Elements and Performance Criteria
- Prepare to upgrade and maintain computer hardware and software.
- OHS procedures for a given work area are identified, obtained and understood.
- Established OHS risk control measures and procedures are followed in preparation for the work.
- Appropriate person(s) are consulted to determine the nature of computer or peripheral hardware/software upgrading or maintenance.
- Appropriate personnel are consulted to ensure the work is co-ordinated effectively with others affected by the work.
- Hardware subsystems needed to upgrade or maintain computers and peripherals are obtained in accordance with established procedures and checked against job requirements. (See Note 1)
- Software versions are deployed in accordance with established procedures and checked against job requirements. (See Note 2)
- Upgrade computer hardware and software.
- OHS risk control measures and procedures for carrying out the work are followed.
- Computers are checked as being isolated where necessary in strict accordance OHS requirements and procedures.
- Computers and peripherals are dismantled as needed for upgrading in accordance with service manual instructions or industry practices, and parts stored to prevent loss or damage.
- Upgrading components are fitted and computer/peripheral apparatus is reassembled in accordance with service manual instructions or industry practices.
- Upgrading software components are installed and accordance with service manual instructions or industry practices.
- Operating system, including device drivers and application software are tested in preparation for return to service/customer. (See Note 3)
- Computer/peripheral apparatus is tested and prepared for return to customer.
- Maintain operation of computer hardware and software.
- OHS risk control measures and procedures for carrying out the work are followed.
- The need to test or measure live is determined in strict accordance with OHS requirements and when necessary conducted within established safety procedures.
- Computers are checked as being isolated where necessary in strict accordance OHS requirements and procedures.
- Computers and peripherals are dismantled as needed to find and rectify faults in accordance with service manual instructions and industry practices, and parts stored to prevent loss or damage.
- Faults are identified using logical techniques drawing on knowledge of computer/peripheral hardware components and measured values of operating parameters.
- Faulty components are rechecked and their fault status confirmed.
- Operating system malfunctions are identified using logical techniques drawing on knowledge of operating system configuration requirements.
- Device driver malfunctions are identified using logical techniques drawing on knowledge of device driver software configuration requirements.
- Application software malfunctions are identified using logical techniques drawing on knowledge of software configuration requirements.
- Malfunctions are rectified using latest software versions, incremental updates and bug and security patches.
- Computer hardware/peripheral device, operating system, including device drivers, and application software are tested in preparation for return to service/customer.
- Redundant files are removed and disposed of or archived in accordance with established procedures.
- Methods for dealing with unexpected situations are selected on the basis of safety and specified work outcomes.
- Maintenance is carried out efficiently without waste of materials and energy or damage to apparatus, the surrounding environment or other services.
- Complete and report upgrading and maintenance activities.
- OHS work completion risk control measures and procedures are followed.
- Work area is cleaned and made safe in accordance with established procedures.
- Written justification is produced for hardware software upgrading and maintenance.
- Upgrading and maintenance is documented and appropriate person(s) notified in accordance with established procedures.
- Note:
- Example of materials are motherboards, processors and memory modules.
- Example include complete version update, incremental (download) updates and security and bug patches.
- Examples include Internet access, word processing, spreadsheet, graphics, publishing and industrial applications.