TOPIC 3: COMPUTER LABORATORY CARE &
MAINTENANCE
Sub-Topic: Computer Literacy
The Booting Process
Booting is the process of starting up a computer.
During booting, the operating system (OS) is loaded from the hard disk (or
any other media) into working memory (RAM).
The process begins when the computer is powered on and ends when the
computer is ready to perform its normal operations.
Types of booting
There are basically two types of booting:
Cold booting/hard booting: This is the process of turning on a computer
after it had been powered off completely.
Warm booting/soft booting: This is the process of restarting a computer
that already is powered on.
Step-by-step process of booting
The power supply sends a signal to the components in the system unit.
The processor finds the ROM chip(s) that contain the
BIOS (Basic input/output system).
The BIOS performs the POST (Power-On Self-Test) which checks
components such as the mouse, keyboard and adapter cards. A series of
messages may display.
The results of the POST are compared with data in a CMOS chip
The BIOS looks for system files on the Hard disk (C:)
The system files and the kernel of the Operating System load into RAM
from the Hard Disk.
The OS loads configuration information and displays the welcome screen.
A series of messages that may be displayed during a POST
On startup, the OS may verify that the person attempting to use the
computer is a legitimate user through use of a password.
After the user logs on, the desktop and icons are displayed on the screen.
Finally, the operating system also executes programs in the Startup folder,
which contains a list of programs that open automatically when you boot
the computer.
25
Computer Literacy
Computer literacy is the ability to use computers and related technology
efficiently.
To be considered computer literate, one needs to possess skills such as:
Turning on the computer and logging on
Opening and creating folders and files
Word processing skills, Spreadsheets skills, Internet and Email skills
Basic hardware terminology and skills
Virus and security awareness.
Advantages of Computer Literacy
Profitable skills: The ability to use more common programs such as
Microsoft Word can aid one to make money or get hired.
Leadership and Promotions: Computer literacy skills may get one promoted
to a higher position within your workplace or be put in a leadership position.
Work performance: Knowing how to use a computer often allows you to get
work done in a more organized, efficient and timely manner
Communication: Knowledge of how to access the Internet on a computer
opens up different possibilities for you to communicate.
Being prepared for the future; Computer technology is advancing faster, so
if you are familiar with computer skills this will makes you ready for bright
future.
New media; computers are replacing television, whether take an example
of many young people or just our Teenagers.
More job opportunities; since almost all workplaces use computers
therefore need for person having computer skills is really in great demand
Staying up to date; in the modern world, it is easier to hear or read about
the latest news through computer websites.
Note:
Digital Divide: is the inequality with regard to access, use, or impact of
information and communication technologies (ICT).
Digital Divide can be a result of having two societies one with very high
levels of computer literacy and the other lagging far behind.
Starting a computer system
Step 1: Switch on the wall sockets
Step 2: Press the power button on the system unit (if monitor is turned off, press
its power button)
Step 2: Wait for computer to complete booting.
Step 3: Click on respective username and enter password (where applicable)
26
Step 4: Your computer is now ready to use.
Shutting down a computer system
Step 1: Save all open work and close open computer programs
Step 2: Click Start button and then shutdown.
Step 3: Wait while the computer shuts down.
Locating and opening computer programs
The Start menu is the gateway to all of the programs on your computer.
To open the Start menu, click the Start button.
The left pane of the Start menu contains a small list of programs.
To open a program, click it.
If you don't see the program you want to open, but you know its name, type
all or part of the name into the search box at the bottom of the left pane.
To browse a complete list of your programs, click the Start button, and then
click All Programs
Sub-Topic: Secure Laboratory Environment
A Computer Laboratory
A computer laboratory is a room that is specially designed and prepared to
provide a safe and conducive environment for using computer systems.
Factors to consider when preparing a computer laboratory
Security of computers, programs and other resources
Reliability of the power source
27
The number of computers to be installed
The available floor space
The maximum number of users the computer laboratory can accommodate
Areas of laboratory security
Organizations, libraries, and schools running public computer labs face a
variety of complex security challenges.
Therefore these institutions should take measures to ensure the safety of
equipment, software, data and users.
Physical security measures
To prevent unauthorized, apply burglar
proofing to reinforce computer laboratory
access points such as windows, doors and
roofing with metal grills.
To avoid thefts fit strong locks, doors,
windows and roofing on the computer
laboratory.
If resources permit, employ security
guards and personnel to keep watch over
the computer laboratory premises.
Consider installing security alarms at strategic access points that would
alert security personnel in case of a break-in.
Use system locks (locked key systems) to make it difficult to access
internal components like hard disks and memory sticks.
Use steel-cable locks to lock the equipment to desk, cabinet or floor.
Alternatively use electronic locking mechanism with keys, swipe cards,
finger print recognition among others.
Likewise use Desktop locks, system unit enclosures and laptop locks.
28
Electric Power Security Measures:
Ensure computers are shut down safely and
properly after use.
To ensure stable power supply connect computers
and other devices to power stabilizers, surge
protectors or UPS.
Note:
Power stabilizers maintain power at required
voltages.
A surge protector can be used to protect computer
equipment against under voltage and over voltage.
UPS keeps backup power for devices in the event of
a sudden power failure or other electrical problems.
Make sure all power and network cables are
properly insulated and laid far away from
pathways in the room.
Additionally, house the cables within trunks
fixed along the walls, to protect them from
damage and prevent electric shock.
Electric and network cabling should be housed
in different trunks to prevent signal attenuation.
Install lightening conductors on the roof of the
computer laboratory to protect devices and
users against lightening and lightening-induced
power surges.
29
Other security measures:
Security Cameras:
Install CCTV Cameras to keep watch over computer systems and the
computer laboratory premises.
CCTV cameras act as a deterrent to theft and other crimes. They can be
operated and monitored in person or remotely.
First aid box:
A first aid kit is a box or bag that contains the necessary items for providing
care in case of any emergency in the computer lab such as electric shocks.
Tool kits:
A tool kit is also necessary for keeping and securing ICT repair and
maintenance tools
Fire Extinguishers:
Are a critical component of saving property and lives in the case of a fire
emergency.
Have gaseous fire extinguishers like those filled with carbon dioxide. Water
based or powder extinguishers should be avoided since they can cause
damage to computer components.
Air Conditioner (AC):
An Air conditioning unit is a device used
for cooling and controlling the humidity and
purity of the air circulating in a space.
Air conditioning units monitor and maintain
the temperature, air distribution and
humidity in a computer room.
30
Note:
Listed below are some of the computer lab equipment and their respective
functions:
Blower:
A blower is used periodically to blow/remove dust that may have
accumulated inside computers and other hardware.
Dust and Water proof covers:
These protect computers from dust, moisture, water and liquids.
When setting up the computer laboratory, consider a location away from
excessive dust.
Computers should remain covered using dust covers when not in use.
Curtains:
The room should have curtains in the windows to keep out dust and protect
computers and other hardware from direct sunlight
Antiglare filter screens:
These are placed on computer monitors, to mainly reduce brightness and
electromagnetic rays from the CRT monitor.
This works well to decrease user eye strain and fatigue.
Woolen carpets:
These are used to absorb any dust on the floor as well as reduce effects on
damage when light hardware falls on the floor
Bulbs/lighting:
These provide enough light and lighting in the computer lab.
Standard furniture:
Computer lab furniture should
comprise among others tables
and chairs.
The tables should be wide
enough and strong to bear the
31
weight of the computers and other hardware.
The seats must be comfortable and have a straight backrest that allows
someone to sit upright.
Safe use of the Laboratory
The following are some of the safety precautions that should be taken to provide
a conducive working environment in the computer lab:
For Hardware safety:
Keep computer components dust free.
Keep away liquids and food items to prevent hardware corrosion.
Don‘t drop hardware to ground (handle with care).
Don‘t make hardware connections to motherboard when computer is on.
Don‘t bring magnetic devices to the laboratory.
Avoid direct sunlight and high temperatures in the laboratory.
Install Fire extinguishers that can be used in case of a fire outbreak.
Do burglar proofing on all entrances and exits to keep all devices and
components secure from thieves.
Install lightening conductors to guard against destruction by lightening.
Avoid overcrowding of both hardware and humanware in the laboratory.
Ensure Proper ventilation of the building in order to have good aeration.
Minimize electrical noise in the Computer environment.
Humidity should be regulated to an optimum 50%
Use standard furniture that can accommodate and support all hardware
components as well as users.
Ensure regular servicing of computers and other hardware by qualified
technicians.
Always use surge protectors, Uninterruptible Power supply (UPS) or
voltage stabilizers to ensure steady power supply to safeguard the
computer system.
For Software safety:
Install and update antivirus software to guard against computer malware
and viruses.
Similarly perform updates of computer operating systems and other
software and to achieve the best performance.
Use optimizers that keep the computer performance to be as good as
expected.
Perform hard disk defragmentation to ensure easy and quick access of files
32
by the operating system.
Install remote administration software to help in the management of
computers in the computer lab.
Make sure to setup user accounts and passwords for different users or
groups of users.
Install computer management software to monitor computer use and
activity in the computer lab.
For Humanware safety:
Avoid using computers during rain storms to avoid lightening induced
power surges that may destroy computers and other hardware.
Cables should be housed in trunks on walls or laid far away from pathways
in the room to avoid danger of exposing the users to electric shock.
Avoid very bright and flickering computer screens that can lead to eye
strain.
Computer lab should have enough light to avoid eye strain.
Always sit upright to avoid muscle pains and back aches caused by poor
sitting posture.
Usually take frequent short breaks from computer work to reduce work-
related fatigue and physical drain.
Computer Laboratory Rules and Regulations
Never remove the computer cover or touch inside the system unit. Seek
assistance from a qualified technician.
Keep all liquids and food items away from your computer to avoid serious
electrical shock, rusting, corrosion and damage to electronic circuits.
Never use your computer during a storm to avoid damage from lightening
induced power surges.
Avoid dropping hardware as this could cause breakage, denting and
damage to the hardware.
Proper shut down of computers should be followed to avoid disk and
system failure (avoid abrupt switching off)
When using the internet do not accept downloads from Internet sites that
you don't know and trust. And never open email attachments unless you
know and trust the source.
Avoid making hardware connections e.g. keyboard, monitor and mouse
connections when the computer is on.
Do not bring magnetic devices to the lab, computers have hard disks which
are magnetic and can be spoilt if they come near other magnetic fields.
Handle storage media and devices with care for example; safely remove
33
flash disks after use and don‘t touch the inner surface of compact disks and
floppy disks.
Always sit upright to avoid muscle pains and back aches caused by poor
sitting posture.
Do not use any school computer facility to violate the terms of any software
license agreement, or copyright provisions.
Do not copy, rename, change or delete files or information belonging to
some other user.
Do not deliberately use computing facilities to harass others, or interfere
with their work for example; sending abusive, threatening or repetitive
messages to a user or users.
Do not attempt to modify system facilities, illegally obtain extra resources or
degrade the performance of any system.
Sub-Topic: Servicing and Maintenance of Computer Systems
The following measures should always be carried out to keep computers in good
working conditions:
Regularly use a blower to remove dust from computers and other
hardware.
Computers require special cleaning even on the inside including hardware
parts such as the mouse and keyboard to perform correctly.
Always use optimizer utilities that modify programs to make computers to
improve/boost performance and make them run more quickly.
Perform updates of computer operating systems and other software and to
achieve the best performance.
Similarly install and update antivirus software to guard against computer
malware and viruses.
Perform hard disk defragmentation to ensure easy and quick access of files
by the operating system.
Uninstall computer programs and applications no longer in use
Periodically perform disk clean up to clear temporary files that accumulate
and fill up partition C: of the hard disk.
Add more RAM chips to increase the RAM capacity of computers incase
available RAM is found to be insufficient.
Periodically check computer hard disk health and make replacements
where warranted.
34