SlideShare a Scribd company logo
1 of 14
Troubleshooting
laptops.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
PACE-IT.
– Common symptoms.
– Proper disassembly technique.
Page 4
Troubleshooting laptops.
Page 5
Troubleshooting laptops.
No display.
The most likely cause is
display failure.
Causes could also include the laptop
not being turned on or a failed video
card. Use an external monitor to
check if it is the video card.
Dim display.
The most likely cause is
backlight failure.
Replace the backlight and/or inverter
if it is a LCD display. LED displays
don’t use an inverter. An easy test is
with a flashlight.
Flickering display.
The most likely cause is
a loose connection.
Causes could also include the
backlight and/or the inverter, or it
could also be the display itself.
Page 6
Troubleshooting laptops.
Sticking keys.
The most likely cause is
spilled food.
In some cases, the problem may be
fixed with compressed air; if not,
disassembly may be required to
properly clean the keyboard.
Intermittent wireless.
The most likely cause is
interference.
It could also be too far from the
WAP. In some cases, it may have to
do with the wireless card or antenna,
especially if the laptop has been
worked on recently.
Battery not charging.
The most likely cause is
battery failure.
It is also wise to check the power
from the wall outlet as well as the
power cord.
Page 7
Troubleshooting laptops.
Ghost cursor.
The most likely cause is
a sensitivity setting.
Most touchpads and trackpads can
be adjusted for sensitivity. When the
sensitivity is set too high, it may
register unintended touches that
cause the cursor to move.
No power.
The most likely cause is
that it isn’t plugged in.
It could also be a bad wall outlet,
power cord, or even the DC jack on
the laptop.
Num lock indicator lights.
The most likely cause is
an inexperienced user.
Some users may need education to
understand how to operate their
keyboard functions.
Page 8
Troubleshooting laptops.
No wireless connectivity.
The most likely cause is
the wireless is turned off.
This is especially true if the laptop
had wireless before. It may also be
caused by a misconfiguration, which
is more likely with a new laptop on
the network.
No Bluetooth connectivity.
The most likely cause is
that it is turned off.
This may also be caused by a
pairing issue if it is with a new
Bluetooth device.
No external display capability.
The most likely cause
the wrong setting.
Toggle the function key used to send
the video signal to the external
connection.
Page 9
Troubleshooting laptops.
Page 10
Research and reading will
be a key component of
properly disassembling any
laptop.
Each original equipment manufacturer (OEM) has
its own process for assembling the laptop and the
reverse is true as well.
Research the recommended steps to learn the
proper way to disassemble and reassemble any
given laptop.
Troubleshooting laptops.
Page 11
Troubleshooting laptops.
– Research the recommendations of the OEM.
» You may also be able to find video tutorials online.
– Create a plan.
» Actually write out the steps; this makes it easier to keep track of
progress.
– Document and label cable and screw
locations.
» Make a map; use coded containers for screws.
• Taking photos may help in the reassembly process.
– Keep organized.
» It is easier to keep track of the pieces if you remain organized.
– Use the appropriate tools for the job.
» Saves on having to buy new screws or cables that have been
damaged by the use of incorrect tools. Remember to wear your
ESD strap!
Page 12
Troubleshooting laptops.
Symptoms tend to revolve around the display, power, or issues with
settings. Sometimes the symptoms will point to a need to educate and train
the user.
Topic
Common symptoms.
Summary
Follow the OEM’s process for disassembly and reassembly. Document and
label everything. Keep organized and don’t mix up fasteners. Always use
the appropriate tools.
Proper disassembly
techniques.
Page 13
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

Viewers also liked

Printer & scanner by sanyam s.saini (me regular)
Printer & scanner by sanyam s.saini (me regular)Printer & scanner by sanyam s.saini (me regular)
Printer & scanner by sanyam s.saini (me regular)Sanyam Singh
 
Blue paper Social Lab: Les nouvelles solutions publicitaires de Facebook
Blue paper Social Lab: Les nouvelles solutions publicitaires de FacebookBlue paper Social Lab: Les nouvelles solutions publicitaires de Facebook
Blue paper Social Lab: Les nouvelles solutions publicitaires de FacebookSocial Lab
 
Выступление на Etarget (Кадывкин Кирилл)
Выступление на Etarget (Кадывкин Кирилл)Выступление на Etarget (Кадывкин Кирилл)
Выступление на Etarget (Кадывкин Кирилл)Kirill Mann
 

Viewers also liked (12)

printer
printerprinter
printer
 
7 laptop repair
7 laptop repair7 laptop repair
7 laptop repair
 
Printers
PrintersPrinters
Printers
 
Printer & scanner by sanyam s.saini (me regular)
Printer & scanner by sanyam s.saini (me regular)Printer & scanner by sanyam s.saini (me regular)
Printer & scanner by sanyam s.saini (me regular)
 
Book Getting Started Src
Book Getting Started SrcBook Getting Started Src
Book Getting Started Src
 
Alejandra
AlejandraAlejandra
Alejandra
 
Listening skills2
Listening skills2Listening skills2
Listening skills2
 
Proposal
ProposalProposal
Proposal
 
Evaluación de ambiente
Evaluación de ambienteEvaluación de ambiente
Evaluación de ambiente
 
Blue paper Social Lab: Les nouvelles solutions publicitaires de Facebook
Blue paper Social Lab: Les nouvelles solutions publicitaires de FacebookBlue paper Social Lab: Les nouvelles solutions publicitaires de Facebook
Blue paper Social Lab: Les nouvelles solutions publicitaires de Facebook
 
Kalvosarja, osa2
Kalvosarja, osa2Kalvosarja, osa2
Kalvosarja, osa2
 
Выступление на Etarget (Кадывкин Кирилл)
Выступление на Etarget (Кадывкин Кирилл)Выступление на Etarget (Кадывкин Кирилл)
Выступление на Etarget (Кадывкин Кирилл)
 

Similar to Pace IT - Troubleshooting Laptops

Wifi Training
Wifi TrainingWifi Training
Wifi Trainingrosedale
 
Pace it data-disposal_and_destruction_methods_bf_sw
Pace it data-disposal_and_destruction_methods_bf_swPace it data-disposal_and_destruction_methods_bf_sw
Pace it data-disposal_and_destruction_methods_bf_swEdward Sargent
 

Similar to Pace IT - Troubleshooting Laptops (20)

Pace IT - Troubleshooting Video and Displays
Pace IT - Troubleshooting Video and DisplaysPace IT - Troubleshooting Video and Displays
Pace IT - Troubleshooting Video and Displays
 
PACE-IT: Troubleshooting MOBO, RAM & CPUs
PACE-IT: Troubleshooting MOBO, RAM & CPUsPACE-IT: Troubleshooting MOBO, RAM & CPUs
PACE-IT: Troubleshooting MOBO, RAM & CPUs
 
PACE-IT: Troubleshooting Hard Drives and Raid
PACE-IT: Troubleshooting Hard Drives and RaidPACE-IT: Troubleshooting Hard Drives and Raid
PACE-IT: Troubleshooting Hard Drives and Raid
 
Pace IT - Laptop Features
Pace IT - Laptop FeaturesPace IT - Laptop Features
Pace IT - Laptop Features
 
Pace IT - Expansion Cards
Pace IT - Expansion CardsPace IT - Expansion Cards
Pace IT - Expansion Cards
 
Pace IT - Laptop Construction and Deconstruction
Pace IT - Laptop Construction and DeconstructionPace IT - Laptop Construction and Deconstruction
Pace IT - Laptop Construction and Deconstruction
 
Pace IT - The Laptop Display
Pace IT - The Laptop DisplayPace IT - The Laptop Display
Pace IT - The Laptop Display
 
Pace IT - Troubleshooting Printers
Pace IT - Troubleshooting PrintersPace IT - Troubleshooting Printers
Pace IT - Troubleshooting Printers
 
Pace IT - Basic Mobile Device
Pace IT - Basic Mobile DevicePace IT - Basic Mobile Device
Pace IT - Basic Mobile Device
 
Pace IT - Introduction to_the_Motherboard
Pace IT - Introduction to_the_MotherboardPace IT - Introduction to_the_Motherboard
Pace IT - Introduction to_the_Motherboard
 
Pace IT - Tools for Working on Networks
Pace IT - Tools for Working on NetworksPace IT - Tools for Working on Networks
Pace IT - Tools for Working on Networks
 
PACE-IT: Troubleshooting Connectivity With Hardware
PACE-IT: Troubleshooting Connectivity With HardwarePACE-IT: Troubleshooting Connectivity With Hardware
PACE-IT: Troubleshooting Connectivity With Hardware
 
Pace IT - Control Panel (Part 3)
Pace IT - Control Panel (Part 3)Pace IT - Control Panel (Part 3)
Pace IT - Control Panel (Part 3)
 
Wifi Training
Wifi TrainingWifi Training
Wifi Training
 
Common Dell Laptop Problems and How to Fix Them
Common Dell Laptop Problems and How to Fix ThemCommon Dell Laptop Problems and How to Fix Them
Common Dell Laptop Problems and How to Fix Them
 
Pace IT - Client Networking (Part 3)
Pace IT - Client Networking (Part 3)Pace IT - Client Networking (Part 3)
Pace IT - Client Networking (Part 3)
 
Pace IT - Troubleshooting OS part 1
Pace IT - Troubleshooting OS part 1Pace IT - Troubleshooting OS part 1
Pace IT - Troubleshooting OS part 1
 
Pace it troubleshooting-common_network_issues_bf
Pace it troubleshooting-common_network_issues_bfPace it troubleshooting-common_network_issues_bf
Pace it troubleshooting-common_network_issues_bf
 
PACE-IT: Troubleshooting Common Network Issues
PACE-IT: Troubleshooting Common Network IssuesPACE-IT: Troubleshooting Common Network Issues
PACE-IT: Troubleshooting Common Network Issues
 
Pace it data-disposal_and_destruction_methods_bf_sw
Pace it data-disposal_and_destruction_methods_bf_swPace it data-disposal_and_destruction_methods_bf_sw
Pace it data-disposal_and_destruction_methods_bf_sw
 

More from Pace IT at Edmonds Community College

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPace IT at Edmonds Community College
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 

More from Pace IT at Edmonds Community College (20)

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
 

Recently uploaded

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxNikitaBankoti2
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
 

Recently uploaded (20)

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 

Pace IT - Troubleshooting Laptops

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 PACE-IT. – Common symptoms. – Proper disassembly technique.
  • 5. Page 5 Troubleshooting laptops. No display. The most likely cause is display failure. Causes could also include the laptop not being turned on or a failed video card. Use an external monitor to check if it is the video card. Dim display. The most likely cause is backlight failure. Replace the backlight and/or inverter if it is a LCD display. LED displays don’t use an inverter. An easy test is with a flashlight. Flickering display. The most likely cause is a loose connection. Causes could also include the backlight and/or the inverter, or it could also be the display itself.
  • 6. Page 6 Troubleshooting laptops. Sticking keys. The most likely cause is spilled food. In some cases, the problem may be fixed with compressed air; if not, disassembly may be required to properly clean the keyboard. Intermittent wireless. The most likely cause is interference. It could also be too far from the WAP. In some cases, it may have to do with the wireless card or antenna, especially if the laptop has been worked on recently. Battery not charging. The most likely cause is battery failure. It is also wise to check the power from the wall outlet as well as the power cord.
  • 7. Page 7 Troubleshooting laptops. Ghost cursor. The most likely cause is a sensitivity setting. Most touchpads and trackpads can be adjusted for sensitivity. When the sensitivity is set too high, it may register unintended touches that cause the cursor to move. No power. The most likely cause is that it isn’t plugged in. It could also be a bad wall outlet, power cord, or even the DC jack on the laptop. Num lock indicator lights. The most likely cause is an inexperienced user. Some users may need education to understand how to operate their keyboard functions.
  • 8. Page 8 Troubleshooting laptops. No wireless connectivity. The most likely cause is the wireless is turned off. This is especially true if the laptop had wireless before. It may also be caused by a misconfiguration, which is more likely with a new laptop on the network. No Bluetooth connectivity. The most likely cause is that it is turned off. This may also be caused by a pairing issue if it is with a new Bluetooth device. No external display capability. The most likely cause the wrong setting. Toggle the function key used to send the video signal to the external connection.
  • 10. Page 10 Research and reading will be a key component of properly disassembling any laptop. Each original equipment manufacturer (OEM) has its own process for assembling the laptop and the reverse is true as well. Research the recommended steps to learn the proper way to disassemble and reassemble any given laptop. Troubleshooting laptops.
  • 11. Page 11 Troubleshooting laptops. – Research the recommendations of the OEM. » You may also be able to find video tutorials online. – Create a plan. » Actually write out the steps; this makes it easier to keep track of progress. – Document and label cable and screw locations. » Make a map; use coded containers for screws. • Taking photos may help in the reassembly process. – Keep organized. » It is easier to keep track of the pieces if you remain organized. – Use the appropriate tools for the job. » Saves on having to buy new screws or cables that have been damaged by the use of incorrect tools. Remember to wear your ESD strap!
  • 12. Page 12 Troubleshooting laptops. Symptoms tend to revolve around the display, power, or issues with settings. Sometimes the symptoms will point to a need to educate and train the user. Topic Common symptoms. Summary Follow the OEM’s process for disassembly and reassembly. Document and label everything. Keep organized and don’t mix up fasteners. Always use the appropriate tools. Proper disassembly techniques.
  • 14. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.