chapter 1
chapter 1
Programs or applications perform different functions. Programs vary widely depending on the type
of information that will be accessed or generated. For example, instructions for balancing a
checkbook are very different from instructions for simulating a virtual reality world on the Internet.
Computers are categorized into several types depending on size, performance, purpose, data
handling.
Based on Size
Computers vary in size, from powerful supercomputers for complex tasks to embedded systems
built for specific functions in everyday devices. Each type is designed to meet different
performance needs and applications.
Characteristics:
Examples:
Mainframe computers, though less efficient than supercomputers, are still very expensive. It is
large and powerful computers designed to handle and process vast amounts of data quickly. They
are used by large organizations like banks, insurance companies, and government institutions for
tasks such as transaction processing, large-scale enterprise applications, and database
management.
Examples:
IBM Z Series
Unisys ClearPath
Minicomputers, also known as mid-range computers, are smaller than mainframes but still
capable of supporting multiple users and handling medium-scale tasks. They are typically used for
smaller businesses or industrial applications that require fewer resources than mainframes.
Characteristics:
Less powerful than mainframes but still capable of running several programs
simultaneously.
Microcomputers are the most common type of computers used by individuals. They are designed
for general-purpose tasks such as browsing the internet, word processing, gaming, and other
personal or office activities. Microcomputers are based on a microprocessor, which integrates the
functions of a computer's central processing unit (CPU) on a single chip.
Characteristics:
Typically smaller, affordable, and user-friendly.
Found in homes, schools, and offices.
Includes desktops, laptops, tablets, and smartphones.
Examples:
Desktop PCs, Laptops, Tablets, Smartphones
Embedded computers are specialized computers that are designed to perform specific tasks and
are often built into other devices. These computers are not typically seen as separate units but are
an integral part of everyday objects, from household appliances to industrial machines.
Characteristics:
Focused on specific functions, with minimal user interaction.
Often run on low power and have limited resources.
Commonly used in devices that require real-time processing.
Examples:
Smart TVs, Washing Machines, Car Control Systems, Microwave Ovens
Computers are classified by performance into workstations and servers. Workstations handle
demanding tasks, while servers manage resources and data for multiple users.
Characteristics:
Examples:
Servers are specialized computers designed to manage, store, and provide resources or services to
other computers (clients) over a network. They are built to handle large amounts of data, provide
access to websites, store files, and manage network communications. Servers are critical in
business and enterprise environments where multiple users need to access shared data and
resources simultaneously.
High processing power to handle multiple requests and manage extensive data.
Increased storage capacity, often with redundancies (e.g., RAID configurations) for data
protection.
Built for high availability and reliability, often operating 24/7 without interruption.
Scalable to accommodate growing data and user needs.
Provide services such as web hosting, file sharing, database management, and email
hosting.
Examples:
Web Servers: These servers host websites and deliver web pages to users' browsers.
Examples include Apache HTTP Server and Nginx.
Database Servers: Servers dedicated to storing and managing databases, like MySQL and
Microsoft SQL Server.
File Servers: Provide centralized storage and management of files for multiple users in an
organization.
Mail Servers: Handle the sending, receiving, and storage of email for users across a
network.
Based on Purpose
Computers are classified by purpose into general-purpose and special-purpose types. General-
purpose computers can perform a wide range of tasks, while special-purpose computers are
designed for specific functions.
General-purpose computers are designed to handle a wide variety of tasks. They can be
programmed to perform a range of functions, from simple calculations to complex tasks. These
computers are flexible and can run many different types of software, making them suitable for
personal, educational, business, and entertainment use.
Characteristics:
Personal Computers (PCs): These are the most common general-purpose computers used
for activities such as word processing, web browsing, and gaming.
Laptops: Portable computers used for general-purpose tasks.
Workstations: High-performance computers designed for technical and scientific work,
often used for tasks like video editing, 3D design, and software development.
Special-purpose computers are designed and optimized to perform a specific task or set of tasks.
Unlike general-purpose computers, they cannot be reprogrammed for other uses. These computers
are typically more efficient than general-purpose computers for the specific function they are
designed for. They are found in a wide range of devices and industries, from household appliances
to industrial machinery.
Characteristics:
Examples:
Gaming Consoles: Devices like the PlayStation or Xbox, which are designed specifically
for playing video games.
Calculators: Electronic devices designed to perform arithmetic calculations.
Traffic Signal Controllers: Specialized systems are used to manage the flow of traffic at
intersections.
ATM Machines: These are computers dedicated to banking transactions and cannot be
used for other tasks.
Microwave Ovens: Embedded systems in appliances that perform specific tasks like
cooking food by controlling the temperature and time.
Based on data handling
Computers are classified by data handling into analog, digital, and hybrid types. Analog handles
continuous data, digital processes binary data, and hybrid combines both methods.
Characteristics:
Examples:
Digital computers process data in binary form (0s and 1s). They are the most common type of
computer and are capable of performing a wide range of tasks, from simple calculations to complex
simulations. Digital computers are versatile, reliable, and can handle large volumes of data quickly.
Characteristics:
Examples:
Personal Computers (PCs): Laptops, and desktops used for general tasks.
Smartphones: Mobile devices for communication and entertainment.
Hybrid computers combine features of both analog and digital computers. They can process both
continuous (analog) and discrete (digital) data. Hybrid systems are designed to take advantage of
the strengths of both types of computers, making them highly useful in specific applications where
both types of data need to be processed simultaneously.
Characteristics:
Combine the real-time processing capabilities of analog systems with the precision and
versatility of digital systems.
Used in specialized applications that require both types of data.
Examples:
Hospitals: Patient monitoring systems that measure heart rate (analog) and store data
digitally.
Scientific Research: Systems that simulate complex phenomena and process both
continuous data (like temperature) and discrete data (like test results).
Industrial Systems: Systems controlling factory machines where both analog sensors
(e.g., temperature) and digital control systems are used.
The computer technical support is a service that is responsible for giving the customer support
by different means to find a solution to the problem of the same, whether physical (hardware) or
logical (software) of any type of electronic device. The staff must be specialized in order to provide
a quality service to customers, on the one hand provide technical support to customers, but also
help to solve specific problems in different devices.
A computer technician not only works when something serious like a cyberattack occurs, but also
has a series of daily jobs that must be performed so that all computer devices in the company work
perfectly. Among them we can highlight checking vulnerable points in the security of systems,
installation of operating systems, verification of the operation of software and hardware, database
backups, system updates, configuration and installation of internal and external networks.
Technical support (Tech Support) provides assistance to users experiencing hardware, software,
or network issues. The goal is to ensure systems operate smoothly and efficiently. IT technical
support is the service provided by professionals to help users resolve hardware, software, or
1. Self-Support (User: - Based Support): In this method, users rely on available resources
such as user manuals, FAQs, community forums, and chatbots to diagnose and fix minor
issues independently. It reduces dependency on technicians and promotes user learning.
2. Remote Support: - This type of support allows technicians to access and troubleshoot
systems from a remote location through the internet using tools like TeamViewer,
AnyDesk, or Windows Remote Desktop. It saves time and cost since no physical visit is
required.
3. On-Site Support: - In cases where hardware replacement or network troubleshooting is
necessary, technicians visit the user’s physical location. On-site support is ideal for
resolving issues such as faulty cables, hardware installation, or server maintenance.
4. Help Desk Support: - The help desk is the first point of contact for users seeking technical
assistance. Support staff handle requests, record incidents, and perform basic
troubleshooting before escalating complex issues to higher-level technicians.
5. Tiered (Level-Based) Technical Support:
Many organizations use a tiered support structure to handle issues efficiently:
o Level 1 (L1): Basic troubleshooting and user guidance (password resets,
installation help).
o Level 2 (L2): Handles complex software, OS, and hardware issues.
o Level 3 (L3): Advanced specialists or developers who deal with system-level
problems or escalations.
6. Vendor or Third-Party Support: - Some specialized systems or software require external
vendor support. Vendors or service providers offer maintenance contracts or warranties
that cover updates, repairs, and technical assistance for specific products.
Lab procedures are a set of standardized rules, safety measures, and professional practices
followed in a computer lab. They protect both the technicians and the equipment from harm, and
they promote a productive working environment.
Injury prevention is everyone’s responsibility. Stay alert to situations that could result in an injury.
Developing and using safe work practices is by far the best method for preventing injuries in the
workplace. In order to best prevent injury, follow these simple rules at all times:
Wear appropriate clothing (avoid loose sleeves or jewelry that could catch on equipment).
Arrange tools and materials in an orderly manner to prevent confusion or accidents.
Disconnect power sources before opening or repairing any computer system.
Label workstations and equipment properly for identification and accountability.
Safety is critical when working with electricity and electronic components. Every technician must:
Follow electrostatic discharge (ESD) precautions by using antistatic wrist straps, mats,
and grounded outlets.
Never work on a system while plugged in — always remove the power cord before
opening a computer case.
Before and after any maintenance activity, proper documentation should be completed. This
includes:
After completing maintenance, the system must be tested and verified to ensure proper
functionality:
Maintenance tools are devices, instruments, and software utilities used to inspect, repair, clean,
test, and optimize computer systems. They are classified into hardware tools, software tools,
and cleaning equipment.
Specialized Tools
Identify tools and software used with personal computer components and their purposes. For every
job there is the right tool. Make sure that you are familiar with the correct use of each tool and that
the right tool is used for the current task. Skilled use of tools and software makes the job less
difficult and ensures that tasks are performed properly and safely.
Contact cleaner
Foam swabs
Cleaning supplies
Magnifying glass
Clip leads
IC extractors
Software Tools: - Software maintenance tools help maintain system performance, security, and
stability.
Disk Management
Fdisk - used to create and delete partitions on a hard drive
Format - used to prepare a hard drive to store information
Scandisk or Chkdsk - used to check the integrity of files and folders on a hard drive by
scanning the disk surface for physical errors
System File Checker (SFC) – a command-line utility that scans the operating system
critical files and replaces any files that are corrupted.
Cleaning tools
Clean computer systems function more efficiently and last longer. Dust and debris can cause
overheating and hardware failure, so regular cleaning is essential. Common cleaning tools include:
Soft Brushes – for removing dust from keyboards and circuit boards.
Lint-Free Cloths – for wiping screens and external surfaces.
Isopropyl Alcohol (70–90%) – for cleaning electronic contacts safely.
Cotton Swabs – for cleaning small or delicate areas.
Compressed Air Canisters – for dust removal from hard-to-reach areas.
Vacuum Cleaners (ESD-safe) – for removing dust without generating static electricity.
Protection Software
Windows XP Security Center or latest version
Antivirus Program (AVG, Avira, McAfee, etc…)
Spyware Remover
Firewall
Organizational Tools
It is important that a technician document all services and repairs. The documentation can
then be used as reference material for similar problems that are encountered in the future. Good
customer service includes providing the customer with a detailed description of the problem and
the solution.
Internet reference tools - The Internet is an excellent source of information about specific
hardware problems and possible solutions:
But most static problems experienced by functional systems are caused by improper grounding.
One of the easiest ways to prevent static problems is with a solid stable ground, which is extremely
important for computer equipment.
A poorly designed grounding system is one of the largest causes of a poor computer design. A
good way to solve static problems is to prevent the static signal from getting into the computer in
the first place. The chassis ground in a properly designed system serves as a static guard for the
computer to redirect the static charge safely to the ground, which means that the system must be
plugged into a properly grounded three-wire outlet.
If the problem is extreme, you can resort to other measures. One is to use a properly grounded
static mat underneath the computer. Touch this mat first before touching the computer itself. This
procedure ensures that any static discharges are routed to the ground, away from the system unit
internals. If problems still persist, you may want to check out the electrical building ground.
1. Dynamic Electricity: - Electricity that flows continuously through a conductor, like the current
in a wire. Computers use dynamic electricity (also called current or electric flow) to power all
components. Measured in volts (V) and amperes (A).
Examples: Powering the CPU, RAM, hard drives, motherboard, and peripherals.
2. Static Electricity: - Electricity stored in an object without flowing, usually caused by friction.
Effect on Computers:
Computers do not use static electricity as a power source; it’s something to prevent. Computers
use DC electricity internally. AC from the wall is converted to DC by the power supply.
ESD effects can be immediate, leading to burnt circuits, or latent, where components are weakened
and later fail. To prevent ESD, technicians must use grounding tools and follow proper safety
procedures.
Static electricity is generated through several common actions or environmental conditions, such
as:
Friction: Rubbing certain materials together (e.g., clothing, carpets, or plastic surfaces).
Dry Air: Low humidity increases static buildup because moisture normally helps dissipate
electric charges.
Movement: Walking across a carpet or moving plastic chairs can cause electrons to
accumulate on your body.
Handling Electronic Components: Touching circuit boards, RAM modules, or
processors without grounding can transfer static electricity from your body to the device.
Electrostatic Discharge (ESD) is the sudden transfer of static electricity between two objects with
different electrical potentials. When ESD occurs, a large amount of electrical energy can flow
through sensitive electronic circuits in a fraction of a second.
Computer components like memory modules, microprocessors, and hard drives are extremely
sensitive to ESD. A discharge as small as 30 volts far below what a human can feel can
permanently damage these components.
To minimize the risks of ESD, technicians should follow these best practices:
Use Antistatic Wrist Straps and Mats: Connect yourself and the workstation to a
common ground to discharge static safely.
Work in ESD-Safe Areas: Use grounded tables, ESD floor mats, and ionizers to neutralize
charges.
Avoid Synthetic Clothing: Wear cotton clothing that doesn’t generate static.
Generally,
Computers use DC (Direct Current) voltage supplied by the power supply unit (PSU).
Common voltages inside a computer:
Stay out of the power supply unless you know what you are doing. Similarly, do not open up your
monitor unless you are absolutely sure of what you are doing. You can electrocute yourself even
with the power disconnected when inside the monitor.
Watch out for components being left inside the box. Dropping a screw inside your case can be a
hazard if it isn't removed before the power is applied, because it can cause components to short-
circuit.
Mechanical Precautions
Make sure you have a large, flat area to work on. That will minimize the chance of components
falling, getting bent, or getting lost. Don't tighten screws too far or you may strip them or make it
impossible to loosen them later.
Sometimes it makes sense to turn your machine on with the cover off the case, to see if something
works before replacing the cover. If you do this, be very careful to keep objects from accidentally
falling into the box.
Data Precautions
Back up your data before you open the box, even if the work you are doing seems "simple". This
applies doubly to any upgrades or repairs that involve changes to the motherboard, processor or
hard disk since data is irreplaceable.
Make a copy of your system's BIOS settings before doing any major work or changing anything
in the BIOS.
Maintenance is the process of keeping computer systems, hardware, and software in good
working condition by regularly checking, repairing, cleaning, or upgrading them. It ensures that
computers work efficiently, last longer, and do not break down unexpectedly.
Types of Maintenance
1. Preventive Maintenance: - Regular maintenance done to prevent problems before they occur.
It Minimize failures, improve performance, and extend system life.
Examples:
o Cleaning dust from hardware.
o Running antivirus scans.
o Updating operating system and software.
2. Corrective Maintenance: - Performed after a fault has occurred to correct the problem. It restore
the system to proper working condition.
Examples:
o Replacing a dead power supply.
o Reinstalling a corrupted operating system.
3. Predictive Maintenance: - Uses monitoring tools and diagnostics to predict when a component
may fail, so action can be taken in advance. It prevent sudden breakdowns by detecting early
warning signs.
Examples:
o Monitoring hard disk health with SMART tools.
o Checking CPU temperature with sensors.
Examples:
o Updating software to work with a new operating system.
o Modifying network settings to work with new hardware.
Examples:
o Upgrading RAM for faster performance.
o Adding new features to software.
To protect the computer, extend the life of the components, and protect the data, proper preventive
maintenance is required. Performance issues may arise without regular maintenance and cleaning.
Reliable and stable equipment is a result of good preventive maintenance procedures.
Benefits of preventive maintenance include reduced computer down time and repair costs,
Increased data protection, Extended life of the components, Increased equipment stability etc…
Preventive maintenance is divided into Hardware maintenance and Software maintenance plus
system protection.
Repair or replace any components that show signs of abuse or excess wear.
Protect Monitors
Protect Hard Disk Drives
Protect Floppy Disk Drives
Protect Input Devices
Schedule Preventive Maintenance
Remove the dust from fan intakes.
Remove dust from power supply.
Remove dust from components inside the computer.
Clean mouse and keyboard.
Check and secure any loose cables.
Keep components clean in order to reduce the likelihood of overheating.
For example, some environments, such as construction sites, may require computer equipment to
be cleaned more often than other environments.
Verify that the installed software is current. Follow the policies of the organization when installing
security updates, operating system updates, and program updates. Many organizations do not allow
updates until extensive testing has been completed. This testing is done to confirm that the update
will not cause problems with the operating system and software.
For example, high-traffic networks, such as a school network, may require additional
scanning and removal of malicious software or unwanted files. Before troubleshooting problems,
always follow the necessary precautions to protect data on a computer.
System Protection
Power-Line Protection
Typical power-supply variations fall into two categories:
In general, if several components go bad in a short period of time, or if components go bad more
often than usual at a given location, these are good indicators of power-related issues. Likewise,
machines that crash randomly and often could be experiencing power issues. If “dirty” power
problems are suspected, a voltage-monitoring device should be placed in the power circuit and left
for an extended period of time. These devices observe the incoming power over time and produce
a problem indicator if significant variations occur.
Surge Suppressors
Inexpensive power-line filters, called surge suppressors, are good for cleaning up dirty commercial
power. These units passively filter the incoming power signal to smooth out variations. You must
consider two factors when choosing a surge suppresser:
Clamping speed
Clamping voltage
These units protect the system from damage, up to a specified point. However, large
variations, such as surges created when power is restored after an outage, can still cause
considerable data loss and damage. In the case of startup surges, making sure that the system is
turned off, or even disconnected from the power source, until after the power is restored is one
option. In the case of a complete shutdown, or a significant sag, the best protection from losing
programs and data is an uninterruptible power supply (UPS).
The standby system monitors the power input line and waits for a significant variation to occur.
The batteries in this unit are held out of the power loop and draw only enough current from the
AC source to stay recharged. When an interruption occurs, the UPS senses it and switches the
output of the batteries into an inverter circuit that converts the DC output of the batteries into an
AC current, and voltage, that resembles the commercial power supply. This power signal is
typically applied to the computer within 10 milliseconds.
The uninterruptible systems do not keep the batteries offline. Instead, the batteries and converters
are always actively attached to the output of UPS. When an interruption in the supply occurs, no
switching of the output is required. The battery/ inverter section just continues under its own
power.
Standby systems do not generally provide a high level of protection from sags and spikes. They
do, however, include additional circuitry to minimize such variations. Conversely, an
uninterruptible system is an extremely good power-conditioning system. Because it always sits
between the commercial power and the computer, it can supply a constant power supply to the
system.
Crete a list of the most common reasons why the error would occur.
List the easiest or most obvious causes at the top with the more complex causes at the bottom.
Determine the exact cause by testing the theories of probable causes one at a time, starting
with the quickest and easiest.
After identifying an exact cause of the problem, determine the steps to resolve the problem.
If the exact cause of the problem has not been determined after you have tested all your
theories, establish a new theory of probable causes and test it.
Sometimes quick procedures can determine the exact cause of the problem or even correct
the problem. If it does, you can go to step 5.
If a quick procedure does not correct the problem, you might need to research the problem
further to establish the exact cause.
Divide larger problems into smaller problems that can be analyzed and solved individually.
Verify full system functionality and implement any preventive measures if needed.
Ensures that you have not created another problem while repairing the computer.