SlideShare a Scribd company logo
Vision for future


                                  Maintenance
Course Description:

In this course, students will be able to identify hardware troubleshooting and how
to maintain their Pc’s, how to install windows and how to solve and recover
common failures .

Course Benefits:
At the end of this course, students will be able to:
    Identify the components of standard desktop personal computers.
    Identify fundamental components and functions of personal computer
     operating systems.
    Identify best practices followed by professional personal computer
     technicians.
    Install and configure system components.
    Maintain and troubleshoot peripheral components.
    Install and configure operating systems.
    Maintain and troubleshoot installations of Microsoft Windows.
    Identify network technologies.
    Install and manage network connections.
    Support printers and scanners.

Program Requirements

Students taking this course should have the following skills: End-user skills with
Windows-based personal computers, including the ability to: Browse and search
for information on the Internet. Start up and shut down the computer. Move, copy,
delete, and rename files in Windows Explorer.



                      Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom.
                 Tel : 048/9102897                 Customer Service : 0102502304
          Email : info@ideal-generation.com        Website: www.ideal-generation.com
Vision for future

Curriculum

Lesson 1: General Introduction
   Computer concept
   History of computer
   How computer work

Lesson 2: Computer Components
     System case and power supply
     Hard drives and optical drives
     Memory ( Ram )
     CPU (Central Processing Unit)
     Mother Board
     Monitor
     Keyboard and Mouse
     Other

Lesson 3: Building Computers from Components
   Assembly components to be compatible with each
   Brand named of different parts

Lesson 4: Booting the computer and BIOS setup
   How to troubleshoot booting process
   How to know different parts at booting process
   Explain BIOS setup

Lesson 5: Operating system fundamentals


                    Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom.
               Tel : 048/9102897                 Customer Service : 0102502304
        Email : info@ideal-generation.com        Website: www.ideal-generation.com
Vision for future

   History of operating system
   How to install windows
   How to customize windows installing process

Lesson 6: Windows Xp basics
   After installing windows XP
   Programs after installing windows
   How to customize your windows environment

Lesson 7: Viruses
     Definition of Virus
     Different types of viruses
     How to deal with viruses
     How to protect your computer from viruses

Lesson 8: Widows Recovery
   How to recover windows failure
   How to use recovery consol
   How to restore your windows

Lesson 9: Maintenance tools
   Describe powerful tools to maintaining your pc
   How to make a clone image for your system
   How to use various restore methods

Lesson 10: Network fundamentals
   Network Concepts


                    Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom.
               Tel : 048/9102897                 Customer Service : 0102502304
        Email : info@ideal-generation.com        Website: www.ideal-generation.com
Vision for future

 Network Communications
 Internet Technologies
 Sharing resources




                Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom.
           Tel : 048/9102897                 Customer Service : 0102502304
    Email : info@ideal-generation.com        Website: www.ideal-generation.com

More Related Content

Similar to Maintenance

Adavanced maintenance diploma
Adavanced maintenance diplomaAdavanced maintenance diploma
Adavanced maintenance diplomaelshiekh1980
 
Moamen Ahmed Lotfy
Moamen Ahmed LotfyMoamen Ahmed Lotfy
Moamen Ahmed LotfyMoamen Ahmed
 
381091947 introduction-computer-systems-servicing-nc-ii
381091947 introduction-computer-systems-servicing-nc-ii381091947 introduction-computer-systems-servicing-nc-ii
381091947 introduction-computer-systems-servicing-nc-ii
hantos_cute
 
Mohammed Farouk Ahmed
Mohammed Farouk AhmedMohammed Farouk Ahmed
Mohammed Farouk AhmedAmr Farouk
 
Laporan Praktikum Keamanan Siber - Tugas 1 - Kelas C - Kelompok 3.pdf
Laporan Praktikum Keamanan Siber - Tugas 1 - Kelas C - Kelompok 3.pdfLaporan Praktikum Keamanan Siber - Tugas 1 - Kelas C - Kelompok 3.pdf
Laporan Praktikum Keamanan Siber - Tugas 1 - Kelas C - Kelompok 3.pdf
IGedeArieYogantaraSu
 
440064845-Introduction-Computer-Systems-Servicing-Nc-II.pptx
440064845-Introduction-Computer-Systems-Servicing-Nc-II.pptx440064845-Introduction-Computer-Systems-Servicing-Nc-II.pptx
440064845-Introduction-Computer-Systems-Servicing-Nc-II.pptx
GelreyLugoJaysonAli
 
aftercomputer fax waleed cv
aftercomputer fax waleed cvaftercomputer fax waleed cv
aftercomputer fax waleed cvwaleed seif
 
Brian_Rose_Resume_4_29_2015
Brian_Rose_Resume_4_29_2015Brian_Rose_Resume_4_29_2015
Brian_Rose_Resume_4_29_2015Brian Rose
 
Waleed's CV _ Last update
Waleed's CV _ Last updateWaleed's CV _ Last update
Waleed's CV _ Last updatewaleed ahmed
 
Ahmed Donia CURRICULUMVITAE
Ahmed Donia CURRICULUMVITAEAhmed Donia CURRICULUMVITAE
Ahmed Donia CURRICULUMVITAEAA DD
 
Revision Notes IT CODE 402 Class 10.pdf
Revision Notes IT CODE 402 Class 10.pdfRevision Notes IT CODE 402 Class 10.pdf
Revision Notes IT CODE 402 Class 10.pdf
ManasGupta211804
 
Mcitp enterprise administrator 2008
Mcitp enterprise administrator 2008Mcitp enterprise administrator 2008
Mcitp enterprise administrator 2008elshiekh1980
 

Similar to Maintenance (20)

Ic3
Ic3Ic3
Ic3
 
Adavanced maintenance diploma
Adavanced maintenance diplomaAdavanced maintenance diploma
Adavanced maintenance diploma
 
My C.V
My C.VMy C.V
My C.V
 
C#
C#C#
C#
 
Moamen Ahmed Lotfy
Moamen Ahmed LotfyMoamen Ahmed Lotfy
Moamen Ahmed Lotfy
 
Mohammad Mazen CV
Mohammad Mazen CVMohammad Mazen CV
Mohammad Mazen CV
 
381091947 introduction-computer-systems-servicing-nc-ii
381091947 introduction-computer-systems-servicing-nc-ii381091947 introduction-computer-systems-servicing-nc-ii
381091947 introduction-computer-systems-servicing-nc-ii
 
Security+
Security+Security+
Security+
 
Mohammed Farouk Ahmed
Mohammed Farouk AhmedMohammed Farouk Ahmed
Mohammed Farouk Ahmed
 
Laporan Praktikum Keamanan Siber - Tugas 1 - Kelas C - Kelompok 3.pdf
Laporan Praktikum Keamanan Siber - Tugas 1 - Kelas C - Kelompok 3.pdfLaporan Praktikum Keamanan Siber - Tugas 1 - Kelas C - Kelompok 3.pdf
Laporan Praktikum Keamanan Siber - Tugas 1 - Kelas C - Kelompok 3.pdf
 
440064845-Introduction-Computer-Systems-Servicing-Nc-II.pptx
440064845-Introduction-Computer-Systems-Servicing-Nc-II.pptx440064845-Introduction-Computer-Systems-Servicing-Nc-II.pptx
440064845-Introduction-Computer-Systems-Servicing-Nc-II.pptx
 
aftercomputer fax waleed cv
aftercomputer fax waleed cvaftercomputer fax waleed cv
aftercomputer fax waleed cv
 
Brian_Rose_Resume_4_29_2015
Brian_Rose_Resume_4_29_2015Brian_Rose_Resume_4_29_2015
Brian_Rose_Resume_4_29_2015
 
Cisco
CiscoCisco
Cisco
 
Waleed's CV _ Last update
Waleed's CV _ Last updateWaleed's CV _ Last update
Waleed's CV _ Last update
 
Cis100 outline
Cis100 outlineCis100 outline
Cis100 outline
 
Ahmed Donia CURRICULUMVITAE
Ahmed Donia CURRICULUMVITAEAhmed Donia CURRICULUMVITAE
Ahmed Donia CURRICULUMVITAE
 
C.V-Mohammad Zaghloul
C.V-Mohammad Zaghloul  C.V-Mohammad Zaghloul
C.V-Mohammad Zaghloul
 
Revision Notes IT CODE 402 Class 10.pdf
Revision Notes IT CODE 402 Class 10.pdfRevision Notes IT CODE 402 Class 10.pdf
Revision Notes IT CODE 402 Class 10.pdf
 
Mcitp enterprise administrator 2008
Mcitp enterprise administrator 2008Mcitp enterprise administrator 2008
Mcitp enterprise administrator 2008
 

More from elshiekh1980

Web design diploma
Web design diplomaWeb design diploma
Web design diplomaelshiekh1980
 
Red hat linux system administration
Red hat linux system administrationRed hat linux system administration
Red hat linux system administrationelshiekh1980
 
Red hat linux networking and security administration
Red hat linux networking and security administrationRed hat linux networking and security administration
Red hat linux networking and security administrationelshiekh1980
 
Red hat linux essentials
Red hat linux essentialsRed hat linux essentials
Red hat linux essentialselshiekh1980
 
Oracle 11g with sql
Oracle 11g with sqlOracle 11g with sql
Oracle 11g with sqlelshiekh1980
 
Oracle 11g structured query language (sql)
Oracle 11g structured query language (sql)Oracle 11g structured query language (sql)
Oracle 11g structured query language (sql)elshiekh1980
 
Oracle 11g rac administration
Oracle 11g rac administrationOracle 11g rac administration
Oracle 11g rac administrationelshiekh1980
 
Oracle 11g database security
Oracle 11g database securityOracle 11g database security
Oracle 11g database securityelshiekh1980
 
Oracle 11g certified professional (ocp)
Oracle 11g certified professional (ocp)Oracle 11g certified professional (ocp)
Oracle 11g certified professional (ocp)elshiekh1980
 
Oracle 11g certified associate (oca)
Oracle 11g certified associate (oca)Oracle 11g certified associate (oca)
Oracle 11g certified associate (oca)elshiekh1980
 
Mcitp server administrator 2008
Mcitp server administrator 2008Mcitp server administrator 2008
Mcitp server administrator 2008elshiekh1980
 
J2 se course outline
J2 se course outlineJ2 se course outline
J2 se course outlineelshiekh1980
 

More from elshiekh1980 (20)

Web design diploma
Web design diplomaWeb design diploma
Web design diploma
 
Sql server 2005
Sql server 2005Sql server 2005
Sql server 2005
 
Red hat linux system administration
Red hat linux system administrationRed hat linux system administration
Red hat linux system administration
 
Red hat linux networking and security administration
Red hat linux networking and security administrationRed hat linux networking and security administration
Red hat linux networking and security administration
 
Red hat linux essentials
Red hat linux essentialsRed hat linux essentials
Red hat linux essentials
 
Oracle 11g with sql
Oracle 11g with sqlOracle 11g with sql
Oracle 11g with sql
 
Oracle 11g structured query language (sql)
Oracle 11g structured query language (sql)Oracle 11g structured query language (sql)
Oracle 11g structured query language (sql)
 
Oracle 11g rac administration
Oracle 11g rac administrationOracle 11g rac administration
Oracle 11g rac administration
 
Oracle 11g database security
Oracle 11g database securityOracle 11g database security
Oracle 11g database security
 
Oracle 11g certified professional (ocp)
Oracle 11g certified professional (ocp)Oracle 11g certified professional (ocp)
Oracle 11g certified professional (ocp)
 
Oracle 11g certified associate (oca)
Oracle 11g certified associate (oca)Oracle 11g certified associate (oca)
Oracle 11g certified associate (oca)
 
N+
N+N+
N+
 
Mcse security
Mcse securityMcse security
Mcse security
 
Mcse messaging
Mcse messagingMcse messaging
Mcse messaging
 
Mcsa security
Mcsa securityMcsa security
Mcsa security
 
Mcitp server administrator 2008
Mcitp server administrator 2008Mcitp server administrator 2008
Mcitp server administrator 2008
 
Jsp
JspJsp
Jsp
 
Java with android
Java with androidJava with android
Java with android
 
J2 se
J2 seJ2 se
J2 se
 
J2 se course outline
J2 se course outlineJ2 se course outline
J2 se course outline
 

Recently uploaded

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

Maintenance

  • 1. Vision for future Maintenance Course Description: In this course, students will be able to identify hardware troubleshooting and how to maintain their Pc’s, how to install windows and how to solve and recover common failures . Course Benefits: At the end of this course, students will be able to:  Identify the components of standard desktop personal computers.  Identify fundamental components and functions of personal computer operating systems.  Identify best practices followed by professional personal computer technicians.  Install and configure system components.  Maintain and troubleshoot peripheral components.  Install and configure operating systems.  Maintain and troubleshoot installations of Microsoft Windows.  Identify network technologies.  Install and manage network connections.  Support printers and scanners. Program Requirements Students taking this course should have the following skills: End-user skills with Windows-based personal computers, including the ability to: Browse and search for information on the Internet. Start up and shut down the computer. Move, copy, delete, and rename files in Windows Explorer. Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom. Tel : 048/9102897 Customer Service : 0102502304 Email : info@ideal-generation.com Website: www.ideal-generation.com
  • 2. Vision for future Curriculum Lesson 1: General Introduction  Computer concept  History of computer  How computer work Lesson 2: Computer Components  System case and power supply  Hard drives and optical drives  Memory ( Ram )  CPU (Central Processing Unit)  Mother Board  Monitor  Keyboard and Mouse  Other Lesson 3: Building Computers from Components  Assembly components to be compatible with each  Brand named of different parts Lesson 4: Booting the computer and BIOS setup  How to troubleshoot booting process  How to know different parts at booting process  Explain BIOS setup Lesson 5: Operating system fundamentals Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom. Tel : 048/9102897 Customer Service : 0102502304 Email : info@ideal-generation.com Website: www.ideal-generation.com
  • 3. Vision for future  History of operating system  How to install windows  How to customize windows installing process Lesson 6: Windows Xp basics  After installing windows XP  Programs after installing windows  How to customize your windows environment Lesson 7: Viruses  Definition of Virus  Different types of viruses  How to deal with viruses  How to protect your computer from viruses Lesson 8: Widows Recovery  How to recover windows failure  How to use recovery consol  How to restore your windows Lesson 9: Maintenance tools  Describe powerful tools to maintaining your pc  How to make a clone image for your system  How to use various restore methods Lesson 10: Network fundamentals  Network Concepts Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom. Tel : 048/9102897 Customer Service : 0102502304 Email : info@ideal-generation.com Website: www.ideal-generation.com
  • 4. Vision for future  Network Communications  Internet Technologies  Sharing resources Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom. Tel : 048/9102897 Customer Service : 0102502304 Email : info@ideal-generation.com Website: www.ideal-generation.com