SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Module 4 / unit 1
Troubleshooting and Maintenance
         Fundamentals
       By kenneth Ayebazibwe
         kynaye@gmail.com
    256774185458 / 256702555890
You Will Learn…
• About your role as a PC technician in
  troubleshooting and maintenance, and tools
  available to help you in those roles
• How to approach a troubleshooting problem
• How to develop a preventive maintenance
  plan and what to include in it
Troubleshooting Perspectives
•   PC support technician
•   PC service technician
•   Bench technician
•   Help-desk technician
Essential Troubleshooting Tools
• Bootable rescue disk for any OS you might
  work on (may need several)
• Ground bracelet and/or ground mat
• Screwdrivers (flat-head, Phillips-head or cross-
  head, Torx set, particularly size T15)
• Tweezers, preferable insulated
• Chip extractor and a spring-loaded extractor
Useful Troubleshooting Tools
• Multimeter           • Pen and paper
• Needle-nose pliers   • Diagnostic cards and
• Flashlight             software
• AC outlet ground     • Utility software
  tester               • Virus detection
• Small cups or bags     software on disks
• Antistatic bags
Bootable Rescue Disk
• Can boot the PC even when the hard drive
  fails
• Ensures cleanest boot possible
Diagnostic Cards and Software
• POST diagnostic cards
• Diagnostic software
• General-purpose utility software
POST Diagnostic Cards
• Discover and report computer errors and conflicts at
  POST
• Examples:
   –   Amber Debug Card (Phoenix Technologies)
   –   PCI Error Testing/Debug Card (Trigen Industries)
   –   POSTcard V3 (Unicore Software, Inc.)
   –   Post Code Master (MSD, Inc.)
   –   POSTmortem Diagnostics Card (System Optimization, Inc.)
Diagnostic Software
• Identifies hardware problems
• Examples:
  – PC-Technician (Windsor Technologies, Inc.)
  – PC-Diagnosys (Windsor Technologies, Inc.)
General-Purpose Utility Software
• Diagnoses problems
• Repairs and maintains software on a PC
• Recovers corrupted or deleted data on hard
  drive or floppy disks
• Provides security
• Monitors system performance
• Downloads software updates from Internet
General-Purpose Utility Software
Fundamental Rules for
            Troubleshooting
• Make backups before making changes
• Approach the problem systematically
• Isolate the problem; eliminate unnecessary
  hardware and software
• Don’t overlook the obvious
• Check simple things first
• Make no assumptions
                                          continued…
Fundamental Rules for
              Troubleshooting
•   Become a researcher
•   Write things down
•   Reboot and start over
•   Establish priorities
•   Keep your cool and don’t rush
•   Don’t assume the worst
•   Know your starting point
Gathering Information
•   Interacting with the user
•   Investigating the problem on the computer
•   Isolating the problem
•   Intermittent problems
Interacting with the User
• Ask questions with diplomacy
• Find out exactly what happened when the
  computer stopped working
• Consider yourself a guest when working at the
  user’s desk
Guidelines for Working
                with a User
• Don’t take drastic action before asking the user
  about data that may not be backed up
• Provide alternatives before making decisions for the
  user
• Protect confidentiality of data on the PC
• Don’t disparage user’s choice of hardware or
  software
• If you make a mistake or must pass the problem on
  to someone with more expertise, be honest
Investigating the Problem
            on the Computer
• What OS is installed?
• What physical components are installed –
  processor, expansion cards, drives, peripheral
  devices? PC connected to network?
• What is the nature of the problem – occur
  before or after boot? Any error messages?
  Does the system hang?
• Can you duplicate the problem?
Isolating the Problem
•   Consider the possibilities
•   Eliminate simple things first
•   Eliminate the unnecessary
•   Trade good for suspected bad
•   Trade suspected bad for good
Intermittent Problems
• More challenging
• Look for patterns or clues
• Keep a log of when problems occur and
  exactly what error messages appear
Preventive Maintenance
• Goals
   – Reduce likelihood that events that cause PC failures will
     occur
   – Lessen the damage if they do occur
• Make and implement a preventive maintenance plan
  to help prevent failures and reduce repair costs and
  downtime
• Develop a disaster recovery plan to manage failures
  when they occur
When a PC Is Your Permanent
              Responsibility
•   Organize hard drive boot directory
•   Create rescue disks
•   Document all setup changes, problems, and solutions
•   Record setup data
•   Take practical precautions to protect software and
    data
    – Back up original software
    – Back up data on the hard drive
A Preventive Maintenance Plan




                                continued…
A Preventive Maintenance Plan
Moving Equipment
•   Back up hard drive
•   Remove removable disks, tape cartridges, or CDs from drives
•   Turn off power to PC and devices
•   Disconnect power cords and external devices
•   Label cable connections
•   Coil all cords and secure them
•   Pack in original shipping cartons
•   Purchase insurance
Disposing of Used Equipment
Disposing of Used Equipment
Fire Extinguishers
• Mount a fire extinguisher for Class C fires
  (ignited and heated by electricity) near your
  workbench, but not directly over it
• Know how to use the fire extinguisher
Chapter Summary
• Common-sense guidelines to solving
  computer problems
  – Avoid making situation worse by damaging
    equipment, software, or data, or by placing undue
    stress on users
  – Follow safety precautions

Weitere ähnliche Inhalte

Ă„hnlich wie Module 4 unit 1

Ch 2 maintenance and safety
Ch 2 maintenance and safetyCh 2 maintenance and safety
Ch 2 maintenance and safetymekashaw tizazu
 
6_Basic_Troubleshooting_for_Computers.ppt
6_Basic_Troubleshooting_for_Computers.ppt6_Basic_Troubleshooting_for_Computers.ppt
6_Basic_Troubleshooting_for_Computers.pptLeojOinam
 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its roleSudeshna Basak
 
Fixsmith pc repair fundamentals
Fixsmith pc repair fundamentalsFixsmith pc repair fundamentals
Fixsmith pc repair fundamentalsFixSmith
 
6.Preventive Maintenance and Troubleshooting.ppt
6.Preventive Maintenance and Troubleshooting.ppt6.Preventive Maintenance and Troubleshooting.ppt
6.Preventive Maintenance and Troubleshooting.pptkoodalcsc
 
MODULE 3.pptx
MODULE 3.pptxMODULE 3.pptx
MODULE 3.pptxkndnewguade
 
L05 slides
L05 slidesL05 slides
L05 slidesAnn Bentley
 
EQUIPMENT MAINTENANCE.pptx
EQUIPMENT MAINTENANCE.pptxEQUIPMENT MAINTENANCE.pptx
EQUIPMENT MAINTENANCE.pptxKenshinRouruni
 
CNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsCNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsSam Bowne
 
CISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsCISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsSam Bowne
 
The Basics of Network Troubleshooting
The Basics of Network TroubleshootingThe Basics of Network Troubleshooting
The Basics of Network Troubleshootingzaisahil
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidenceOnline
 
7. Security Operations
7. Security Operations7. Security Operations
7. Security OperationsSam Bowne
 
It 2
It 2It 2
It 2M Rao
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital ForensicsNicholas Davis
 
Digital forensics
Digital forensicsDigital forensics
Digital forensicsNicholas Davis
 

Ă„hnlich wie Module 4 unit 1 (20)

Ch 2 maintenance and safety
Ch 2 maintenance and safetyCh 2 maintenance and safety
Ch 2 maintenance and safety
 
Ch02
Ch02Ch02
Ch02
 
6_Basic_Troubleshooting_for_Computers.ppt
6_Basic_Troubleshooting_for_Computers.ppt6_Basic_Troubleshooting_for_Computers.ppt
6_Basic_Troubleshooting_for_Computers.ppt
 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its role
 
1 - Introduction.ppt
1 - Introduction.ppt1 - Introduction.ppt
1 - Introduction.ppt
 
Fixsmith pc repair fundamentals
Fixsmith pc repair fundamentalsFixsmith pc repair fundamentals
Fixsmith pc repair fundamentals
 
6.Preventive Maintenance and Troubleshooting.ppt
6.Preventive Maintenance and Troubleshooting.ppt6.Preventive Maintenance and Troubleshooting.ppt
6.Preventive Maintenance and Troubleshooting.ppt
 
Computer basic
Computer basicComputer basic
Computer basic
 
MODULE 3.pptx
MODULE 3.pptxMODULE 3.pptx
MODULE 3.pptx
 
L05 slides
L05 slidesL05 slides
L05 slides
 
EQUIPMENT MAINTENANCE.pptx
EQUIPMENT MAINTENANCE.pptxEQUIPMENT MAINTENANCE.pptx
EQUIPMENT MAINTENANCE.pptx
 
CNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsCNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security Operations
 
CISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsCISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security Operations
 
The Basics of Network Troubleshooting
The Basics of Network TroubleshootingThe Basics of Network Troubleshooting
The Basics of Network Troubleshooting
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidence
 
7. Security Operations
7. Security Operations7. Security Operations
7. Security Operations
 
It 2
It 2It 2
It 2
 
Encryption
EncryptionEncryption
Encryption
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 

Mehr von Ayebazibwe Kenneth

National guidelines and manual for innovation fund for green jobs creation
National guidelines and manual for innovation fund for green jobs creation National guidelines and manual for innovation fund for green jobs creation
National guidelines and manual for innovation fund for green jobs creation Ayebazibwe Kenneth
 
INNOVATION FUND FOR GREEN JOB CREATION: BUSINESS PLAN TEMPLATE
INNOVATION FUND FOR GREEN JOB CREATION: BUSINESS PLAN TEMPLATE INNOVATION FUND FOR GREEN JOB CREATION: BUSINESS PLAN TEMPLATE
INNOVATION FUND FOR GREEN JOB CREATION: BUSINESS PLAN TEMPLATE Ayebazibwe Kenneth
 
INNOVATION FUND PROJECTS APPLICATION FORM
INNOVATION FUND PROJECTS APPLICATION FORM INNOVATION FUND PROJECTS APPLICATION FORM
INNOVATION FUND PROJECTS APPLICATION FORM Ayebazibwe Kenneth
 
ADVERTISEMENT: MINISTRY OF GENDER, LABOUR AND SOCIAL DEVELOPMENT
ADVERTISEMENT:  MINISTRY OF GENDER, LABOUR AND SOCIAL DEVELOPMENT ADVERTISEMENT:  MINISTRY OF GENDER, LABOUR AND SOCIAL DEVELOPMENT
ADVERTISEMENT: MINISTRY OF GENDER, LABOUR AND SOCIAL DEVELOPMENT Ayebazibwe Kenneth
 
Uganda Woman Magazine IJssue 5
Uganda Woman Magazine IJssue 5 Uganda Woman Magazine IJssue 5
Uganda Woman Magazine IJssue 5 Ayebazibwe Kenneth
 
Uganda woman issue 4 march 2014 web
Uganda woman issue 4 march 2014 webUganda woman issue 4 march 2014 web
Uganda woman issue 4 march 2014 webAyebazibwe Kenneth
 
International women's day synopsis policy guidelines
International women's day synopsis   policy guidelinesInternational women's day synopsis   policy guidelines
International women's day synopsis policy guidelinesAyebazibwe Kenneth
 
Uganda Woman Magazine October 2013
Uganda Woman Magazine October 2013Uganda Woman Magazine October 2013
Uganda Woman Magazine October 2013Ayebazibwe Kenneth
 
Press release for the celebration of the international day against child labour
Press release for the celebration of the international day against child labourPress release for the celebration of the international day against child labour
Press release for the celebration of the international day against child labourAyebazibwe Kenneth
 
Connecting Grassroots Women to Development
Connecting Grassroots Women to DevelopmentConnecting Grassroots Women to Development
Connecting Grassroots Women to DevelopmentAyebazibwe Kenneth
 
Commemoration of the international day of families 15th may 2013
Commemoration of the international day of families 15th may 2013Commemoration of the international day of families 15th may 2013
Commemoration of the international day of families 15th may 2013Ayebazibwe Kenneth
 
International women’s day (iwd) 2013 synopsis
International women’s day (iwd) 2013 synopsisInternational women’s day (iwd) 2013 synopsis
International women’s day (iwd) 2013 synopsisAyebazibwe Kenneth
 
Statement by hon. rukia nakadama isanga the minister of state for gender and ...
Statement by hon. rukia nakadama isanga the minister of state for gender and ...Statement by hon. rukia nakadama isanga the minister of state for gender and ...
Statement by hon. rukia nakadama isanga the minister of state for gender and ...Ayebazibwe Kenneth
 
Introduction to computer security syllabus
Introduction to computer security syllabusIntroduction to computer security syllabus
Introduction to computer security syllabusAyebazibwe Kenneth
 
Iatj call for applications
Iatj call for applicationsIatj call for applications
Iatj call for applicationsAyebazibwe Kenneth
 

Mehr von Ayebazibwe Kenneth (20)

National guidelines and manual for innovation fund for green jobs creation
National guidelines and manual for innovation fund for green jobs creation National guidelines and manual for innovation fund for green jobs creation
National guidelines and manual for innovation fund for green jobs creation
 
INNOVATION FUND FOR GREEN JOB CREATION: BUSINESS PLAN TEMPLATE
INNOVATION FUND FOR GREEN JOB CREATION: BUSINESS PLAN TEMPLATE INNOVATION FUND FOR GREEN JOB CREATION: BUSINESS PLAN TEMPLATE
INNOVATION FUND FOR GREEN JOB CREATION: BUSINESS PLAN TEMPLATE
 
INNOVATION FUND PROJECTS APPLICATION FORM
INNOVATION FUND PROJECTS APPLICATION FORM INNOVATION FUND PROJECTS APPLICATION FORM
INNOVATION FUND PROJECTS APPLICATION FORM
 
ADVERTISEMENT: MINISTRY OF GENDER, LABOUR AND SOCIAL DEVELOPMENT
ADVERTISEMENT:  MINISTRY OF GENDER, LABOUR AND SOCIAL DEVELOPMENT ADVERTISEMENT:  MINISTRY OF GENDER, LABOUR AND SOCIAL DEVELOPMENT
ADVERTISEMENT: MINISTRY OF GENDER, LABOUR AND SOCIAL DEVELOPMENT
 
Uganda Woman Magazine IJssue 5
Uganda Woman Magazine IJssue 5 Uganda Woman Magazine IJssue 5
Uganda Woman Magazine IJssue 5
 
Uganda woman issue 4 march 2014 web
Uganda woman issue 4 march 2014 webUganda woman issue 4 march 2014 web
Uganda woman issue 4 march 2014 web
 
International women's day synopsis policy guidelines
International women's day synopsis   policy guidelinesInternational women's day synopsis   policy guidelines
International women's day synopsis policy guidelines
 
Uganda Woman Magazine October 2013
Uganda Woman Magazine October 2013Uganda Woman Magazine October 2013
Uganda Woman Magazine October 2013
 
Press release for the celebration of the international day against child labour
Press release for the celebration of the international day against child labourPress release for the celebration of the international day against child labour
Press release for the celebration of the international day against child labour
 
Connecting Grassroots Women to Development
Connecting Grassroots Women to DevelopmentConnecting Grassroots Women to Development
Connecting Grassroots Women to Development
 
Commemoration of the international day of families 15th may 2013
Commemoration of the international day of families 15th may 2013Commemoration of the international day of families 15th may 2013
Commemoration of the international day of families 15th may 2013
 
International women’s day (iwd) 2013 synopsis
International women’s day (iwd) 2013 synopsisInternational women’s day (iwd) 2013 synopsis
International women’s day (iwd) 2013 synopsis
 
Statement by hon. rukia nakadama isanga the minister of state for gender and ...
Statement by hon. rukia nakadama isanga the minister of state for gender and ...Statement by hon. rukia nakadama isanga the minister of state for gender and ...
Statement by hon. rukia nakadama isanga the minister of state for gender and ...
 
Lecture one
Lecture oneLecture one
Lecture one
 
Introduction to computer security syllabus
Introduction to computer security syllabusIntroduction to computer security syllabus
Introduction to computer security syllabus
 
Lecture two
Lecture twoLecture two
Lecture two
 
Iatj call for applications
Iatj call for applicationsIatj call for applications
Iatj call for applications
 
Internet 2
Internet 2Internet 2
Internet 2
 
Module 3 unit 1
Module 3  unit 1Module 3  unit 1
Module 3 unit 1
 
Internet
InternetInternet
Internet
 

KĂĽrzlich hochgeladen

DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 

KĂĽrzlich hochgeladen (20)

DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Module 4 unit 1

  • 1. Module 4 / unit 1 Troubleshooting and Maintenance Fundamentals By kenneth Ayebazibwe kynaye@gmail.com 256774185458 / 256702555890
  • 2. You Will Learn… • About your role as a PC technician in troubleshooting and maintenance, and tools available to help you in those roles • How to approach a troubleshooting problem • How to develop a preventive maintenance plan and what to include in it
  • 3. Troubleshooting Perspectives • PC support technician • PC service technician • Bench technician • Help-desk technician
  • 4. Essential Troubleshooting Tools • Bootable rescue disk for any OS you might work on (may need several) • Ground bracelet and/or ground mat • Screwdrivers (flat-head, Phillips-head or cross- head, Torx set, particularly size T15) • Tweezers, preferable insulated • Chip extractor and a spring-loaded extractor
  • 5. Useful Troubleshooting Tools • Multimeter • Pen and paper • Needle-nose pliers • Diagnostic cards and • Flashlight software • AC outlet ground • Utility software tester • Virus detection • Small cups or bags software on disks • Antistatic bags
  • 6. Bootable Rescue Disk • Can boot the PC even when the hard drive fails • Ensures cleanest boot possible
  • 7. Diagnostic Cards and Software • POST diagnostic cards • Diagnostic software • General-purpose utility software
  • 8. POST Diagnostic Cards • Discover and report computer errors and conflicts at POST • Examples: – Amber Debug Card (Phoenix Technologies) – PCI Error Testing/Debug Card (Trigen Industries) – POSTcard V3 (Unicore Software, Inc.) – Post Code Master (MSD, Inc.) – POSTmortem Diagnostics Card (System Optimization, Inc.)
  • 9. Diagnostic Software • Identifies hardware problems • Examples: – PC-Technician (Windsor Technologies, Inc.) – PC-Diagnosys (Windsor Technologies, Inc.)
  • 10. General-Purpose Utility Software • Diagnoses problems • Repairs and maintains software on a PC • Recovers corrupted or deleted data on hard drive or floppy disks • Provides security • Monitors system performance • Downloads software updates from Internet
  • 12. Fundamental Rules for Troubleshooting • Make backups before making changes • Approach the problem systematically • Isolate the problem; eliminate unnecessary hardware and software • Don’t overlook the obvious • Check simple things first • Make no assumptions continued…
  • 13. Fundamental Rules for Troubleshooting • Become a researcher • Write things down • Reboot and start over • Establish priorities • Keep your cool and don’t rush • Don’t assume the worst • Know your starting point
  • 14. Gathering Information • Interacting with the user • Investigating the problem on the computer • Isolating the problem • Intermittent problems
  • 15. Interacting with the User • Ask questions with diplomacy • Find out exactly what happened when the computer stopped working • Consider yourself a guest when working at the user’s desk
  • 16. Guidelines for Working with a User • Don’t take drastic action before asking the user about data that may not be backed up • Provide alternatives before making decisions for the user • Protect confidentiality of data on the PC • Don’t disparage user’s choice of hardware or software • If you make a mistake or must pass the problem on to someone with more expertise, be honest
  • 17. Investigating the Problem on the Computer • What OS is installed? • What physical components are installed – processor, expansion cards, drives, peripheral devices? PC connected to network? • What is the nature of the problem – occur before or after boot? Any error messages? Does the system hang? • Can you duplicate the problem?
  • 18. Isolating the Problem • Consider the possibilities • Eliminate simple things first • Eliminate the unnecessary • Trade good for suspected bad • Trade suspected bad for good
  • 19. Intermittent Problems • More challenging • Look for patterns or clues • Keep a log of when problems occur and exactly what error messages appear
  • 20. Preventive Maintenance • Goals – Reduce likelihood that events that cause PC failures will occur – Lessen the damage if they do occur • Make and implement a preventive maintenance plan to help prevent failures and reduce repair costs and downtime • Develop a disaster recovery plan to manage failures when they occur
  • 21. When a PC Is Your Permanent Responsibility • Organize hard drive boot directory • Create rescue disks • Document all setup changes, problems, and solutions • Record setup data • Take practical precautions to protect software and data – Back up original software – Back up data on the hard drive
  • 22. A Preventive Maintenance Plan continued…
  • 24. Moving Equipment • Back up hard drive • Remove removable disks, tape cartridges, or CDs from drives • Turn off power to PC and devices • Disconnect power cords and external devices • Label cable connections • Coil all cords and secure them • Pack in original shipping cartons • Purchase insurance
  • 25. Disposing of Used Equipment
  • 26. Disposing of Used Equipment
  • 27. Fire Extinguishers • Mount a fire extinguisher for Class C fires (ignited and heated by electricity) near your workbench, but not directly over it • Know how to use the fire extinguisher
  • 28. Chapter Summary • Common-sense guidelines to solving computer problems – Avoid making situation worse by damaging equipment, software, or data, or by placing undue stress on users – Follow safety precautions