Computing Fundamentals Module Lesson 3  —  Maintaining and Protecting Hardware Computer Literacy BASICS
Objectives Explain how to evaluate computer hardware to purchase components or upgrades. Identify and describe how input and output devices are connected to the computer. Describe the routine maintenance tasks necessary to keep your computer in good working condition.
Objectives (cont.) Explain how to use troubleshooting techniques to solve computer-related problems. Understand how to protect the computer system from damage. Identify factors that can damage storage media and learn how to safeguard stored data.
Vocabulary Firewall Hackers Modem Parallel ports Plug and play Serial ports Surge protectors Troubleshooting Uninterruptible power supply (UPS) Universal serial bus (USB) Virus
Evaluating Hardware Components and Upgrades Make a list of the tasks you want to accomplish with a new system or upgrade. Check company policies or standards. Make sure the software you want to use for applications is compatible with the computer’s operating system. Consider the expected useful life of the components.
Comparing CPUs Different types of computers use different central processing unit (CPU) chips. Speed of the CPU  depends on the system clock but  one 800-MHz computer system may run faster than another of the same speed because they are designed differently. Amount of RAM available also affects the processing speed.
Comparing Computer Models What do you want to do with the computer? Office Applications Pictures Music Video editing Games What about peripherals and storage? Monitors, speakers, card readers Hard drive storage, CD, DVD
Comparing Models
Upgrading Computer Hardware You can add more RAM to make a processor run faster.  Expansion cards with 128K to 512K or more additional RAM are available on expansion cards Fit easily into the computer’s motherboard. Hardware peripherals, such as a new keyboard, mouse, or printer, are even easier to install with an installation wizard.
“Bundled” Software Software that comes with the computer Virus software Microsoft® Works Other software may be offered on a  trial  basis must pay a fee to continue to use the program after a certain date Microsoft® Offices (latest edition)
Warranties and Technical Support Most electronic equipment has a  limited  warranty  ensures defective components will be repaired or replaced during that time Manufacturers and retailers offer  extended  warranties  additional cost ( Read the terms of a warranty to make sure it is a good value.) Register new equipment so that the manufacturer’s warranty will be in effect.
Connecting Devices to the Computer Input and output devices must be connected to the printer before they can be used. There are two ways to connect I/O devices to the computer: Plug the device into an existing socket or port on the back of the computer. Install a circuit board with the port you need already included.
Typical PC Port Arrangement
Serial and Parallel Ports Serial ports transmit data one bit at a time and are used to connect a mouse, modem, and keyboard. Parallel ports transmit data eight bits at a time and are used for printers and external storage devices.
Special Ports PS/2:  Often used to connect a mouse or keyboard  USB:  A newer standard that can be used to replace serial and parallel ports and can handle up to 127 devices SCSI:  Allows many devices to use a single port MIDI:  Used to connect recording devices PC card:  Can be connected to add memory or storage capacity
Cables Different types of cables are required to connect different devices: Power cords Computer-to-peripheral connections Telephone line or cable modem connections A printer cable
Plug and Play Most hardware components available today are called  plug and play   They install so simply Computer’s operating system recognizes the new device when it is plugged in and takes care of all configuring tasks A dialog box (Wizard) will appear  asks you to confirm the type of new hardware Computer takes care of changing all settings and making it ready to use.
Routine Maintenance Make regular visual inspections of the computer system to look for problems. Keep the computer components clean. Perform routine “internal” maintenance by running utility programs that clean up the hard disk drive by removing unneeded files and defragmenting the drive.
Routine Maintenance Keep anti-virus software up-to-date Run software to remove “spyware” Ad-Aware Free download ( www.cnet.com ) Run  disk cleanup  to remove temporary files Gives you space on your hard drive Helps your computer run faster Delete “cookies” and temporary files through your browser (Internet Explorer)
Troubleshooting Steps 1. Recognize the problem. 2. Replicate the problem by reproducing the steps that cause the problem consistently. 3. Attempt basic solutions to correct the problem, such as restarting the hardware or checking cable connections. 4. Look for available help and advice in manuals, or access a technical support Web site or telephone number.
Troubleshooting Steps (cont.) 5. Communicate the problem accurately to the support technician. 6. Follow the instructions the technician gives you carefully. 7. Confirm that the problem has been fixed. 8. Avoid similar problems in the future.
Accessing Technical Support When trouble-shooting a computer problem, you can find advice on a technical support Web site provided by the hardware or software manu-facturer.
Protecting Hardware Protect it from power surges and electrical failures, theft, and environmental damage. Use an uninterruptible power source (UPS)  prevents damage and data loss during a power failure Surge protectors  protect against power spikes that can destroy components Use security measures and good sense protect computer hardware from theft or damage.
Protecting Data Saving active files  frequently   Backup procedures  create files that can be used to restore data if the primary storage system becomes inaccessible Use anti-virus software Viruses are programs written to corrupt data.  Use Firewalls a combination of software and hardware elements, prevent unauthorized access to a computer on a network (including the Internet). Zone Alarm (Free)
Caring for Storage Media Keep disks away from magnetic and electrical fields, such as those contained in televisions and monitors. Avoid extreme temperatures. Never touch the surface of the media itself. Hold optical media, such as CDs and DVDs, at the edges. Remove media from drives and store them properly when not in use. Never remove a disk from a drive when the drive indicator light is on. Keep disks in a sturdy case when transporting.
Summary Decisions about what kind of computer to buy should be based on what you want a computer to do. The kind of software you want to run should also help you decide what kind of computer to buy. It is important to register new equipment to activate the warranty and technical support.
Summary (cont.) Input and output devices are connected to the computer through serial and parallel ports. The Universal Serial Bus is a newer standard that is beginning to replace serial and parallel ports. There are several types of ports: USB, SCSI, MIDI, parallel, and serial.
Summary (cont.) Cables connect peripherals to the computer. Many hardware devices today are designed to be plug and play, so the operating system recognizes the new hardware and configures the system for it to work correctly.
Summary (cont.) A regular visual inspection of your computer system can help you find loose cables and other potential problems before they affect how the computer runs. Keeping your computer system clean is another way to avoid serious problems.
Summary (cont.) Troubleshooting involves analyzing problems to correct faults in the system. Power outages and power surges can both damage hardware and corrupt data, so it is important to protect your computer system from fluctuations in the power supply.
Summary (cont.) Protect your computer from theft, viruses, and hackers by taking basic security precautions. To maintain a permanent copy of data, you must store it on some type of storage medium. These may include floppy diskettes, hard drives, CDs, magnetic tape cartridges, and WORM disks.

Power Point Lesson 03

  • 1.
    Computing Fundamentals ModuleLesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS
  • 2.
    Objectives Explain howto evaluate computer hardware to purchase components or upgrades. Identify and describe how input and output devices are connected to the computer. Describe the routine maintenance tasks necessary to keep your computer in good working condition.
  • 3.
    Objectives (cont.) Explainhow to use troubleshooting techniques to solve computer-related problems. Understand how to protect the computer system from damage. Identify factors that can damage storage media and learn how to safeguard stored data.
  • 4.
    Vocabulary Firewall HackersModem Parallel ports Plug and play Serial ports Surge protectors Troubleshooting Uninterruptible power supply (UPS) Universal serial bus (USB) Virus
  • 5.
    Evaluating Hardware Componentsand Upgrades Make a list of the tasks you want to accomplish with a new system or upgrade. Check company policies or standards. Make sure the software you want to use for applications is compatible with the computer’s operating system. Consider the expected useful life of the components.
  • 6.
    Comparing CPUs Differenttypes of computers use different central processing unit (CPU) chips. Speed of the CPU depends on the system clock but one 800-MHz computer system may run faster than another of the same speed because they are designed differently. Amount of RAM available also affects the processing speed.
  • 7.
    Comparing Computer ModelsWhat do you want to do with the computer? Office Applications Pictures Music Video editing Games What about peripherals and storage? Monitors, speakers, card readers Hard drive storage, CD, DVD
  • 8.
  • 9.
    Upgrading Computer HardwareYou can add more RAM to make a processor run faster. Expansion cards with 128K to 512K or more additional RAM are available on expansion cards Fit easily into the computer’s motherboard. Hardware peripherals, such as a new keyboard, mouse, or printer, are even easier to install with an installation wizard.
  • 10.
    “Bundled” Software Softwarethat comes with the computer Virus software Microsoft® Works Other software may be offered on a trial basis must pay a fee to continue to use the program after a certain date Microsoft® Offices (latest edition)
  • 11.
    Warranties and TechnicalSupport Most electronic equipment has a limited warranty ensures defective components will be repaired or replaced during that time Manufacturers and retailers offer extended warranties additional cost ( Read the terms of a warranty to make sure it is a good value.) Register new equipment so that the manufacturer’s warranty will be in effect.
  • 12.
    Connecting Devices tothe Computer Input and output devices must be connected to the printer before they can be used. There are two ways to connect I/O devices to the computer: Plug the device into an existing socket or port on the back of the computer. Install a circuit board with the port you need already included.
  • 13.
    Typical PC PortArrangement
  • 14.
    Serial and ParallelPorts Serial ports transmit data one bit at a time and are used to connect a mouse, modem, and keyboard. Parallel ports transmit data eight bits at a time and are used for printers and external storage devices.
  • 15.
    Special Ports PS/2: Often used to connect a mouse or keyboard USB: A newer standard that can be used to replace serial and parallel ports and can handle up to 127 devices SCSI: Allows many devices to use a single port MIDI: Used to connect recording devices PC card: Can be connected to add memory or storage capacity
  • 16.
    Cables Different typesof cables are required to connect different devices: Power cords Computer-to-peripheral connections Telephone line or cable modem connections A printer cable
  • 17.
    Plug and PlayMost hardware components available today are called plug and play They install so simply Computer’s operating system recognizes the new device when it is plugged in and takes care of all configuring tasks A dialog box (Wizard) will appear asks you to confirm the type of new hardware Computer takes care of changing all settings and making it ready to use.
  • 18.
    Routine Maintenance Makeregular visual inspections of the computer system to look for problems. Keep the computer components clean. Perform routine “internal” maintenance by running utility programs that clean up the hard disk drive by removing unneeded files and defragmenting the drive.
  • 19.
    Routine Maintenance Keepanti-virus software up-to-date Run software to remove “spyware” Ad-Aware Free download ( www.cnet.com ) Run disk cleanup to remove temporary files Gives you space on your hard drive Helps your computer run faster Delete “cookies” and temporary files through your browser (Internet Explorer)
  • 20.
    Troubleshooting Steps 1.Recognize the problem. 2. Replicate the problem by reproducing the steps that cause the problem consistently. 3. Attempt basic solutions to correct the problem, such as restarting the hardware or checking cable connections. 4. Look for available help and advice in manuals, or access a technical support Web site or telephone number.
  • 21.
    Troubleshooting Steps (cont.)5. Communicate the problem accurately to the support technician. 6. Follow the instructions the technician gives you carefully. 7. Confirm that the problem has been fixed. 8. Avoid similar problems in the future.
  • 22.
    Accessing Technical SupportWhen trouble-shooting a computer problem, you can find advice on a technical support Web site provided by the hardware or software manu-facturer.
  • 23.
    Protecting Hardware Protectit from power surges and electrical failures, theft, and environmental damage. Use an uninterruptible power source (UPS) prevents damage and data loss during a power failure Surge protectors protect against power spikes that can destroy components Use security measures and good sense protect computer hardware from theft or damage.
  • 24.
    Protecting Data Savingactive files frequently Backup procedures create files that can be used to restore data if the primary storage system becomes inaccessible Use anti-virus software Viruses are programs written to corrupt data. Use Firewalls a combination of software and hardware elements, prevent unauthorized access to a computer on a network (including the Internet). Zone Alarm (Free)
  • 25.
    Caring for StorageMedia Keep disks away from magnetic and electrical fields, such as those contained in televisions and monitors. Avoid extreme temperatures. Never touch the surface of the media itself. Hold optical media, such as CDs and DVDs, at the edges. Remove media from drives and store them properly when not in use. Never remove a disk from a drive when the drive indicator light is on. Keep disks in a sturdy case when transporting.
  • 26.
    Summary Decisions aboutwhat kind of computer to buy should be based on what you want a computer to do. The kind of software you want to run should also help you decide what kind of computer to buy. It is important to register new equipment to activate the warranty and technical support.
  • 27.
    Summary (cont.) Inputand output devices are connected to the computer through serial and parallel ports. The Universal Serial Bus is a newer standard that is beginning to replace serial and parallel ports. There are several types of ports: USB, SCSI, MIDI, parallel, and serial.
  • 28.
    Summary (cont.) Cablesconnect peripherals to the computer. Many hardware devices today are designed to be plug and play, so the operating system recognizes the new hardware and configures the system for it to work correctly.
  • 29.
    Summary (cont.) Aregular visual inspection of your computer system can help you find loose cables and other potential problems before they affect how the computer runs. Keeping your computer system clean is another way to avoid serious problems.
  • 30.
    Summary (cont.) Troubleshootinginvolves analyzing problems to correct faults in the system. Power outages and power surges can both damage hardware and corrupt data, so it is important to protect your computer system from fluctuations in the power supply.
  • 31.
    Summary (cont.) Protectyour computer from theft, viruses, and hackers by taking basic security precautions. To maintain a permanent copy of data, you must store it on some type of storage medium. These may include floppy diskettes, hard drives, CDs, magnetic tape cartridges, and WORM disks.

Editor's Notes