SlideShare a Scribd company logo
1 of 12
Written by
Ben Edwards
Georgia CTAE
Resource Network
2010
Basic Troubleshooting
Or: Repairing the Inevitable System Crash
Intro to Troubleshooting
• Troubleshooting is a logical, systematic search
for the source of a problem, so that it can be
solved.
• Objective: Be able to identify, evaluate, and
correct computer-based problems using
resources such as hardware, software, and
online support.
The Three Rules
• Remain calm and logical
– Troubleshooting is a rational process of elimination in a
complex environment
• Document
– This way you don’t
do things more times
than necessary
– You also must remember
what you’ve done in
order to potentially undo it!
• Do no harm
– Make a backup
– Make sure you can undo any changes you make
• It is possible to make your situation worse!
Getting Started
• Start with the basics
– Make sure you are dealing
with an error, and not just
doing something wrong.
– Make sure everything is
connected and on.
– Try closing the
document/application (if
applicable).
– Try rebooting the computer,
resetting the modem, router,
printer, etc. (After you’ve
saved your work, of course!).
Problem Solving
• A variant of the general problem solving techniques
you learned earlier can be used for troubleshooting.
Identify the
problem
Gather
Information
Propose
Solution
Success?
Test
Solution
Document
Solution
Yes
No
Identify the problem
• Define the
symptoms as clearly
and fully as possible
• As always,
document.
– Write down the
error message, the
problem application,
or the specific
problem.
Gather Information
• Record any changes you’ve made
– What have you added, removed, changed, or
done recently?
• Record your current configuration
– Hardware, operating system, etc.
• Gather resources
Resources
• Number 1 Resource: The Internet
– Chances are your question has already been answered
somewhere. Online forums like spywareinfoforum.com and
bleepingcomputer.com are useful tools.
– Online virus scanners like Kaspersky, PandaSecurity, and
BitDefender.
• Diagnostic tools
– Network, hard drive, memory, and other diagnostic and
recovery tools available for free (all available on Hiren’s Boot
CD)
– Virus and Malware scanners like AVG, Malwarebytes, HijackThis
• Tech support
– Keep the phone numbers for your various hardware and
software tech support handy
Propose Solutions
• Start with the easiest and most likely solutions
• Have a plan
– Process of elimination: eliminate most likely and
easiest solutions first, either solving the problem
along the way or eventually leaving only one
possibility.
Test Solution
• Change only one variable at a time!
– Test individual possibilities rather than trying
multiple solutions at once.
– Document each change so that you can
potentially undo it later.
Success?
• Yes
– Congratulations!
– Write down the successful
solution
• No
– Undo the solution
– Gather more information
– Propose and test another
solution
Summary
• Three Rules:
– Stay calm, document, and don’t make things
worse than they started
• Find out exactly what’s happening
• Research, use resources
• Propose a solution
• Test the solution
• Repeat if necessary

More Related Content

Similar to 6_Basic_Troubleshooting_for_Computers.ppt

Take Care of Your Computer Part 2 -- Backup, Clone Your System Disk Feb-16-2012
Take Care of Your Computer Part 2 -- Backup, Clone Your System Disk Feb-16-2012Take Care of Your Computer Part 2 -- Backup, Clone Your System Disk Feb-16-2012
Take Care of Your Computer Part 2 -- Backup, Clone Your System Disk Feb-16-2012Ted Whittemore
 
Apply Problem Solving Techniques to Routine Malfunctions.pptx
Apply Problem Solving Techniques to Routine Malfunctions.pptxApply Problem Solving Techniques to Routine Malfunctions.pptx
Apply Problem Solving Techniques to Routine Malfunctions.pptxwesendesta2
 
apply problem solve.pdf
apply problem solve.pdfapply problem solve.pdf
apply problem solve.pdfdereje33
 
Help your tech
Help your tech Help your tech
Help your tech stantons
 
Info sec is not daunting v1.0
Info sec is not daunting v1.0 Info sec is not daunting v1.0
Info sec is not daunting v1.0 Michael Gough
 
Basic Computer Skills.pptx
Basic Computer Skills.pptxBasic Computer Skills.pptx
Basic Computer Skills.pptxChandniK7
 
Guide to Helping your Tech Help You
Guide to Helping your Tech Help YouGuide to Helping your Tech Help You
Guide to Helping your Tech Help YouDesiree Caskey
 
Take Care of Your Computer Part 4 -- The Top 10 Best Free Software Programs o...
Take Care of Your Computer Part 4 -- The Top 10 Best Free Software Programs o...Take Care of Your Computer Part 4 -- The Top 10 Best Free Software Programs o...
Take Care of Your Computer Part 4 -- The Top 10 Best Free Software Programs o...Ted Whittemore
 
Virus Precautions
Virus PrecautionsVirus Precautions
Virus PrecautionsBilal Arif
 
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxMAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxRichardSugbo
 
Troubleshooting computer problem
Troubleshooting computer problemTroubleshooting computer problem
Troubleshooting computer problemsamsach1
 
Types of Software - Y9 Computing
Types of Software - Y9 ComputingTypes of Software - Y9 Computing
Types of Software - Y9 ComputingMrJRogers
 
Software Development Whats & Whys
Software Development Whats & Whys Software Development Whats & Whys
Software Development Whats & Whys Harun Yardımcı
 

Similar to 6_Basic_Troubleshooting_for_Computers.ppt (20)

Take Care of Your Computer Part 2 -- Backup, Clone Your System Disk Feb-16-2012
Take Care of Your Computer Part 2 -- Backup, Clone Your System Disk Feb-16-2012Take Care of Your Computer Part 2 -- Backup, Clone Your System Disk Feb-16-2012
Take Care of Your Computer Part 2 -- Backup, Clone Your System Disk Feb-16-2012
 
Apply Problem Solving Techniques to Routine Malfunctions.pptx
Apply Problem Solving Techniques to Routine Malfunctions.pptxApply Problem Solving Techniques to Routine Malfunctions.pptx
Apply Problem Solving Techniques to Routine Malfunctions.pptx
 
apply problem solve.pdf
apply problem solve.pdfapply problem solve.pdf
apply problem solve.pdf
 
TROUBLESHOOTING.pptx
TROUBLESHOOTING.pptxTROUBLESHOOTING.pptx
TROUBLESHOOTING.pptx
 
L05 slides
L05 slidesL05 slides
L05 slides
 
Help your tech
Help your tech Help your tech
Help your tech
 
Unit no_1.pptx
Unit no_1.pptxUnit no_1.pptx
Unit no_1.pptx
 
Info sec is not daunting v1.0
Info sec is not daunting v1.0 Info sec is not daunting v1.0
Info sec is not daunting v1.0
 
Software
SoftwareSoftware
Software
 
Basic Computer Skills.pptx
Basic Computer Skills.pptxBasic Computer Skills.pptx
Basic Computer Skills.pptx
 
Guide to Helping your Tech Help You
Guide to Helping your Tech Help YouGuide to Helping your Tech Help You
Guide to Helping your Tech Help You
 
Take Care of Your Computer Part 4 -- The Top 10 Best Free Software Programs o...
Take Care of Your Computer Part 4 -- The Top 10 Best Free Software Programs o...Take Care of Your Computer Part 4 -- The Top 10 Best Free Software Programs o...
Take Care of Your Computer Part 4 -- The Top 10 Best Free Software Programs o...
 
Virus Precautions
Virus PrecautionsVirus Precautions
Virus Precautions
 
Drop, Stop & Roll
Drop, Stop & RollDrop, Stop & Roll
Drop, Stop & Roll
 
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxMAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
 
Troubleshooting computer problem
Troubleshooting computer problemTroubleshooting computer problem
Troubleshooting computer problem
 
Types of Software - Y9 Computing
Types of Software - Y9 ComputingTypes of Software - Y9 Computing
Types of Software - Y9 Computing
 
Software Development Whats & Whys
Software Development Whats & Whys Software Development Whats & Whys
Software Development Whats & Whys
 
Welcome to files
Welcome to filesWelcome to files
Welcome to files
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

6_Basic_Troubleshooting_for_Computers.ppt

  • 1. Written by Ben Edwards Georgia CTAE Resource Network 2010 Basic Troubleshooting Or: Repairing the Inevitable System Crash
  • 2. Intro to Troubleshooting • Troubleshooting is a logical, systematic search for the source of a problem, so that it can be solved. • Objective: Be able to identify, evaluate, and correct computer-based problems using resources such as hardware, software, and online support.
  • 3. The Three Rules • Remain calm and logical – Troubleshooting is a rational process of elimination in a complex environment • Document – This way you don’t do things more times than necessary – You also must remember what you’ve done in order to potentially undo it! • Do no harm – Make a backup – Make sure you can undo any changes you make • It is possible to make your situation worse!
  • 4. Getting Started • Start with the basics – Make sure you are dealing with an error, and not just doing something wrong. – Make sure everything is connected and on. – Try closing the document/application (if applicable). – Try rebooting the computer, resetting the modem, router, printer, etc. (After you’ve saved your work, of course!).
  • 5. Problem Solving • A variant of the general problem solving techniques you learned earlier can be used for troubleshooting. Identify the problem Gather Information Propose Solution Success? Test Solution Document Solution Yes No
  • 6. Identify the problem • Define the symptoms as clearly and fully as possible • As always, document. – Write down the error message, the problem application, or the specific problem.
  • 7. Gather Information • Record any changes you’ve made – What have you added, removed, changed, or done recently? • Record your current configuration – Hardware, operating system, etc. • Gather resources
  • 8. Resources • Number 1 Resource: The Internet – Chances are your question has already been answered somewhere. Online forums like spywareinfoforum.com and bleepingcomputer.com are useful tools. – Online virus scanners like Kaspersky, PandaSecurity, and BitDefender. • Diagnostic tools – Network, hard drive, memory, and other diagnostic and recovery tools available for free (all available on Hiren’s Boot CD) – Virus and Malware scanners like AVG, Malwarebytes, HijackThis • Tech support – Keep the phone numbers for your various hardware and software tech support handy
  • 9. Propose Solutions • Start with the easiest and most likely solutions • Have a plan – Process of elimination: eliminate most likely and easiest solutions first, either solving the problem along the way or eventually leaving only one possibility.
  • 10. Test Solution • Change only one variable at a time! – Test individual possibilities rather than trying multiple solutions at once. – Document each change so that you can potentially undo it later.
  • 11. Success? • Yes – Congratulations! – Write down the successful solution • No – Undo the solution – Gather more information – Propose and test another solution
  • 12. Summary • Three Rules: – Stay calm, document, and don’t make things worse than they started • Find out exactly what’s happening • Research, use resources • Propose a solution • Test the solution • Repeat if necessary