SlideShare a Scribd company logo
Computing Fundamentals Module
  Lesson 3 — Maintaining and
     Protecting Hardware

         Computer Literacy
         BASICS
Objectives

     Explain  how to evaluate computer hardware
      to purchase components or upgrades.
     Identify and describe how input and output
      devices are connected to the computer.
     Describe the routine maintenance tasks
      necessary to keep your computer in good
      working condition.


2                                  Computer Literacy BASICS
Objectives (cont.)

     Explain  how to use troubleshooting
      techniques to solve computer-related
      problems.
     Understand how to protect the computer
      system from damage.
     Identify factors that can damage storage
      media and learn how to safeguard stored
      data.
3                                   Computer Literacy BASICS
Vocabulary

     Firewall         Surge protectors
     Hackers          Troubleshooting
     Modem            Uninterruptible
     Parallelports     power supply (UPS)
     Plug and play    Universal serial bus

     Serial ports      (USB)
                       Virus


4                               Computer Literacy BASICS
Evaluating Hardware Components
    and Upgrades

     Make a list of the tasks you want to accomplish
      with a new system or upgrade.
     Check company policies or standards.
     Make sure the software you want to use for
      applications is compatible with the computer’s
      operating system.
     Consider the expected useful life of the
      components.

5                                     Computer Literacy BASICS
Comparing CPUs

     Different types of computers use different
      central processing unit (CPU) chips.
     The speed of the CPU depends on the system
      clock, but one 800-MHz computer system may
      run faster than another of the same speed
      because they are designed differently.
     The amount of RAM available also affects the
      processing speed.

6                                   Computer Literacy BASICS
Comparing Computer Models

     The   tasks you want to perform with a
      computer and the environment in which you
      will use it will guide you in deciding what kind
      of computer you need.
     Consider the peripherals and storage
      devices you will need when comparing
      available systems.


7                                      Computer Literacy BASICS
Upgrading Computer Hardware

     You  can add more RAM to make a processor
      run faster. Expansion cards with 128K to
      512K or more additional RAM are available
      on expansion cards that fit easily into the
      computer’s motherboard.
     Hardware peripherals, such as a new
      keyboard, mouse, or printer, are even easier
      to install with an installation wizard.

8                                   Computer Literacy BASICS
“Bundled” Software

     Sometimes   the software that comes with a
      new computer system is fully operable and
      can be registered and used for the life of the
      computer.
     Other software may be offered on a trial
      basis, and you must pay a fee to continue to
      use the program after a certain date.


9                                     Computer Literacy BASICS
Warranties and Technical Support

      Most  electronic equipment has a limited
       warranty that ensures defective components
       will be repaired or replaced during that time.
      Manufacturers and retailers offer extended
       warranties at additional cost. Read the terms
       of a warranty to make sure it is a good value.
      Register new equipment so that the
       manufacturer’s warranty will be in effect.
10                                    Computer Literacy BASICS
Connecting Devices to the
     Computer

      Input and output devices must be connected
       to the printer before they can be used.
      There are two ways to connect I/O devices to
       the computer:
       –   Plug the device into an existing socket or port
           on the back of the computer.
       –   Install a circuit board with the port you need
           already included.

11                                        Computer Literacy BASICS
Typical PC Port Arrangement




12                         Computer Literacy BASICS
Serial and Parallel Ports

      Serialports transmit data one bit at a time
       and are used to connect a mouse, modem
       (hardware used to encode data and move
       across a carrier line), and keyboard.
      Parallel ports transmit data eight bits at a
       time and are used for printers and external
       storage devices.


13                                     Computer Literacy BASICS
Special Ports

      PS/2: Often used to connect a mouse or
       keyboard
      USB: A newer standard that can be used to
       replace serial and parallel ports and can handle
       up to 127 devices
      SCSI: Allows many devices to use a single port
      MIDI: Used to connect recording devices
      PC card: Can be connected to add memory or
       storage capacity
14                                      Computer Literacy BASICS
Cables

     Different types of            A printer cable
       cables are required
       to connect different
       devices:
        Power cords
        Computer-to-peripheral
         connections
        Telephone line or cable
         modem connections

15                                              Computer Literacy BASICS
Plug and Play

        Most hardware components available today are
         called plug and play because they install so
         simply.
        The computer’s operating system recognizes the
         new device when it is plugged in and takes care of
         all configuring tasks.
        A dialog box will appear asking you to confirm the
         type of new hardware, and then the computer
         takes care of changing all settings and making it
         ready to use.
16                                          Computer Literacy BASICS
Routine Maintenance

      Make  regular visual inspections of the
       computer system to look for problems.
      Keep the computer components clean.
      Perform routine “internal” maintenance by
       running utility programs that clean up the
       hard disk drive by removing unneeded files
       and defragmenting the drive.


17                                   Computer Literacy BASICS
Troubleshooting Steps

     1.
                                            Reco
                                            gnize
                                            the
                                            probl
                                            em.
     2.
                                              Repli
                                              cate
                                              the
18                                            probl
                             Computer Literacy BASICS
Troubleshooting Steps (cont.)

     5. Communicate the problem accurately to the
        support technician.
     6. Follow the instructions the technician gives
        you carefully.
     7. Confirm that the problem has been fixed.
     8. Avoid similar problems in the future.



19                                    Computer Literacy BASICS
Accessing Technical Support

     When trouble-
     shooting a
     computer
     problem, you
     can find advice
     on a technical
     support Web
     site provided by
     the hardware or
     software manu-
     facturer.



20                         Computer Literacy BASICS
Protecting Hardware

        Keeping hardware safe involves protecting it from
         power surges and electrical failures, theft, and
         environmental damage.
        An uninterruptible power source prevents damage
         and data loss during a power failure.
        Surge protectors can protect against power spikes
         that can destroy components.
        Using security measures and good sense protect
         computer hardware from theft or damage.
21                                        Computer Literacy BASICS
Protecting Data

        Saving active files frequently is the best way to
         protect against data loss.
        Backup procedures create files that can be used to
         restore data if the primary storage system becomes
         inaccessible.
        Viruses are programs written to corrupt data. Backup
         files and antivirus software help avoid data loss from
         viruses.
        Firewalls, a combination of software and hardware
         elements, prevent unauthorized access to a
         computer on a network (including the Internet).
22                                           Computer Literacy BASICS
Caring for Storage Media
        Keep disks away from magnetic and electrical fields, such
         as those contained in televisions and monitors.
        Avoid extreme temperatures.
        Never touch the surface of the media itself. Hold optical
         media, such as CDs and DVDs, at the edges.
        Remove media from drives and store them properly when
         not in use.
        Never remove a disk from a drive when the drive indicator
         light is on.
        Keep disks in a sturdy case when transporting.

23                                             Computer Literacy BASICS
Summary

      Decisions   about what kind of computer to
       buy should be based on what you want a
       computer to do.
      The kind of software you want to run should
       also help you decide what kind of computer
       to buy.
      It is important to register new equipment to
       activate the warranty and technical support.
24                                    Computer Literacy BASICS
Summary (cont.)

      Input  and output devices are connected to
       the computer through serial and parallel
       ports.
      The Universal Serial Bus is a newer standard
       that is beginning to replace serial and parallel
       ports.
      There are several types of ports: USB, SCSI,
       MIDI, parallel, and serial.
25                                     Computer Literacy BASICS
Summary (cont.)

      Cables  connect peripherals to the computer.
      Many hardware devices today are designed
       to be plug and play, so the operating system
       recognizes the new hardware and configures
       the system for it to work correctly.




26                                   Computer Literacy BASICS
Summary (cont.)

     A  regular visual inspection of your computer
       system can help you find loose cables and
       other potential problems before they affect
       how the computer runs.
      Keeping your computer system clean is
       another way to avoid serious problems.



27                                    Computer Literacy BASICS
Summary (cont.)

      Troubleshooting    involves analyzing problems
       to correct faults in the system.
      Power outages and power surges can both
       damage hardware and corrupt data, so it is
       important to protect your computer system
       from fluctuations in the power supply.



28                                    Computer Literacy BASICS
Summary (cont.)

      Protect your computer from theft, viruses,
       and hackers (somebody who accesses
       another's computer without permission) by
       taking basic security precautions.
      To maintain a permanent copy of data, you
       must store it on some type of storage
       medium. These may include floppy diskettes,
       hard drives, CDs, magnetic tape cartridges,
       and WORM disks.
29                                  Computer Literacy BASICS

More Related Content

What's hot

Performing Computer Operations (PCO)
Performing Computer Operations (PCO)Performing Computer Operations (PCO)
Performing Computer Operations (PCO)
Walden Macabuhay
 
Ch 2 computer hardware(a,b,c,d,e)
Ch 2   computer hardware(a,b,c,d,e)Ch 2   computer hardware(a,b,c,d,e)
Ch 2 computer hardware(a,b,c,d,e)
Mohamed Ahmed
 
Specialized Computer Systems
Specialized Computer SystemsSpecialized Computer Systems
Specialized Computer Systems
MLG College of Learning, Inc
 
Chapter 09 Operating Systems
Chapter 09 Operating SystemsChapter 09 Operating Systems
Chapter 09 Operating Systems
xtin101
 
Occupational health and safety
Occupational health and safetyOccupational health and safety
Occupational health and safety
elsaobejas1
 
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
Michael Lew
 
K to 12_entrep-based_pc_hardware_servicing_learning_module
K to 12_entrep-based_pc_hardware_servicing_learning_moduleK to 12_entrep-based_pc_hardware_servicing_learning_module
K to 12_entrep-based_pc_hardware_servicing_learning_module
Johndion Ruloma
 
V Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii EditedV Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii Edited
SHC
 
IT Essentials (Version 7.0) - ITE Chapter 7 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 7 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 7 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 7 Exam Answers
ITExamAnswers.net
 
Understanding the computer system
Understanding the  computer systemUnderstanding the  computer system
Understanding the computer system
EILLEN IVY PORTUGUEZ
 
Computer Hardware Servicing
Computer Hardware ServicingComputer Hardware Servicing
Computer Hardware Servicing
eillen ivy portuguez
 
Computer Hardware Servicing Learning Module v.2.0
Computer Hardware Servicing Learning Module v.2.0Computer Hardware Servicing Learning Module v.2.0
Computer Hardware Servicing Learning Module v.2.0
Bogs De Castro
 
The Basics of Intel vPro
The Basics of Intel vProThe Basics of Intel vPro
The Basics of Intel vPro
Manage Beyond
 
Chapter # 1
Chapter # 1Chapter # 1
Chapter # 1
SahamAkmal
 
Module3 system unit
Module3 system unitModule3 system unit
Module3 system unit
zamzulaiha
 
Network
NetworkNetwork
Hardware
HardwareHardware
Hardware
Susheel-Jain
 
Hwswb
HwswbHwswb
0417 IGCSE ICT Chapter 1
0417 IGCSE ICT Chapter 10417 IGCSE ICT Chapter 1
0417 IGCSE ICT Chapter 1
Anthi Aristotelous
 
B Sc IT II Sem NHSB Networking For Home And Small Business Amity University
B Sc IT II Sem NHSB Networking For Home And Small Business Amity UniversityB Sc IT II Sem NHSB Networking For Home And Small Business Amity University
B Sc IT II Sem NHSB Networking For Home And Small Business Amity University
Kanhaiya Murarka
 

What's hot (20)

Performing Computer Operations (PCO)
Performing Computer Operations (PCO)Performing Computer Operations (PCO)
Performing Computer Operations (PCO)
 
Ch 2 computer hardware(a,b,c,d,e)
Ch 2   computer hardware(a,b,c,d,e)Ch 2   computer hardware(a,b,c,d,e)
Ch 2 computer hardware(a,b,c,d,e)
 
Specialized Computer Systems
Specialized Computer SystemsSpecialized Computer Systems
Specialized Computer Systems
 
Chapter 09 Operating Systems
Chapter 09 Operating SystemsChapter 09 Operating Systems
Chapter 09 Operating Systems
 
Occupational health and safety
Occupational health and safetyOccupational health and safety
Occupational health and safety
 
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
 
K to 12_entrep-based_pc_hardware_servicing_learning_module
K to 12_entrep-based_pc_hardware_servicing_learning_moduleK to 12_entrep-based_pc_hardware_servicing_learning_module
K to 12_entrep-based_pc_hardware_servicing_learning_module
 
V Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii EditedV Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii Edited
 
IT Essentials (Version 7.0) - ITE Chapter 7 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 7 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 7 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 7 Exam Answers
 
Understanding the computer system
Understanding the  computer systemUnderstanding the  computer system
Understanding the computer system
 
Computer Hardware Servicing
Computer Hardware ServicingComputer Hardware Servicing
Computer Hardware Servicing
 
Computer Hardware Servicing Learning Module v.2.0
Computer Hardware Servicing Learning Module v.2.0Computer Hardware Servicing Learning Module v.2.0
Computer Hardware Servicing Learning Module v.2.0
 
The Basics of Intel vPro
The Basics of Intel vProThe Basics of Intel vPro
The Basics of Intel vPro
 
Chapter # 1
Chapter # 1Chapter # 1
Chapter # 1
 
Module3 system unit
Module3 system unitModule3 system unit
Module3 system unit
 
Network
NetworkNetwork
Network
 
Hardware
HardwareHardware
Hardware
 
Hwswb
HwswbHwswb
Hwswb
 
0417 IGCSE ICT Chapter 1
0417 IGCSE ICT Chapter 10417 IGCSE ICT Chapter 1
0417 IGCSE ICT Chapter 1
 
B Sc IT II Sem NHSB Networking For Home And Small Business Amity University
B Sc IT II Sem NHSB Networking For Home And Small Business Amity UniversityB Sc IT II Sem NHSB Networking For Home And Small Business Amity University
B Sc IT II Sem NHSB Networking For Home And Small Business Amity University
 

Viewers also liked

102 bachelorette party ideas
102 bachelorette party ideas102 bachelorette party ideas
102 bachelorette party ideas
Freelance Leads
 
Power point lesson 01
Power point lesson 01Power point lesson 01
Power point lesson 01
heidirobison
 
Power point lesson 01
Power point lesson 01Power point lesson 01
Power point lesson 01
heidirobison
 
Asistencia de cabildo 14.
Asistencia de cabildo 14.Asistencia de cabildo 14.
Asistencia de cabildo 14.
sabmpio
 
6_Alena_Slovakia
6_Alena_Slovakia6_Alena_Slovakia
Days Suitable for Fieldwork
Days Suitable for FieldworkDays Suitable for Fieldwork
Days Suitable for Fieldwork
John Kelley
 
Fast raq a fast approach to range aggregate queries in big data environments
Fast raq a fast approach to range aggregate queries in big data environmentsFast raq a fast approach to range aggregate queries in big data environments
Fast raq a fast approach to range aggregate queries in big data environments
LeMeniz Infotech
 
Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...
LeMeniz Infotech
 
Internet safety online
Internet safety onlineInternet safety online
Internet safety online
heidirobison
 

Viewers also liked (9)

102 bachelorette party ideas
102 bachelorette party ideas102 bachelorette party ideas
102 bachelorette party ideas
 
Power point lesson 01
Power point lesson 01Power point lesson 01
Power point lesson 01
 
Power point lesson 01
Power point lesson 01Power point lesson 01
Power point lesson 01
 
Asistencia de cabildo 14.
Asistencia de cabildo 14.Asistencia de cabildo 14.
Asistencia de cabildo 14.
 
6_Alena_Slovakia
6_Alena_Slovakia6_Alena_Slovakia
6_Alena_Slovakia
 
Days Suitable for Fieldwork
Days Suitable for FieldworkDays Suitable for Fieldwork
Days Suitable for Fieldwork
 
Fast raq a fast approach to range aggregate queries in big data environments
Fast raq a fast approach to range aggregate queries in big data environmentsFast raq a fast approach to range aggregate queries in big data environments
Fast raq a fast approach to range aggregate queries in big data environments
 
Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...
 
Internet safety online
Internet safety onlineInternet safety online
Internet safety online
 

Similar to Power point lesson 03

Power Point Lesson 03
Power Point  Lesson 03Power Point  Lesson 03
Power Point Lesson 03
Nasir Jumani
 
F 1 00 Capstone Activity
F   1 00 Capstone ActivityF   1 00 Capstone Activity
F 1 00 Capstone Activity
06maggiequ
 
Ppt lesson 04 adjusted
Ppt lesson 04 adjustedPpt lesson 04 adjusted
Ppt lesson 04 adjusted
patton14
 
Module_2_IT_ERA.pptx
Module_2_IT_ERA.pptxModule_2_IT_ERA.pptx
Module_2_IT_ERA.pptx
JenloDiamse
 
hardware software basics
hardware software basicshardware software basics
hardware software basics
Deepa Rani
 
computer archtecture lab, computer hardware , problem and solutons in computer
computer archtecture lab, computer hardware , problem and solutons in computercomputer archtecture lab, computer hardware , problem and solutons in computer
computer archtecture lab, computer hardware , problem and solutons in computer
GS Kosta
 
Lec no. 4 hardware and software basic
Lec no. 4 hardware and software basicLec no. 4 hardware and software basic
Lec no. 4 hardware and software basic
Jiian Francisco
 
Gl2010 m1 com-presentation
Gl2010 m1 com-presentationGl2010 m1 com-presentation
Gl2010 m1 com-presentation
Tracie King
 
2.-HARDWARE.pptx
2.-HARDWARE.pptx2.-HARDWARE.pptx
2.-HARDWARE.pptx
AndrewBeka
 
Hardware and Software Basics With Dr. Poirot
Hardware and Software Basics With Dr. PoirotHardware and Software Basics With Dr. Poirot
Hardware and Software Basics With Dr. Poirot
zelah marie dasmariñas-gorres
 
Computer Maintenance Presentation.pptx
Computer Maintenance Presentation.pptxComputer Maintenance Presentation.pptx
Computer Maintenance Presentation.pptx
MAHERMOHAMED27
 
Lesson 3 Operating System Functions
Lesson 3 Operating System FunctionsLesson 3 Operating System Functions
Lesson 3 Operating System Functions
Laguna State Polytechnic University
 
K to 12_entrep-based_pc_hardware_servicing_learning_module.pdf
K to 12_entrep-based_pc_hardware_servicing_learning_module.pdfK to 12_entrep-based_pc_hardware_servicing_learning_module.pdf
K to 12_entrep-based_pc_hardware_servicing_learning_module.pdf
Jelito Rueras
 
Language for Embedded System
Language for Embedded System Language for Embedded System
Language for Embedded System
vkrhanjeeth .
 
Language for embedded system
Language for embedded systemLanguage for embedded system
Language for embedded system
vkrhanjeeth .
 
Bct Terms 1 3
Bct Terms 1 3Bct Terms 1 3
Bct Terms 1 3
mkirsc53
 
Hardware software
Hardware softwareHardware software
Hardware software
Saheli Aich
 
Ict k12 paul
Ict k12 paulIct k12 paul
Ict k12 paul
John Paul Intano
 
Computer hardware servicing_ict-computer (1)
Computer hardware servicing_ict-computer (1)Computer hardware servicing_ict-computer (1)
Computer hardware servicing_ict-computer (1)
GRACE SAGOSO
 
Computer Hardware and Servicing.pdf
Computer Hardware and Servicing.pdfComputer Hardware and Servicing.pdf
Computer Hardware and Servicing.pdf
JAYARVILLARIN1
 

Similar to Power point lesson 03 (20)

Power Point Lesson 03
Power Point  Lesson 03Power Point  Lesson 03
Power Point Lesson 03
 
F 1 00 Capstone Activity
F   1 00 Capstone ActivityF   1 00 Capstone Activity
F 1 00 Capstone Activity
 
Ppt lesson 04 adjusted
Ppt lesson 04 adjustedPpt lesson 04 adjusted
Ppt lesson 04 adjusted
 
Module_2_IT_ERA.pptx
Module_2_IT_ERA.pptxModule_2_IT_ERA.pptx
Module_2_IT_ERA.pptx
 
hardware software basics
hardware software basicshardware software basics
hardware software basics
 
computer archtecture lab, computer hardware , problem and solutons in computer
computer archtecture lab, computer hardware , problem and solutons in computercomputer archtecture lab, computer hardware , problem and solutons in computer
computer archtecture lab, computer hardware , problem and solutons in computer
 
Lec no. 4 hardware and software basic
Lec no. 4 hardware and software basicLec no. 4 hardware and software basic
Lec no. 4 hardware and software basic
 
Gl2010 m1 com-presentation
Gl2010 m1 com-presentationGl2010 m1 com-presentation
Gl2010 m1 com-presentation
 
2.-HARDWARE.pptx
2.-HARDWARE.pptx2.-HARDWARE.pptx
2.-HARDWARE.pptx
 
Hardware and Software Basics With Dr. Poirot
Hardware and Software Basics With Dr. PoirotHardware and Software Basics With Dr. Poirot
Hardware and Software Basics With Dr. Poirot
 
Computer Maintenance Presentation.pptx
Computer Maintenance Presentation.pptxComputer Maintenance Presentation.pptx
Computer Maintenance Presentation.pptx
 
Lesson 3 Operating System Functions
Lesson 3 Operating System FunctionsLesson 3 Operating System Functions
Lesson 3 Operating System Functions
 
K to 12_entrep-based_pc_hardware_servicing_learning_module.pdf
K to 12_entrep-based_pc_hardware_servicing_learning_module.pdfK to 12_entrep-based_pc_hardware_servicing_learning_module.pdf
K to 12_entrep-based_pc_hardware_servicing_learning_module.pdf
 
Language for Embedded System
Language for Embedded System Language for Embedded System
Language for Embedded System
 
Language for embedded system
Language for embedded systemLanguage for embedded system
Language for embedded system
 
Bct Terms 1 3
Bct Terms 1 3Bct Terms 1 3
Bct Terms 1 3
 
Hardware software
Hardware softwareHardware software
Hardware software
 
Ict k12 paul
Ict k12 paulIct k12 paul
Ict k12 paul
 
Computer hardware servicing_ict-computer (1)
Computer hardware servicing_ict-computer (1)Computer hardware servicing_ict-computer (1)
Computer hardware servicing_ict-computer (1)
 
Computer Hardware and Servicing.pdf
Computer Hardware and Servicing.pdfComputer Hardware and Servicing.pdf
Computer Hardware and Servicing.pdf
 

More from heidirobison

L26 communication services
L26   communication servicesL26   communication services
L26 communication services
heidirobison
 
L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentals
heidirobison
 
Lesson 8 vocabulary
Lesson 8 vocabularyLesson 8 vocabulary
Lesson 8 vocabulary
heidirobison
 
Power point lesson 08
Power point lesson 08Power point lesson 08
Power point lesson 08
heidirobison
 
Lesson 7 vocabulary
Lesson 7 vocabularyLesson 7 vocabulary
Lesson 7 vocabulary
heidirobison
 
L7 operating system
L7   operating systemL7   operating system
L7 operating system
heidirobison
 
Questions for interviewers worksheet
Questions for interviewers worksheetQuestions for interviewers worksheet
Questions for interviewers worksheet
heidirobison
 
Starting the career search
Starting the career searchStarting the career search
Starting the career search
heidirobison
 
Osha rules
Osha rulesOsha rules
Osha rules
heidirobison
 
Labor laws questions
Labor laws questionsLabor laws questions
Labor laws questions
heidirobison
 
Work place readiness (student instructions)
Work place readiness (student instructions)Work place readiness (student instructions)
Work place readiness (student instructions)
heidirobison
 
Wpr career search
Wpr   career searchWpr   career search
Wpr career search
heidirobison
 
Candy bar presentation
Candy bar presentationCandy bar presentation
Candy bar presentation
heidirobison
 
Power point lesson 20
Power point lesson 20Power point lesson 20
Power point lesson 20
heidirobison
 
Power point lesson 19
Power point lesson 19Power point lesson 19
Power point lesson 19
heidirobison
 
Week 8 october 22
Week 8 october 22Week 8 october 22
Week 8 october 22
heidirobison
 
Week 7 october 15
Week 7 october 15Week 7 october 15
Week 7 october 15
heidirobison
 
Review for 6 week assessment
Review for 6 week assessmentReview for 6 week assessment
Review for 6 week assessment
heidirobison
 
Review for quiz lesson 3 5
Review for quiz lesson 3 5Review for quiz lesson 3 5
Review for quiz lesson 3 5
heidirobison
 
Lesson 5 vocabulary
Lesson 5 vocabularyLesson 5 vocabulary
Lesson 5 vocabulary
heidirobison
 

More from heidirobison (20)

L26 communication services
L26   communication servicesL26   communication services
L26 communication services
 
L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentals
 
Lesson 8 vocabulary
Lesson 8 vocabularyLesson 8 vocabulary
Lesson 8 vocabulary
 
Power point lesson 08
Power point lesson 08Power point lesson 08
Power point lesson 08
 
Lesson 7 vocabulary
Lesson 7 vocabularyLesson 7 vocabulary
Lesson 7 vocabulary
 
L7 operating system
L7   operating systemL7   operating system
L7 operating system
 
Questions for interviewers worksheet
Questions for interviewers worksheetQuestions for interviewers worksheet
Questions for interviewers worksheet
 
Starting the career search
Starting the career searchStarting the career search
Starting the career search
 
Osha rules
Osha rulesOsha rules
Osha rules
 
Labor laws questions
Labor laws questionsLabor laws questions
Labor laws questions
 
Work place readiness (student instructions)
Work place readiness (student instructions)Work place readiness (student instructions)
Work place readiness (student instructions)
 
Wpr career search
Wpr   career searchWpr   career search
Wpr career search
 
Candy bar presentation
Candy bar presentationCandy bar presentation
Candy bar presentation
 
Power point lesson 20
Power point lesson 20Power point lesson 20
Power point lesson 20
 
Power point lesson 19
Power point lesson 19Power point lesson 19
Power point lesson 19
 
Week 8 october 22
Week 8 october 22Week 8 october 22
Week 8 october 22
 
Week 7 october 15
Week 7 october 15Week 7 october 15
Week 7 october 15
 
Review for 6 week assessment
Review for 6 week assessmentReview for 6 week assessment
Review for 6 week assessment
 
Review for quiz lesson 3 5
Review for quiz lesson 3 5Review for quiz lesson 3 5
Review for quiz lesson 3 5
 
Lesson 5 vocabulary
Lesson 5 vocabularyLesson 5 vocabulary
Lesson 5 vocabulary
 

Recently uploaded

Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 

Recently uploaded (20)

Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 

Power point lesson 03

  • 1. Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS
  • 2. Objectives  Explain how to evaluate computer hardware to purchase components or upgrades.  Identify and describe how input and output devices are connected to the computer.  Describe the routine maintenance tasks necessary to keep your computer in good working condition. 2 Computer Literacy BASICS
  • 3. Objectives (cont.)  Explain how to use troubleshooting techniques to solve computer-related problems.  Understand how to protect the computer system from damage.  Identify factors that can damage storage media and learn how to safeguard stored data. 3 Computer Literacy BASICS
  • 4. Vocabulary  Firewall  Surge protectors  Hackers  Troubleshooting  Modem  Uninterruptible  Parallelports power supply (UPS)  Plug and play  Universal serial bus  Serial ports (USB)  Virus 4 Computer Literacy BASICS
  • 5. Evaluating Hardware Components and Upgrades  Make a list of the tasks you want to accomplish with a new system or upgrade.  Check company policies or standards.  Make sure the software you want to use for applications is compatible with the computer’s operating system.  Consider the expected useful life of the components. 5 Computer Literacy BASICS
  • 6. Comparing CPUs  Different types of computers use different central processing unit (CPU) chips.  The speed of the CPU depends on the system clock, but one 800-MHz computer system may run faster than another of the same speed because they are designed differently.  The amount of RAM available also affects the processing speed. 6 Computer Literacy BASICS
  • 7. Comparing Computer Models  The tasks you want to perform with a computer and the environment in which you will use it will guide you in deciding what kind of computer you need.  Consider the peripherals and storage devices you will need when comparing available systems. 7 Computer Literacy BASICS
  • 8. Upgrading Computer Hardware  You can add more RAM to make a processor run faster. Expansion cards with 128K to 512K or more additional RAM are available on expansion cards that fit easily into the computer’s motherboard.  Hardware peripherals, such as a new keyboard, mouse, or printer, are even easier to install with an installation wizard. 8 Computer Literacy BASICS
  • 9. “Bundled” Software  Sometimes the software that comes with a new computer system is fully operable and can be registered and used for the life of the computer.  Other software may be offered on a trial basis, and you must pay a fee to continue to use the program after a certain date. 9 Computer Literacy BASICS
  • 10. Warranties and Technical Support  Most electronic equipment has a limited warranty that ensures defective components will be repaired or replaced during that time.  Manufacturers and retailers offer extended warranties at additional cost. Read the terms of a warranty to make sure it is a good value.  Register new equipment so that the manufacturer’s warranty will be in effect. 10 Computer Literacy BASICS
  • 11. Connecting Devices to the Computer  Input and output devices must be connected to the printer before they can be used.  There are two ways to connect I/O devices to the computer: – Plug the device into an existing socket or port on the back of the computer. – Install a circuit board with the port you need already included. 11 Computer Literacy BASICS
  • 12. Typical PC Port Arrangement 12 Computer Literacy BASICS
  • 13. Serial and Parallel Ports  Serialports transmit data one bit at a time and are used to connect a mouse, modem (hardware used to encode data and move across a carrier line), and keyboard.  Parallel ports transmit data eight bits at a time and are used for printers and external storage devices. 13 Computer Literacy BASICS
  • 14. Special Ports  PS/2: Often used to connect a mouse or keyboard  USB: A newer standard that can be used to replace serial and parallel ports and can handle up to 127 devices  SCSI: Allows many devices to use a single port  MIDI: Used to connect recording devices  PC card: Can be connected to add memory or storage capacity 14 Computer Literacy BASICS
  • 15. Cables Different types of A printer cable cables are required to connect different devices:  Power cords  Computer-to-peripheral connections  Telephone line or cable modem connections 15 Computer Literacy BASICS
  • 16. Plug and Play  Most hardware components available today are called plug and play because they install so simply.  The computer’s operating system recognizes the new device when it is plugged in and takes care of all configuring tasks.  A dialog box will appear asking you to confirm the type of new hardware, and then the computer takes care of changing all settings and making it ready to use. 16 Computer Literacy BASICS
  • 17. Routine Maintenance  Make regular visual inspections of the computer system to look for problems.  Keep the computer components clean.  Perform routine “internal” maintenance by running utility programs that clean up the hard disk drive by removing unneeded files and defragmenting the drive. 17 Computer Literacy BASICS
  • 18. Troubleshooting Steps 1. Reco gnize the probl em. 2. Repli cate the 18 probl Computer Literacy BASICS
  • 19. Troubleshooting Steps (cont.) 5. Communicate the problem accurately to the support technician. 6. Follow the instructions the technician gives you carefully. 7. Confirm that the problem has been fixed. 8. Avoid similar problems in the future. 19 Computer Literacy BASICS
  • 20. Accessing Technical Support When trouble- shooting a computer problem, you can find advice on a technical support Web site provided by the hardware or software manu- facturer. 20 Computer Literacy BASICS
  • 21. Protecting Hardware  Keeping hardware safe involves protecting it from power surges and electrical failures, theft, and environmental damage.  An uninterruptible power source prevents damage and data loss during a power failure.  Surge protectors can protect against power spikes that can destroy components.  Using security measures and good sense protect computer hardware from theft or damage. 21 Computer Literacy BASICS
  • 22. Protecting Data  Saving active files frequently is the best way to protect against data loss.  Backup procedures create files that can be used to restore data if the primary storage system becomes inaccessible.  Viruses are programs written to corrupt data. Backup files and antivirus software help avoid data loss from viruses.  Firewalls, a combination of software and hardware elements, prevent unauthorized access to a computer on a network (including the Internet). 22 Computer Literacy BASICS
  • 23. Caring for Storage Media  Keep disks away from magnetic and electrical fields, such as those contained in televisions and monitors.  Avoid extreme temperatures.  Never touch the surface of the media itself. Hold optical media, such as CDs and DVDs, at the edges.  Remove media from drives and store them properly when not in use.  Never remove a disk from a drive when the drive indicator light is on.  Keep disks in a sturdy case when transporting. 23 Computer Literacy BASICS
  • 24. Summary  Decisions about what kind of computer to buy should be based on what you want a computer to do.  The kind of software you want to run should also help you decide what kind of computer to buy.  It is important to register new equipment to activate the warranty and technical support. 24 Computer Literacy BASICS
  • 25. Summary (cont.)  Input and output devices are connected to the computer through serial and parallel ports.  The Universal Serial Bus is a newer standard that is beginning to replace serial and parallel ports.  There are several types of ports: USB, SCSI, MIDI, parallel, and serial. 25 Computer Literacy BASICS
  • 26. Summary (cont.)  Cables connect peripherals to the computer.  Many hardware devices today are designed to be plug and play, so the operating system recognizes the new hardware and configures the system for it to work correctly. 26 Computer Literacy BASICS
  • 27. Summary (cont.) A regular visual inspection of your computer system can help you find loose cables and other potential problems before they affect how the computer runs.  Keeping your computer system clean is another way to avoid serious problems. 27 Computer Literacy BASICS
  • 28. Summary (cont.)  Troubleshooting involves analyzing problems to correct faults in the system.  Power outages and power surges can both damage hardware and corrupt data, so it is important to protect your computer system from fluctuations in the power supply. 28 Computer Literacy BASICS
  • 29. Summary (cont.)  Protect your computer from theft, viruses, and hackers (somebody who accesses another's computer without permission) by taking basic security precautions.  To maintain a permanent copy of data, you must store it on some type of storage medium. These may include floppy diskettes, hard drives, CDs, magnetic tape cartridges, and WORM disks. 29 Computer Literacy BASICS

Editor's Notes

  1. Fig.3-2
  2. Fig.3-4