Preview

Preventive maintenance

Powerful Essays
Open Document
Open Document
5644 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Preventive maintenance
59
PREVENTIVE
MAINTENANCE

CONTENTS AT A GLANCE
Protecting Your Data
Step 1: File backups
Step 2: CMOS backups

Cleaning
Step 3: Clean the case
Step 4: Clean the air intake
Step 5: Clean the speakers
Step 6: Clean the keyboard
Step 7: Clean the monitor
Step 8: Clean the mouse

Step 9: Check external cables
Step 10: Clean the floppy drive
Step 11: Clean the tape drive
Step 12: Check the CD tray
Step 13: Check the sound system
Step 14: Check color purity

Step 15: Check the fans
Step 16: Clean fans and filters
Step 17: Check expansion boards
Step 18: Check internal cables
Step 19: Check memory
Step 20: Check the CPU
Step 21: Check drive mounting

Drive Check

3

Step 22: Update the boot disk
Step 23: Run ScanDisk
Step 24: Run Defrag

Preventive Maintenance
Troubleshooting
Further Study

1505

SYSTEM MAINTENANCE AND SUPPORT

External Check

Internal Check

1506

PREVENTIVE MAINTENANCE

For most end-users, the purchase of a PC is a substantial investment of both time and money. For corporations and organizations with hundreds (even thousands) of PCs, this investment is that much higher. But after the money is spent and the PC is in our home or office, few PC users ever take the time to maintain their PC. Routine maintenance is an important part of PC ownership, and can go a long way toward keeping your computer’s hardware and software error-free. Proper routine maintenance can also help to avoid costly visits to the repair shop (U.S. $50 to $70/hour). Businesses can save a substantial amount of money by assigning technicians to perform regular maintenance. If you’re in business for yourself, offering “preventive maintenance” services as part of a normal repair or as seasonal “specials” can provide you with an added income stream. This chapter provides you with a comprehensive, step-by-step procedure for protecting and maintaining a personal computer investment.
This chapter is geared primarily for

You May Also Find These Documents Helpful

  • Powerful Essays

    Mutandum Corporation Case

    • 963 Words
    • 4 Pages

    While Mutandum’s current method of tracking computers (attaching assigned, unique tracking numbers directly to the equipment) is effective, it must be applied to all systems, regardless of the asset’s value at the time of purchase. The system itself is not what these unique tracking numbers are protecting, but rather the sensitive data stored on…

    • 963 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Eg2401 Unit 1 Assignment

    • 4754 Words
    • 20 Pages

    billion personal computers in the world at present. In the United States alone, over 50% of…

    • 4754 Words
    • 20 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1110

    • 335 Words
    • 2 Pages

    3. Centralized Storage for backup - If a computer needs to be rebuilt or wiped, you can push files and backups and restore from the same location.…

    • 335 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Midas shops provide total car care includes tires, brakes, batteries, oil changes, air conditioning, and an array of vehicle maintenance services by ASE-certified technicians (Midas International Corporation, 2014). Midas is a well-known company that customers use to take care of his or her automotive needs. The objective of this paper is to answer four question pertaining to the Midas case study in Chapter 2 of the textbook. These questions will discuss anticipated impacts on operating efficiencies, recommend solutions to minimize the negative impacts, operating practices to accommodate tune-ups, reasons why input should be gathered from the shop owners, the type of input that should be gathered, and the processes and steps needed to launch this new program.…

    • 1117 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    - when we are going to buy a new office machine we should chose the one which save energy…

    • 274 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    NT1110Module4 SA

    • 302 Words
    • 1 Page

    The New Technology File system also provides support for the larger hard drives and better security in the form of encryption and permissions that restrict access by unauthorized users. It allows administrators to set a guideline for people who can access certain files and folders. It also allows administrators to set up specific accounts with limits for each person to tighten the security.…

    • 302 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    CMGT430 2015 SYLLABUS

    • 2598 Words
    • 16 Pages

    and facility access as well as the concepts for protecting the hardware and software assets of an enterprise.…

    • 2598 Words
    • 16 Pages
    Satisfactory Essays
  • Good Essays

    | Keep information secure and manage personal access to information sources securelyProtect systems and data: Access controls: Physical controls: log-in details should be treated as credit card information and not to be left lying anywhere with an easy access, locks, passwords, access levels.…

    • 793 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    307-Task B

    • 265 Words
    • 2 Pages

    Biv, If your files are stored on computer or other electronic device you should ensure it is password protected and that any removable devices are locked away securely. Usernames and Anti-virus programs also give you better protection. Anti-virus is only effective if you keep it up to…

    • 265 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    3. Check with a local service station to find the cost of services and ask a service station operator how much you are likely to spend on repairs…

    • 1396 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    For this assignment I will discuss and evaluate the improvements to computer systems achieved by routine housekeeping procedures and the benefits. Listed below is what I shall be discussing.…

    • 1304 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Computer Memory Hacking

    • 820 Words
    • 2 Pages

    of reasons that one might participate in hacking the memory of a computer system. One reason…

    • 820 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The remarkable progress technology made has brought many hi-tech goods to the average consumer. Computers have been around since the 1950’s and were used for tasks like accounting, code breaking and statistical calculations(2), but priced beyond the typical business budget. With the advent of microprocessors in the early 1970’s prices began to fall, computers became smaller; their capabilities began to…

    • 826 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    221 - Use office equipment

    • 2807 Words
    • 12 Pages

    The computers have lots of important features. A lot of confidential information and documents are kept safe in protected electronic files on the computer such as PAS (patient attendance system). We also have intranet, which I mostly use to access…

    • 2807 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Why: Physical security must be maintained, because no matter what logical measures are taken, if an unauthorized person is able to gain hands-on access directly to a workstation, they can wreak havoc on the organization’s systems. Since we never know who may be around, it is equally as important to lock or logout of a workstation when leaving the desk, and never leave passwords near it. IT Staff needs to ensure all systems have the appropriate software for both day-to-day operations, as well as workstation security are installed to prevent the need to download more additional software, and prevent malware from being loaded into the system.…

    • 545 Words
    • 2 Pages
    Satisfactory Essays

Related Topics