Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.



Published on


  • Login to see the comments


  2. 2. Conceptualization SoftwareIt is a generic term for the programs that run inside of a computer. In this casepossibly Windows operating system or operating programme that gives life to yourcomputer, as well as you can now see this information on your screen. HardwareIt is commonly used for the physical components of a computer or a computer. Thisis the most basic level on which the computer runs. The dominant to remember isthat the information is processed electronically by the hardware. The pc is preparedas a computer or personal computer. The monitor, keyboard, and mouse (parts ofyour hardware) are connected to the system unit.  Where does the information processed?The information that is processed obviously must be where leave to be used andthese means are: the monitor screen, the printer or printer, speaker or speaker.
  3. 3.  Classificatión of operating systemsOperating Systems can be classified as follows 1. Multi-user: allows two or more users to use their programmes at the same time. Some operating systems allow hundreds or thousands of users at the same time. 2. Multiprocessing: supports opening the same program on more than one CPU. 3. Multitasking: allows you to run several programs at the same time. 4. Multitramo: allow various parts of a single program to run at the same time. 5. Real-time: responds to the entries immediately.  How an operating systemOperating systems provide a software platform on which other programs, calledapplications, to function. Applications are programmed so that they work on aparticular operating system, therefore, the choice of the operating system largelydetermines the applications that you can use.The most used in the pc operating systems are two, os / 2, and windows, but thereare others that are also used, like for instance Linux.  How to use an operating systemA user typically interacts with the operating system through a system of commands,for example, the operating system windows contain commands such as copy andpaste to copy and paste files respectively. The commands are accepted andexecuted on the one hand operating system called command processor orinterpreter from the command line. Graphical interfaces allow you to use thecommand pointing at objects that appear on the screen.  How is distributed spyware?Generally the spies arrive at a computer to download a program or seeminglyharmless game from the internet or from file-sharing programs. There are timesthat the program is actually harmless, but has been manipulated to includesoftware spy as it was the case of a version of the Kazaa. We can also be affected
  4. 4. by these programs when we browse on the Internet with low security or if weaccept any request that comes from a site. There are pages which tend to be quiteinsistent when we press the "No" to deny the request; These are usually the mostdangerous.  How to remove spywareThere is large number of programmes antispyware or software to help find andeliminate spyware, although some of them what they do is install new spyware,because that some spyware take advantage of the weak points of Internet Explorer. We recommend using a browser less venerable as Firefox or Opera (both are free).Award-winning protection antispyware which guarantees the protection of your PC from threats of tracking of your privacy. Spyware Doctor Spyware Doctor now includes analysis of reports, profiles of behaviour and protection reports cards to provide up-to-date protection and an analysis of the status of your PC. It is an anti-spyware that detects, removes and blocks all types of spyware, adware, Trojans spyware, keyloggers, phishing identity, browser hijackers, threats of tracking, evil anti-spyware, unwanted software, electronic fraud, pop-up Windows and corrupted web sites. It includes Smart Update updates and Schedule tasks. Anti-spyware is known as the best and Google includes the trial version in the Google Pack. He has received numerous awards from leading computer publications (PC Word, PC Magazine, PC Pro, PC Plus, PC Authority, PC Utilities, PC Advisor, PC Choice, Microdatorn, competence Bild and PC Answers Magazine) and around the world testing laboratories highlighted it for their qualities.
  5. 5.  What is computer maintenance?Maintenance is one that I use to have the computer equipment, in excellentcondition provided that create programs to perform these manutenciones and havethe necessary elements for this. There are two types ofmaintenance, the preventive and the corrective.  Preventive MaintenancePreventive maintenance is the periodic revision of certain aspects, both hardwareand software on a PC. These influence the reliable performance of the system, inthe integrity of stored data and an exchange of accurate information, to themaximum possible speed within the configuration optima system.Preventive maintenance in general dealt with in the determination of operatingconditions, durability and reliability of a team, in reference to this type ofmaintenance helps to reduce the time that can be generated by correctivemaintenance. OBSERVATIONMost of the failures come from layers of dust that accumulate in the internaldevice which causes overheating and gives as a result the damage of thecomponent or that her plots are encouraged.  Corrective Maintenance of a ComputerCorrective maintenance is done when it is necessary to correct or repair anyproblem that is going on in the PC which can be software or hardware respectively.Corrective maintenance of software is to correct a problem either programs or theoperating system. When need to replace a mouse, keyboard, source of power,
  6. 6. speakers, memory card, motherboard or expansion or in the latter cases should bea small welding is speaking of corrective maintenance of hardware.  Preventive maintenanceIt is recommended to perform a maintenance every 6 months if the computerequipment is not widely used either every 4 months if this constantly is in use. But itis very important to do it every 2 months if the PC is used every day, more so if theInternet network is used constantly.Whenever the use of a PC is at risk of that will break down a card, Mouse, or anypart of the Pc. But also where there are likely to find more problems that harm thePC is on the Internet because thats where unintentionally it can infect anycomputer with a virus of any kind and that hampered the proper functioning of anycomputer equipment.  What does the preventive maintenancePreventive maintenance can detect failures repeated, decrease the points killed bystops, increase the useful life of equipment, lower costs of repairs, detect weakpoints in the installation from a long list of advantages. Including commonperipherals e.g.: CPU, mouse, etc.; as well as keep it free of pollutants such asliquid, powder.  Steps to remove the computer processor or CPU The first thing is to remove the fan or heatsink of heat (remember to disconnect the card the Fan Heatsink has a thin cable that is connected to the mainboard), the second is to remove the piece of aluminum that has the processor, this is done with care, the pieces of aluminum usually stop them with pieces mounted pressure, Sun or you should see are the pieces that have to be move to remove it and then do the same with the other sideThe third would be to remove the processor has to throw a small switch and take
  7. 7. it with an antistatic bayetilla or guates of latex. To be able to remove it without any problem.  Steps to clean the computer processor or CPUIf he will clean up and has shifted the microprocessor (CPU) (be careful not totouch the pins) must have an antistatic bayetilla to clean the processor only on thebasis where there are no pins and it must be applied a little bit of dissipative creamon the base where you will place the heat sink for the part where She is clean andis again inserted in the slot so that is the base where you will place the processornoting that it is placed in the corresponding pins.OBSERVATIONMany times the processor is clean, so is not recommended to remove it, since insome cases the pins may bend or break easily. Between the processor and theheatsink, there is a thermal paste which should not touch or remove because thelack of this means that the processor is hot. In any case the only thing that couldclean up serious fan and the heatsink without remove the processor and removethe paste attached to the heatsink.  Maintenance classe a computer monitorMaintaining externalFollow these steps (apague_el_monitor_y_el_computador,_2) unplug the monitor from the wall outlet, 3) clean with a soft bayetilla screen and Cabinet, if it is necessary to use a blower.
  8. 8. HousekeepingFollow steps 1 and 2 of the previous maintenanceObservatión Itis necessary to have a blower or a can of compressed air3) (Destornille if it is necessary to remove the back cover of the 4 monitor) withouttouching any components of the monitor blow the inner part to remove dust and dirtaccumulated. (5) again and tape the monitor having the care necessary to notbreak anything.CautionYou should not use benzene, thinner, or any other volatile substance to clean themonitor. These chemicals can damage it.Differences – SIMM DIMM- DDR DIMMs are used in personal computers RAM memory modules. The DIMMs arerecognizable externally by having your contacts (or pins) separated on both sidesmeasuring 13 inches and have 168-pin. Sokar them them they are black and carry2 notches to facilitate their placement. Can handle 64-bit once and they are thefamous SDRAM PC66, PC100, PC133... This number belongs to the speed of thebus., unlike the SIMM possessing contacts so that one side are United with theconnectors on the edge of the modulewith about 8.5 cm in length and 30connectors this is the biggest difference with respect to their successors theDIMMs.DDR are composed of memory synchronous (SDRAM), available in encapsulatedDIMM RAM memory modules, which allows the transfer of data by two differentchannels simultaneously in a same clock cycle. The DDR modules support amaximum capacity of 1 GiB (1 073 741 824 bytes). The bandwidth of themodule can transfer an amount of information of 8 bytes in each clock cycle to theabove frequencies. Information can be transferred through a channel only, so it isonly necessary to introduce all DIMM modules in the same bank of slots. Or theycan exchange data with the bus through two simultaneous channels, one for eachbank. SIMM DIMM RAM
  9. 9.  Protection should be taken into account for the maintenance of the PcYou must have the pc disconnected from the outlet, have excellent lighting to avoidpossible damages, take into account (electrostatic discharge) protection equipmentthat consists of a wristband with a cable to land called bracelet unsightly if you wantto have a special mat, also with his cable to land. The use of this equipment to workwithin the system will help you make sure to never destroy any of the componentswith an electric shock.  As the RAM should be handled to not to cause harmWhen you want to do cleaning up the RAM to do is remove RAM memory byavoiding the direct contact of the connection pins with your fingers, it isrecommended to use an antistatic handle because if not handled very carefully theymay be damaged by static energy, at the time of install it again should have clearedall the dust of the module DIMM, to install only should play the module RAM edgesby pressing with the thumbs.
  10. 10.  As a hard disk is formattedThere are two possible cases1-that the disk reformat, is or will be the operating systems disk. 2.-that is a datadisk. The second case, does not present any difficulty, and can format from thecommand line (format as from the graphical interface 1) my pc, 2) right click on thedisk drive, 3) format 4) click on home.EXAMPLE 2y3 1
  11. 11. 4 Como se desfragmenta un disco duro en Windows
  12. 12. The use of the defragmented is very simple, in "My PC or team" where it has yourdisk drive to the right (D) and partitions (if you have them), in the example would be(C). It will mean is desfragmentara the drive C.Were going to "Properties" and give you left click, get out a table of dialogueIt now clicks on “Tools” and will get a new dialog
  13. 13. Should be on the button "Defragment now." What will be the first thing you should do is to select the partition (we had said thatwe will do it on (d) and we are first going to "Analyze" to inform us whether it isnecessary or not defragmenting, so is to click on the button and begins to analyze).
  14. 14. From there it can click on "Defragment" (to avoid having to return to the previous screen)There are many white and red vertical lines which means respectively I have many"spaces" between sectors and many "fragmented files" over D, so what will thedefragmented is logic: try to put everything together so that all sectors (or most) inblue-displayed must be taken into account that green spaces are fixed so it willremain there (are always system). After several minutes (which will varyaccording to the power of your PC), will be a message saying that thedefragmentation has been completed:If you click on the button defragment begins the process and displayed on the barof estimated disk usage after defragmentation displays the disks status during thedefragmentation process, which will vary as the process advances
  15. 15. The defragmentation operation is an operation that is quite time make her,depending on the size of free disk, the rate of fragmentation of the files and thecharacteristics of the team. We must bear in mind that we may not use thecomputer during the process of fragmentation, so it will have to think the best timefor a defragmentation, the lunch, breakfast time, while we carry out any otheractivity that we dont need the computer orIf necessary, at night while you sleep.We see a similar report to that we presented during the analysis of thedefragmentation of the disk, but already with the carried out defragmentation
  16. 16. After the defragmentation is presented to us the following messageConclusionsOnce we have finished the process, our hard disk is again in perfect conditions ofwork and we can enjoy it. We must bear in mind that it is appropriate to perform ona regular basis, at least the analysis to verify the degree of defragmentation of yourhard drive, especially when we have subjected to continuous operations ofrecording files, more so if these files are large and deletion, as RAW type, is thecase in the editing processes of video or images in high resolution formats or anyprogram that uses files large and with many operations of reading / writing.  How to install the operating system Windows xpIt must be done without loading the entire operating system. To this end, a startupwith an operating system disk is used. The steps to perform are. With the pcturned off, insert the disk OS, in the CD - ROM drive home and later, with the CDand released, turn on the pc. So the first thing we do is go to the BIOS Setup, to getour Windows installation CD to start once we turn our PC and place the installationCD in the CD/DVD drive.To enter the BIOS Setup by pressing Delete, F2 or F11 (depending on the model ofmotherboard) turn anything else on our PC.
  17. 17. Look for the Advance Bios Features option in the BIOS Setup and press ENTER onthis option.We will post the following: First Boot Device CD-ROM, Second Boot Device -HDD-0We return to the previous menu and select Save & Exit Setup and accept withENTER.
  18. 18. Note: The settings of the Setup can change from one to another. In other BIOSboot sequence is in the section Boot Secuence instead of being included inAdvance Bios Features. With the CD-ROM in the CD/DVD drive-restart thecomputer to start the installation of Windows XP will appear a message press anykey. The installation will begin to copy files and to start devices, we will wait.When we get to this point in the installation press ENTER to confirm the installationof Windows on a hard drive.It will then show us the license of Windows that we accept pressing F8 to continueinstalling Windows XP.
  19. 19. We will now prepare the hard disk to install the Windows XP files. Select a partitionif any and eliminate by pressing D.We confirm its elimination by pressing L and then ENTER.Below is presented the space not partitioning that will be similar to the volume of
  20. 20. the partition you just delete. Press C to create the partition, and will accept theconfirmation with ENTER.In this new screen select a quick NTFS disk format and press ENTER.If we have any suspicion of failure on the disk is better not to use the option offormatting fast and do a normal formatting. This will take us much longer, but willcheck us the integrity of our hard drive (at least in the partition, which is the mostimportant).Then the partition is formatted, the basic files will be installed and automaticallyrestarts the computer as shown in these images. While we wait without pressingany key.
  21. 21. 1 2* Now the installation will continue to be graphic and more easily.We will leave to follow the course of the facility waiting to be required to introduceconfiguration options.Enter the details of language and geographical location when we see this screen.We then ask the name and the Organization to which we belong. We fill the dataand click Next.
  22. 22. Then ask us to introduce the key to our Windows, introduced once click Next.We must now give a name to your computer, the default is fully valid even if we canget one that is easier to remember. We will also write an administrator password toprovide greater security for our team.Once complete click Next.The following is to adjust the date and the hour of our system, as well as the timezone where we are.After completing this process click Next again.
  23. 23. When we get to this screen, enter the network settings. If we do not have a networkat home or do not know the parameters of the network, we will leave the values bydefault and click Next.From this point the installation will continue with copying files. Now the computerwill reboot, and we should not press any key, so that it will not boot from the CD.The installation will ask us the latest configuration data. Configure the screenaccepting all the menus that appear.
  24. 24. 1. .2We accept the first display of completion of the installation of Windows XP. Weomit the check of the Internet connection.
  25. 25. This screen is to activate your copy of Windows. If we are connected to the Internet(by a Reuter) choose the option Yes, activate Windows online now. Otherwiseselect No, reminded me in a few days.Then enter the user names of people who will use the equipment.Note: This step is very important for a correct configuration of the computer, it is atthis point that is going to define the user that will make the functions ofadministrator (the first to say). The omission of this point is one of the main causesof subsequent failures of the system.
  26. 26. This completes the installation of the OSNow we can only verify that Windows has recognized and loaded all the drivers weneed. Otherwise install the drivers missing us (graphics card, sound card etc.).These drivers should have in the CD of the motherboard (if they are integrated) orin the Cds for.Notewith this type of installation are deleted all the files of your computer, so it should bea reinstatement, we save all the data that we have it on external media such asUSB memory devices or Cds DVDsbefore you begin the installation.
  27. 27.  Antivirus for S.OA good antivirus software should have a good heuristic, which is the technique thatuse antivirus to recognize malicious code (viruses, worms, Trojans, etc.) and thatthey are not in your database. Statistics have shown here that the Kaspersky andNod32 antivirus (both payment) and the Avast (A free antivirus). • The follewing antivirus are recommended because of its effectiveness 1. Kaspersky is an antivirus that provides very good protection both reactive and preventive, protecting you from viruses, Trojans and all kinds of malignant programs. In addition also undertakes to protect your log and your whole system against potentially dangerous programs like spyware. Kaspersky has proved to be one of the antivirus that has a better search and capture analysis of virus. 2. Avast is a good free antivirus that derects virus of all sorts, malware such as Worms, Trojans and other able to modify themselves. With this antivirus, the likelihood of the income of threats is greatly reduced to surf the net and also operates in way such that you do not perceive the analysis carried out on files that are running. In addition, conducts deep scans of your hard disk, checking the integrity of all of its content and facilitating the recover y of files damaged as a result of infections. It protects the system from the most dangerous virus today, known as the macrovirus and resident viruses. Integrantes with Windows Explorer, so you can scan files from the context menu and updates virus databases on a daily basis. 3. NOD32 is an antivirus of quality and very efficient. It has a certain virtually absolute in the detection of any known virus and still unknown due to its complex heuristics. One of its features are the low use of system resources, detection of viruses and codes "malicious" very high percentage, speed of searches, detailed heuristic analysis, numerous possibilities of disinfection without deletion, recovery from damage caused by virus options, code 32-bit, etc. It is an anti-virus of first quality, on the basis of their potential in its speed
  28. 28. and the total detection of the vast majority of threats. Su elección será la mejor para su equipoPLUGINS FAULT SIGNIFIERS THAT ARE PRESENTED TO USERSTHE COMPUTER WILL NOT STARTmust first review the electrical installations looking decision-making and wiringelectrical and perhaps stabilizer or in some cases the towers have ignition switch inthe back opened be reviewed everything to verify that both the power outlet and thewiring is well can connect another machine there with the same cable or a dexter inthe outlet I confirm that if is used if it is fine everything from cabling and poweroutlet and still not turn on cable to both the monitor and the tower when Idisconnect because this offline I am about to disassemble the Tower removing thescrews of the covers to then open these and thus look the connection of a sourcewith the main board if it is well connected I start reviewing all connections if theyare I can either disconnect all the connections of the main board and to verify thatthe power source is working I can create a bridge with a pin of black and a greenpin can make bridge connection with a clip that helps me to join the two previouslynamed legs if doing the fan moves this means that the source if it works correctly.The bridge can be soBut if doing so does not work the fan that wants to say that the source of power isnot used and it is likely that you touch change it to enable and turn on thecomputer.
  29. 29. WARNINGDo not perform this procedure but previously known steps and measures ofprotection.But if the source with this test if it works and even turn on the computerclean connections with clean contacts and check that the switch has good yourconnection depending on the map of the main board and if bad her connect thispossibly make it work but if it is good to check the main board is perhaps damagedprocessor or any other part of the main board because this fix will correspond anelectrical engineer.DA NO VIDEO EQUIPMENTthe monitor turns on but this this black screen, look at electrical installations againas with the previous problem I look also to the video connection this well both themonitor and the Tower if they are well can try the monitor on another tower to ruleout that it is the monitor that does not give video if it works normally with anotherTower I rule out that it is the monitor and I focus on the tower to review it Idisconnect all external connections of the monitor and the Tower alreadydisconnected remove the screws of the lids and open the Tower check the videocard probandola in another Tower if it doesnt work is that this damaged the videocard and If it is so simply change by one serving.THE MONITOR DOES NOT IMAGES ARE ALL THE COLORSJust on the desktop give you right click (1) properties then get me a window withthe options of (2) display properties give you click on (3) configuration (the qualityof the color must be in 32-bit).
  31. 31. It may be because perhaps no operating system installed or that the hard disk isdamaged or there is any damage file systems within the system operating this Imust then remove the hard drive and can be in another Tower putting it as a slaveand so make a backup of the information that is in This what formatting and Iconnect again to the Tower initial changing it again to master and install theoperating system.
  32. 32. NO MOUSE POINTER IS MOVINGpossibly the mouse disconnected and the system does not recognize thisperipheral or possibly the PS/2 pins are twisted if they are twisted can straightenbut if they are parties to change the mouse but if the problem is already in the mainboard you must install a USB card to mouse but if they are well connectors I test onanother computer then I come to connect the mouse and reboot the system so thatit recognizes, but does not work if you can right-click this dirty in such a wayremove you the screws of the party less I open and so clean clean contact andagain it to join and if it doesnt already It is problem or it mouse or its connector wewould have to change it but not to repair it.Or for a more simple than the mouse case this good but that monitor the cursordoes not move should be also because this has locked up and it can be solved bypressing CTRL and 5 option appears administrator tasks to give click there get methis Windows.I would like to end task, and this close me the program that I have blocked thecursor this may be another possible problem with solution.THE KEY DOES NOT RESPOND
  33. 33. possibly the keyboard this disconnected and the system does not recognize thisperipheral or possibly the PS/2 pins are twisted if they are twisted can straightenbut if they are parties to change the keyboard but if the problem is already in themain board you must install a USB card keyboard but if they are well connectors Itest on another computer then I proceed to connect the keyboard and reboot thesystem so that it recognizes, but if it does not work it may be that harm will come ofthe membrane or card and these parties must change if it is not the case and theirinternal parts are fine but the problem persists can be that the keyboard this dirty insuch a way remove you the screws of the party less I open and so clean cleancontact and again it to join and if it doesnt already a problem or keyboard and itsconnector We would have to change it but not to repair it.THE COMPUTER IS SLOW AND GENERATES ERROR CONSTANTS ON THESCREENthe main reason may be because the hard drive this very full, the information maybe fragmented information can be des fragment with a defragmented hard drivefound in the operating system or the hard disk this next to damaged must bechanged or you may also be slow by wiring or sub-procesos you can be updatingthe operating system or the antivirus can be that the operating system this gradientand gives errors or possibly has many viruses can format or install a new operatingsystem if it requires it.Another reason why the computer may be slow should be because it is very full oftemporary (temporary are visits carried out on a daily basis is that they are storedor the records reviewed sites) to remove them I can do the following procedure:
  34. 34. Join the start buttonThen I will runI write the following in run
  35. 35. Typing this in run appear all the time as wellThen select where you want to remove and oprimo shift+supr to eliminate them andthat do not appear me in the trash again.And so I deleted them causing the computer faster.THE UNIT OF CD-ROM CD-WRITER OR DVD-ROM DOES NOT READ THECDS:look at the internal connections for this must disconnect all the connections of themonitor and the Tower then remove the screws and open the lids of the towers insuch a way I can examine connections by making me to the main board you this byproviding enough voltage to the connectors on the drives and the data connection ifthey are well users online and corresponds to the set voltage can have possibleinternal damage in the optical reader if you do you change the unit but if only its dirt
  36. 36. is done with blower and cleaning with a CD of cleaning and a bit of isopropylalcohol (to recognize a cleaning CD this comes with) a small brush which isimpregnated with alcohol and this makes you clean the CD-ROM CD-WRITER orDVD-ROM drive.These common failures are continuously presented to users, was solved bymeans that questions were technical support Ilyich Mauritius antolinez Interviews INTERVIEWS with users of the capacity of bogota d.c LABORATORY TOOLS HERRAMIENTAS DE LABORATORIO
  37. 37. • request for technical support and troubleshooting:nº de caso: 2• time and date of interview: 27/04/2011 10: 06 am• description of the support: the printer does not work does not print it• solution provided: checked the brand of the printer and the ip address that is the port that is using the other computer for printing and look in the computer effectively does related such way is configured the printer to the computer and both wanted the (IP) port and are looking for the printer are send a test print and is functioning normally• Officer (a) applicant: light nery flowers león• Unit: legal advice Office• extension:466• Case No: 3• time and date of interview: 27/04/2011 10: 15 am• description of the support: the monitor is blocked• provided solution: it can be verified and effectively on the monitor does not respond is not moving or the cursor of the mouse in such a way the mouse disconnects reconnects then push CTRL and given her task manager option is given to end task restarts the system and is solved the problem.• Officer (to) solicitante:jaffiza Ivonne amador namen• Unit: Branch Office• extension:106
  38. 38. • Case No:5• time and date of interview: 27/04/2011 10: 40 Am• description of the support: does not recognize the keyboard• solution provided: disconnects and reconnects the keyboard restarts the system and the problem is solved• Officer (to) Castilian solicitante:zoila defiles• Unit: Police Affairs• extension:131• Case No:11• time and date of interview: 28/04/2011• description of support: to save a file in Word and then reopen it in open office it appear read-only for this reason doesnt it change.• solution provided: makes a copy of the Word file and sticks in an open office file.• Officer (a) applicant: ario lozano Alfonso Asprilla• Unit: jurisdictional• extension:296
  39. 39. Guarantees and policiesGlossaryComputers are composed of a series of electronic components that are responsiblefor their proper functioning. These include• Central unit of processes (CPU): is the brain of the pc. He is responsible forprocessing instructions and data that the computer works. The processor is themost important device and which most influences his speed to analyze information.• Memory RAM or main memory: is the random access memory, stored instructionsand data for programs to ensure that the CPU can access them directly through theexternal high speed data bus.The RAM is known as a read/write memory, to differentiate it from the ROM. It issaid that in the RAM, the CPU can write and read. For this reason, most of theprogrammes allocated part of the RAM as a temporary space for storing data,which allows to rewrite. As it does not retain its contents, turn off the computer it isimportant to save the information.The amount of RAM memory rather influences the speed of a pc. Among morememory RAM you have, faster work and more programs may have open at thesame time.• Memory ROM: it is the memory only for reading. It is the part of the main storageof the computer that does not lose its contents when power is interrupted. Itcontains essential programs of the system that the computer or the user can bedeleted, as those that allow you to start the operation every time you turn on thecomputer.• Memory ROM: it is the memory only for reading. It is the part of the main storageof the computer that does not lose its contents when power is interrupted. Itcontains essential programs of the system that the computer or the user can bedeleted, as those that allow you to start the operation every time you turn on thecomputer.• Hard drive: is the device of secondary storage that usesmultiple hard drives of a magnetically sensitive material. It ishoused, together with the heads of reading in a sealingmechanism in hermetic manner, which saved programs and all files created by the
  40. 40. user when working with these programs. Between more ability to have a disk hard,more information and programs can be stored on your pc.The capacity of the hard drive is measured in gigabytes (GB). A GB equals 1,024megabytes (MB) for approximate mind.• Cache: is a small unit of ultrafast memory which stores information that has beenaccessed recently or that are accessed frequently, which prevents that themicroprocessor has to retrieve this information from slower memory circuits.The cache is usually located on the motherboard, but sometimes it is integratedinto the processor module. Data storage capacity is measured in kilobytes (KB).While more cache has the computer it is better, because you will have moreinstructions and data available in a faster memory.• Motherboard: is circuit board containing the processor, or CPU, RAM,microprocessor support chips and expansion slots. These are those that allowinsert, for example, the sound (which allows the pc to play sound), the internalmodem (which makes it possible to surf the internet) or the graphics card or cardvideo (which allows to display images on the screen).• CD-ROM: this unit is used to read CDs, whether these programs, music ormultimedia (sounds, images, texts), such as encyclopaedias and video games. Thespeed of this unit depends on two factors: the rate of data transfer and access time.Data transfer rate refers to the amount of data that the unity of CD - ROM can sendto your pc in a second. This rate is measured in kilobytes per second (kbps) andindicated with a number next to a x, e.g.: 16 x, 24 x, 48 x. While more x, faster.Access time refers to it takes the entire process.• CD drive: this drive reads and writes on CDs. These discs are used to save andread information, but in contrast to the hard disk, which is fixed inside the pc, canenter and get out of the unit, so enable transporting data from one side to another.The CDs have a very high capacity for data storage.The essential data entry tools are called input devices: input devices incorporatethe information into the drive of the pc system.
  41. 41. Keyboard: it is an input device consisting of a system of keys, such as the of atypewriter, which allows input data the computer or digital device.When you press a character, an encrypted entry is sent to the computer, whichthen shows the character on the screen. Numeric keypad refers to the set of keyswith numbers in the right hand side of some keyboards. The keys on the keyboard of the computer are usually classified follows: • alphanumeric keys: letters and numbers. • keys of punctuation: comma, point, point and comma, among others.Special keys: function keys, control keys, arrows, key caps, among others. Mouse /mouse: piece of hardware connects your computer to help you control themovements of the cursor and the ability to handle objects on your screen. It allowsnavigation in an easy and convenient way.A positive point of this hardware is that it works perfectly with any of the types ofcomputer that are on the market today. It is difficult to see any incompatibilitychanging mouse/mouse, whatever the brand of a system to another.The function main mouse, "mouse" is find or organize information with theleft hand side. The right side presents several options, such as copy, paste orcut.GOALSInstitutional
  42. 42. • The manual for the area of technical support of preventive maintenance of PC´s is over 100%. • That the manual will be implemented and works for the technical support area. • The personnel to perform their Social Service and practical professionals in this area, using it and learn of preventative maintenance activities.Staff´sAcquire practical skills and develop theoretical knowledge, to perform anydiagnosis and detect faults in the teams both hardware or software givingsolution to the problems as soon as possible.OBJECTIVESGeneral
  43. 43. Make a user manual, to serve as a reference to implement courses of preventivemaintenance of PCs, allowing training staff that requires theoretical - practical, way.SpecificS Learn about the internal architecture of the computer hardware. Differentiate the existing Hardware configurations. Know and use the materials and tools used in the area of technical support forthe preventive maintenancet Learn how to perform the preventive and corrective maintenance through amethodological sequence to PCs. • REQUIREMENTS FOR PREVENTIVE MAINTENANCE • Machinery and equipment to incluide
  44. 44. 1) A set of screwdrivers (Philips) or cross-head, Hexagon socket or Torx, flat and Copa del Rey). 2) A wrist strap. 3) A small soft brush. 4) Catton swab. 5) A blower or "blower. 6) Pieces of fabric dry. 7) A disk cleanup. 8) Isopropy Alcohol. 9) Clean spray contacts. 10) Silicone lubricant or White fat. 11) Oil-3 – IN - ONE. 12) A draft. • Areas of operation to include It is important to include in this guide many of the areas in which we can carry out maintenance either in preventive and corrective of one machine because in any occasion where there is a computer or computer maintenance there this our work seen. In this case we have carried out preventive maintenance of one of the maquias of the area of technical support and help desk, in the interviews we can see all the areas we visited to conduct maintenance or make such media named in these.• Additional disciplines to the preventive mantenance program
  45. 45. As well as experience in the area of systems, there are other air which shouldknow because they used in the maintenance of computing.The electronic management (electricity)• Customer service• Cleaning• Mechanics• Mathematics and some physical PLANNING FOR THE IMPLENTATION OF THE MAINMATENANCE(ORDER JOB)
  46. 46. Below are the procedures which had and should take into account whenmaking the maintenance of the Pc
  47. 47. Planning for the implementation of the maintenanceProcedure Time in minutesWorking tools to disassemble the team get ready to go 2Disconnect the wiring equipment (hardware) 3Take the team and move it 25 secondsPlace the teams computer on a flat surface and secure 25 secondsDetermine the first tools used in disarmament 3Unscrew the tower or pc is desensamblando 2Remove the end covers 30 secondsPlace the pc in a proper way so it can be disassembled 20 secondsRemove or disconnect the source of power of the main board, CD-ROM, hard 4drive, Floppy driveDestornillar the source of power 2Remove it from the tower 30 secondsBlow out the source of power, placing him an element to the fan to prevent 1damage or to turnDestornillar along with the heat sink fan if necessary. There are some 4that are under pressureRemove the heatsink of the mainboard, avoiding damage to the processor and2blow it withthesopladora(asegurar_el_ventilador_con_un_elemento_que_no_permita_las_revoluciones_deel_ventilador)Now to remove the processor if you want to. Remove the insurance that keeps 1pressureRemove the processor using latex gloves if necessary, if not you think it 2appropriate to not remove the processorPlace the processor in a safe place in case an antistatic element 20 secondsRemove video, internet RAM memories graphics cards 6Unscrew the hard disk and CD-ROM drive 4Remove units 1Clean the elements removed from the pc as a hard drive, unit of CD - ROM - 7floppy with a can of foamy unit and if it is necessary to use the blower.Clean up as RAM - internet sound cards and others with a can of compressed 5air or blowerClean up the entire interior of the tower with a blower avoiding contact with the 5powder
  48. 48. The average time of preventive maintenance in hardware is 1 hour or hourand a half.In this case our time was 1 hour 22 minutes 30 seconds.MEASUREMENT OF PREVENTIVE MAINTENANCEFor the measurement of the preventive maintenance will seek a software as it is inthis case the software called performance, is intended to be the final outcome ofthe test performance of 7% PROCEDURE FOR PREVENTIVE MAINTENANCE OF SOFTWARE AND HARDWARE Preventive maintenance software 1- The defragmented disk desfragmentación addresses accommodate files in ancient Memory addresses 2- applications installed on the computer and that no longer in use, removal of temporary, missing files, empty folders, shortcuts that have a path that no longer exists, invalid records for the purpose of free space on your hard disk to increase the speed and correct the flaws in the normal functioning of computers. 3- You can choose in the form of releasing disk space windows as the Liberator search in the drive you have selected the temporary files, internet cache files, and unnecessary files that can be removed safely. • The execution of a virus which is carried out scanning of cleaning of the computer in my pc or computer by right clicking and analysing with the antivirus contains its OS Mantenimiento del Hardware (PC) Maintain CPU (box of the computer) adequately ventilated and separated from excessive sources of heat and humidity. Check from time to time that fans of the CPU (source of food, safe, processor and graphics card) are working properly and are free from dust, cleaning them with care if necessary. An excessive or unusual sound can help us to prevent
  49. 49. a rapid failure of the fan. • Do not move or hit the CPU while it is turned on. We must remember that the que el disco disk hard is girado constantly, like the floppy drive or CD-ROM, and can cause a failure of any of them. In the same way, carefully move the CPU on the move, because we can disengage some cards or connection internal. Clean up every time the keyboard, mouse, printer, removing dust and stains, according to the manufacturers instructions. The only connection that can connect and disconnect from a switched on PC is the USB. For the rest, shut down always the computer and the peripheral connect, making it turn then. Used to be a current peaks filter, which protect us from overvoltages by failures in the power supply. Such devices have aspect of "multiple space" and they are relatively affordable. During the installation of cards or components inside the CPU, be careful, and insert them without force. Before you place them, touch the metal parts to download possible static electricity of our body, which can damage the components. Verify that the cables do not prevent proper cooling of the fansINVENTORY OF HARDWARE AND SOFTWARE (CHECK LISTINGS)Estos thedevices found were:Inventory of hardware maintenance:First computerRAM: 2 GB of Kingston memoriesMEMORY TYPE: DDRVOLTAGE: 2.6SIZE OF RAM CAPACITY: 256 MBPROCESSOR: Intel Pentium 2.40ghz/1m/533 SL 88f pilipinas 75228303
  50. 50. ZOCKET: MPGA 478BMAIN BOARD: Intel desk top board D845GVFN/D845 pemyPCI: number 3 with wireless and PCI card in halfAGP: not availableHARD disk: maxtor size; 40 gb voltage; 12 and/or 5 reference; Nar61H90KEYBOARD reference: 427004614 CMS marks; geniusesREFERENCE MOUSE: netscrollREFERENCE drive: serial; 96850433 js smt N50 marks; Sony model; MPF920voltage; 5. 960 MAREFERENCE DVD; (ROM): model; SOHC-5236V serial; 461519008805 voltage;5 1.5A/12v 1.5ASecond ComputingRAM: 1 KingstonMEMORY TYPE: DDR 400VOLTAGE: 2.5SIZE OF CAPACITY: 512 MBPROCESSOR: Intel Pentium 519 k SL 8 ja philippines3.06hz/1m/533/04a753b212SOCKET: IFJ702MAIN BOARD: as rock dual channel 77515g reference; fsb1066/esb800PCI: 3 without a card numberAGP: if you have but no cardHARD drive: Hitachi size; 164 gb voltage; 5 490MA - 12V serial; z20po6efmodel; HDS721616 PLAT80
  51. 51. KEYBOARD reference: kb-0316 5v-50mA E-C012-03-Spain (B)THE MOUSE reference: geniuses s/n 148655902046REFERENCE drive: E-H012-03-0795 (B) 5V-960 mA Js hsm n50REFERENCE DVD (ROM: model;) GSA-h42n serial; 701HBWB37345 5v/12v1.5A/2.0A marks; LGThird computingRAM: 1 KingstonMEMORY TYPE: DDRVOLTAGE: 1.8BUILDING SIZE: 2GPROCESSOR: Intel 05E4600 Intel coreTM 2 Duo SL a94MALAY2.40ghz/2m/8000gq812a22 SL 88f Philippines 75228303SOCKET:MAIN BOARD: as rockPCI: 2 without a card numberAGP: If you have with-pin connectorHARD disk: maxtor size; 40 gb voltage; 12 and/or 5 reference; Nar61H90KEYBOARD reference: geniuses model GK-070006/U YB 9811024703REFERENCE mouse: genius GM-03022P s/N W60193701747REFERENCE drive: Sony model; MPF920 voltage; 5. 960 mAREFERENCE DVD; (ROM): model; SOHC-5236V serial; 461519008805 voltage;5 1.5A/12v 1. 5th
  52. 52. Format for the recruitment and screening for the maintenance of hardware
  54. 54. Inventory of software maintenanceMaintenance of software as inventory is a total collection of programs (software)containing the pc and general how by follows. • Goes to the start button • Control Panel • Programs and Features And you can see how the computer program contains in itself that will be the general inventoryHOW TO MAKE A BACK-UP FOR FILESevery time you are going to carries out maintenance of some damage to softwareor hardware that includes as such internal manipulation of the Tower hard drive isvery important to make a back up of the documents of the user which means that Ido a copy of the most important of the user documents so then both he and I do notpresent disadvantages once the maintenance has been and is missing a file insuch a way this back up we can do in the following way:I enter the start buttonLook there for my PC when enter search the local hard drive option this saves theinformation on your hard disk.
  55. 55. Double click and enter will receive a series of folders where you will find a folder assuch assigned to make back-up like this.Da double click will appear the folders of the number of users who use this PC insuch a way that search for the folder that the user indicated.To give double click will appear documents that you have on your computer are alland selected giving them copy either a CD or a USB memory or in such manner onother removable hard drive in this way will be saving the files that most interest youto the user.When you are finished and the maintenance of the computer again on the localdrive.Then in the folder Of which remove the folder of the user and finally in the final folder which is theuser where you got information either on the CD or the USB memory stick orremovable hard disk copiare where again the information there was user. EQUIPMENT READINESS
  56. 56. Enlistment of equipment transfer and monitoringProvided that it performs a preventive or corrective maintenance it is important thatwe demarquemos the computer to review to avoid future problems.To demarcate we use symbols, strike, or some kind of stamp as it is: Technician Time Machine name model Board Date Procedure computer was performed PROOF OF PERFORMANCE (PERFORMACE) It will give rise to the following instructions 1- The software is in operation you will be given click to continue.
  57. 57. 2- It sought the option RUN BENCHMARK and will click immediately began to analyze the performance of your computer 3- He observed the progress that has thes software on the análisis of the measuremente of the maintenance.Finally performance software to show the performance of your computer and if youwant to save this information only goes to save result.
  58. 58. In this case the performance is 401.0 DISARMAMENT and assembling of the equipment (images) • Determine the most organized form of maintenance of equipment.Keep the computer free of dustUtiliza un paño suaveKeep the screen and the typing covered with covers or guards.Order to detect the features that present the computer externallyBe complied with (a) in the management of safety standardsOrganized (a) in place of workCareful (a) in the handling of the toolCautious (a) in the disassembly of parts teamNeat in the cleaning of surfaces external/internal CPUCreative in solving problems
  59. 59. Honest to assemble partsResponsible for the delivery in good condition and in time the pcTechniques of disassembly and Assembly of equipment of computer.These basic measures are vital to the security of the computer equipment andpersonal safety * before opening of any is necessary to check for to detect possiblefailure, which is to turn on the computer and test each and every one of theapplicationsreview of floppy disk drives and the CD - ROM drive. * Verify that eachone of the keys of the keyboard work properly, both the mouse and the buttons tomove without any problem. * No forget to shut down the computer and disconnectthe power cord of the taking of power before removing the screws and take note ofthe place where I remove them. * Remove the screws and to introduce them in thepot for the photographic roll (thus avoiding losing the screws), be sure to use theappropriate driver. * Remove the lid of the computer, if the PC is mini tower lie himto work with comfort and security. * Prior to remove any component, look carefullyat the inner part of PC, take note of the placement of the cards, when preventivemaintenance is completed put them in the exact place where the bag. * Once takennotes small details appropriate to place the antistatic wristband to avoid damagingany card.* When to remove the card and it is found cleaning place it in an antistatic bag, thesame for all cards. It is recommended to not remove the hard drive, microprocessorand power source. * The work table to be located in a right place, to avoid the riskof falling components removed from the Cabinet (cables, expansion cards, * anadequate lighting is essential to see the areas to be cleaned)along with a betteridentification of the components of the computer to avoid confusion at the time ofconnect the different cables inside the system. Be cautious with the management ofthe screws of the system in time to disarm it. The screws are not designed for allpoints. It is very important to differentiate well those who are short of the mediumand long. For example, if a long screw is used to mount the hard drive, there is arisk of damaging the card internal it is better to store screws in a single place,others classify and others ordered them as it is disarming to then train them inreverse order at the time to assemble the team.
  60. 60. PROOF OF PERFORMANCE ENDAnd finally our final proof of performance demonstrating that our preventivemaintenance if it is right and we can have a better performance of themachine TERMS OF DELIVERY AND COST All services offered in this manual have specific cost and monetary value does not exceed $ 180,000 common. All prices include VAT (Value Added Tax). If satisfied with the service, the hardware parts are charged per order for postage and packing method of payment is made between the parties concerned. 1. With credit card, the easiest option. We accept Visa, Castling, American
  61. 61. Express and Diners. You enter the card details and we charge the amount.2. By bank transfer or check. Transfer money to our account or send a check for the invoice value. The account number for transfer can be found in order confirmation. If you choose to check, please use the address below. After confirmation of payment for their part, we will send your computer equipment. If you have any questions regarding payment methods, you can contact us at We will respond with pleasure. WARRANTIES AND POLICIES This warranty policy only covers the original installed parts that make up the team (original model configuration).Coverage of labor and work specified in the warranty document is subject to the type and model of PC. Coverage of original software is preloaded on hardware devices with morethan one year, the software system have a duration of 30 days from the date of commencement of warranty period. It is important that the customer has on hand a copy of the invoice Have none of these documents will be requested the exact date computer repair, as this is a prerequisite to apply for a share. According to the models of each computer has, the warranty terms and conditions described in the policy of product on the side of the document signed by repairing your PC or laptop. Processing of WarrantyRepaired equipment failure must submit the following procedure so that your warranty will be served: Through a toll-free customer must report the failure of his machine at No 3203032554.A representative of the companys Technical Support will assist you and help to detect the failure of your machine.If your phone can not resolve the impasse, the representative shall assign a case number and an authorized center. Different models and it is concluded that there are different types of warranty. There are teams that according to your policy have the following warranty period:Hosts: count with 03 year warranty covering labor and parts as indicated by your policy and attendance is close to the case. Desktop computers - Tower: These are computers that have 01 years warranty on labor.
  62. 62. The customer and the warranty of the battery are also 01 years. Laptops as indicated by the policy have a warranty of 2 years of work and part but becomes effective the client must take the equipment to Dealer CONCLUSIONS The opportunity to analyze a wide variety of equipment with different problems has allowed a broader view of what is really to preventive maintenance. This in turn has helped to gain new knowledge and enhanceknowledge to those who already had, has had the opportunity to clarify many doubts that in theory were not always easy to understand, but in practice they are much more understandable. Whole mechanism is known in the implementation of software and hardware maintenance. The opportunity to implement what they have learned to acquire new knowledge society of other preventive maintenance of an efficient support for any technical problems. Has allowed a broader view of what is really to preventive maintenance.
  63. 63. GLOSSARY Computers are composed of a series of electronic components that are responsible for proper operation. These include • central processing unit (CPU) is the brain of the pc. Responsible for processing instructions and data that the computer works. The processor is the device most important and most influential in their speed in analyzing information. • RAM or main memory: the random access memory in which instructionsand data are stored programs for the CPU can access them directly through the external data bus speed. The RAM memory is known as read / write, to differentiate it from the ROM. This means that in the RAM, the CPU can read and write. Therefore, most programs use part of RAM as temporary space to store data, which allowsrewriting. As it does not retain its contents, turning the computer is important to keep the information.The amount of RAM enough influence on the speed of a PC. The more RAM you have, the faster work and more programs can have open at once.• Memory ROM: read-only memory. Is the main storage of the computer that does not lose its contents when power is interrupted. It contains essential system programs that neither the computer or the user can delete, such as those that allow you to start running every time you turn on the computer. • Hard disk: the secondary storage device that uses multiple hard drives covered in a magnetically sensitive material. Is housed, along with the read heads in a hermetically sealed mechanism, which are stored programs and all files created by the user when working with these programs. The more capacity you have a hard disk, information and programs can be stored on the PC.Hard disk capacity is measured in gigabytes (GB). One GB is equal to 1,024 megabytes (MB) about mind. • Cache is a small unit superfast memory that stores information that recently accessed or that is frequently accessed, thus preventing the microprocessor will need to recover this information from slower memory chips. The cache is usually located on the motherboard, but sometimes it is integrated into the processor module. Their data storage capacity measuredin kilobytes (KB). While the computer has more cache is better, because you have more instructions and data in a faster memory. • Motherboard: is the circuit board containing the processor or CPU, RAM, chips support the microprocessor and expansion slots. These are for inserting, for example, the sound card (which allows the pc playing sound),
  64. 64. the internal modem (which makes it possible to surf the internet) or graphics or video (which can display images on the screen) . • CD-ROM: This drive used to read compact discs, are these programs, music or multimedia (sounds, images, text), such as encyclopedias andgames. The speed of this unit depends on two factors: the data transfer rate and access time. The data transfer rate refers to the amount of data to the CD - ROM can besent to PC in a second. This rate is measured in kilobytes per second (kbps) and is indicated by a number next to an x, eg 16x, 24x or 48x. The more x, the more speed. The access time refers to how long it takes the entire process.• CD: This drive reads and writes to CDs. These discs are used to store and read information, but unlike the hard disk, which is fixed within the PC, you can insert and remove the drive, so you can move data from one place to another. The CDs have a data storage capacity very high. The essential tools in the data input are called Input Devices: Input devices incorporate the information into the system drive of the pc. Keyboard: is an input device consisting of a key system, such as a typewriter, which allows the computer to enter data or digital device.When you press a character, it sends a coded input to the computer, whichthen displays the character on screen. The term numeric refers to the set of keys with numbers on the right side of some keyboards. The keys on computer keyboards are often classified as follows: • Alphanumeric keys: letters and numbers. • punctuation keys, comma, period, semicolon, among others. • Special keys: function keys, control keys, arrow keys, shift key, among others. Mouse / Mouse: piece of hardware connects your computer to help control the movements of the cursor and the ability to handle objects on your screen. Navigation enables an easy and comfortable. A bright spot of this hardware is that it works perfectly with either type of computer on the market today. It is difficult to see any inconsistencychanging mouse / mouse, whatever the brand from one system to another.The main function of the mouse, "mouse" is to find and organize informationon the left side. On the right side are several options such as copy, paste or cut.
  65. 65. REFERENCES • sirvemantenimiento • ntoPreventivoCorrectivoDePCs.pdf • • correctivo
  66. 66. • correctivo-de-computadoras.html Corrective Maintenance of a Computer • qid=20110112094435AA9MvE0 • option=com_content&view=article&id=5428:Mantenimiento- preventivo&catid=902:Aprende-algo-% C3% Batil-today-Education% C3% B3n-para- the-job & Itemid = 332 • C3% B3mo-remove-one- processor-de-la-computadora.html • ora • limpieza-del-monitor-y-limpieza-del-mouse.html • • • • una.html • qid=20090511074406AAssGxA •• cpu.html • computador/mantenimiento-computador.shtml • interior-de-tu-pc
  67. 67. _____________________________________________________ SYSTEMS TECHNICAL GROUP 2011