SlideShare a Scribd company logo
1 of 11
3/10/2012




                               Computer
                         Basic Troubleshooting




By Franklin Sondakh, S.Kom, M.Th.




     Troubleshooting Basics

• Seven step process
• Easiest to Hardest
• Outside In




                                                        1
3/10/2012




    7 Steps in Troubleshooting

•    Analysis
•    Problem replication/identification
•    Action Plan
•    Implementation
•    Testing
•    Documentation
•    Follow Up




        Common Problems

1.   Cables
2.   Input & Optical Devices
3.   Overheating
4.   Power problems
5.   Electromagnetic Interference (EMI)
6.   Electrostatic Discharge (ESD)
7.   Windows errors
8.   Device drivers
9.   Viruses




                                                 2
3/10/2012




            1. Cables

                 •   Kabel longgar
                 •   Pin kabel yang bengkok
                 •   Kesalahan pemasangan
                 •   Kehabisan port
                 •   Pengaturan pemasangan




 2. Input & Optical Devices

• Bad Mouse
• Keyboard doesn't respond properly
• CD-ROM/Floppy Drive Issues




                                                     3
3/10/2012




          3. Overheating

•   Blocked vents
•   Dust
•   Cooling fans
•   Power supply
•   Room temperature
•   Peripheral overload




        4. Power Problems

•   Black Out- Complete power failure
•   Brown Out- Power “sags” below acceptable
•   levels causing computer to reboot
•   Surges or “Spikes”- Sudden surge of power
    (i.e. lightning strikes)




                                                       4
3/10/2012




5. Electromagnetic Interference

• Disebabkan oleh sumber tenaga
  listrik yang besar seperti motor,
  kabel tegangan tinggi, dsb.
• Gangguan komunikasi terjadi
  pada beberapa jenis kabel.
• Menyebabkan gangguan pada
  tampilan layar komputer seperti
  hujan ataupun bergaris-garis.




   6. Electrostatic Discharge

 • Static cling
 • Environmental causes
 • Prevention




                                             5
3/10/2012




7. Windows Error Messages




       8. Device Drivers

• Provide the programs that helps the computer
  to “talk” to a peripheral
• Common point of failure
• Can be difficult to fix
• Check the manufacturer’s websites for
  notification of upgrades




                                                        6
3/10/2012




       9. Computer Viruses

         Merupakan program komputer yang
      menggandakan atau menyalin dirinya dan
     menyebar dengan cara menyisipkan salinan
    dirinya ke dalam program atau dokumen lain.




       Sifat Virus komputer

•   Sulit diperbaiki
•   Mudah dicegah
•   Penting untuk dipahami dan selalu awas
•   Mempunyai tipe yang umum
•   Memiliki pertahanan yang baik




                                                         7
3/10/2012




               Viruses
•   Worm
•   Trojan
•   Backdoor
•   Spyware
•   Rogue
•   Rootkit
•   Polymorphic virus
•   Metamorphic virus
•   Virus ponsel




Preventative Maintenance

• Cleaning (Physical)
• Hard drive (Virtual)
• Updates




                                  8
3/10/2012




               I. Cleaning

•   Mouse
•   Keyboard
•   Box
•   Monitor
•   Printer
•   Others




          II. Hard Drive
    Defragmentation          Scandisk




                                               9
3/10/2012




Hard Drive- File Maintenance

• Disk cleanup
• Archiving
• Backups




          III. Updates

• Operating System updates
• Application updates
• Antivirus updates




                                     10
3/10/2012




           Final Thoughts

•   Think simple first
•   Outside in
•   Gather resources
•   Document
•   Be patient




                                  11

More Related Content

Viewers also liked

Viewers also liked (20)

Pamela gómez 6 to a
Pamela gómez 6 to aPamela gómez 6 to a
Pamela gómez 6 to a
 
Corcino 3
Corcino 3Corcino 3
Corcino 3
 
El conte de_la_lletera
El conte de_la_lleteraEl conte de_la_lletera
El conte de_la_lletera
 
Sentir A Vida
Sentir A VidaSentir A Vida
Sentir A Vida
 
Tr 28 prólogos - isabel - grupo 05
Tr 28   prólogos - isabel - grupo 05Tr 28   prólogos - isabel - grupo 05
Tr 28 prólogos - isabel - grupo 05
 
Caribbean international university
Caribbean international universityCaribbean international university
Caribbean international university
 
Documentos
DocumentosDocumentos
Documentos
 
Presentacion auriculares
Presentacion auricularesPresentacion auriculares
Presentacion auriculares
 
Universidad pedagogica nacional leticia 5 semestre
Universidad pedagogica nacional leticia 5 semestreUniversidad pedagogica nacional leticia 5 semestre
Universidad pedagogica nacional leticia 5 semestre
 
El problema
El problemaEl problema
El problema
 
Güzel insan 1
Güzel insan 1Güzel insan 1
Güzel insan 1
 
1 letourneau silvicultura y calidad de madera
1 letourneau silvicultura y calidad de madera1 letourneau silvicultura y calidad de madera
1 letourneau silvicultura y calidad de madera
 
Niña fex-2013
Niña fex-2013Niña fex-2013
Niña fex-2013
 
Leon andrew giraldo lois carlos gomez 9-a
Leon andrew giraldo  lois carlos gomez 9-aLeon andrew giraldo  lois carlos gomez 9-a
Leon andrew giraldo lois carlos gomez 9-a
 
Características das crianças
Características das criançasCaracterísticas das crianças
Características das crianças
 
Judici de paris
Judici de parisJudici de paris
Judici de paris
 
Delitos contra la administracion pública
Delitos contra la administracion públicaDelitos contra la administracion pública
Delitos contra la administracion pública
 
Presentacion auriculares
Presentacion auricularesPresentacion auriculares
Presentacion auriculares
 
Catálogo 2010
Catálogo 2010Catálogo 2010
Catálogo 2010
 
08 mediunidade e corpo físico
08   mediunidade e corpo físico08   mediunidade e corpo físico
08 mediunidade e corpo físico
 

Similar to 003 ho computer basic troubleshooting

Alphatech 2011-12
Alphatech 2011-12Alphatech 2011-12
Alphatech 2011-12thinkict
 
40 plus leveraging mobile computing to aid in job search v2.1
40 plus leveraging mobile computing to aid in job search v2.140 plus leveraging mobile computing to aid in job search v2.1
40 plus leveraging mobile computing to aid in job search v2.1Thomas Petry
 
Emerging Threats and Attack Surfaces
Emerging Threats and Attack SurfacesEmerging Threats and Attack Surfaces
Emerging Threats and Attack SurfacesPeter Wood
 
Internet worm-case-study
Internet worm-case-studyInternet worm-case-study
Internet worm-case-studyIan Sommerville
 
40 plus leveraging mobile computing to aid in job search
40 plus leveraging mobile computing to aid in job search40 plus leveraging mobile computing to aid in job search
40 plus leveraging mobile computing to aid in job searchThomas Petry
 
Lis 457 power point assignment
Lis 457 power point assignmentLis 457 power point assignment
Lis 457 power point assignmentjaynapierce
 
Lis 457 power point assignment
Lis 457 power point assignmentLis 457 power point assignment
Lis 457 power point assignmentjaynapierce
 
Syafiqah slideshare of security measures
Syafiqah slideshare of security measuresSyafiqah slideshare of security measures
Syafiqah slideshare of security measuresSyafiqah Akemi
 
Syafiqah slideshare of security measures
Syafiqah slideshare of security measuresSyafiqah slideshare of security measures
Syafiqah slideshare of security measuresSyafiqah Akemi
 
Discovering Computers: Chapter 01
Discovering Computers: Chapter 01Discovering Computers: Chapter 01
Discovering Computers: Chapter 01Anna Stirling
 
Capítulo 1 Discovering Computers
Capítulo 1 Discovering ComputersCapítulo 1 Discovering Computers
Capítulo 1 Discovering Computerszihat
 
Computer security and safety.pptx
Computer security and safety.pptxComputer security and safety.pptx
Computer security and safety.pptxssuser666f98
 
Lect 07 computer security and privacy 1 4 q
Lect 07 computer security and privacy 1 4 qLect 07 computer security and privacy 1 4 q
Lect 07 computer security and privacy 1 4 qRamy Eltarras
 

Similar to 003 ho computer basic troubleshooting (20)

BSA Computer MB
BSA Computer MBBSA Computer MB
BSA Computer MB
 
Alphatech 2011-12
Alphatech 2011-12Alphatech 2011-12
Alphatech 2011-12
 
40 plus leveraging mobile computing to aid in job search v2.1
40 plus leveraging mobile computing to aid in job search v2.140 plus leveraging mobile computing to aid in job search v2.1
40 plus leveraging mobile computing to aid in job search v2.1
 
Emerging Threats and Attack Surfaces
Emerging Threats and Attack SurfacesEmerging Threats and Attack Surfaces
Emerging Threats and Attack Surfaces
 
Chapter 12.0
Chapter 12.0Chapter 12.0
Chapter 12.0
 
Unit 1 introduction to computers
Unit 1  introduction to computersUnit 1  introduction to computers
Unit 1 introduction to computers
 
Internet worm-case-study
Internet worm-case-studyInternet worm-case-study
Internet worm-case-study
 
40 plus leveraging mobile computing to aid in job search
40 plus leveraging mobile computing to aid in job search40 plus leveraging mobile computing to aid in job search
40 plus leveraging mobile computing to aid in job search
 
Data security
Data securityData security
Data security
 
Lis 457 power point assignment
Lis 457 power point assignmentLis 457 power point assignment
Lis 457 power point assignment
 
Lis 457 power point assignment
Lis 457 power point assignmentLis 457 power point assignment
Lis 457 power point assignment
 
Lalitpur nnta
Lalitpur nntaLalitpur nnta
Lalitpur nnta
 
Syafiqah slideshare of security measures
Syafiqah slideshare of security measuresSyafiqah slideshare of security measures
Syafiqah slideshare of security measures
 
Syafiqah slideshare of security measures
Syafiqah slideshare of security measuresSyafiqah slideshare of security measures
Syafiqah slideshare of security measures
 
Chapter01
Chapter01Chapter01
Chapter01
 
Discovering Computers: Chapter 01
Discovering Computers: Chapter 01Discovering Computers: Chapter 01
Discovering Computers: Chapter 01
 
Capítulo 1 Discovering Computers
Capítulo 1 Discovering ComputersCapítulo 1 Discovering Computers
Capítulo 1 Discovering Computers
 
Computer security and safety.pptx
Computer security and safety.pptxComputer security and safety.pptx
Computer security and safety.pptx
 
Lect 07 computer security and privacy 1 4 q
Lect 07 computer security and privacy 1 4 qLect 07 computer security and privacy 1 4 q
Lect 07 computer security and privacy 1 4 q
 
Spn year8 notes
Spn year8 notesSpn year8 notes
Spn year8 notes
 

More from Franklin Sondakh

More from Franklin Sondakh (6)

01 iso 9001 2008
01 iso 9001 200801 iso 9001 2008
01 iso 9001 2008
 
02 Internal Quality Audit Training
02 Internal Quality Audit Training02 Internal Quality Audit Training
02 Internal Quality Audit Training
 
004 ho introduction to crm
004 ho introduction to crm004 ho introduction to crm
004 ho introduction to crm
 
002 ho email etiquette and security
002 ho email etiquette and security002 ho email etiquette and security
002 ho email etiquette and security
 
001 ho basic computer
001 ho basic computer001 ho basic computer
001 ho basic computer
 
000 training opening
000 training opening000 training opening
000 training opening
 

Recently uploaded

Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdftbatkhuu1
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseribangash
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 

Recently uploaded (20)

Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 

003 ho computer basic troubleshooting

  • 1. 3/10/2012 Computer Basic Troubleshooting By Franklin Sondakh, S.Kom, M.Th. Troubleshooting Basics • Seven step process • Easiest to Hardest • Outside In 1
  • 2. 3/10/2012 7 Steps in Troubleshooting • Analysis • Problem replication/identification • Action Plan • Implementation • Testing • Documentation • Follow Up Common Problems 1. Cables 2. Input & Optical Devices 3. Overheating 4. Power problems 5. Electromagnetic Interference (EMI) 6. Electrostatic Discharge (ESD) 7. Windows errors 8. Device drivers 9. Viruses 2
  • 3. 3/10/2012 1. Cables • Kabel longgar • Pin kabel yang bengkok • Kesalahan pemasangan • Kehabisan port • Pengaturan pemasangan 2. Input & Optical Devices • Bad Mouse • Keyboard doesn't respond properly • CD-ROM/Floppy Drive Issues 3
  • 4. 3/10/2012 3. Overheating • Blocked vents • Dust • Cooling fans • Power supply • Room temperature • Peripheral overload 4. Power Problems • Black Out- Complete power failure • Brown Out- Power “sags” below acceptable • levels causing computer to reboot • Surges or “Spikes”- Sudden surge of power (i.e. lightning strikes) 4
  • 5. 3/10/2012 5. Electromagnetic Interference • Disebabkan oleh sumber tenaga listrik yang besar seperti motor, kabel tegangan tinggi, dsb. • Gangguan komunikasi terjadi pada beberapa jenis kabel. • Menyebabkan gangguan pada tampilan layar komputer seperti hujan ataupun bergaris-garis. 6. Electrostatic Discharge • Static cling • Environmental causes • Prevention 5
  • 6. 3/10/2012 7. Windows Error Messages 8. Device Drivers • Provide the programs that helps the computer to “talk” to a peripheral • Common point of failure • Can be difficult to fix • Check the manufacturer’s websites for notification of upgrades 6
  • 7. 3/10/2012 9. Computer Viruses Merupakan program komputer yang menggandakan atau menyalin dirinya dan menyebar dengan cara menyisipkan salinan dirinya ke dalam program atau dokumen lain. Sifat Virus komputer • Sulit diperbaiki • Mudah dicegah • Penting untuk dipahami dan selalu awas • Mempunyai tipe yang umum • Memiliki pertahanan yang baik 7
  • 8. 3/10/2012 Viruses • Worm • Trojan • Backdoor • Spyware • Rogue • Rootkit • Polymorphic virus • Metamorphic virus • Virus ponsel Preventative Maintenance • Cleaning (Physical) • Hard drive (Virtual) • Updates 8
  • 9. 3/10/2012 I. Cleaning • Mouse • Keyboard • Box • Monitor • Printer • Others II. Hard Drive Defragmentation Scandisk 9
  • 10. 3/10/2012 Hard Drive- File Maintenance • Disk cleanup • Archiving • Backups III. Updates • Operating System updates • Application updates • Antivirus updates 10
  • 11. 3/10/2012 Final Thoughts • Think simple first • Outside in • Gather resources • Document • Be patient 11