SlideShare a Scribd company logo
1 of 16
Preventative
maintenance
tools.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certification
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
– Backup.
– System Restore.
– Check Disk.
– Defrag.
– Recovery images.
PACE-IT.
Page 4
Preventative maintenance tools.
Page 5
– Backup provides security in case of failure.
– Windows XP.
» Click Start, select All Programs, select Accessories, select
System Tools, and then choose Backup.
» Follow the directions in the wizard to either back up or restore
data.
» The wizard makes it easy to select which files you want to back
up; backups can be local or stored to removable media.
– Windows Vista and Windows 7.
» In Vista, Microsoft introduced the Backup and Restore Center,
which provides more options on how to back up and where you
can back up.
» Available from the Control Panel.
Preventative maintenance tools.
Page 6
Preventative maintenance tools.
Page 7
– System Restore.
» Many things can affect the stability of a PC; applications,
drivers, and updates are just a few.
» System Restore will return the PC to an earlier state.
– Windows XP.
» Click Start, select All Programs, select Accessories, select
System Tools, and then choose System Restore to get to the
available restore points.
» Windows creates restore points every seven days and before
certain events take place; you can manually create them as
well.
– Windows Vista and Windows 7.
» System Restore is available from the Control Panel.
» Click System, select System Protection, and choose System
Restore.
Preventative maintenance tools.
Page 8
Preventative maintenance tools.
Page 9
– Check Disk
» Windows may automatically detect a possible disk error
and schedule a Check Disk for that drive on the next
reboot.
» Check Disk can mark bad drive sectors and, if set
correctly, will attempt to recover them.
» Check Disk can try to recover corrupted system files.
– Check Disk can be manually run.
» From Windows Explorer, right click the disk or volume.
» Select Properties.
» Select Tools.
» Select Error Checking.
» Select the options desired.
Preventative maintenance tools.
Page 10
Preventative maintenance tools.
Page 11
– Disk drives can become fragmented
without intervention.
» Fragmented disks are less efficient.
– Windows XP
» Defrag is available from within the Computer Management
utility.
» Defrag has to be run manually.
– Windows Vista and Windows 7
» Windows Vista and Windows 7 allow for the scheduling of
Defrag automatically.
» Typing “defrag” into a search box will bring up the graphical
user interface (GUI).
Preventative maintenance tools.
Page 12
Preventative maintenance tools.
Page 13
– Recovery image options.
» An image of the operating system only.
» An image of the OS and selected installed applications.
» An image of the OS, selected installed applications, and
selected user data.
– Windows Vista.
» Windows Complete PC Backup and Restore is available from
the Backup and Recovery center.
– Windows 7.
» The Create a System Image tool is available from the Backup
and Restore applet.
– Recovery partition and image deployment.
» Original equipment manufacturer (OEM) images that do not
contain user data.
Preventative maintenance tools.
Page 14
Preventative maintenance tools.
Backup copies of files folders and operating system, providing security in
case of failure.
Topic
Backup.
Summary
System Restore returns the PC to a prior state.System Restore.
Check Disk will analyze the integrity of drives and can try to recover from
disk errors.Check Disk.
Defrag will defragment drives, making them more efficient; it is
automatically scheduled in Windows Vista and Windows 7.Defrag.
A recovery image is an exact duplicate of a system at a given point in time.Recovery image.
Page 15
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

Viewers also liked

Viewers also liked (20)

COMPUTER Bios
COMPUTER BiosCOMPUTER Bios
COMPUTER Bios
 
Port types
Port typesPort types
Port types
 
Bios
Bios Bios
Bios
 
Format, Partition, Install OS
Format, Partition, Install OSFormat, Partition, Install OS
Format, Partition, Install OS
 
BIOS - Basic Input Output System
BIOS - Basic Input Output SystemBIOS - Basic Input Output System
BIOS - Basic Input Output System
 
Comp ports
Comp portsComp ports
Comp ports
 
Ch 4
Ch 4Ch 4
Ch 4
 
Sony vaio recovery manual
Sony vaio recovery manualSony vaio recovery manual
Sony vaio recovery manual
 
4.BIOS, UEFI y Legacy
4.BIOS, UEFI y Legacy4.BIOS, UEFI y Legacy
4.BIOS, UEFI y Legacy
 
Bios
BiosBios
Bios
 
Uefi and bios
Uefi and biosUefi and bios
Uefi and bios
 
Bios
BiosBios
Bios
 
Bios uefi y legacy
Bios uefi y legacyBios uefi y legacy
Bios uefi y legacy
 
External storage devices
External storage devicesExternal storage devices
External storage devices
 
Unified Extensible Firmware Interface (UEFI)
Unified Extensible Firmware Interface (UEFI)Unified Extensible Firmware Interface (UEFI)
Unified Extensible Firmware Interface (UEFI)
 
Bios
BiosBios
Bios
 
Ram presentation
Ram presentationRam presentation
Ram presentation
 
UEFI presentation
UEFI presentationUEFI presentation
UEFI presentation
 
Types of Storage Devices
Types of Storage DevicesTypes of Storage Devices
Types of Storage Devices
 
Random access memory
Random access memoryRandom access memory
Random access memory
 

Similar to Pace IT - Maintainance Tools

MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxMAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxRichardSugbo
 
Pace it data-disposal_and_destruction_methods_bf_sw
Pace it data-disposal_and_destruction_methods_bf_swPace it data-disposal_and_destruction_methods_bf_sw
Pace it data-disposal_and_destruction_methods_bf_swEdward Sargent
 
Preventive maintenance and troubleshooting
Preventive maintenance and troubleshootingPreventive maintenance and troubleshooting
Preventive maintenance and troubleshootingChristian Macatangay
 

Similar to Pace IT - Maintainance Tools (20)

Pace IT - Troubleshooting OS part 2
Pace IT - Troubleshooting OS part 2Pace IT - Troubleshooting OS part 2
Pace IT - Troubleshooting OS part 2
 
Pace IT - Troubleshooting Security
Pace IT - Troubleshooting SecurityPace IT - Troubleshooting Security
Pace IT - Troubleshooting Security
 
Pace IT - Troubleshooting OS part 1
Pace IT - Troubleshooting OS part 1Pace IT - Troubleshooting OS part 1
Pace IT - Troubleshooting OS part 1
 
PACE-IT: Supporting Configuration Management (part 2)
PACE-IT: Supporting Configuration Management (part 2)PACE-IT: Supporting Configuration Management (part 2)
PACE-IT: Supporting Configuration Management (part 2)
 
PACE-IT: Operation System Features
PACE-IT: Operation System FeaturesPACE-IT: Operation System Features
PACE-IT: Operation System Features
 
Pace IT - Control Panel (Part 3)
Pace IT - Control Panel (Part 3)Pace IT - Control Panel (Part 3)
Pace IT - Control Panel (Part 3)
 
PACE-IT, Security+2.8: Risk Management Best Practices
PACE-IT, Security+2.8: Risk Management Best PracticesPACE-IT, Security+2.8: Risk Management Best Practices
PACE-IT, Security+2.8: Risk Management Best Practices
 
PACE-IT: Troubleshooting Hard Drives and Raid
PACE-IT: Troubleshooting Hard Drives and RaidPACE-IT: Troubleshooting Hard Drives and Raid
PACE-IT: Troubleshooting Hard Drives and Raid
 
Pace IT - Client Networking (Part 1)
Pace IT - Client Networking (Part 1)Pace IT - Client Networking (Part 1)
Pace IT - Client Networking (Part 1)
 
Pace IT - Command Line OS (Part 1)
Pace IT - Command Line OS (Part 1)Pace IT - Command Line OS (Part 1)
Pace IT - Command Line OS (Part 1)
 
Pace IT - Maintenance Procedures Best Practices
Pace IT - Maintenance Procedures Best PracticesPace IT - Maintenance Procedures Best Practices
Pace IT - Maintenance Procedures Best Practices
 
5 stepmainttut
5 stepmainttut5 stepmainttut
5 stepmainttut
 
PACE-IT: Risk and Security Related Concepts
PACE-IT: Risk and Security Related ConceptsPACE-IT: Risk and Security Related Concepts
PACE-IT: Risk and Security Related Concepts
 
Pace IT - Install and Configure OS (Part 1)
Pace IT - Install and Configure OS (Part 1)Pace IT - Install and Configure OS (Part 1)
Pace IT - Install and Configure OS (Part 1)
 
Pace IT - Basic OS Security Settings (Part 2)
Pace IT - Basic OS Security Settings (Part 2)Pace IT - Basic OS Security Settings (Part 2)
Pace IT - Basic OS Security Settings (Part 2)
 
PACE-IT, Security+2.8: Disaster Recovery Concepts
PACE-IT, Security+2.8: Disaster Recovery ConceptsPACE-IT, Security+2.8: Disaster Recovery Concepts
PACE-IT, Security+2.8: Disaster Recovery Concepts
 
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxMAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
 
Pace it data-disposal_and_destruction_methods_bf_sw
Pace it data-disposal_and_destruction_methods_bf_swPace it data-disposal_and_destruction_methods_bf_sw
Pace it data-disposal_and_destruction_methods_bf_sw
 
Pace IT - Command Line OS (Part 2)
Pace IT - Command Line OS (Part 2)Pace IT - Command Line OS (Part 2)
Pace IT - Command Line OS (Part 2)
 
Preventive maintenance and troubleshooting
Preventive maintenance and troubleshootingPreventive maintenance and troubleshooting
Preventive maintenance and troubleshooting
 

More from Pace IT at Edmonds Community College

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPace IT at Edmonds Community College
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 

More from Pace IT at Edmonds Community College (20)

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
 

Recently uploaded

Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 

Recently uploaded (20)

Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 

Pace IT - Maintainance Tools

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certification  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 – Backup. – System Restore. – Check Disk. – Defrag. – Recovery images. PACE-IT.
  • 5. Page 5 – Backup provides security in case of failure. – Windows XP. » Click Start, select All Programs, select Accessories, select System Tools, and then choose Backup. » Follow the directions in the wizard to either back up or restore data. » The wizard makes it easy to select which files you want to back up; backups can be local or stored to removable media. – Windows Vista and Windows 7. » In Vista, Microsoft introduced the Backup and Restore Center, which provides more options on how to back up and where you can back up. » Available from the Control Panel. Preventative maintenance tools.
  • 7. Page 7 – System Restore. » Many things can affect the stability of a PC; applications, drivers, and updates are just a few. » System Restore will return the PC to an earlier state. – Windows XP. » Click Start, select All Programs, select Accessories, select System Tools, and then choose System Restore to get to the available restore points. » Windows creates restore points every seven days and before certain events take place; you can manually create them as well. – Windows Vista and Windows 7. » System Restore is available from the Control Panel. » Click System, select System Protection, and choose System Restore. Preventative maintenance tools.
  • 9. Page 9 – Check Disk » Windows may automatically detect a possible disk error and schedule a Check Disk for that drive on the next reboot. » Check Disk can mark bad drive sectors and, if set correctly, will attempt to recover them. » Check Disk can try to recover corrupted system files. – Check Disk can be manually run. » From Windows Explorer, right click the disk or volume. » Select Properties. » Select Tools. » Select Error Checking. » Select the options desired. Preventative maintenance tools.
  • 11. Page 11 – Disk drives can become fragmented without intervention. » Fragmented disks are less efficient. – Windows XP » Defrag is available from within the Computer Management utility. » Defrag has to be run manually. – Windows Vista and Windows 7 » Windows Vista and Windows 7 allow for the scheduling of Defrag automatically. » Typing “defrag” into a search box will bring up the graphical user interface (GUI). Preventative maintenance tools.
  • 13. Page 13 – Recovery image options. » An image of the operating system only. » An image of the OS and selected installed applications. » An image of the OS, selected installed applications, and selected user data. – Windows Vista. » Windows Complete PC Backup and Restore is available from the Backup and Recovery center. – Windows 7. » The Create a System Image tool is available from the Backup and Restore applet. – Recovery partition and image deployment. » Original equipment manufacturer (OEM) images that do not contain user data. Preventative maintenance tools.
  • 14. Page 14 Preventative maintenance tools. Backup copies of files folders and operating system, providing security in case of failure. Topic Backup. Summary System Restore returns the PC to a prior state.System Restore. Check Disk will analyze the integrity of drives and can try to recover from disk errors.Check Disk. Defrag will defragment drives, making them more efficient; it is automatically scheduled in Windows Vista and Windows 7.Defrag. A recovery image is an exact duplicate of a system at a given point in time.Recovery image.
  • 16. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.