42
Computing Fundamentals Module Lesson 3 Maintaining and Protecting Hardware Computer Literacy BASICS

Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

Embed Size (px)

Citation preview

Page 1: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

Computing Fundamentals ModuleLesson 3 — Maintaining and

Protecting Hardware

Computer Literacy BASICS

Page 2: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

Computer Literacy BASICS2

Objectives

Explain how to evaluate computer hardware to purchase components or upgrades.

Identify and describe how input and output devices are connected to the computer.

Describe the routine maintenance tasks necessary to keep your computer in good working condition.

Page 3: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

Computer Literacy BASICS3

Objectives (cont.)

Explain how to use troubleshooting techniques to solve computer-related problems.

Understand how to protect the computer system from damage.

Identify factors that can damage storage media and learn how to safeguard stored data.

Page 4: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

Computer Literacy BASICS4

Vocabulary

Firewall Hackers Modem Parallel ports Plug and play Serial ports

Surge protectors Troubleshooting Uninterruptible power supply (UPS) Universal serial bus (USB) Virus

Page 5: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

Computer Literacy BASICS5

Evaluating Hardware Componentsand Upgrades

Make a list of the tasks you want to accomplish with a new system or upgrade.

Check company policies or standards. Make sure the software you want to use for

applications is compatible with the computer’s operating system.

Consider the expected useful life of the components.

Page 6: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

Computer Literacy BASICS6

Comparing CPUs

Different types of computers use different central processing unit (CPU) chips.

The speed of the CPU depends on the system clock, but one 800-MHz computer system may run faster than another of the same speed because they are designed differently.

The amount of RAM available also affects the processing speed.

Page 7: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

Computer Literacy BASICS7

Comparing Computer Models

The tasks you want to perform with a computer and the environment in which you will use it will guide you in deciding what kind of computer you need.

Consider the peripherals and storage devices you will need when comparing available systems.

Page 8: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

Computer Literacy BASICS8

Upgrading Computer Hardware

You can add more RAM to make a processor run faster. Expansion cards with 128K to 512K or more additional RAM are available on expansion cards that fit easily into the computer’s motherboard.

Hardware peripherals, such as a new keyboard, mouse, or printer, are even easier to install with an installation wizard.

Page 9: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

Computer Literacy BASICS9

“Bundled” Software

Sometimes the software that comes with a new computer system is fully operable and can be registered and used for the life of the computer.

Other software may be offered on a trial basis, and you must pay a fee to continue to use the program after a certain date.

Page 10: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

Computer Literacy BASICS10

Warranties and Technical Support

Most electronic equipment has a limited warranty that ensures defective components will be repaired or replaced during that time.

Manufacturers and retailers offer extended warranties at additional cost. Read the terms of a warranty to make sure it is a good value.

Register new equipment so that the manufacturer’s warranty will be in effect.

Page 11: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

Computer Literacy BASICS11

Connecting Devices to the Computer

Input and output devices must be connected to the printer before they can be used.

There are two ways to connect I/O devices to the computer:– Plug the device into an existing socket or port

on the back of the computer.– Install a circuit board with the port you need

already included.

Page 12: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

Computer Literacy BASICS12

Typical PC Port Arrangement

Page 13: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

Computer Literacy BASICS13

Serial and Parallel Ports

Serial ports transmit data one bit at a time and are used to connect a mouse, modem, and keyboard.

Parallel ports transmit data eight bits at a time and are used for printers and external storage devices.

Page 14: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

Computer Literacy BASICS14

Special Ports

PS/2: Often used to connect a mouse or keyboard

USB: A newer standard that can be used to replace serial and parallel ports and can handle up to 127 devices

SCSI: Allows many devices to use a single port MIDI: Used to connect recording devices PC card: Can be connected to add memory or

storage capacity

Page 15: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

Computer Literacy BASICS15

Cables

Different types of cables are required to connect different devices:

Power cords Computer-to-peripheral

connections Telephone line or cable

modem connections

A printer cable

Page 16: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

Computer Literacy BASICS16

Plug and Play

Most hardware components available today are called plug and play because they install so simply.

The computer’s operating system recognizes the new device when it is plugged in and takes care of all configuring tasks.

A dialog box will appear asking you to confirm the type of new hardware, and then the computer takes care of changing all settings and making it ready to use.

Page 17: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

Computer Literacy BASICS17

Routine Maintenance

Make regular visual inspections of the computer system to look for problems.

Keep the computer components clean. Perform routine “internal” maintenance by

running utility programs that clean up the hard disk drive by removing unneeded files and defragmenting the drive.

Page 18: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

Computer Literacy BASICS18

Troubleshooting Steps

1. Recognize the problem.2. Replicate the problem by reproducing the

steps that cause the problem consistently.3. Attempt basic solutions to correct the problem,

such as restarting the hardware or checking cable connections.

4. Look for available help and advice in manuals, or access a technical support Web site or telephone number.

Page 19: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

Computer Literacy BASICS19

Troubleshooting Steps (cont.)

5. Communicate the problem accurately to the support technician.

6. Follow the instructions the technician gives you carefully.

7. Confirm that the problem has been fixed.

8. Avoid similar problems in the future.

Page 20: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

Computer Literacy BASICS20

Accessing Technical Support

When trouble-shooting a computer problem, you can find advice on a technical support Web site provided by the hardware or software manu-facturer.

Page 21: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

Computer Literacy BASICS21

Protecting Hardware

Keeping hardware safe involves protecting it from power surges and electrical failures, theft, and environmental damage.

An uninterruptible power source prevents damage and data loss during a power failure.

Surge protectors can protect against power spikes that can destroy components.

Using security measures and good sense protect computer hardware from theft or damage.

Page 22: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

Computer Literacy BASICS22

Protecting Data

Saving active files frequently is the best way to protect against data loss.

Backup procedures create files that can be used to restore data if the primary storage system becomes inaccessible.

Viruses are programs written to corrupt data. Backup files and antivirus software help avoid data loss from viruses.

Firewalls, a combination of software and hardware elements, prevent unauthorized access to a computer on a network (including the Internet).

Page 23: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

Computer Literacy BASICS23

Caring for Storage Media

Keep disks away from magnetic and electrical fields, such as those contained in televisions and monitors.

Avoid extreme temperatures. Never touch the surface of the media itself. Hold optical

media, such as CDs and DVDs, at the edges. Remove media from drives and store them properly when

not in use. Never remove a disk from a drive when the drive indicator

light is on. Keep disks in a sturdy case when transporting.

Page 24: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

Computer Literacy BASICS24

Summary

Decisions about what kind of computer to buy should be based on what you want a computer to do.

The kind of software you want to run should also help you decide what kind of computer to buy.

It is important to register new equipment to activate the warranty and technical support.

Page 25: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

Computer Literacy BASICS25

Summary (cont.)

Input and output devices are connected to the computer through serial and parallel ports.

The Universal Serial Bus is a newer standard that is beginning to replace serial and parallel ports.

There are several types of ports: USB, SCSI, MIDI, parallel, and serial.

Page 26: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

Computer Literacy BASICS26

Summary (cont.)

Cables connect peripherals to the computer. Many hardware devices today are designed

to be plug and play, so the operating system recognizes the new hardware and configures the system for it to work correctly.

Page 27: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

Computer Literacy BASICS27

Summary (cont.)

A regular visual inspection of your computer system can help you find loose cables and other potential problems before they affect how the computer runs.

Keeping your computer system clean is another way to avoid serious problems.

Page 28: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

Computer Literacy BASICS28

Summary (cont.)

Troubleshooting involves analyzing problems to correct faults in the system.

Power outages and power surges can both damage hardware and corrupt data, so it is important to protect your computer system from fluctuations in the power supply.

Page 29: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

Computer Literacy BASICS29

Summary (cont.)

Protect your computer from theft, viruses, and hackers by taking basic security precautions.

To maintain a permanent copy of data, you must store it on some type of storage medium. These may include floppy diskettes, hard drives, CDs, magnetic tape cartridges, and WORM disks.

Page 30: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

Quick Quiz

1.Which of the following is not a reason to upgrade computer hardware?

A. to increase RAM

B. to add the ability to scan art and text

C. to run shareware

D. to increase data storage capacity

Computer Literacy BASICS30

Page 31: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

Answer: C

to run shareware

Computer Literacy BASICS31

Page 32: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

2.Which of the following ports transmit data one bit at a time?

A. parallel ports

B. serial ports

C. MIDI ports

D. SCSI ports

Computer Literacy BASICS32

Page 33: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

Answer: B

serial ports

Computer Literacy BASICS33

Page 34: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

3.True or False?

A regular visual inspection of computer equipment is the easiest routine maintenance you can perform.

Computer Literacy BASICS34

Page 35: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

Answer: True

Computer Literacy BASICS35

Page 36: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

4.The first step in the troubleshooting process is to _______________.

A. avoid similar problems in the future

B. recognize the problem

C. replicate the problem

D. communicate the problem to a support technician

Computer Literacy BASICS36

Page 37: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

Answer: B

recognize the problem

Computer Literacy BASICS37

Page 38: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

5.What device can protect your computer and data from electrical blackouts?

Computer Literacy BASICS38

Page 39: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

Answer: uninterruptible power source (UPS)

Computer Literacy BASICS39

Page 40: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

Discussion Question #1

What kinds of hardware upgrades would you like to make to the computer system you use at home or school? Why do you think these upgrades are important, and how will they help improve the quality and speed of your work?

Computer Literacy BASICS40

Page 41: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

Discussion Question #2

Why don’t all computer peripherals connect using the same kinds of cables and ports?

Computer Literacy BASICS41

Page 42: Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS

Discussion Question #3

Warnings about new types of computer viruses are often reported on the news or via an e-mail alert. What are some ways you can protect your computer from viruses? Do you think technical fixes, such as antivirus software, or personal caution when using the computer is the best way to avoid problems with viruses?

Computer Literacy BASICS42