Computer assembly and maintenance training is the first module to complete this training, and it is also an important link to st
Computer assembly and maintenance training is the first module to complete this training, and it is also an important link to strengthen classroom knowledge and practical operation in the future teaching plan. The following is the experience of computer assembly and maintenance training, hoping to help everyone.
Part I: Computer Assembly and Maintenance Training Experience The one-week computer assembly and maintenance training ended unconsciously. Through this training, I learned a lot: I have a general understanding of computer software and hardware; Learned the ability and experience to deal with simple computer problems. My practical ability has been improved, and at the same time, I have established the consciousness of thinking and solving problems independently. The training provided by the school gives us the opportunity to apply book knowledge to practice, which benefits us a lot.
On the first day of training, we were so curious about computers, although we could see them almost every day. We all looked at all kinds of hardware in the mainframe curiously. Some students can't help itching. The teacher said to us, "Ignorance and fearlessness, one step at a time." We are considerate. Then the teacher began to tell us about the working environment requirements of computers. It turns out that we usually have many small details that have damaged the computer. For example, we can't put objects with strong magnetic fields next to the computer, but we often put our mobile phones next to the computer to charge them. We can't eat snacks and drink in front of the computer, but we often do these things. Next, the teacher divided us into groups and assigned tasks to each group. So, we began to inquire about information and learn around the task. During this period, the teacher explained the BIOS settings and hardware knowledge to us. Let us get to know computers again.
We learned a lot in the process of consulting materials. The information in the library is very rich, and it is really an ocean of knowledge. Our group chooses suitable materials and studies them together. When in doubt, we will discuss with each other or consult our teachers. So our group from the initial ignorance of the task to the later mastery of the task. This is also related to everyone's very high enthusiasm for learning.
On Wednesday, the teacher began to test the tasks assigned to us. Because I am not familiar with the knowledge points, I can't describe the teacher's questions accurately and clearly. The teacher gave me some guidance, which made me realize my own shortcomings and let me know how to check and fill the gaps next.
We started our final defense on Friday. I basically completed the task assigned by the teacher.
However, there are still some problems in this training. For example, because each group has assigned tasks, everyone is busy with their own tasks, ignoring the overall grasp of computer assembly and maintenance knowledge. I chose computer system installation, so I only pay attention to the system and know little about computer hardware.
In a word, I have gained a lot from this training:
1, this training has improved my learning enthusiasm. This time, the students began to communicate with each other, which is an unprecedented learning atmosphere;
2. Hands-on ability has been enhanced. Through this training, I got more hands-on opportunities and improved my hands-on ability.
3, learned to install the operating system;
Let me realize what our major needs to survive in the industry at present.
Through practical training, I have mastered and understood the basic composition of the computer and the structure and function of each component. And I will assemble the computer and understand the matters needing attention in the installation process. For some simple computer failures, I can also eliminate them myself. I learned a lot from this training and benefited a lot. Now, we should seize the time, enrich and improve ourselves, and be a capable and worthy of the name college student!
Part II: Computer assembly and maintenance training experience 1. The basic idea of system security setting.
Generally speaking, the operation of public microcomputers can be divided into three categories: the first category is the system administrator, who has absolute control over the system and generally does not need to limit the authority of the system administrator; The second type is ordinary users, who use computers to complete all kinds of work, so they must obtain certain permissions, but they should also prevent exceeding their permissions or destroying the system; The third category is illegal intruders, who have no right to use computers at all. All functions of the system must be protected against intruders.
According to this idea, we must first set the normal operators of Windows 98, including super users, and enter the list of operators into the system, and then set their permissions appropriately to ensure their safety and prohibit them from operating beyond their authority. Finally, measures should be taken to prevent illegal users from "invading" and ensure the security of the system.
2. Setup of Microcomputer Operator
Windows 95 is a multi-user operating system, but its user management is very confusing. Illegal intruders can even add new users directly through the password confirmation box at startup, which brings great inconvenience to the control system. However, Windows 98 has improved this. It provides the selective login function of user names, so you can add all users to the system in advance, and then display these user lists when the system starts. Different users can start the system in their own names after selecting their own user names and entering the corresponding passwords, while illegal users cannot directly create new users through the password confirmation box. They can only enter the system by pressing the Cancel button or the Esc key. In this way, the machine can clearly distinguish normal users, including super users and ordinary users, as well as illegal intruders. Normal users choose the user name and enter the password through the login box, and illegal intruders use the "Cancel" button, so their rights can be restricted respectively.
It should be noted that Windows 98 still uses the same "old-fashioned" user name login method as Windows 95 by default. If we want to use the user name selective login method, we should perform the following steps:
The following steps 1 ~ 4 are mainly used to set the user name and password in Windows 98. If the user has already set them, you can skip these steps and start directly from step 5.
1. Double-click the password icon in the Windows 98 control panel to open the password property setting box.
2. Select the option "Users can customize preferences and desktop settings, and Windows will automatically enable personal settings when logging in".
3. Decide whether to add the start menu to the user's custom settings as needed. Generally, you should choose Yes, then click OK, and then set the appropriate user password according to the screen prompts.
4. Click "OK" button to exit the setting box.
Restarting the computer will pop up a regular password setting window. You can enter the newly set user name and password to start Windows 98 in a normal way.
5. Start the control panel and double-click the "Network" icon to open the "Network" setting box.
Chapter 3: Computer assembly and maintenance training experience Computer assembly and maintenance training is the first module to complete this training, and it is also an important link to strengthen classroom knowledge and practical operation in the future teaching plan. Through the study and practice of several sub-modules of computer assembly and maintenance these days, I not only mastered the installation sequence and method, but also successfully assembled a newly configured desktop computer and system, and installed and maintained all the software by using the knowledge I learned comprehensively. Summarized as follows:
The first is the theory, which mainly focuses on the appearance, gender indicators and internal structure of hardware equipment.
Structure, functions of various components, etc. The detailed explanation is as follows:
1. Hardware:
① Motherboard: Motherboard is the basic unit for installation.
Function: The motherboard is generally a rectangular circuit board, on which the main circuit systems that make up the computer are installed. Generally, there are bios chip, i/o control chip, keyboard and panel control switch interface, indicator light connector, expansion slot, motherboard and plug-in DC power card and other components. Such as: ASUS, Gigabyte, etc.
② cpu: At present, the cpu on pc is mainly intel and amd.
Function: Central processing unit (cpu) refers to a large-scale integrated circuit with the functions of arithmetic unit and controller, referred to as CPU or microprocessor. It is the heart of the microcomputer and constitutes the control center of the system, coordinating and controlling all components in a unified way.
Argument: Three key indicators: main frequency, external frequency and cache. The main frequency is the execution speed of cpu.
③ Hard disk: Function: Hard disk is one of the most important external storage of computer.
Parameters: a capacity volume b speed rotating speed cache
④ Memory: Function: semiconductor chip memory, which is used to store information to be processed and common information.
Include ram random access memory, rom read-only memory and cache memory.
⑤ The function of the graphics card is to convert the output information of the host computer into text, graphics, colors and other information, and send it to the display for display.
Parameters: video memory and bit width
⑥ Monitor: Function: The monitor is the main output device of the computer. Arguments: point distance, resolution, scanning frequency, rearrangement speed, power consumption, electromagnetic radiation, etc.
⑦ Chassis: It is used to centralize and fix all computer accessories together, and has the functions of protecting accessories and shielding the host system.
Pet-name ruby sound card: function: interface card parameters for processing multimedia computer sound: sound track
Pet-name ruby optical drive: function: device parameters for reading optical disc information: DVD DL RW+-R.
Attending the function of the network card: it is used to realize the physical connection between the networked computer and the network cable.
12 the most basic input device in keyboard computer system
13 mouse input device for determining the position of the cursor on the screen.
14 power supply: the power supply is the main accessory for supplying power to the computer and the device for converting alternating current into DC voltage. The power supply is related to the stable execution of the whole machine, and its output power cannot be lower than 250w W W.
Second, software maintenance, testing and performance optimization: everything a computer does depends on the execution of software, so software installation, maintenance and performance optimization are extremely important.
Software:
① System software
System software is a large-scale software that comprehensively manages computer software and hardware resources and provides users with working environment and development tools. System software mainly includes operating system and programming language. The operating system is the housekeeper of the computer. It is responsible for managing and controlling the coordination of various parts of the computer. It is the most basic and important system software. The computer must have an operating system installed to work properly. Dos, windows, unix and linux are all operating system software used on computers.
Programming language is a special language used to write software. All kinds of software we use are written in programming languages. There are many programming languages, such as basic, pascal, C, foxbase, visual basic and so on.
② Application software
Application software is software compiled by computer users to solve some specific problems. Such as ofifice, wps office, financial software, qq chat software, optimization master, 360 security guards and so on.
Second, practice
1, check attachment 2 and prepare for installation.
3. Install three computers.
4. Install the motherboard 6. Install the hard disk and other accessories of optical disk drive 7. Connect all related devices 8. Debug and install system 9. Install and debug xp system and application software.
10, learned the application of ghost software.
Third, summary.
2 1 century is the information age, and information and computers are inevitably related, but people pay more attention to computer software and network technology, which are considered as the main ones. Technically, they are better than hardware such as computer assembly. But I think it is very important to assemble and maintain this course, because it is the foundation of the whole computer and a part of the whole system. Without a foundation, nothing else can be discussed.
Through this study, I have mastered and understood the basic composition of the computer and the structure and function of each component. Moreover, I can assemble the computer myself, and I also know the precautions in the installation process. For some simple faults, you can do it yourself, especially when Mr. Luo takes examples as the leading factor and explains them in great detail, telling us the operation skills, what problems are easy to occur and the solutions. These are very practical experiences.
After learning this course, although I can't completely solve the computer problem, at least I have a further understanding of the computer structure and improved my practical ability to use computers. It will play a great role in the future practical application. ?