SlideShare une entreprise Scribd logo
1  sur  28
Module 4 / unit 1
Troubleshooting and Maintenance
         Fundamentals
       By kenneth Ayebazibwe
         kynaye@gmail.com
    256774185458 / 256702555890
You Will Learn…
• About your role as a PC technician in
  troubleshooting and maintenance, and tools
  available to help you in those roles
• How to approach a troubleshooting problem
• How to develop a preventive maintenance
  plan and what to include in it
Troubleshooting Perspectives
•   PC support technician
•   PC service technician
•   Bench technician
•   Help-desk technician
Essential Troubleshooting Tools
• Bootable rescue disk for any OS you might
  work on (may need several)
• Ground bracelet and/or ground mat
• Screwdrivers (flat-head, Phillips-head or cross-
  head, Torx set, particularly size T15)
• Tweezers, preferable insulated
• Chip extractor and a spring-loaded extractor
Useful Troubleshooting Tools
• Multimeter           • Pen and paper
• Needle-nose pliers   • Diagnostic cards and
• Flashlight             software
• AC outlet ground     • Utility software
  tester               • Virus detection
• Small cups or bags     software on disks
• Antistatic bags
Bootable Rescue Disk
• Can boot the PC even when the hard drive
  fails
• Ensures cleanest boot possible
Diagnostic Cards and Software
• POST diagnostic cards
• Diagnostic software
• General-purpose utility software
POST Diagnostic Cards
• Discover and report computer errors and conflicts at
  POST
• Examples:
   –   Amber Debug Card (Phoenix Technologies)
   –   PCI Error Testing/Debug Card (Trigen Industries)
   –   POSTcard V3 (Unicore Software, Inc.)
   –   Post Code Master (MSD, Inc.)
   –   POSTmortem Diagnostics Card (System Optimization, Inc.)
Diagnostic Software
• Identifies hardware problems
• Examples:
  – PC-Technician (Windsor Technologies, Inc.)
  – PC-Diagnosys (Windsor Technologies, Inc.)
General-Purpose Utility Software
• Diagnoses problems
• Repairs and maintains software on a PC
• Recovers corrupted or deleted data on hard
  drive or floppy disks
• Provides security
• Monitors system performance
• Downloads software updates from Internet
General-Purpose Utility Software
Fundamental Rules for
            Troubleshooting
• Make backups before making changes
• Approach the problem systematically
• Isolate the problem; eliminate unnecessary
  hardware and software
• Don’t overlook the obvious
• Check simple things first
• Make no assumptions
                                          continued…
Fundamental Rules for
              Troubleshooting
•   Become a researcher
•   Write things down
•   Reboot and start over
•   Establish priorities
•   Keep your cool and don’t rush
•   Don’t assume the worst
•   Know your starting point
Gathering Information
•   Interacting with the user
•   Investigating the problem on the computer
•   Isolating the problem
•   Intermittent problems
Interacting with the User
• Ask questions with diplomacy
• Find out exactly what happened when the
  computer stopped working
• Consider yourself a guest when working at the
  user’s desk
Guidelines for Working
                with a User
• Don’t take drastic action before asking the user
  about data that may not be backed up
• Provide alternatives before making decisions for the
  user
• Protect confidentiality of data on the PC
• Don’t disparage user’s choice of hardware or
  software
• If you make a mistake or must pass the problem on
  to someone with more expertise, be honest
Investigating the Problem
            on the Computer
• What OS is installed?
• What physical components are installed –
  processor, expansion cards, drives, peripheral
  devices? PC connected to network?
• What is the nature of the problem – occur
  before or after boot? Any error messages?
  Does the system hang?
• Can you duplicate the problem?
Isolating the Problem
•   Consider the possibilities
•   Eliminate simple things first
•   Eliminate the unnecessary
•   Trade good for suspected bad
•   Trade suspected bad for good
Intermittent Problems
• More challenging
• Look for patterns or clues
• Keep a log of when problems occur and
  exactly what error messages appear
Preventive Maintenance
• Goals
   – Reduce likelihood that events that cause PC failures will
     occur
   – Lessen the damage if they do occur
• Make and implement a preventive maintenance plan
  to help prevent failures and reduce repair costs and
  downtime
• Develop a disaster recovery plan to manage failures
  when they occur
When a PC Is Your Permanent
              Responsibility
•   Organize hard drive boot directory
•   Create rescue disks
•   Document all setup changes, problems, and solutions
•   Record setup data
•   Take practical precautions to protect software and
    data
    – Back up original software
    – Back up data on the hard drive
A Preventive Maintenance Plan




                                continued…
A Preventive Maintenance Plan
Moving Equipment
•   Back up hard drive
•   Remove removable disks, tape cartridges, or CDs from drives
•   Turn off power to PC and devices
•   Disconnect power cords and external devices
•   Label cable connections
•   Coil all cords and secure them
•   Pack in original shipping cartons
•   Purchase insurance
Disposing of Used Equipment
Disposing of Used Equipment
Fire Extinguishers
• Mount a fire extinguisher for Class C fires
  (ignited and heated by electricity) near your
  workbench, but not directly over it
• Know how to use the fire extinguisher
Chapter Summary
• Common-sense guidelines to solving
  computer problems
  – Avoid making situation worse by damaging
    equipment, software, or data, or by placing undue
    stress on users
  – Follow safety precautions

Contenu connexe

Similaire à Module 4 unit 1

Ch 2 maintenance and safety
Ch 2 maintenance and safetyCh 2 maintenance and safety
Ch 2 maintenance and safetymekashaw tizazu
 
6_Basic_Troubleshooting_for_Computers.ppt
6_Basic_Troubleshooting_for_Computers.ppt6_Basic_Troubleshooting_for_Computers.ppt
6_Basic_Troubleshooting_for_Computers.pptLeojOinam
 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its roleSudeshna Basak
 
Fixsmith pc repair fundamentals
Fixsmith pc repair fundamentalsFixsmith pc repair fundamentals
Fixsmith pc repair fundamentalsFixSmith
 
6.Preventive Maintenance and Troubleshooting.ppt
6.Preventive Maintenance and Troubleshooting.ppt6.Preventive Maintenance and Troubleshooting.ppt
6.Preventive Maintenance and Troubleshooting.pptkoodalcsc
 
EQUIPMENT MAINTENANCE.pptx
EQUIPMENT MAINTENANCE.pptxEQUIPMENT MAINTENANCE.pptx
EQUIPMENT MAINTENANCE.pptxKenshinRouruni
 
CNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsCNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsSam Bowne
 
CISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsCISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsSam Bowne
 
The Basics of Network Troubleshooting
The Basics of Network TroubleshootingThe Basics of Network Troubleshooting
The Basics of Network Troubleshootingzaisahil
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidenceOnline
 
7. Security Operations
7. Security Operations7. Security Operations
7. Security OperationsSam Bowne
 
It 2
It 2It 2
It 2M Rao
 

Similaire à Module 4 unit 1 (20)

Ch 2 maintenance and safety
Ch 2 maintenance and safetyCh 2 maintenance and safety
Ch 2 maintenance and safety
 
Ch02
Ch02Ch02
Ch02
 
6_Basic_Troubleshooting_for_Computers.ppt
6_Basic_Troubleshooting_for_Computers.ppt6_Basic_Troubleshooting_for_Computers.ppt
6_Basic_Troubleshooting_for_Computers.ppt
 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its role
 
1 - Introduction.ppt
1 - Introduction.ppt1 - Introduction.ppt
1 - Introduction.ppt
 
Fixsmith pc repair fundamentals
Fixsmith pc repair fundamentalsFixsmith pc repair fundamentals
Fixsmith pc repair fundamentals
 
6.Preventive Maintenance and Troubleshooting.ppt
6.Preventive Maintenance and Troubleshooting.ppt6.Preventive Maintenance and Troubleshooting.ppt
6.Preventive Maintenance and Troubleshooting.ppt
 
Computer basic
Computer basicComputer basic
Computer basic
 
MODULE 3.pptx
MODULE 3.pptxMODULE 3.pptx
MODULE 3.pptx
 
L05 slides
L05 slidesL05 slides
L05 slides
 
EQUIPMENT MAINTENANCE.pptx
EQUIPMENT MAINTENANCE.pptxEQUIPMENT MAINTENANCE.pptx
EQUIPMENT MAINTENANCE.pptx
 
CNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsCNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security Operations
 
CISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsCISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security Operations
 
The Basics of Network Troubleshooting
The Basics of Network TroubleshootingThe Basics of Network Troubleshooting
The Basics of Network Troubleshooting
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidence
 
7. Security Operations
7. Security Operations7. Security Operations
7. Security Operations
 
It 2
It 2It 2
It 2
 
Encryption
EncryptionEncryption
Encryption
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 

Plus de Ayebazibwe Kenneth

National guidelines and manual for innovation fund for green jobs creation
National guidelines and manual for innovation fund for green jobs creation National guidelines and manual for innovation fund for green jobs creation
National guidelines and manual for innovation fund for green jobs creation Ayebazibwe Kenneth
 
INNOVATION FUND FOR GREEN JOB CREATION: BUSINESS PLAN TEMPLATE
INNOVATION FUND FOR GREEN JOB CREATION: BUSINESS PLAN TEMPLATE INNOVATION FUND FOR GREEN JOB CREATION: BUSINESS PLAN TEMPLATE
INNOVATION FUND FOR GREEN JOB CREATION: BUSINESS PLAN TEMPLATE Ayebazibwe Kenneth
 
INNOVATION FUND PROJECTS APPLICATION FORM
INNOVATION FUND PROJECTS APPLICATION FORM INNOVATION FUND PROJECTS APPLICATION FORM
INNOVATION FUND PROJECTS APPLICATION FORM Ayebazibwe Kenneth
 
ADVERTISEMENT: MINISTRY OF GENDER, LABOUR AND SOCIAL DEVELOPMENT
ADVERTISEMENT:  MINISTRY OF GENDER, LABOUR AND SOCIAL DEVELOPMENT ADVERTISEMENT:  MINISTRY OF GENDER, LABOUR AND SOCIAL DEVELOPMENT
ADVERTISEMENT: MINISTRY OF GENDER, LABOUR AND SOCIAL DEVELOPMENT Ayebazibwe Kenneth
 
Uganda Woman Magazine IJssue 5
Uganda Woman Magazine IJssue 5 Uganda Woman Magazine IJssue 5
Uganda Woman Magazine IJssue 5 Ayebazibwe Kenneth
 
Uganda woman issue 4 march 2014 web
Uganda woman issue 4 march 2014 webUganda woman issue 4 march 2014 web
Uganda woman issue 4 march 2014 webAyebazibwe Kenneth
 
International women's day synopsis policy guidelines
International women's day synopsis   policy guidelinesInternational women's day synopsis   policy guidelines
International women's day synopsis policy guidelinesAyebazibwe Kenneth
 
Uganda Woman Magazine October 2013
Uganda Woman Magazine October 2013Uganda Woman Magazine October 2013
Uganda Woman Magazine October 2013Ayebazibwe Kenneth
 
Press release for the celebration of the international day against child labour
Press release for the celebration of the international day against child labourPress release for the celebration of the international day against child labour
Press release for the celebration of the international day against child labourAyebazibwe Kenneth
 
Connecting Grassroots Women to Development
Connecting Grassroots Women to DevelopmentConnecting Grassroots Women to Development
Connecting Grassroots Women to DevelopmentAyebazibwe Kenneth
 
Commemoration of the international day of families 15th may 2013
Commemoration of the international day of families 15th may 2013Commemoration of the international day of families 15th may 2013
Commemoration of the international day of families 15th may 2013Ayebazibwe Kenneth
 
International women’s day (iwd) 2013 synopsis
International women’s day (iwd) 2013 synopsisInternational women’s day (iwd) 2013 synopsis
International women’s day (iwd) 2013 synopsisAyebazibwe Kenneth
 
Statement by hon. rukia nakadama isanga the minister of state for gender and ...
Statement by hon. rukia nakadama isanga the minister of state for gender and ...Statement by hon. rukia nakadama isanga the minister of state for gender and ...
Statement by hon. rukia nakadama isanga the minister of state for gender and ...Ayebazibwe Kenneth
 
Introduction to computer security syllabus
Introduction to computer security syllabusIntroduction to computer security syllabus
Introduction to computer security syllabusAyebazibwe Kenneth
 

Plus de Ayebazibwe Kenneth (20)

National guidelines and manual for innovation fund for green jobs creation
National guidelines and manual for innovation fund for green jobs creation National guidelines and manual for innovation fund for green jobs creation
National guidelines and manual for innovation fund for green jobs creation
 
INNOVATION FUND FOR GREEN JOB CREATION: BUSINESS PLAN TEMPLATE
INNOVATION FUND FOR GREEN JOB CREATION: BUSINESS PLAN TEMPLATE INNOVATION FUND FOR GREEN JOB CREATION: BUSINESS PLAN TEMPLATE
INNOVATION FUND FOR GREEN JOB CREATION: BUSINESS PLAN TEMPLATE
 
INNOVATION FUND PROJECTS APPLICATION FORM
INNOVATION FUND PROJECTS APPLICATION FORM INNOVATION FUND PROJECTS APPLICATION FORM
INNOVATION FUND PROJECTS APPLICATION FORM
 
ADVERTISEMENT: MINISTRY OF GENDER, LABOUR AND SOCIAL DEVELOPMENT
ADVERTISEMENT:  MINISTRY OF GENDER, LABOUR AND SOCIAL DEVELOPMENT ADVERTISEMENT:  MINISTRY OF GENDER, LABOUR AND SOCIAL DEVELOPMENT
ADVERTISEMENT: MINISTRY OF GENDER, LABOUR AND SOCIAL DEVELOPMENT
 
Uganda Woman Magazine IJssue 5
Uganda Woman Magazine IJssue 5 Uganda Woman Magazine IJssue 5
Uganda Woman Magazine IJssue 5
 
Uganda woman issue 4 march 2014 web
Uganda woman issue 4 march 2014 webUganda woman issue 4 march 2014 web
Uganda woman issue 4 march 2014 web
 
International women's day synopsis policy guidelines
International women's day synopsis   policy guidelinesInternational women's day synopsis   policy guidelines
International women's day synopsis policy guidelines
 
Uganda Woman Magazine October 2013
Uganda Woman Magazine October 2013Uganda Woman Magazine October 2013
Uganda Woman Magazine October 2013
 
Press release for the celebration of the international day against child labour
Press release for the celebration of the international day against child labourPress release for the celebration of the international day against child labour
Press release for the celebration of the international day against child labour
 
Connecting Grassroots Women to Development
Connecting Grassroots Women to DevelopmentConnecting Grassroots Women to Development
Connecting Grassroots Women to Development
 
Commemoration of the international day of families 15th may 2013
Commemoration of the international day of families 15th may 2013Commemoration of the international day of families 15th may 2013
Commemoration of the international day of families 15th may 2013
 
International women’s day (iwd) 2013 synopsis
International women’s day (iwd) 2013 synopsisInternational women’s day (iwd) 2013 synopsis
International women’s day (iwd) 2013 synopsis
 
Statement by hon. rukia nakadama isanga the minister of state for gender and ...
Statement by hon. rukia nakadama isanga the minister of state for gender and ...Statement by hon. rukia nakadama isanga the minister of state for gender and ...
Statement by hon. rukia nakadama isanga the minister of state for gender and ...
 
Lecture one
Lecture oneLecture one
Lecture one
 
Introduction to computer security syllabus
Introduction to computer security syllabusIntroduction to computer security syllabus
Introduction to computer security syllabus
 
Lecture two
Lecture twoLecture two
Lecture two
 
Iatj call for applications
Iatj call for applicationsIatj call for applications
Iatj call for applications
 
Internet 2
Internet 2Internet 2
Internet 2
 
Module 3 unit 1
Module 3  unit 1Module 3  unit 1
Module 3 unit 1
 
Internet
InternetInternet
Internet
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Dernier (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Module 4 unit 1

  • 1. Module 4 / unit 1 Troubleshooting and Maintenance Fundamentals By kenneth Ayebazibwe kynaye@gmail.com 256774185458 / 256702555890
  • 2. You Will Learn… • About your role as a PC technician in troubleshooting and maintenance, and tools available to help you in those roles • How to approach a troubleshooting problem • How to develop a preventive maintenance plan and what to include in it
  • 3. Troubleshooting Perspectives • PC support technician • PC service technician • Bench technician • Help-desk technician
  • 4. Essential Troubleshooting Tools • Bootable rescue disk for any OS you might work on (may need several) • Ground bracelet and/or ground mat • Screwdrivers (flat-head, Phillips-head or cross- head, Torx set, particularly size T15) • Tweezers, preferable insulated • Chip extractor and a spring-loaded extractor
  • 5. Useful Troubleshooting Tools • Multimeter • Pen and paper • Needle-nose pliers • Diagnostic cards and • Flashlight software • AC outlet ground • Utility software tester • Virus detection • Small cups or bags software on disks • Antistatic bags
  • 6. Bootable Rescue Disk • Can boot the PC even when the hard drive fails • Ensures cleanest boot possible
  • 7. Diagnostic Cards and Software • POST diagnostic cards • Diagnostic software • General-purpose utility software
  • 8. POST Diagnostic Cards • Discover and report computer errors and conflicts at POST • Examples: – Amber Debug Card (Phoenix Technologies) – PCI Error Testing/Debug Card (Trigen Industries) – POSTcard V3 (Unicore Software, Inc.) – Post Code Master (MSD, Inc.) – POSTmortem Diagnostics Card (System Optimization, Inc.)
  • 9. Diagnostic Software • Identifies hardware problems • Examples: – PC-Technician (Windsor Technologies, Inc.) – PC-Diagnosys (Windsor Technologies, Inc.)
  • 10. General-Purpose Utility Software • Diagnoses problems • Repairs and maintains software on a PC • Recovers corrupted or deleted data on hard drive or floppy disks • Provides security • Monitors system performance • Downloads software updates from Internet
  • 12. Fundamental Rules for Troubleshooting • Make backups before making changes • Approach the problem systematically • Isolate the problem; eliminate unnecessary hardware and software • Don’t overlook the obvious • Check simple things first • Make no assumptions continued…
  • 13. Fundamental Rules for Troubleshooting • Become a researcher • Write things down • Reboot and start over • Establish priorities • Keep your cool and don’t rush • Don’t assume the worst • Know your starting point
  • 14. Gathering Information • Interacting with the user • Investigating the problem on the computer • Isolating the problem • Intermittent problems
  • 15. Interacting with the User • Ask questions with diplomacy • Find out exactly what happened when the computer stopped working • Consider yourself a guest when working at the user’s desk
  • 16. Guidelines for Working with a User • Don’t take drastic action before asking the user about data that may not be backed up • Provide alternatives before making decisions for the user • Protect confidentiality of data on the PC • Don’t disparage user’s choice of hardware or software • If you make a mistake or must pass the problem on to someone with more expertise, be honest
  • 17. Investigating the Problem on the Computer • What OS is installed? • What physical components are installed – processor, expansion cards, drives, peripheral devices? PC connected to network? • What is the nature of the problem – occur before or after boot? Any error messages? Does the system hang? • Can you duplicate the problem?
  • 18. Isolating the Problem • Consider the possibilities • Eliminate simple things first • Eliminate the unnecessary • Trade good for suspected bad • Trade suspected bad for good
  • 19. Intermittent Problems • More challenging • Look for patterns or clues • Keep a log of when problems occur and exactly what error messages appear
  • 20. Preventive Maintenance • Goals – Reduce likelihood that events that cause PC failures will occur – Lessen the damage if they do occur • Make and implement a preventive maintenance plan to help prevent failures and reduce repair costs and downtime • Develop a disaster recovery plan to manage failures when they occur
  • 21. When a PC Is Your Permanent Responsibility • Organize hard drive boot directory • Create rescue disks • Document all setup changes, problems, and solutions • Record setup data • Take practical precautions to protect software and data – Back up original software – Back up data on the hard drive
  • 22. A Preventive Maintenance Plan continued…
  • 24. Moving Equipment • Back up hard drive • Remove removable disks, tape cartridges, or CDs from drives • Turn off power to PC and devices • Disconnect power cords and external devices • Label cable connections • Coil all cords and secure them • Pack in original shipping cartons • Purchase insurance
  • 25. Disposing of Used Equipment
  • 26. Disposing of Used Equipment
  • 27. Fire Extinguishers • Mount a fire extinguisher for Class C fires (ignited and heated by electricity) near your workbench, but not directly over it • Know how to use the fire extinguisher
  • 28. Chapter Summary • Common-sense guidelines to solving computer problems – Avoid making situation worse by damaging equipment, software, or data, or by placing undue stress on users – Follow safety precautions