SlideShare a Scribd company logo
1 of 14
IT Essentials PC Hardware
  and Software 4.1

  Instructional Resource
  Chapter 4: Basics of
  Preventive Maintenance and
  Troubleshooting




Presentation_ID                © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   1
Chapter 4: Objectives
            Explain the purpose of preventive maintenance.
            Identify the steps of the troubleshooting process.




Presentation_ID                                       © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   2
Chapter 4: Critical Concepts
            What is this chapter about and why is it important?
            This chapter discusses preventive maintenance and a methodology for
             troubleshooting computer problems. It explains the benefits of having a preventive
             maintenance program, including hardware and software. This chapter also outlines
             a process for troubleshooting computer hardware and software problems.
            This chapter is important because many IT technicians are responsible for the
             upkeep of all of the computers at a company. Having and adhering to a preventive
             maintenance plan saves the company money by avoiding many types of computer
             problems. When a problem does occur, a technician who uses the troubleshooting
             methodology that is described in this chapter can, in most instances, identify and fix
             the problem quickly.
            Preventive maintenance and troubleshooting skills are so important that they are
             included in almost every chapter that follows this one.




Presentation_ID                                       © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   3
Chapter 4: Activities
            What activities are associated with this chapter?
                  There are no labs in this chapter.
                  Chapter 4 Quiz




Presentation_ID                                        © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   4
Chapter 4: New Terms
            What terms are introduced in this chapter?
                  beep code                                                            4.2.2

                  data backup                                                          4.2.1

                  Device Manager                                                       4.2.2

                  diagnostic software                                                  4.2.2

                  diagnostic tools                                                     4.2.2

                  Event Viewer                                                         4.2.2

                  software                                                             4.1




Presentation_ID                                     © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   5
Chapter 4: Changes
            What has changed from the previous version (4.0) of ITEPC?

                  Page 4.2.2 Identify the problem
                  • Identify the problem.

                  Page 4.2.3 Establish a theory of probable causes
                  • Establish a theory of probable causes.

                  Page 4.2.4 Determine an exact cause
                  • Test the theory to determine the cause.
                  • Once the theory is confirmed, determine the steps to resolve the problem.
                  • If the theory is not confirmed, establish a new theory or escalate the problem.

                  Page 4.2.5 Implement the solution
                  • Establish a plan of action to resolve the problem and then implement that
                    solution.

Presentation_ID                                          © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   6
Chapter 4: Changes (continued)
            What has changed from the previous version (4.0) of ITEPC?


                  Page 4.2.6 Verify solution and full system functionality
                  • Verify full system functionality and, if applicable, implement preventive
                    measures.


                  Page 4.2.7 Document findings
                  • Document findings, actions, and outcomes.




Presentation_ID                                          © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   7
Chapter 4: Classroom Management
           Troubleshooting cannot be learned from a book. Hands-on practice of the steps
            outlined in this chapter and the information from the previous three chapters
            must be done by each student.
                •Place the students in groups of two; one student leaves the room, and the
                other student installs one problem in a computer. The instructor can provide
                a list of possible problems to install. The problems should be limited to
                things that students learned in previous chapters, such as loose or missing
                cabling, missing CMOS battery, or incorrect BIOS settings. The other
                student returns and solves the problem by applying the processes that the
                chapter describes.
                •Give students access to the troubleshooting section of the manual for the
                computers that are being used in the classroom.
                •Give students access to the Internet for researching error codes.




Presentation_ID                                      © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   8
Chapter 4: Teaching Analogies
            Preventive maintenance for a computer is similar to the following examples:
               • Performing a car tune-up
               • Brushing your teeth
               • Removing ice from a car windshield before you drive
            Troubleshooting a computer is like troubleshooting any problem. Discuss
             troubleshooting processes in the following examples:
               • A television does not power on when you press the TV remote power button.
               • A clock does not consistently display the correct time.
               • When you insert a CD into a stereo system, music does not play.




Presentation_ID                                    © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   9
Chapter 4: Suggested Class Discussions
                   What is the recommended preventive maintenance for the classroom printer?
                   What is the recommended preventive maintenance on a high-end laser printer?
                   What is the recommended preventive maintenance for a home computer?
                   What are some common mistakes when choosing cleaning supplies for
                    computer maintenance?
                   A college has discovered that 500 computers are not patched for a recently
                    discovered virus, and 58 computers do not have anti-virus software installed.
                    These computers have been installed by college technicians. What are the
                    implications of this? What should the college do? How should the college
                    prevent this type of situation in the future?




Presentation_ID                                        © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   10
Chapter 4: Best Practices
                     Organize students to clean the office or school computers for other staff
                      members.
                      • Students should call and verify an appointment time to clean the
                         computer.
                      • Students should call after the preventive maintenance visit to ask about
                         computer performance improvements.
                     Ask the technical support staff if your students can watch them work during a
                      class period.




Presentation_ID                                         © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   11
Chapter 4: Outside Reading
                   Cisco Systems Website

                   Microsoft TechNet Website




Presentation_ID                                 © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   12
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   13
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   14

More Related Content

What's hot

ITE v5.0 - Chapter 9
ITE v5.0 - Chapter 9ITE v5.0 - Chapter 9
ITE v5.0 - Chapter 9Irsandi Hasan
 
IT Essential - Course Overview
IT Essential - Course OverviewIT Essential - Course Overview
IT Essential - Course OverviewIrsandi Hasan
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersITExamAnswers.net
 
ITE v5.0 - Chapter 11
ITE v5.0 - Chapter 11ITE v5.0 - Chapter 11
ITE v5.0 - Chapter 11Irsandi Hasan
 
CS5032 L10 security engineering 2 2013
CS5032 L10 security engineering 2 2013CS5032 L10 security engineering 2 2013
CS5032 L10 security engineering 2 2013Ian Sommerville
 
IT Essentials (Version 7.0) - ITE Chapter 11 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 11 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 11 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 11 Exam AnswersITExamAnswers.net
 
Security Engineering 2 (CS 5032 2012)
Security Engineering 2 (CS 5032 2012)Security Engineering 2 (CS 5032 2012)
Security Engineering 2 (CS 5032 2012)Ian Sommerville
 
CS5032 L9 security engineering 1 2013
CS5032 L9 security engineering 1 2013CS5032 L9 security engineering 1 2013
CS5032 L9 security engineering 1 2013Ian Sommerville
 
lesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handoutslesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handoutslorbz
 
Ict 9 module 3, lesson 2.4.2 installing operating system (windows 7)
Ict 9 module 3, lesson 2.4.2 installing operating system (windows 7)Ict 9 module 3, lesson 2.4.2 installing operating system (windows 7)
Ict 9 module 3, lesson 2.4.2 installing operating system (windows 7)Yonel Cadapan
 
CS 5032 L6 reliability and security specification 2013
CS 5032 L6 reliability and security specification 2013CS 5032 L6 reliability and security specification 2013
CS 5032 L6 reliability and security specification 2013Ian Sommerville
 

What's hot (20)

Ite pc v40_chapter1
Ite pc v40_chapter1Ite pc v40_chapter1
Ite pc v40_chapter1
 
Ite pc v40_chapter5
Ite pc v40_chapter5Ite pc v40_chapter5
Ite pc v40_chapter5
 
Ite v5.0 chapter2
Ite v5.0 chapter2Ite v5.0 chapter2
Ite v5.0 chapter2
 
Ite pc v40_chapter4
Ite pc v40_chapter4Ite pc v40_chapter4
Ite pc v40_chapter4
 
ITE - Chapter 13
ITE - Chapter 13ITE - Chapter 13
ITE - Chapter 13
 
Ite pc v40_chapter6
Ite pc v40_chapter6Ite pc v40_chapter6
Ite pc v40_chapter6
 
ITE v5.0 - Chapter 9
ITE v5.0 - Chapter 9ITE v5.0 - Chapter 9
ITE v5.0 - Chapter 9
 
Ch2 Presentation
Ch2 PresentationCh2 Presentation
Ch2 Presentation
 
IT Essential - Course Overview
IT Essential - Course OverviewIT Essential - Course Overview
IT Essential - Course Overview
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
 
ITE v5.0 - Chapter 11
ITE v5.0 - Chapter 11ITE v5.0 - Chapter 11
ITE v5.0 - Chapter 11
 
CS5032 L10 security engineering 2 2013
CS5032 L10 security engineering 2 2013CS5032 L10 security engineering 2 2013
CS5032 L10 security engineering 2 2013
 
IT Essentials (Version 7.0) - ITE Chapter 11 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 11 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 11 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 11 Exam Answers
 
Ite v5.0 chapter3
Ite v5.0 chapter3Ite v5.0 chapter3
Ite v5.0 chapter3
 
Security Engineering 2 (CS 5032 2012)
Security Engineering 2 (CS 5032 2012)Security Engineering 2 (CS 5032 2012)
Security Engineering 2 (CS 5032 2012)
 
CS5032 L9 security engineering 1 2013
CS5032 L9 security engineering 1 2013CS5032 L9 security engineering 1 2013
CS5032 L9 security engineering 1 2013
 
lesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handoutslesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handouts
 
Ict 9 module 3, lesson 2.4.2 installing operating system (windows 7)
Ict 9 module 3, lesson 2.4.2 installing operating system (windows 7)Ict 9 module 3, lesson 2.4.2 installing operating system (windows 7)
Ict 9 module 3, lesson 2.4.2 installing operating system (windows 7)
 
System Engineer-Bhuvanesh
System  Engineer-BhuvaneshSystem  Engineer-Bhuvanesh
System Engineer-Bhuvanesh
 
CS 5032 L6 reliability and security specification 2013
CS 5032 L6 reliability and security specification 2013CS 5032 L6 reliability and security specification 2013
CS 5032 L6 reliability and security specification 2013
 

Viewers also liked

How You Present Findings Can Affect Your Credibility Upload
How You Present Findings Can Affect Your Credibility UploadHow You Present Findings Can Affect Your Credibility Upload
How You Present Findings Can Affect Your Credibility UploadWendy Castleman
 
Protolib findings presentation slides
Protolib findings presentation slidesProtolib findings presentation slides
Protolib findings presentation slidesfuturelib
 
5 days TPM Workshop/Implementation Strategies at F&N
5 days TPM Workshop/Implementation Strategies at F&N5 days TPM Workshop/Implementation Strategies at F&N
5 days TPM Workshop/Implementation Strategies at F&NTimothy Wooi
 
Masonry: Tools and Preventive Maintenance
Masonry: Tools and Preventive MaintenanceMasonry: Tools and Preventive Maintenance
Masonry: Tools and Preventive MaintenanceAlyssa Natano
 
Overall Equipment Effectiveness
Overall Equipment EffectivenessOverall Equipment Effectiveness
Overall Equipment EffectivenessAnand Subramaniam
 
6 OEE overview
6 OEE overview6 OEE overview
6 OEE overviewWebseology
 

Viewers also liked (13)

Presentation of Findings
Presentation of FindingsPresentation of Findings
Presentation of Findings
 
How You Present Findings Can Affect Your Credibility Upload
How You Present Findings Can Affect Your Credibility UploadHow You Present Findings Can Affect Your Credibility Upload
How You Present Findings Can Affect Your Credibility Upload
 
Protolib findings presentation slides
Protolib findings presentation slidesProtolib findings presentation slides
Protolib findings presentation slides
 
Drt findings presentation
Drt findings presentationDrt findings presentation
Drt findings presentation
 
5 days TPM Workshop/Implementation Strategies at F&N
5 days TPM Workshop/Implementation Strategies at F&N5 days TPM Workshop/Implementation Strategies at F&N
5 days TPM Workshop/Implementation Strategies at F&N
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Masonry: Tools and Preventive Maintenance
Masonry: Tools and Preventive MaintenanceMasonry: Tools and Preventive Maintenance
Masonry: Tools and Preventive Maintenance
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
The Six Big Losses of OEE
The Six Big Losses of OEEThe Six Big Losses of OEE
The Six Big Losses of OEE
 
TPM Implementation Strategy
TPM Implementation StrategyTPM Implementation Strategy
TPM Implementation Strategy
 
Overall Equipment Effectiveness
Overall Equipment EffectivenessOverall Equipment Effectiveness
Overall Equipment Effectiveness
 
6 OEE overview
6 OEE overview6 OEE overview
6 OEE overview
 
Overall Equipment Effectiveness
Overall Equipment EffectivenessOverall Equipment Effectiveness
Overall Equipment Effectiveness
 

Similar to ITE - Chapter 4

DEVASC_Module_1.pdf
DEVASC_Module_1.pdfDEVASC_Module_1.pdf
DEVASC_Module_1.pdfMorooCoffee
 
It secuirty policy guidelines and practices
It secuirty policy guidelines and practicesIt secuirty policy guidelines and practices
It secuirty policy guidelines and practiceswaruireuben
 
ITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdf
ITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdfITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdf
ITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdfGomzAriez
 
Swiss Testing Day - Testautomation, 10 (sometimes painful) lessons learned
Swiss Testing Day - Testautomation, 10 (sometimes painful) lessons learnedSwiss Testing Day - Testautomation, 10 (sometimes painful) lessons learned
Swiss Testing Day - Testautomation, 10 (sometimes painful) lessons learnedMichael Palotas
 
Ite pc v40_chapter11
Ite pc v40_chapter11Ite pc v40_chapter11
Ite pc v40_chapter11Nada Ariff
 
2.-IT-266_APDET-Module-2-of-3.pptx
2.-IT-266_APDET-Module-2-of-3.pptx2.-IT-266_APDET-Module-2-of-3.pptx
2.-IT-266_APDET-Module-2-of-3.pptxKENNEDYDONATO1
 
Unit 2 SEPM_ Requirement Engineering
Unit 2 SEPM_ Requirement EngineeringUnit 2 SEPM_ Requirement Engineering
Unit 2 SEPM_ Requirement EngineeringKanchanPatil34
 
Chapter 9 lab a security policy development and implementation (instructor ve...
Chapter 9 lab a security policy development and implementation (instructor ve...Chapter 9 lab a security policy development and implementation (instructor ve...
Chapter 9 lab a security policy development and implementation (instructor ve...wosborne03
 
Managing Data Science Projects
Managing Data Science ProjectsManaging Data Science Projects
Managing Data Science ProjectsDanielle Dean
 
Patch Management: 4 Best Practices and More for Today’s Banking IT Leaders
Patch Management: 4 Best Practices and More for Today’s Banking IT LeadersPatch Management: 4 Best Practices and More for Today’s Banking IT Leaders
Patch Management: 4 Best Practices and More for Today’s Banking IT LeadersKaseya
 
Less18 Patching oracle dba 11g
Less18 Patching oracle dba 11gLess18 Patching oracle dba 11g
Less18 Patching oracle dba 11gvivaankumar
 
TDD with BizTalk
TDD with BizTalkTDD with BizTalk
TDD with BizTalkBen Carey
 
FIDP_1_Quarter_CSS1 (1).docx
FIDP_1_Quarter_CSS1 (1).docxFIDP_1_Quarter_CSS1 (1).docx
FIDP_1_Quarter_CSS1 (1).docxjonathanlabajo2
 

Similar to ITE - Chapter 4 (20)

IT ESSENTIALS 6.0
IT ESSENTIALS 6.0IT ESSENTIALS 6.0
IT ESSENTIALS 6.0
 
DEVASC_Module_1.pdf
DEVASC_Module_1.pdfDEVASC_Module_1.pdf
DEVASC_Module_1.pdf
 
ITE - Chapter 10
ITE - Chapter 10ITE - Chapter 10
ITE - Chapter 10
 
It secuirty policy guidelines and practices
It secuirty policy guidelines and practicesIt secuirty policy guidelines and practices
It secuirty policy guidelines and practices
 
8th sem
8th sem8th sem
8th sem
 
ITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdf
ITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdfITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdf
ITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdf
 
Swiss Testing Day - Testautomation, 10 (sometimes painful) lessons learned
Swiss Testing Day - Testautomation, 10 (sometimes painful) lessons learnedSwiss Testing Day - Testautomation, 10 (sometimes painful) lessons learned
Swiss Testing Day - Testautomation, 10 (sometimes painful) lessons learned
 
#1
#1#1
#1
 
Ite pc v40_chapter11
Ite pc v40_chapter11Ite pc v40_chapter11
Ite pc v40_chapter11
 
2.-IT-266_APDET-Module-2-of-3.pptx
2.-IT-266_APDET-Module-2-of-3.pptx2.-IT-266_APDET-Module-2-of-3.pptx
2.-IT-266_APDET-Module-2-of-3.pptx
 
Ite pc v40_chapter9
Ite pc v40_chapter9Ite pc v40_chapter9
Ite pc v40_chapter9
 
Unit 2 SEPM_ Requirement Engineering
Unit 2 SEPM_ Requirement EngineeringUnit 2 SEPM_ Requirement Engineering
Unit 2 SEPM_ Requirement Engineering
 
Chapter 9 lab a security policy development and implementation (instructor ve...
Chapter 9 lab a security policy development and implementation (instructor ve...Chapter 9 lab a security policy development and implementation (instructor ve...
Chapter 9 lab a security policy development and implementation (instructor ve...
 
Managing Data Science Projects
Managing Data Science ProjectsManaging Data Science Projects
Managing Data Science Projects
 
Patch Management: 4 Best Practices and More for Today’s Banking IT Leaders
Patch Management: 4 Best Practices and More for Today’s Banking IT LeadersPatch Management: 4 Best Practices and More for Today’s Banking IT Leaders
Patch Management: 4 Best Practices and More for Today’s Banking IT Leaders
 
Less18 Patching oracle dba 11g
Less18 Patching oracle dba 11gLess18 Patching oracle dba 11g
Less18 Patching oracle dba 11g
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
TDD with BizTalk
TDD with BizTalkTDD with BizTalk
TDD with BizTalk
 
ITE - Chapter 3
ITE - Chapter 3ITE - Chapter 3
ITE - Chapter 3
 
FIDP_1_Quarter_CSS1 (1).docx
FIDP_1_Quarter_CSS1 (1).docxFIDP_1_Quarter_CSS1 (1).docx
FIDP_1_Quarter_CSS1 (1).docx
 

More from Irsandi Hasan

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01Irsandi Hasan
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - OverviewIrsandi Hasan
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11Irsandi Hasan
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10Irsandi Hasan
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9Irsandi Hasan
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8Irsandi Hasan
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7Irsandi Hasan
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6Irsandi Hasan
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5Irsandi Hasan
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4Irsandi Hasan
 

More from Irsandi Hasan (20)

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
 

Recently uploaded

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 

Recently uploaded (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

ITE - Chapter 4

  • 1. IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter 4: Basics of Preventive Maintenance and Troubleshooting Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
  • 2. Chapter 4: Objectives  Explain the purpose of preventive maintenance.  Identify the steps of the troubleshooting process. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
  • 3. Chapter 4: Critical Concepts  What is this chapter about and why is it important?  This chapter discusses preventive maintenance and a methodology for troubleshooting computer problems. It explains the benefits of having a preventive maintenance program, including hardware and software. This chapter also outlines a process for troubleshooting computer hardware and software problems.  This chapter is important because many IT technicians are responsible for the upkeep of all of the computers at a company. Having and adhering to a preventive maintenance plan saves the company money by avoiding many types of computer problems. When a problem does occur, a technician who uses the troubleshooting methodology that is described in this chapter can, in most instances, identify and fix the problem quickly.  Preventive maintenance and troubleshooting skills are so important that they are included in almost every chapter that follows this one. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
  • 4. Chapter 4: Activities  What activities are associated with this chapter? There are no labs in this chapter. Chapter 4 Quiz Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
  • 5. Chapter 4: New Terms  What terms are introduced in this chapter? beep code 4.2.2 data backup 4.2.1 Device Manager 4.2.2 diagnostic software 4.2.2 diagnostic tools 4.2.2 Event Viewer 4.2.2 software 4.1 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
  • 6. Chapter 4: Changes  What has changed from the previous version (4.0) of ITEPC? Page 4.2.2 Identify the problem • Identify the problem. Page 4.2.3 Establish a theory of probable causes • Establish a theory of probable causes. Page 4.2.4 Determine an exact cause • Test the theory to determine the cause. • Once the theory is confirmed, determine the steps to resolve the problem. • If the theory is not confirmed, establish a new theory or escalate the problem. Page 4.2.5 Implement the solution • Establish a plan of action to resolve the problem and then implement that solution. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
  • 7. Chapter 4: Changes (continued)  What has changed from the previous version (4.0) of ITEPC? Page 4.2.6 Verify solution and full system functionality • Verify full system functionality and, if applicable, implement preventive measures. Page 4.2.7 Document findings • Document findings, actions, and outcomes. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
  • 8. Chapter 4: Classroom Management  Troubleshooting cannot be learned from a book. Hands-on practice of the steps outlined in this chapter and the information from the previous three chapters must be done by each student. •Place the students in groups of two; one student leaves the room, and the other student installs one problem in a computer. The instructor can provide a list of possible problems to install. The problems should be limited to things that students learned in previous chapters, such as loose or missing cabling, missing CMOS battery, or incorrect BIOS settings. The other student returns and solves the problem by applying the processes that the chapter describes. •Give students access to the troubleshooting section of the manual for the computers that are being used in the classroom. •Give students access to the Internet for researching error codes. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
  • 9. Chapter 4: Teaching Analogies  Preventive maintenance for a computer is similar to the following examples: • Performing a car tune-up • Brushing your teeth • Removing ice from a car windshield before you drive  Troubleshooting a computer is like troubleshooting any problem. Discuss troubleshooting processes in the following examples: • A television does not power on when you press the TV remote power button. • A clock does not consistently display the correct time. • When you insert a CD into a stereo system, music does not play. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
  • 10. Chapter 4: Suggested Class Discussions  What is the recommended preventive maintenance for the classroom printer?  What is the recommended preventive maintenance on a high-end laser printer?  What is the recommended preventive maintenance for a home computer?  What are some common mistakes when choosing cleaning supplies for computer maintenance?  A college has discovered that 500 computers are not patched for a recently discovered virus, and 58 computers do not have anti-virus software installed. These computers have been installed by college technicians. What are the implications of this? What should the college do? How should the college prevent this type of situation in the future? Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
  • 11. Chapter 4: Best Practices  Organize students to clean the office or school computers for other staff members. • Students should call and verify an appointment time to clean the computer. • Students should call after the preventive maintenance visit to ask about computer performance improvements.  Ask the technical support staff if your students can watch them work during a class period. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
  • 12. Chapter 4: Outside Reading  Cisco Systems Website  Microsoft TechNet Website Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
  • 13. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
  • 14. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14