Chapter 1 3
Chapter 1 3
TECHNICAL SUPPORT
CHAPTER ONE
Basics of Computer Maintenance and
Technical Support
List of Contents
◉ General concepts about PC and tech support
◉ Safety rules
◉ Without software that allows the hardware to accomplish something, a computer is nothing
more than a doorstop.
◉ Every computer needs an important piece of software called an operating system, which
coordinates the interaction between hardware and software applications.
◉ The operating system also handles the interaction between a user and the computer.
Continued…
○ Examples of operating systems include DOS, Windows XP, Windows Vista, Windows 7,
OS X, and various types of Unix, such as Red Hat and Mandrake.
◉ When a user selects an application, the operating system controls the loading of the
application.
◉ The operating system also controls any hardware devices such as:
○ mouse, keyboard, monitor, printer, that must be accessed by the application.
Continued…
◉ It is called firmware because it is a chip, which is hardware, and it has software built into the chip.
○ An example of firmware is the BIOS (basic input/output system) chip.
○ BIOS chips always have software inside them.
○ The BIOS has startup software that must be present for a computer to operate.
BIOS (basic input/output system) is the program a computer's microprocessor uses to start the computer
system after it is powered on.
It also manages data flow between the computer's operating system (OS) and attached devices, such as
the hard disk, video adapter, keyboard, mouse and printer.
?
◉ A computer, sometimes called a microcomputer or a PC, is a unit that performs tasks using
software applications.
◉ Once the case is removed from the computer, the parts inside can be identified.
Continued…
◉ The easiest part to identify is the power supply, which is the metal box normally located in a
back corner of the case.
◉ A power cord goes from the power supply to a wall outlet or surge strip.
◉ One purpose of the power supply is to convert the AC voltage that comes out of the outlet to
DC voltage the computer can use.
◉ The power supply also supplies DC voltage to the internal parts of the computer.
Continued…
◉ A fan located inside the power supply keeps the computer cool, which avoids damage to the
components.
◉ Two examples of storage devices are the floppy drive and the hard drive.
Continued…
◉ The floppy drive allows data storage to floppy disks (sometimes called diskettes or disks) that
can be used in other computers.
◉ The hard drive, sometimes called hard disk, is a rectangular box normally inside the
computer’s case that is sealed to keep out dust and dirt.
◉ In a desktop computer, the hard drive is normally mounted below or beside the floppy drive.
Continued…
◉ A CD drive holds disks (CDs) that have data, music, or software applications on them.
◉ A popular alternative to a CD drive is a DVD drive (digital versatile disk drive), which
supports CDs as well as music and video DVDs.
◉ The motherboard is the main circuit board located inside a PC and contains the most
electronics.
◉ Other names for the motherboard include mainboard, planar, or system board.
Continued…
◉ The motherboard is the largest electronic circuit board in the computer.
◉ Some devices have a cable that connects the device to the motherboard.
◉ Memory chips hold applications, part of the operating system, and user documents.
◉ POST performs a basic test of the individual hardware components such as the
motherboard, RAM memory chips, keyboard, floppy drive, and hard drive.
◉ When a computer is turned on with the power switch, BIOS executes POST.
○ Numbers appearing in the upper-left corner of the monitor indicate that
POST is checking RAM.
1.1.1 External Connectivity
◉ Motherboards that have ports built into them are called integrated
motherboards.
Continued…
○ A technician must be able to identify these common ports readily to ensure that
1. the correct cable plugs into the port; and
2. the technician can troubleshoot problems in the right area.
◉ A D-shell connector has more pins or holes on top than on the bottom, so a cable connected to
the D-shell connector can only be inserted in one direction and not accidentally flipped upside
down.
○ Parallel, serial, and video ports are examples of D-shell connectors.
○ Many documents represent a D-shell connector by using the letters DB, a hyphen, and the
number of pins as DB-9, DB-15….
Continued…
◉ When a connector is keyed it has an extra metal piece or notch that matches with an extra
metal piece or notch on the cable, and the cable can only be inserted into the DIN connector
one way.
○ Older keyboard and mouse connectors are examples of DIN connectors
Continued…
◉ Today, there are two types normally seen and they both have three rows.
◉ The newer port is called a DVI port (Digital Visual Interface) and it has three rows of square
holes.
◉ A USB port allows up to 127 devices to transmit at speeds up to 5Gbps (5 billion bits per
second) with version 3.0.
◉ In order for the computer to use the USB port, it must have a Pentium or higher CPU; and
operating system that supports USB
Continued…
◉ USB ports and devices come in three versions:
○ Version 1.0 supported speeds of 1.5Mbps and 12Mbps.
○ Version 2.0 increased the supported speed to 480Mbps; and
○ Version 3.0 supports speeds up to 5Gbps.
◉ A serial port (also known as a COM port or an asynchronous (async) port) can be a 9-pin
male D-shell connector or a 25-pin male D-shell connector (on very old computers).
○ Serial ports are used for a variety of devices including mice, external modems,
digitizers, printers, PDAs, and digital cameras.
1.1.5 IEEE 1394 Port
◉ The IEEE 1394 standard is a serial technology developed by Apple Computer.
◉ IEEE 1394 ports have been more predominant on Apple computers, but are now becoming a
standard port on PCs.
◉ Windows and Apple operating systems support the IEEE 1394 standard.
◉ As many as 63 devices (using cable lengths up to 14 feet) can be connected with FireWire.
Continued…
◉ The IEEE 1394 standard supports hot swapping (plugging and unplugging devices
with the power on), plug and play, and powering low-power devices.
Figure 1.9 IEEE 1394 adapter ports Figure 1.10 IEEE 1394 laptop port
1.1.6 Network ports
◉ Network ports are used to connect a computer to other computers, including a network server.
◉ Two different network adapters, Ethernet and Token Ring, are available, but most networks use
Ethernet ports.
◉ The ports on these adapters can be quite confusing because the connectors are sometimes the same.
○ Ethernet adapters are the most common type of NIC (network interface card/controller).
○ They can have a BNC, an RJ-45, a 15-pin female D-shell connector, or a combination of these
on the same adapter.
Continued…
◉ Token Ring adapters are not as popular as Ethernet, and they can have two
different connectors: RJ-45 and/or 9-pin female D-shell connectors.
◉ Some adapters have a little green sticker with the numbers 4/16 on it, which
indicates the two speeds, 4Mbps and 16Mbps, at which Token Ring adapters
can run.
◉ The 4/16 sticker is a helpful indicator that the port is a Token Ring port.
Continued…
◉ An external modem is a separate device that sits outside the computer and connects to a 9-pin or 25-
pin serial port.
◉ The external modem can also have one or two RJ-11 connectors. The RJ-11 connectors look like
typical phone jacks.
○ The RJ-11 connector labeled Line is for the connection to the wall jack.
○ The RJ-11 connector labeled Phone is for the connection to the phone.
Continued…
◉ In addition, a docking station can have expansion slots or cards and storage
bays.
Continued…
◉ The port replicator is similar to a docking station, but does not normally
include an expansion slot or drive storage bays.
◉ The port replicator attaches to the laptop and allows more devices to be
connected, such as an external monitor, keyboard, mouse, joystick, and printer.
◉ To use a port replicator, normally the external devices are connected first.
Continued…
◉ These skills do not come overnight and not all of them can be taught
○ but a technician can constantly develop and fine-tune each of them.
Continued…
◉ Once a technician has a job in the industry, past hands-on time will increase his or
her depth of knowledge and experience.
◉ A technician is like a detective, constantly looking for clues, using common sense
and deductive reasoning, gathering information from the computer and the
computer user, and finally solving the mystery.
○ Familiarize yourself with the MSDS (Material safety data sheet) for safety
issues and disposal restrictions to help protect the environment.
○ Be able to use the correct tools for the task.
○ Know how to clean components safely.
○ Use organizational tools during computer repairs.
2.2 Maintenance Tools
◉ Make sure that you are familiar with the correct use of each tool and that the
correct tool is used for the current task.
◉ Skilled use of tools and software makes the job less difficult and ensures that
tasks are performed properly and safely.
◉ A toolkit should contain all the tools necessary to complete hardware repairs.
Continued…
◉ ESD tools:
○ There are two ESD tools: the antistatic wrist strap and
○ the antistatic mat.
■ The antistatic wrist strap protects computer equipment when
grounded to a computer chassis.
■ The antistatic mat protects computer equipment by preventing
static electricity from accumulating on the hardware or on the
technician.
Continued…
◉ Hand tools:
○ Most tools used in the computer assembly process are small hand
tools.
○ They are available individually or as part of a computer repair toolkit.
○ Toolkits range widely in size, quality, and price.
Continued…
◉ Always avoid magnetized tools, such as screwdrivers with magnetic heads, or tools
that use extension magnets to retrieve small metal objects that are out of reach.
◉ Using magnetic tools can cause loss of data on hard drives and floppy disks.
Continued…
◉ Cleaning tools:
○ Having the appropriate cleaning tools is essential when
maintaining and repairing computers.
◉ Note: When using compressed air to clean inside the computer, blow the air
around the components with a minimum distance of 4 inches (10 cm) from the
nozzle. Clean the power supply and the fan from the back of the case.
Continued…
○ Caution: Before cleaning any device, turn it off and unplug the device
from the power source.
Continued…
◉ Diagnostic tools:
○ Digital Multimeter
■ It is a device that can take many types of measurements.
■ It tests the integrity of circuits and the quality of electricity in computer
components.
○ Loopback Adapter
■ tests the basic functionality of computer ports.
■ The adapter is specific to the port that you want to test.
Continued…
○ Toner Probe
■ It is a two-part tool.
■ The toner part is connected to a cable at one end using specific adapters,
such as an RJ-45, coaxial, or metal clips.
■ The probe part traces the cable.
■ When the probe is in near proximity to the cable to which the toner is
attached, the tone can be heard through a speaker in the probe.
Continued…
◉ Organizational tools:
○ A technician must document all repairs and computer problems.
○ The documentation can then be used as a reference for future problems or
for other technicians who may not have encountered the problem before.
○ The documents can be paper-based, but electronic forms are preferred
because they can be easily searched for specific problems.
Continued…
◉ Software tools:
○ Software tools help diagnose computer and network problems and
determine which computer device is not functioning correctly.
○ A technician must be able to use a range of software tools to diagnose
problems, maintain hardware, and protect the data stored on a computer.
Continued…
■ System File Checker (SFC) - Scans the operating system critical files
and replaces files that are corrupted. Use the Windows 7 boot disk for
troubleshooting and repairing corrupted files. The Windows 7 boot disk
repairs Windows system files, restores damaged or lost files, and
reinstalls the operating system.
● Third-party software tools are also available to assist in
troubleshooting problems.
Continued…
◉ Some electronic components may not be damaged the first time static
electricity occurs.
Continued…
◉ An ESD event is not recoverable, nothing can be done about the damage it
induces.
◉ Electronic chips and memory modules are most susceptible to ESD strikes.
◉ When humidity is low, the potential for ESD is greater than at any other time.
◉ After removing the computer case, if you are right-handed, place your bare left
arm on the power supply.
◉ Remove the computer parts one by one, always keeping your left elbow (or some
bare part of your arm) connected to the power supply.
◉ If you are left-handed, place your right arm on the power supply.
◉ Also, removing the power cable from the back of the computer is a good idea.
◉ Power supplies provide a small amount of power to the motherboard even when
the computer is powered off.
◉ Note: Technicians should not wear an ESD wrist strap when working inside a
CRT monitor because of the high voltages there.
4. Safety Rules
◉ To protect yourself and the computer, make sure the computer power is off when
disassembling, installing, or removing hardware, or doing preventive maintenance
(cleaning).
◉ Never take the monitor or power supply apart unless you have been specifically
trained on these components.
Continued…
◉ The power supply and monitor have capacitors (electronic parts that hold an
electrical charge), which can hurt you even if the power has been removed.
◉ Preventive maintenance (PM) is the regular and routine maintenance of equipment and assets in
order to keep them running and prevent any costly unplanned downtime from unexpected
equipment failure.
◉ Preventive maintenance includes certain procedures performed to extend the life of the
computer.
◉ Typical preventive measures include vacuuming the computer and cleaning the floppy drive
heads, CD/DVD laser, keyboard keys, printers, and monitor screen.
◉ Repair companies frequently provide a preventive maintenance kit for service calls.
Continued…
◉ The kit normally includes:
○ portable vacuum cleaner,
○ special vacuum cleaner bags for laser printers,
○ a can of compressed air,
○ urethane swabs,
○ monitor wipes,
○ lint-free cloths,
○ general purpose cloths,
○ general purpose cleanser,
○ denatured alcohol,
○ mouse ball cleaning kit,
○ an antistatic brush
Continued…
◉ When performing preventive maintenance, power on the computer to be certain
it operates.
◉ You will wonder if the cleaning you performed caused the problem or if the
computer had a problem before the preventive maintenance.
◉ Once the computer powers up, go into Setup and copy the current settings in
case the battery dies.
Continued…
◉ Keep this documentation with the computer.
◉ Power off the computer, remove the power cord, and vacuum it with a non-metallic
attachment.
◉ Do not start with compressed air or by blowing dust out of the computer because
the dirt and dust will simply go into the air and eventually fall back into the
computer and surrounding equipment.
◉ If you remove an adapter from an expansion slot, replace it into the same slot.
Continued…
◉ The preventive maintenance call is the perfect opportunity to check computers for
viruses.
◉ Then, while the virus checker is running, you might clean external peripherals,
such as printers.