0% found this document useful (0 votes)
23 views13 pages

Is 2 Cocu 2

Uploaded by

puvaneswary1828
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views13 pages

Is 2 Cocu 2

Uploaded by

puvaneswary1828
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 13

KOLEJ CQ BREYER

NO. 1C JALAN SG 3/19


TAMAN SRI GOMBAK
68100 BATU CAVES,
SELANGOR DARUL EHSAN

KERTAS PENERANGAN
( INFORMATION SHEET )

KOD DAN NAMA


PROGRAM /
FB-081-4:2012
PROGRAM’S CODE &
NAME
TAHAP / LEVEL LEVEL 4

NO. DAN TAJUK UNIT


KOMPETENSI / C02-INFORMATION SYSTEM MAINTENANCE
COMPETENCY UNIT NO. COORDIDANITION
AND TITLE
1.identify information system maintenance requirement
2. prepare information system maintenance requirement
3. coordinate information system preventive
NO. DAN PENYATAAN
maintenance activities
AKTIVITI KERJA / WORK
4. Coordinate information system corrective
ACTIVITIES NO. AND
maintenance activities.
STATEMENT
5.Evaluate information system preventive maintenance
6. produce information system maintenance report

NO. KOD / CODE NUM. FB-081-4:2012/C02/P(1/2) Page : 1 Of : 13

TAJUK/TITLE: identify information system maintenance requirement and prepare


maintenance requirement
TUJUAN/PURPOSE:

This Information Sheet is intended to describe on all activities involved in maintenance to


enhance the user’s knowledge relevant to the maintenance requirement.

By understanding the material in this chapter, trainees will be able to:

1. Infected with virus


2. System not accessible
3. System not functioning
4. Troubleshooting
5. Repair
6. Replace
7. Report writing skill
Page 2 of 13
NO. KOD / CODE NUM. FB-024-2:2012/C01/P(1/2)
Infected with virus
A computer virus is a malware program that, when executed, replicates by inserting
copies of itself (possibly modified) into other computer programs, data files, or the
boot sector of the hard drive; when this replication succeeds, the affected areas are
then said to be "infected".

DISADVANTAGES
-Viruses can cause many problems on your computer. Usually, they display pop-up ads
on your desktop or steal your information. Some of the more nasty ones can even crash
your computer or delete your files.
-Your computer gets slowed down
-Some the applications won't start (ex: I hate mozilla virus won't let you start the
mozilla) You can not see some of the settings in your OS( ex one kind of virus disables
hide folder options and you will never be able to set it)-Many "hackers" get jobs with
software firms by finding and exploiting problems with software.

Troubleshooting
Troubleshooting is a form of problem solving, often applied to repair failed products or
processes. It is a logical, systematic search for the source of a problem so that it can be
solved, and so the product or process can be made operational again. Troubleshooting
is needed to develop and maintain complex systems where the symptoms of a problem
can have many possible causes. Troubleshooting is used in many fields such as
engineering, system administration, electronics, automotive repair, and diagnostic
medicine. Troubleshooting requires identification of the malfunction(s) or symptoms
within a system. Then, experience is commonly used to generate possible causes of
the symptoms. Determining the most likely cause is a process of elimination -
eliminating potential causes of a problem. Finally, troubleshooting requires confirmation
that the solution restores the product or process to its working state.
Page 3 of 13
NO. KOD / CODE NUM. FB-024-2:2012/C01/P(1/2)
1. Workgroup – Make sure that each computer that you want to access is in the same
workgroup. The name of the workgroup should be exactly the same on every computer.
Also, be sure to use the same case for the names (all upper or all lower).

2. File and Printer Sharing – Make sure that file and printer sharing is turned on for
the network adapter. You can enable this by going to Control Panel, Network
Connections, right-clicking on the network connection, choosing Properties and
making sure File and Printer Sharing for Microsoft Networks is checked.

3. Correct Subnet and IP addresses – You really shouldn’t have this problem if all
your computers are connected to the same router, but it’s still worth mentioning.
Page 4 of 13
NO. KOD / CODE NUM. FB-024-2:2012/C01/P(1/2)
Make sure that the Subnet Mask and Default Gateway are the same for all computers.
If these are not the same, then you will have issues connecting the computers over the
network.

You can view these details by going to Start, Run, typing CMD and then typing
IPCONFIG /ALL at the command prompt on each computer.

4. Check Firewalls – My suggestion here would be to first disable the Windows


Firewall on all computers and then try to access the shared folders. Also, be sure to
disable any third-party firewall programs like Norton or Comodo.

If you find that the sharing works with the firewall off, make sure to add File and Printer
Sharing to the exceptions list in your Windows Firewall and third-party firewall
programs.

5. Shared Permissions – If you are getting the “You might not have permission to use
this network resource…Access is Denied.”, your problem could also be that the
permissions for the shared directory are not properly set.
Page 5 of 13
NO. KOD / CODE NUM. FB-024-2:2012/C01/P(1/2)
Depending on whether you are running XP Home or XP Pro, you will have to configure
the sharing properly. For XP Home, you can only share files using Simple File Sharing.
It’s pretty easy because they have a wizard to walk you through the sharing process.

For XP Pro, you need to disable Simple File Sharing and set the NTFS permissions and
share permissions to allow everyone access. You can read my post here on how to
configure share and NTFS permissions in Windows.

6. Use TCP/IP Protocol – You probably don’t have to worry about this either, but just to
cover all bases, you need to make sure that the computers on the network are all using
the Internet TCP/IP protocol to communicate and not IPX/SPX or NetBEUI.

You can go to Start, Control Panel, Network Connections, right-click on the network
connection, choose Properties and see which protocol is listed in the list box.

7. Username and Passwords – If you’ve done everything above correctly and still
can’t connect, then you can also try making sure that the usernames and passwords on
all computers are exactly the same.

It’s best to have passwords on all accounts and to create a new account on each
computer with the same username and password. Sometimes it’s important to create a
new account instead of just changing the name or password on an existing account.
Make sure the accounts are Administrators.

8. Computer Names – Make sure that the NetBIOS names for all computers are
unique. NetBIOS names are only 8 characters, so if you named one computer
JohnnyBoy1 and JohnnyBoy2, they will have the same NetBIOS name.

Make sure that the first eight characters of a computer name are unique, otherwise you
will have problems.
Page 6 of 13
NO. KOD / CODE NUM. FB-024-2:2012/C01/P(1/2)
9. Local Security Policy – Another reason you may not be able to access another
computer across the network is because of a local security policy.

You can go to Control Panel, Administrative Tools, Local Security Policy, Local Policies,
Security Options. Now find the following policy:

Network access: Do not allow anonymous enumeration of SAM accounts and


shares

Make sure that the value is set to Disabled. Also, make sure to disable only the setting
that says “SAM accounts and shares” not the one that says “SAM accounts” only.

10. Uninstall anti-virus and Internet Security – Finally, make sure that all your anti-
virus programs are either turned off or uninstalled to test out the connection. If you have
any Internet Security program such as Norton Internet Security or Kaspersky Internet
Security, disable them!
Page 7 of 13
NO. KOD / CODE NUM. FB-024-2:2012/C01/P(1/2)
Repair
1.General: Restoration of a broken, damaged, or failed device, equipment, part, or
property to an acceptable operating or usable condition or state. See also beyond
economic repair, major repair, normal repair, and reparability.

2.Quality control: Action taken on a non-conforming product so that it fulfills its designed
(intended) function, whether or not conforming to the original specifications.

Maintenance evaluation
The Maintenance Evaluation is a mixture of interviews, observations, information
assessment and expert opinion. We build up a picture of your current maintenance
situation across ten different areas of Maintenance Best Practice in a limited time and
with minimal disruption to your day to day operations.

TYPES OF MAINTENANCE

Preventive – Planned maintenance


Responsive – Corrective maintenance

1) The care and servicing by personnel for purpose of maintaining equipment n


facility in satisfactory operating condition by providing for systematic; detection
and correction of incipient failures either before their a occur or before they
develop into major defects.

2) Responsive or corrective maintenance is an action carried out to restore a


defective item conditions. It can be categories into three classes.

 Routine repair – when the break is sent as an in convenience but otherwise


does not affect usual services.
 Urgent repairs – where vital services are disrupted because of failure of fabric
or services.
Page 8 of 13
NO. KOD / CODE NUM. FB-024-2:2012/C01/P(1/2)
 Emergency repairs – where failure of an item presents an immediate danger
to help and safety.

MAINTENANCE ACTIVITIES COULD INCLUDE

1) Site preparation
2) Equipment preparation
3) Product preparation
4) Component removal
5) Component repair
6) Component replacement

It can be :

i. Scheduled
ii. Unscheduled
iii. Preventive
iv. Corrective
v. Emergency
vi. Temporary
vii. Permanent
MAINTENANCE REQUIREMENT

Maintenance requirement could be incorporated in

i. Job specification
ii. Work order
iii. Purchase order
iv. Contracts
v. Memos
vi. SOP

MAINTENANCE SCHEDULE

Maintenance schedule will assist person in charge in ensuring that deteriorated


structured items in premises are attended.
Page 9 of 13
NO. KOD / CODE NUM. FB-024-2:2012/C01/P(1/2)

Inspection procedures

- The inspection team should review previews inspection reports to insure that
any outstanding action have been corrected.
- The inspection team should consider

1. Work place design


2. Systems of work
3. Environment
4. Behavior

WHO SHOULD DO THE INSPECTION

- The inspection team must be :


i. A staff member familiar with work area, usually the relevant supervisor
ii. A staff representative

- The head of department of area may wish to became directly involved or


provide a list of team inspection party.
- Departments may decide that workers shall conduct self-inspections of their
individual work areas on a regular basis.

WHEN TO INSPECT

 The frequency of inspection is dependent upon the nature of work place. Areas
that involve high risk areas such as offices only require a six monthly inspection.
Page 10 of 13
NO. KOD / CODE NUM. FB-024-2:2012/C01/P(1/2)
EQUIPMENT LIFESPAN

 Equipment life spend / assets useful life is the time period during which it is
expected to be used.
 The period is generally much shorter then a assets physical life.

a. Physical where an tear


b. Obsolescence
c. Inadequacy
RECORDING AND REPORTING

 The inspection team must record its observation during course of the
inspections. Summary work place inspection forms should be used to highlight
required actions.
 Where possible the inspection team should include actions to be taken and
recommend action according to agreed priorities.
ASSET DISPOSAL

 When asset is no longer useful, it is discarded, sold or trade in on a new asset

a) DISCARDED
- When an asset is no longer useful to the business and has no sales value it
will be discarded or scrapped.
- If the asset was fully depreciated there is no loss or disposal.

b) SALE OF ASSETS
- Another ways disposing assets are to sell it
- If selling price exceeds the book value then is loss on disposal.

c) TRADE IN
- Other means of disposing and asset it’s to trade in for another asset. The
exchanges occur frequently with machinery, automobiles, and equipment.
- The trade in allow for the own asset is deducted from the price of the new
asset and the balance is paid in according with the credit terms.
Page 11 of 13
NO. KOD / CODE NUM. FB-024-2:2012/C01/P(1/2)

MAINTENANCE ALLOW TO:

1) Identify improper conditions and review appropriate control measures.


2) Monitor affects need of a acceptance by personnel of safety practices.
3) Monitor and evaluate a in effectiveness of present and procedures
4) Improve practices and procedures
5) Major safety performance
6) Check near facilities, equipment and process.
7) Collect information that identify new initiatives
8) Maintain interest in develop comfortable work place through consultation
9) Display supervisory commitment for proper place.
Example of maintenance logbook
Page 12 of 13
NO. KOD / CODE NUM. FB-024-2:2012/C01/P(1/2)
Page 13 of 13
NO. KOD / CODE NUM. FB-024-2:2012/C01/P(1/2)

Question

1. What is troubleshooting?
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………

2. List advantage of maintenance schedule


…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………

Reference

- http://www.businessdictionary.com/definition/repair.html#ixzz3VY6fRGxa
- https://www.google.com.my/search?
q=maintenance+report+sample&biw=1024&bih=463&tbm
- https://www.google.com.my/search?
q=report+writing+skill+for+maintenance&biw=1024&bih=463&source=lnms&sa=X&ei=
ndcUVdPQL46duQS7jIHIDg&ved=0CAUQ_AUoAA&dpr=1#q=maintenance+report+sa
mple
- https://www.google.com.my/search?
q=report+writing+skill+for+maintenance&biw=1024&bih=463&source=lnms&sa=X&ei=
ndcUVdPQL46duQS7jIHIDg&ved=0CAUQ_AUoAA&dpr=1#q=report+writing+steps+fo
rmat&revid=216159543

You might also like