Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Lesson 15 Task Assessment ICASAS301A Run standard diagnostic tests Objective Run standard diagnostic tests include a range of basic skills that are required to troubleshoot computer problems. With these skills you will be able to identify which components of a computer system are working correctly and which are not. This information will help you determine the nature of the problem. In this unit you’ll do tasks for a company to allow you to demonstrate your skills and knowledge in running standard diagnostic tests. To do these tasks you’ll need to be able to: Operate system diagnostics. Scan a system for viruses. Use system diagnostic tools practice Activity 1 Q1: Explain key terms Booting: (also known as booting up) is a bootstrapping process that starts operating systems when the user turns on a computer system. A boot sequence is the initial set of operations that the computer performs when power is switched on. Partition: Disk partitioning is the act of dividing a hard disk drive into multiple logical storage units referred to as partitions, to treat one physical disk drive as if it were multiple disks. CMOS: Complementary metal–oxide–semiconductor (CMOS) ( /ˈsiːmɒs/) is a technology for constructing integrated circuits. CMOS technology is used in microprocessors, microcontrollers, static RAM, and other digital logic circuits. Two important characteristics of CMOS devices are high noise immunity and low static power consumption. DMA channel: Direct memory access (DMA) is a feature of modern computers that allows certain hardware subsystems within the computer to access system memory independently of the central processing unit (CPU). Without DMA, the CPU using programmed input/output is typically fully occupied for the entire duration of the read or write operation, and is thus unavailable to perform other work. With DMA, the CPU would initiate the transfer, do other operations while the transfer is in progress, and receive an interrupt from the DMA controller once the operation has been done. IDE: IDE (Integrated Drive Electronics) is a standard electronic interface used between a computer motherboard's data paths or bus and the computer's disk storage devices. The IDE interface is based on the IBM PC Industry Standard Architecture (ISA) 16-bit bus standard, but it is also used in computers that use other bus standards. Most computers sold today use an enhanced version of IDE called Enhanced Integrated Drive Electronics (EIDE). In today's computers, the IDE controller is often built into the motherboard. IDE was adopted as a standard by American National Standards Institute (ANSI) in November, 1990. The ANSI name for IDE is Advanced Technology Attachment (ATA). The IDE (ATA) standard is one of several related standards maintained by the T10 Committee. Electrostatic discharge (ESD): ESD is a serious issue in solid state electronics, such as integrated circuits. Integrated circuits are made from semiconductor materials such as silicon and insulating materials such as silicon dioxide. Either of these materials can suffer permanent damage when subjected to high voltages; as a result, there are now a number of antistatic devices that help prevent static build up. Electromagnetic interference: Electromagnetic interference (or EMI, also called radio frequency interference or RFI) is disturbance that affects an electrical circuit due to either electromagnetic induction or electromagnetic radiation emitted from an external source.The disturbance may interrupt, obstruct, or otherwise degrade or limit the effective performance of the circuit. Surge protector: A surge protector (or surge suppressor) is an appliance designed to protect electrical devices from voltage spikes. A surge protector attempts to limit the voltage supplied to an electric device by either blocking or by shorting to ground any unwanted voltages above a safe threshold. Backup: In information technology, a back up or the process of backing up is making copies of data which may be used to restore the original after a data loss event. Worm: A computer worm is a self-replicating malware computer program, which uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. This is due to security shortcomings on the target computer. Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer. Antivirus software: Antivirus or anti-virus software is used to prevent, detect, and remove malware, including but not limited to computer viruses, computer worm, trojan horses, spyware and adware. Boot sector: A boot sector or boot block is a region of a hard disk, floppy disk, solidstate drive, or similar data storage device that contains machine code intended to be executed by a computer's built-in firmware. This region has a size and location (perhaps corresponding to a single logical disk sector in the CHS addressing scheme) specified by the design of the computing platform. The usual purpose of a boot sector is to boot a program (usually, but not necessarily, an operating system) stored on the same storage device. Background scanning: Background scanning is a feature in some anti-virus software to automatically scan files and documents as they are created, opened, closed, or executed. http://home.mcafee.com/VirusInfo/Glossary.aspx#B Data file: Most computer programs work with files. This is because files help in storing information permanently. Database programs create files of information.Compilers read source files and generate executable files. A file itself is a bunch of bytes stored on some storage device like tape, or magnetic disk etc. The data files are the files that store data pertaining to a specific application, for later use.The data files can be stored in two ways:(i)Text files.(ii)Binary files. Executable (EXE) file: In computing, an executable file causes a computer "to perform indicated tasks according to encoded instructions," as opposed to a data file that must be parsed by a program to be meaningful. These instructions are traditionally machine code instructions for a physical CPU. Some operating systems designate executable files by filename extension (such as .exe) or noted alongside the file in its metadata (such as by marking an "execute" permission in Unix-like operating systems). Activity 2: Determine problems and make recommendations Q1: You have been called to a PC system that will not load the operating system. What diagnostic tool will you examine to help determine the problem? A: Power-On Self-Test (POST) refers to routines run immediately after power is applied, by nearly all electronic devices. Perhaps the most widely-known usage pertains to computing devices (personal computers, PDAs, networking devices such as routers, switches, intrusion detection systems and other monitoring devices). Q2: You have been called to a PC system that will not load the operating system. When you turn it on the screen remains blank and you hear a series of beeps. You know the system has a Gigabyte motherboard. What do you do? A: Visit the Gigabyte website for information on the specific MB POST indications e.g. Q3: You have determined that the system has suffered from a user accidentally entering the CMOS setup tool and modifying settings. What would you recommend? A: Remove the CMOS battery for 5-10 mins resets BIOS to default settings. Activity 3: Understand diagnostic tools Answer true or false for following statements. Q1: The purpose of booting in ‘Safe’ mode is to minimise the chances of the operating system failing through only loading core services. A: True Q2: The system log will record information about which system services have started and which have failed. A: True Detect and remove viruses practicum Activity 1: Prepare a new computer for the workplace Q: You have been provided with a new computer for your business (no software installed). The steps to prepare a new computer for the workplace are: A: 1. Determine software needs 2. Test and partition the hard drive 3. Install the operating system and test 4. Determine organisation preferred antivirus (a-v) and configuration and install antivirus 5. Update virus database/signatures and scan 6. Load required software applications and test 7. Backup 8. Connect network, setup firewall and internet; and test Preventative Maintenance Read: http://www.pcworld.com/article/116583/hardware_tips_complete_pc_preventive_main tenance_guide.html Explain what materials you need to undertake preventative maintenance on a PC A: lint-free wipes, a can of compressed air, a few drops of a mild cleaning solution such as Formula 409 or Simple Green in a bowl of water, and an antistatic wrist strap to protect your system when you clean inside the case. Explain the preventative maintenance tasks you could undertake with the above resources on a PC A: Clean the case: Wipe the case and clear its ventilation ports of any obstructions. Compressed air is great for this, but don't blow dust into the PC or its optical and floppy drives. Keep all cables firmly attached to their connectors on the case. Maintain your mechanical mouse: When a nonoptical mouse gets dirty, the pointer moves erratically. Unscrew the ring on the bottom of the unit and remove the ball. Then scrape the accumulated gunk off the two plastic rollers that are set 90 degrees apart inside the ball's housing. Keep a neat keyboard: Turn the keyboard upside down and shake it to clear the crumbs from between the keys. If that doesn't suffice, blast it (briefly) with compressed air. If your keys stick or your keyboard is really dirty, pry the keys off for easier cleaning. Computer shops have special tools for removing keys, but you can also pop them off by using two pencils with broken tips as jumbo tweezers--just be sure to use a soft touch. Make your monitor sparkle: Wipe the monitor case and clear its vents of obstructions, without pushing dust into the unit. Clean the screen with a standard glass cleaner and a lint-free cloth. If your monitor has a degauss button (look for a small magnet icon), push it to clear magnetic interference. Many LCDs can be cleaned with isopropyl alcohol; check with your LCD manufacturer. Wipe your LCD lightly: The underlying glass is fragile. Explain the benefits of the following preventative maintenance tasks on a PC A: Anti-virus benefits are reduced exposure to data loss, slowing of PC, identity and data theft Data backup benefits are improved disaster recovery and business continuity Removal of malicious software, spyware and adware benefits are reduced identity and data theft, improved PC performance. Regular OS update benefits are reduced likelihood of data and privacy being compromised. Defragmentation benefits are improved hard drive performance, data access and PC performance. Clean-up of unnecessary files benefits are improved software performance. Cooling system clean-up benefits include reduced overheating of components reducing component failure and improving component life. Upgrade of hardware benefits include increased functionality and efficiency PRACTICUM Activity 1 A-V http://www.softpedia.com/progDownload/AVZ-Antiviral-Toolkit-Download-113572.html 1. Select: Softpedia Secure Download (US) [ZIP] and download to your USB 2. UNZIP to your USB 3. Run a scan on your USB for viruses 4. PrintScreen the results: Activity 2 Diagnostic utility e.g. Sandra Lite or TuffTEST lite SiSoftoftware Sandra 2011 Lite does an overwhelming number of tests to pinpoint exactly how well each component in your system is running. It even tests power efficiency. Run a good hardware diagnostic utility and PrintScreen your results: Activity 3 Emulation A client wishes to emulate an electronic game on a PC Read: http://coolrom.com/ Explain Emulation A: Create an emulation on your PC of an electronic device Install, analyse and evaluate its functionality A: