PERFORM COMPUTER REPAIR AND MAINTENANCE Revision Questions
1.
Outline the process of disassembling a computer.
Power Down and Unplug: Turn off the computer and disconnect it from any power source to ensure safety.
Open the Case: Use a screwdriver or other tools to remove screws or fasteners holding the case panels in place.
Disconnect Components: Unplug all power, data, and other cables connected to the motherboard and peripherals.
Remove Components: Carefully remove the GPU, storage drives, RAM, and other components by unscrewing and gently pulling them out.
Remove the Motherboard: Unscrew the motherboard from the case standoffs and carefully lift it out.
Clean and Store Components: Use compressed air to remove dust from components and store them in anti-static bags or other protective containers.
2.
Analyze the common causes of slow computer performance.
Insufficient RAM: Limited RAM prevents smooth multitasking and may cause slowdowns when multiple programs are open.
Malware Infections: Viruses, spyware, or other malicious software consume system resources, leading to sluggish performance.
Too Many Startup Programs: Excessive programs set to launch at startup slow down the boot process and reduce available resources.
Fragmented Hard Drive: On mechanical hard drives, fragmented data causes slower read and write times as the drive head searches for data.
Outdated Software: Running outdated software can lead to inefficiencies, bugs, and slower performance compared to newer versions.
Background Processes: Unnecessary or resource-heavy processes running in the background consume CPU, memory, and disk resources, reducing overall system performance.
3.
Evaluate the effectiveness of different antivirus programs.
Detection Rates: The ability of an antivirus program to accurately identify and neutralize viruses, malware, ransomware, and other threats.
Resource Usage: The impact an antivirus program has on system performance, especially during full scans or when real-time protection is enabled.
User Interface: The ease with which users can navigate the software, access features, and configure settings for optimal protection.
Update Frequency: Regular updates to virus definitions and security protocols to protect against emerging threats.
Additional Features: Many antivirus programs offer extra features like firewalls, anti-phishing protection, parental controls, and system optimization tools.
Customer Support: The availability and quality of technical support, including online resources, live chat, and phone support, to assist with issues.
4.
Identify the main components of a computer and their functions.
CPU (Central Processing Unit): The brain of the computer, responsible for executing instructions, performing calculations, and managing tasks.
Motherboard: The main circuit board that connects all components and peripherals, providing communication between the CPU, RAM, storage devices, and other hardware.
RAM (Random Access Memory): Temporary memory used to store data that is actively being worked on by the CPU, allowing for quick access and multitasking.
Hard Drive/SSD (Solid State Drive): Long-term storage for operating systems, programs, files, and data. SSDs are faster and more reliable than traditional hard drives.
Power Supply Unit (PSU): Provides power to all the internal components of the computer, converting electricity from the outlet to the appropriate voltage levels.
GPU (Graphics Processing Unit): Specialized hardware responsible for rendering images, videos, and animations. Critical for tasks like gaming, video editing, and 3D modeling.
Cooling System: Fans or liquid cooling systems that prevent the CPU, GPU, and other components from overheating during operation.
5.
Explain the difference between hardware and software
Hardware: Physical components of a computer system, such as the CPU, RAM, motherboard, and hard drive. These are tangible and can be physically handled.
Software: Programs and applications that run on the computer, including the operating system (OS) and various applications (e.g., word processors, browsers). Software is intangible and interacts with hardware.
Hardware is Tangible: It includes all the components that can be physically seen and touched.
Software is Intangible: Exists in digital form, stored on hardware devices, and can only be interacted with through a user interface.
Hardware Requires Software: Hardware cannot function without software to provide instructions for performing tasks.
Software Requires Hardware: Software needs hardware to be executed and to run processes.
6.
Describe the steps involved in assembling a computer.
Preparation: Gather all necessary components (CPU, motherboard, RAM, PSU, etc.) and tools (screwdriver, anti-static wrist strap). Ensure a static-free environment by grounding yourself.
Install the CPU: Place the CPU into the socket on the motherboard, aligning the pins correctly, and secure it by lowering the retention arm.
Install the CPU Cooler: Apply a small amount of thermal paste to the top of the CPU and attach the CPU cooler, ensuring it is firmly seated and secured with screws or clips.
Install RAM Modules: Insert RAM sticks into the designated slots on the motherboard, applying gentle pressure until they click into place.
Install the Motherboard: Place the motherboard inside the computer case, aligning it with the standoffs, and screw it into place.
Connect the PSU and Components: Attach power supply cables to the motherboard, CPU, GPU, and storage drives. Ensure all components are properly powered and connected.
Install Storage and GPU: Attach storage drives (HDD/SSD) and the graphics card to the motherboard, ensuring they are secured and connected with the appropriate cables.
7.
Compare the features of SSDs and HDDs.
Speed: SSDs are significantly faster than HDDs in terms of read and write speeds, leading to quicker boot times and faster application loading.
Durability: SSDs have no moving parts, making them more resistant to physical shocks and reducing the likelihood of mechanical failure compared to HDDs.
Storage Capacity: HDDs generally offer larger storage capacities at a lower price per GB, making them ideal for mass storage of data.
Power Consumption: SSDs consume less power, making them more energy-efficient and suitable for laptops or devices where battery life is a concern.
Noise: HDDs produce noise due to spinning platters and moving read/write heads, whereas SSDs are silent as they have no moving parts.
Cost: SSDs are more expensive per GB compared to HDDs, though prices are decreasing as SSD technology becomes more widespread.
8.
Assess the role of cable management in improving airflow inside a computer case.
Airflow Optimization: Proper cable management reduces obstructions inside the case, allowing air to flow more freely and efficiently, which helps in cooling components like the CPU, GPU, and PSU.
Aesthetic Appeal: A well-organized case with neatly arranged cables improves the appearance of the build, which is especially important for transparent or windowed cases.
Ease of Maintenance: Properly managed cables make it easier to access and replace components, facilitating future upgrades, repairs, or cleaning without the hassle of tangled cables.
Reduced Dust Buildup: Fewer obstructions within the case mean fewer areas where dust can accumulate, which can extend the lifespan of components and reduce overheating risks.
Preventing Damage: Organized cables reduce the risk of pinching, tangling, or stretching, which can lead to cable failure or damage to connected components over time.
Improved Safety: Good cable management helps reduce the likelihood of short circuits or fire hazards caused by frayed or poorly routed cables.
9.
Discuss the importance of BIOS/UEFI in a computer system.
Boot Process: BIOS (Basic Input/Output System) or UEFI (Unified Extensible Firmware Interface) initializes and tests hardware components when the computer is powered on, ensuring that all necessary parts (CPU, RAM, storage) are working correctly before the operating system loads.
Firmware Interface: Provides a platform for configuring hardware settings, such as boot sequence, fan speeds, and overclocking. UEFI also includes a more user-friendly graphical interface than BIOS.
Hardware Detection: BIOS/UEFI detects and configures connected hardware components, allowing the system to recognize new devices like storage drives, keyboards, and peripherals.
System Security: UEFI includes security features such as Secure Boot, which ensures that only trusted, signed operating systems can boot, protecting against unauthorized software or malware.
Performance Tuning: Allows users to adjust performance settings like CPU clock speeds, voltage, and memory timings to optimize the performance of the system.
Updates: BIOS/UEFI can be updated to fix bugs, improve performance, and add support for new hardware, ensuring that the system stays current and compatible with future technologies.
10.
Illustrate the proper way to apply thermal paste on a CPU.
Clean the Surface: Before applying new thermal paste, clean off any old paste from both the CPU and the cooler using isopropyl alcohol and a lint-free cloth.
Apply a Small Amount: Place a pea-sized dot of thermal paste in the center of the CPU. Alternatively, a thin line or small X shape can be used, but avoid overapplying the paste.
Spread Evenly (Optional): Some prefer to spread the thermal paste with a plastic tool or card to ensure an even layer. However, the cooler's pressure typically spreads the paste adequately.
Attach the Cooler: Carefully position the cooler over the CPU, making sure it is aligned correctly. Lower it straight down to avoid smearing the paste.
Secure the Cooler: Fasten the cooler according to the manufacturer's instructions, ensuring even pressure across the CPU for optimal heat transfer.
Check for Excess: After securing the cooler, check to ensure that no thermal paste has spilled over the edges of the CPU, as this can cause short circuits.
11.
Discuss the key steps in troubleshooting network connectivity issues.
Restart Devices: Power cycle the modem, router, and computer to refresh the network connection and clear temporary issues.
Check Cables: Ensure that all Ethernet cables are securely connected and check for any visible damage that may be affecting the connection.
Update Drivers: Install the latest drivers for the network adapter to ensure compatibility and functionality with the system.
Network Settings: Verify that the IP and DNS settings are configured correctly. Check for issues like static IP address conflicts or incorrect DNS entries.
Disable VPNs/Firewalls: Temporarily disable any VPN or firewall settings to rule out interference with the network connection.
Contact ISP: If the problem persists, contact the Internet Service Provider (ISP) to check for outages or issues on their end.
12.
Demonstrate how to update drivers on a Windows operating system.
Open Device Manager: Right-click the Start button and select "Device Manager" from the menu to access the list of installed hardware.
Select Device: Expand the relevant category for the device that needs an update (e.g., "Network adapters" for network-related devices).
Right-click Device: Right-click on the device and choose "Update driver" from the context menu.
Search for Drivers: Choose "Search automatically for updated driver software" to allow Windows to search for the latest driver online.
Install Drivers: If a new driver is found, follow the prompts to install it. If no update is available, you may need to download the driver manually from the manufacturer's website.
Restart Computer: After installing the driver, restart the computer to ensure the changes take effect.
13.
Formulate a plan for regular computer maintenance.
Weekly Backups: Regularly back up important data to an external drive or cloud storage to protect against data loss.
Monthly Updates: Check for and install updates for the operating system, software, and drivers to ensure compatibility, performance, and security.
Quarterly Cleaning: Physically clean the computer by using compressed air to remove dust from fans, vents, and internal components to prevent overheating.
Security Scans: Run antivirus and anti-malware scans to detect and remove any security threats that could compromise the system.
Disk Cleanup: Use Disk Cleanup tools or third-party software to remove temporary files, old downloads, and other unnecessary data to free up space and improve performance.
Performance Monitoring: Regularly monitor system performance using tools like Task Manager or third-party applications to identify and address any slowdowns or issues.
14.
Critique the impact of malware on computer performance.
Resource Consumption: Malware often runs processes in the background, consuming CPU, RAM, and disk resources, which can slow down system performance and reduce the responsiveness of applications.
Data Corruption: Certain types of malware, such as ransomware, can corrupt or encrypt files, making data inaccessible and causing significant data loss.
Privacy Threats: Malware like keyloggers or spyware can steal sensitive information, such as login credentials or financial data, potentially leading to identity theft or fraud.
Network Issues: Some malware uses internet bandwidth for malicious activities, such as sending spam or launching Distributed Denial of Service (DDoS) attacks, which can reduce internet speed and connectivity.
System Instability: Malware can cause system instability by crashing programs, causing freezes, or even triggering system reboots, making the computer unreliable.
Recovery Costs: Removing malware can be time-consuming and costly, requiring professional help or specialized software. In extreme cases, a full system reinstallation may be necessary to restore functionality.
15.
Describe the process of checking and replacing a faulty power supply unit (PSU).
Identify Symptoms: Common signs of a faulty PSU include the computer not powering on, random shutdowns, unusual noises, or electrical smells coming from the unit.
Test Power Supply: Use a PSU tester or multimeter to check the voltage output of the power supply. Ensure that it meets the required voltage for each connector. Alternatively, you can use the paperclip test for basic testing.
Check Connections: Before removing the PSU, verify that all power cables are securely connected to the motherboard, CPU, GPU, and other components.
Remove Power Supply: Power off the computer, unplug it, and remove the side panel. Unscrew the PSU from the case, disconnect all power cables, and carefully remove the unit.
Install New PSU: Place the new PSU in the case, align it with the mounting holes, and screw it in. Connect the appropriate power cables to the motherboard, CPU, GPU, and drives.
Test System: Power on the computer to ensure the new PSU is functioning correctly. Check that all components are receiving power and that the system runs without issues.
16.
Explain the significance of the exclusionary rule in the context of probable cause
Legal Principle: The exclusionary rule prevents evidence obtained through illegal means (e.g., without a warrant or probable cause) from being used in a court of law.
Protects Rights: It upholds the Fourth Amendment, which protects individuals from unreasonable searches and seizures, ensuring that law enforcement follows proper legal procedures.
Deterrent Effect: The rule discourages law enforcement from conducting unlawful searches or violating constitutional rights, as any evidence obtained illegally cannot be used in prosecution.
Judicial Integrity: The exclusionary rule preserves the integrity of the judicial system by ensuring that trials are conducted fairly and in accordance with the law.
Case Law: Landmark cases like Mapp v. Ohio have reinforced the importance of the exclusionary rule, ensuring its application in both state and federal courts.
Limitations: There are exceptions to the exclusionary rule, such as the "good faith" exception (where law enforcement acted on a faulty warrant they believed to be valid) and the "inevitable discovery" rule, where evidence would have been found regardless of illegal actions.
17.
List the essential tools needed for computer maintenance.
Phillips Head Screwdriver: Used to remove and secure screws when assembling or disassembling a computer.
Anti-static Wrist Strap: Protects sensitive electronic components from electrostatic discharge (ESD) during handling.
Compressed Air: Blows dust and debris out of components such as fans, heatsinks, and vents to improve airflow and cooling.
Thermal Paste: Used to reapply between the CPU and cooler during maintenance or installation to ensure efficient heat transfer.
Multimeter: Checks voltage output and continuity in power supplies, cables, and other electronic components for troubleshooting.
Cable Ties: Organizes and secures cables within the case to improve airflow, reduce clutter, and prevent damage from loose wires.
18.
Recommend solutions for a computer experiencing frequent crashes.
Update Drivers: Ensure that all hardware drivers, especially for the GPU, network, and chipset, are up to date to prevent compatibility issues or bugs.
Run Memory Test: Use tools like MemTest86 to check for faulty RAM. Faulty memory can cause random crashes and instability.
Check for Overheating: Monitor CPU, GPU, and motherboard temperatures using tools like HWMonitor. Clean dust from fans and heatsinks, and ensure proper airflow in the case.
Scan for Malware: Run a full antivirus and anti-malware scan to detect and remove malicious software that could be causing instability.
Check Power Supply: Test the PSU to ensure it is delivering stable power to the components. Replace it if it is faulty or underpowered.
Review Event Logs: Check the Windows Event Viewer for error messages or warnings that may indicate the source of the crashes, such as faulty hardware or software conflicts.
19.
Justify the use of anti-static wrist straps during computer assembly.
Prevents ESD Damage: Electrostatic discharge (ESD) can damage sensitive computer components, such as the CPU, GPU, and RAM. An anti-static wrist strap grounds the user, preventing the buildup of static electricity.
Improves Safety: Using an anti-static wrist strap reduces the risk of accidentally damaging hardware during installation or maintenance, making the assembly process safer.
Cost-effective: Anti-static wrist straps are inexpensive and simple to use, providing an affordable way to protect expensive components from ESD damage.
Professional Practice: Wearing an anti-static wrist strap is standard practice in professional environments, ensuring best practices are followed during hardware handling.
Reliability: The use of an anti-static wrist strap increases the likelihood of a successful build or repair, minimizing the risk of component failure due to static discharge.
User Confidence: Wearing an anti-static strap gives users peace of mind during assembly, knowing they are taking the necessary precautions to protect their components.
20.
Illustrate how to connect front panel connectors to the motherboard.
Locate Headers: Identify the front panel header pins on the motherboard, which are usually labeled with abbreviations such as PWR_SW (power switch), RESET_SW (reset switch), and HDD_LED (hard drive LED).
Consult Manual: Refer to the motherboard manual to confirm the correct pin layout for connecting front panel connectors.
Connect Power Switch: Attach the power switch cable from the case to the designated pins on the motherboard labeled PWR_SW.
Connect Reset Switch: Attach the reset switch cable to the pins labeled RESET_SW. This switch allows the user to restart the system.
Connect LED Indicators: Connect the power LED (PWR_LED) and hard drive activity LED (HDD_LED) cables to their respective pins, ensuring correct polarity (+ and -).
Test Connections: After assembling the system, power it on to confirm that all front panel buttons and LED indicators function properly.
21.
Distinguish between different types of computer cooling systems.
Air Cooling: Uses fans and heatsinks to dissipate heat from components. Fans circulate air to move heat away from the CPU, GPU, and other parts, while heatsinks provide a larger surface area for heat dissipation.
Liquid Cooling: Utilizes a liquid coolant to transfer heat from components to a radiator, where fans expel the heat. Liquid cooling is more effective for high-performance or overclocked systems.
Passive Cooling: Relies on heatsinks without fans to disperse heat. This method is silent and maintenance-free but less effective than active cooling in dissipating large amounts of heat.
Hybrid Cooling: Combines air and liquid cooling methods, using both a liquid loop and fans to cool high-performance components more efficiently.
Phase Change Cooling: Uses a refrigerant, similar to a refrigerator, to cool components. It is typically used in extreme overclocking scenarios but is expensive and complex to maintain.
Thermoelectric Cooling: Uses the Peltier effect to transfer heat. This method is highly efficient but can generate excess heat that needs to be managed with secondary cooling methods.
22.
Predict the consequences of not regularly updating system software.
Security Vulnerabilities: Failing to install updates leaves the system vulnerable to malware, viruses, and hacking attempts that exploit known weaknesses in outdated software.
Performance Issues: Older software may not be optimized for new hardware or applications, leading to slower performance, bugs, or compatibility issues.
Bug Accumulation: Without regular updates, unresolved bugs and glitches accumulate, causing system instability and degraded functionality over time.
Loss of Support: Software providers often discontinue support for older versions, meaning users may lose access to patches, security updates, and customer service.
Feature Limitations: Users miss out on new features, improvements, and optimizations introduced in newer software versions, limiting their system's capabilities.
Software Incompatibility: As newer applications and hardware are released, older systems may struggle to run them, leading to compatibility issues and requiring eventual updates or upgrades.
23.
Which factor is critical when deciding to repair or replace components?
A) The alignment of the moon and stars
B) The cost analysis
C) The number of days in a week
D) The length of your lunch break
B) The cost analysis
24.
What should you do before cleaning components for repair?
A) Disassemble them further
B) Inspect for wear and damage
C) Skip cleaning altogether
D) Throw them away
B) Inspect for wear and damage
25.
Which tool is used for separating parts without damaging them?
A) Hammer
B) Pry bar
C) Wrench
D) Screwdriver
B) Pry bar
26.
What should you ensure before reassembling components?
A) They are cleaned with soap
B) They are coated with oil
C) They are in the same orientation
D) They are stored in a different room
C) They are in the same orientation
27.
How should you test an assembly after reassembly?
A) By ignoring it
B) By functional testing
C) By disassembling it again
D) By painting it red
B) By functional testing
28.
Which factor influences the decision to repair or replace components?
A) The alignment of the moon and stars
B) The cost analysis
C) The number of days in a week
D) The length of your lunch break
B) The cost analysis
29.
What should you use to avoid damaging components during disassembly?
A) A sledgehammer
B) A soft mallet or punch
C) A laser beam
D) A catapult
B) A soft mallet or punch
30.
Which protocol should be followed for handling hazardous materials during disassembly?
A) Ignore them
B) Store them in a cardboard box
C) Dispose of them properly
D) Bury them in the backyard
C) Dispose of them properly
31.
What is the purpose of functional testing before reassembly?
A) To increase complexity
B) To ensure proper operation
C) To confuse technicians
D) To take up more time
B) To ensure proper operation
32.
What should you update after making modifications during reassembly?
A) Your social media status
B) The weather forecast
C) The documentation
D) Your lunch order
C) The documentation
33.
What is the primary purpose of documentation during the disassembly process?
A) To increase the weight of the components
B) To assist in reassembly
C) To add complexity to the process
D) To reduce the visibility of the components
B) To assist in reassembly
34.
Which tool is best suited for removing hexagonal socket screws?
A) Pliers
B) Hammer
C) Allen key (hex key)
D) Adjustable wrench
C) Allen key (hex key)
35.
What should you wear to protect yourself during disassembly?
A) Sunglasses
B) Gloves and safety glasses
C) High heels
D) A hat
B) Gloves and safety glasses
36.
When should you test components during the disassembly process?
A) After reassembly
B) Before disassembly
C) During disassembly
D) Never
C) During disassembly
37.
How should you organize small parts during disassembly?
A) Throw them in a pile
B) Label and keep them in a magnetic tray
C) Use a single cup for all parts
D) Scatter them around the workspace
B) Label and keep them in a magnetic tray
38.
Which factor is critical when deciding to repair or replace components?
A) The alignment of the moon and stars
B) The cost analysis
C) The number of days in a week
D) The length of your lunch break
B) The cost analysis
39.
What should you do before cleaning components for repair?
A) Disassemble them further
B) Inspect for wear and damage
C) Skip cleaning altogether
D) Throw them away
B) Inspect for wear and damage
40.
Which tool is used for separating parts without damaging them?
A) Hammer
B) Pry bar
C) Wrench
D) Screwdriver
B) Pry bar
41.
What should you ensure before reassembling components?
A) They are cleaned with soap
B) They are coated with oil
C) They are in the same orientation
D) They are stored in a different room
C) They are in the same orientation
42.
How should you test an assembly after reassembly?
A) By ignoring it
B) By functional testing
C) By disassembling it again
D) By painting it red
B) By functional testing
43.
Which factor influences the decision to repair or replace components?
A) The alignment of the moon and stars
B) The cost analysis
C) The number of days in a week
D) The length of your lunch break
B) The cost analysis
44.
What should you use to avoid damaging components during disassembly?
A) A sledgehammer
B) A soft mallet or punch
C) A laser beam
D) A catapult
B) A soft mallet or punch
45.
Which protocol should be followed for handling hazardous materials during disassembly?
A) Ignore them
B) Store them in a cardboard box
C) Dispose of them properly
D) Bury them in the backyard
C) Dispose of them properly
46.
What is the purpose of functional testing before reassembly?
A) To increase complexity
B) To ensure proper operation
C) To confuse technicians
D) To take up more time
B) To ensure proper operation
47.
What should you update after making modifications during reassembly?
A) Your social media status
B) The weather forecast
C) The documentation
D) Your lunch order
C) The documentation
48.
What is the purpose of the exclusionary rule in probable cause?
A) To allow all evidence in court
B) To exclude irrelevant witnesses
C) To prevent illegally obtained evidence from being used in court
D) To speed up the trial process
C) To prevent illegally obtained evidence from being used in court
49.
What is the purpose of the exclusionary rule in probable cause?
A) To allow all evidence in court
B) To exclude irrelevant witnesses
C) To prevent illegally obtained evidence from being used in court
D) To speed up the trial process
C) To prevent illegally obtained evidence from being used in court
50.
What is the primary purpose of documentation during the disassembly process?
A) To increase the weight of the components
B) To assist in reassembly
C) To add complexity to the process
D) To reduce the visibility of the components
B) To assist in reassembly
51.
Which tool is best suited for removing hexagonal socket screws?
A) Pliers
B) Hammer
C) Allen key (hex key)
D) Adjustable wrench
C) Allen key (hex key)
52.
What should you wear to protect yourself during disassembly?
A) Sunglasses
B) Gloves and safety glasses
C) High heels
D) A hat
B) Gloves and safety glasses
53.
When should you test components during the disassembly process?
A) After reassembly
B) Before disassembly
C) During disassembly
D) Never
C) During disassembly
54.
How should you organize small parts during disassembly?
A) Throw them in a pile
B) Label and keep them in a magnetic tray
C) Use a single cup for all parts
D) Scatter them around the workspace
B) Label and keep them in a magnetic tray
55.
Describe the steps involved in disassembling a mechanical assembly using appropriate tools.
Preparation: Gather necessary tools and safety equipment.
Documentation: Take photos or notes before starting to aid reassembly.
Sequence: Start from outermost parts and work inward.
Fasteners: Use correct tools (screwdrivers, wrenches) to remove screws and bolts.