sometimes cause serious problems. Perhaps an older program is in the system that is not
compatible with the current operating system. An automatic update may install code that will work for most users but
does not work with your system.
Windows Restore Point, shown in Figure 3, is the solution for this problem. Windows XP can create an image of
current computer settings, called a restore point. Then, if the computer crashes, or an update causes system
problems, the computer can roll back to a previous configuration.
A technician should always create a restore point before updating or replacing the operating system. Restore points
should also be created at the following times:
NOTE: A restore point backs up drivers, system files, and registry settings but not application data.
Start > All Programs > Accessories > System Tools > System Restore