SlideShare una empresa de Scribd logo
1 de 27
Preventive
Maintenance
and
Troubleshootin
g
-Sir Cy
Preventive Maintenance
is a regular and systematic inspection, cleaning,
and replacement of worn parts, materials, and
systems. Preventive maintenance helps to
prevent failure of parts, materials, and systems by
ensuring that they are in good working order.
is a systematic approach to locating the cause of a
fault in a computer system.
Troubleshooting
A good preventive maintenance program helps
minimize failures. With fewer failures,
there is less troubleshooting to do, thus saving an
organization time and money.
Explain the Purpose of Preventive
Maintenance
Preventive Maintenance reduces the
probability of hardware or software problems
by systematically and periodically checking
hardware and software to ensure proper
operation.
Check the condition of cables, components and
peripherals. Clean components to reduce the
likelihood of overheating. Repair or replace any
components that show signs of damage or
excessive wear.
Use the following tasks as a guide to
create a hardware maintenance
program:
Remove dust from fan intakes.
Remove dust from the power supply.
Remove dust from components
inside the computer.
Clean the mouse and keyboard.
Check and secure loose cables.
Software
Verify that installed software is current. Follow
the policies of the organization when installing
security updates, operating system updates,
and program updates. Many organizations do
not allow updates until extensive testing has
been completed. This testing is done to confirm
that the update will not cause problems with the
operating system and software.
Use the tasks listed as a guide to create a
software maintenance schedule that fits
the needs of your computer equipment:
Review security updates.
Review software updates.
Review driver updates.
Update virus definition files.
Scan for viruses and spyware.
Remove unwanted programs
Scan hard drive for errors.
Defragment hard drives.
Benifits
Be proactive in computer equipment maintenance and
data protection. By performing regular maintenance
routines, you can reduce potential hardware and
software problems. Regular maintenance routines
reduce computer downtime and repair costs.
The following are the benefits of preventive
maintenance:
Increases data protection
Extends the life of the components
Increases equipment stability
Reduces repair costs
Reduces the number of equipment failures
Identify the Steps of the Troubleshooting
Process
Troubleshooting requires an organized and logical approach
to problems with computers and other components. A logical
approach to troubleshooting allows you to eliminate
variables in a systematic order. Asking the right questions,
testing the right hardware, and examining the right data
helps you understand the problem. This helps you form a
proposed solution to try.
Troubleshooting is a skill that you will refine over
time. Each time you solve another problem, you will
increase your troubleshooting skills by gaining more
experience.
The following troubleshooting process is a guideline
that you can modify to fit your needs.
Explain the purpose of data protection.
Identify the problem.
Establish a theory of probable causes.
Test the theory to determine the exact cause.
Establish a plan of action to resolve the problem and implement
the solution.
Verify the full system functionality, and if applicable,
implement preventive measures.
Document finding, actions and outcomes.
Purpose of Data Protection
Before you begin troubleshooting problems, always follow the
necessary precautions to protect data on a computer. Some
repairs, such as replacing a hard drive or reinstalling an
operating system, might put the data on the computer at risk.
Make sure that you do everything possible to prevent data loss
while attempting repairs.
A data backup is a copy of the data on a computer hard drive
that is saved to media such as a CD, DVD, or tape drive. In an
organization, backups are routinely done on a daily, weekly, and
monthly basis.
Data Backup
Here is a list of items to verify with the customer about
data backups:
Date of the last backup
Contents of the backup
Data integrity of the backup
Availability of all backup media for
a data restore
If the customer does not have a current backup and you
are not able to create one, you should ask the customer to
sign a liability release form. A liability release form should
contain at least the following information:
Permission to work on the computer without a current
back-up available
Release of liability if data is lost or corrupted.
Description of the work to be performed.
Identify the Problem
Here is a list of some of the important information to gather
from the customer:
Customer Information
Company name
Contact name
Address
Phone number
Computer configuration
Connection type
Network environment
Operating system information
Manufacturer and model
Closed-ended questions
Description of problem
Open-ended questions
Conversation Etiquette
Do not accuse the customer of causing the problem.
When you are talking to the customer, you should follow these
guidelines:
Ask direct questions to gather information.
Do not use industry jargon when talking to customers.
Do not talk down to the customer.
Do not insult the customer.
Open-Ended Questions
What problems are you experiencing with your computer?
Closed-Ended Questions
Has anyone else used your computer recently?
Have you changed your password recently?
What where you doing when the problem was identified?
Documenting Responses
Document the information obtained from the customer in the
work order and in the repair
journal. Write down anything that you think might be
important for you or another technician.
Often, the small details can lead to the solution of a difficult
or complicated problem.
It is now time to verify the customer’s description of the
problem by gathering data from
the computer.
Event Viewer
When system, user, or software errors occur on a
computer, Event Viewer is updated with
information about the errors.
Device Manager
displays all of the devices that are configured
on a computer. Any device that the operating
system determines to be acting incorrectly is
flagged with an error icon.
Preventive maintenance and troubleshooting
Preventive maintenance and troubleshooting

Más contenido relacionado

La actualidad más candente

Bios ( Basic Input Output System )
Bios ( Basic Input Output System )Bios ( Basic Input Output System )
Bios ( Basic Input Output System )Jesthine Nesshal
 
Installing and configuring computer System
Installing and configuring computer SystemInstalling and configuring computer System
Installing and configuring computer Systemiankeithsomoza
 
Motherboard components and their functions
Motherboard components and their functionsMotherboard components and their functions
Motherboard components and their functionsBESOR ACADEMY
 
Assembling and disassembling pc. pdf
Assembling and disassembling pc. pdfAssembling and disassembling pc. pdf
Assembling and disassembling pc. pdfJohnRebenRequinto1
 
Internal System Unit Components
Internal System Unit ComponentsInternal System Unit Components
Internal System Unit Componentsolivixjohnson
 
Lo1.3 diagnosing computer systems
Lo1.3 diagnosing computer systemsLo1.3 diagnosing computer systems
Lo1.3 diagnosing computer systemsFrya Lora
 
4. motherboard
4.   motherboard4.   motherboard
4. motherboardjazz_306
 
Advanced PC Maintenance and Troubleshooting
Advanced PC Maintenance and TroubleshootingAdvanced PC Maintenance and Troubleshooting
Advanced PC Maintenance and TroubleshootingNatan Mesfin
 
Troubleshooting computer problem
Troubleshooting computer problemTroubleshooting computer problem
Troubleshooting computer problemsamsach1
 
Troubleshooting And Maintenance Fundamentals
Troubleshooting And Maintenance FundamentalsTroubleshooting And Maintenance Fundamentals
Troubleshooting And Maintenance Fundamentalsricsanmae
 
Motherboard, It's Functions and It's Components
Motherboard, It's Functions and It's ComponentsMotherboard, It's Functions and It's Components
Motherboard, It's Functions and It's ComponentsPreSolutions Softwares
 
Bios and cmos
Bios and cmosBios and cmos
Bios and cmosOnline
 
Day 3 motherboard of a pc
Day 3 motherboard of a pcDay 3 motherboard of a pc
Day 3 motherboard of a pcSaket Rai
 
Computer Parts & Functions.pdf
Computer Parts & Functions.pdfComputer Parts & Functions.pdf
Computer Parts & Functions.pdfPatrickSerrano10
 

La actualidad más candente (20)

Bios ( Basic Input Output System )
Bios ( Basic Input Output System )Bios ( Basic Input Output System )
Bios ( Basic Input Output System )
 
Installing and configuring computer System
Installing and configuring computer SystemInstalling and configuring computer System
Installing and configuring computer System
 
Pc assembly
Pc assemblyPc assembly
Pc assembly
 
Motherboard components and their functions
Motherboard components and their functionsMotherboard components and their functions
Motherboard components and their functions
 
Assembling and disassembling pc. pdf
Assembling and disassembling pc. pdfAssembling and disassembling pc. pdf
Assembling and disassembling pc. pdf
 
Motherboard ppt
Motherboard pptMotherboard ppt
Motherboard ppt
 
Internal System Unit Components
Internal System Unit ComponentsInternal System Unit Components
Internal System Unit Components
 
Lo1.3 diagnosing computer systems
Lo1.3 diagnosing computer systemsLo1.3 diagnosing computer systems
Lo1.3 diagnosing computer systems
 
4. motherboard
4.   motherboard4.   motherboard
4. motherboard
 
Advanced PC Maintenance and Troubleshooting
Advanced PC Maintenance and TroubleshootingAdvanced PC Maintenance and Troubleshooting
Advanced PC Maintenance and Troubleshooting
 
Troubleshooting computer problem
Troubleshooting computer problemTroubleshooting computer problem
Troubleshooting computer problem
 
Bios
BiosBios
Bios
 
Motherboard Components
Motherboard Components Motherboard Components
Motherboard Components
 
Troubleshooting And Maintenance Fundamentals
Troubleshooting And Maintenance FundamentalsTroubleshooting And Maintenance Fundamentals
Troubleshooting And Maintenance Fundamentals
 
Motherboard, It's Functions and It's Components
Motherboard, It's Functions and It's ComponentsMotherboard, It's Functions and It's Components
Motherboard, It's Functions and It's Components
 
Troubleshooting
TroubleshootingTroubleshooting
Troubleshooting
 
Bios and cmos
Bios and cmosBios and cmos
Bios and cmos
 
Bios
BiosBios
Bios
 
Day 3 motherboard of a pc
Day 3 motherboard of a pcDay 3 motherboard of a pc
Day 3 motherboard of a pc
 
Computer Parts & Functions.pdf
Computer Parts & Functions.pdfComputer Parts & Functions.pdf
Computer Parts & Functions.pdf
 

Destacado

Pc Preventative Maintenance Checklist
Pc Preventative Maintenance ChecklistPc Preventative Maintenance Checklist
Pc Preventative Maintenance ChecklistMiss Cheska
 
GUIDE HARDWARE AND SOFTWARE MAINTENANCE English
GUIDE HARDWARE AND SOFTWARE MAINTENANCE EnglishGUIDE HARDWARE AND SOFTWARE MAINTENANCE English
GUIDE HARDWARE AND SOFTWARE MAINTENANCE EnglishFelipe Luis Garcia C
 
Planned Maintenance.
Planned Maintenance.Planned Maintenance.
Planned Maintenance.Hal Frohreich
 
Maintaining equipment
Maintaining equipmentMaintaining equipment
Maintaining equipmentNc Das
 

Destacado (6)

Pc Preventative Maintenance Checklist
Pc Preventative Maintenance ChecklistPc Preventative Maintenance Checklist
Pc Preventative Maintenance Checklist
 
GUIDE HARDWARE AND SOFTWARE MAINTENANCE English
GUIDE HARDWARE AND SOFTWARE MAINTENANCE EnglishGUIDE HARDWARE AND SOFTWARE MAINTENANCE English
GUIDE HARDWARE AND SOFTWARE MAINTENANCE English
 
Maintenance
MaintenanceMaintenance
Maintenance
 
Planned Maintenance.
Planned Maintenance.Planned Maintenance.
Planned Maintenance.
 
Maintaining equipment
Maintaining equipmentMaintaining equipment
Maintaining equipment
 
Preventive maintenance
Preventive maintenancePreventive maintenance
Preventive maintenance
 

Similar a Preventive maintenance and troubleshooting

MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxMAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxRichardSugbo
 
Help Now Guardian Workstation
Help Now Guardian WorkstationHelp Now Guardian Workstation
Help Now Guardian WorkstationHelp Now, LLC
 
Apply Problem Solving Techniques to Routine Malfunctions.pptx
Apply Problem Solving Techniques to Routine Malfunctions.pptxApply Problem Solving Techniques to Routine Malfunctions.pptx
Apply Problem Solving Techniques to Routine Malfunctions.pptxwesendesta2
 
Network Administrator Career
Network Administrator CareerNetwork Administrator Career
Network Administrator CareerBill Kuhl
 
Task 1.Complete the BIA table below and use it for the remai
Task 1.Complete the BIA table below and use it for the remaiTask 1.Complete the BIA table below and use it for the remai
Task 1.Complete the BIA table below and use it for the remaialehosickg3
 
apply problem solve.pdf
apply problem solve.pdfapply problem solve.pdf
apply problem solve.pdfdereje33
 
chapter2 Technical Support.ppt
chapter2 Technical Support.pptchapter2 Technical Support.ppt
chapter2 Technical Support.pptMemMem25
 
Predictive Maintenance - Nanoprecise
Predictive Maintenance - NanoprecisePredictive Maintenance - Nanoprecise
Predictive Maintenance - NanopreciseNanoprecise
 
How to Improve Overall Performance & Security For Any eCommerce Website In 2023
How to Improve Overall Performance & Security For Any eCommerce Website In 2023How to Improve Overall Performance & Security For Any eCommerce Website In 2023
How to Improve Overall Performance & Security For Any eCommerce Website In 2023Galaxy Weblinks
 
3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of DataMISY
 
Netreo whitepaper 5 ways to avoid it management becoming shelfware
Netreo whitepaper   5 ways to avoid it management becoming shelfwareNetreo whitepaper   5 ways to avoid it management becoming shelfware
Netreo whitepaper 5 ways to avoid it management becoming shelfwarePeter Reynolds
 
4.1-1 Plan conduct maintenance.pdf
4.1-1 Plan conduct maintenance.pdf4.1-1 Plan conduct maintenance.pdf
4.1-1 Plan conduct maintenance.pdfkingsleigh
 
Tips for The Accidental Techie
Tips for The Accidental TechieTips for The Accidental Techie
Tips for The Accidental TechieMNA Tech
 
S M B Top 10minstakes
S M B  Top 10minstakesS M B  Top 10minstakes
S M B Top 10minstakesctnewmarket
 
2006 Best Customer Presentation 1 The Worst Way To Run A Business
2006 Best   Customer Presentation 1   The Worst Way To Run A Business2006 Best   Customer Presentation 1   The Worst Way To Run A Business
2006 Best Customer Presentation 1 The Worst Way To Run A Businesstreparks
 

Similar a Preventive maintenance and troubleshooting (20)

MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxMAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
 
Help Now Guardian Workstation
Help Now Guardian WorkstationHelp Now Guardian Workstation
Help Now Guardian Workstation
 
Apply Problem Solving Techniques to Routine Malfunctions.pptx
Apply Problem Solving Techniques to Routine Malfunctions.pptxApply Problem Solving Techniques to Routine Malfunctions.pptx
Apply Problem Solving Techniques to Routine Malfunctions.pptx
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 
Network Administrator Career
Network Administrator CareerNetwork Administrator Career
Network Administrator Career
 
Task 1.Complete the BIA table below and use it for the remai
Task 1.Complete the BIA table below and use it for the remaiTask 1.Complete the BIA table below and use it for the remai
Task 1.Complete the BIA table below and use it for the remai
 
Lesson 3.2
Lesson 3.2Lesson 3.2
Lesson 3.2
 
apply problem solve.pdf
apply problem solve.pdfapply problem solve.pdf
apply problem solve.pdf
 
Disaster Proof
Disaster ProofDisaster Proof
Disaster Proof
 
Lanlogic IT White Paper
Lanlogic IT White PaperLanlogic IT White Paper
Lanlogic IT White Paper
 
chapter2 Technical Support.ppt
chapter2 Technical Support.pptchapter2 Technical Support.ppt
chapter2 Technical Support.ppt
 
Predictive Maintenance - Nanoprecise
Predictive Maintenance - NanoprecisePredictive Maintenance - Nanoprecise
Predictive Maintenance - Nanoprecise
 
How to Improve Overall Performance & Security For Any eCommerce Website In 2023
How to Improve Overall Performance & Security For Any eCommerce Website In 2023How to Improve Overall Performance & Security For Any eCommerce Website In 2023
How to Improve Overall Performance & Security For Any eCommerce Website In 2023
 
3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of Data
 
Netreo whitepaper 5 ways to avoid it management becoming shelfware
Netreo whitepaper   5 ways to avoid it management becoming shelfwareNetreo whitepaper   5 ways to avoid it management becoming shelfware
Netreo whitepaper 5 ways to avoid it management becoming shelfware
 
4.1-1 Plan conduct maintenance.pdf
4.1-1 Plan conduct maintenance.pdf4.1-1 Plan conduct maintenance.pdf
4.1-1 Plan conduct maintenance.pdf
 
Tips for The Accidental Techie
Tips for The Accidental TechieTips for The Accidental Techie
Tips for The Accidental Techie
 
Tips For The At Web
Tips For The At WebTips For The At Web
Tips For The At Web
 
S M B Top 10minstakes
S M B  Top 10minstakesS M B  Top 10minstakes
S M B Top 10minstakes
 
2006 Best Customer Presentation 1 The Worst Way To Run A Business
2006 Best   Customer Presentation 1   The Worst Way To Run A Business2006 Best   Customer Presentation 1   The Worst Way To Run A Business
2006 Best Customer Presentation 1 The Worst Way To Run A Business
 

Más de Christian Macatangay (10)

Computer system
Computer systemComputer system
Computer system
 
Multimedia formats
Multimedia formatsMultimedia formats
Multimedia formats
 
Types of software
Types of softwareTypes of software
Types of software
 
Social impact of computers
Social impact of computersSocial impact of computers
Social impact of computers
 
Multimedia
MultimediaMultimedia
Multimedia
 
Data vs. information
Data vs. informationData vs. information
Data vs. information
 
Computer literacy
Computer literacyComputer literacy
Computer literacy
 
Computer literacy in the workplace
Computer literacy in the workplaceComputer literacy in the workplace
Computer literacy in the workplace
 
Computer Memory
Computer MemoryComputer Memory
Computer Memory
 
History of computer hardware
History of computer hardwareHistory of computer hardware
History of computer hardware
 

Último

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Último (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Preventive maintenance and troubleshooting

  • 2. Preventive Maintenance is a regular and systematic inspection, cleaning, and replacement of worn parts, materials, and systems. Preventive maintenance helps to prevent failure of parts, materials, and systems by ensuring that they are in good working order. is a systematic approach to locating the cause of a fault in a computer system. Troubleshooting
  • 3. A good preventive maintenance program helps minimize failures. With fewer failures, there is less troubleshooting to do, thus saving an organization time and money.
  • 4. Explain the Purpose of Preventive Maintenance Preventive Maintenance reduces the probability of hardware or software problems by systematically and periodically checking hardware and software to ensure proper operation.
  • 5. Check the condition of cables, components and peripherals. Clean components to reduce the likelihood of overheating. Repair or replace any components that show signs of damage or excessive wear.
  • 6. Use the following tasks as a guide to create a hardware maintenance program: Remove dust from fan intakes. Remove dust from the power supply. Remove dust from components inside the computer. Clean the mouse and keyboard. Check and secure loose cables.
  • 7. Software Verify that installed software is current. Follow the policies of the organization when installing security updates, operating system updates, and program updates. Many organizations do not allow updates until extensive testing has been completed. This testing is done to confirm that the update will not cause problems with the operating system and software.
  • 8. Use the tasks listed as a guide to create a software maintenance schedule that fits the needs of your computer equipment: Review security updates. Review software updates. Review driver updates. Update virus definition files. Scan for viruses and spyware. Remove unwanted programs Scan hard drive for errors. Defragment hard drives.
  • 9. Benifits Be proactive in computer equipment maintenance and data protection. By performing regular maintenance routines, you can reduce potential hardware and software problems. Regular maintenance routines reduce computer downtime and repair costs.
  • 10. The following are the benefits of preventive maintenance: Increases data protection Extends the life of the components Increases equipment stability Reduces repair costs Reduces the number of equipment failures
  • 11. Identify the Steps of the Troubleshooting Process Troubleshooting requires an organized and logical approach to problems with computers and other components. A logical approach to troubleshooting allows you to eliminate variables in a systematic order. Asking the right questions, testing the right hardware, and examining the right data helps you understand the problem. This helps you form a proposed solution to try.
  • 12. Troubleshooting is a skill that you will refine over time. Each time you solve another problem, you will increase your troubleshooting skills by gaining more experience.
  • 13. The following troubleshooting process is a guideline that you can modify to fit your needs. Explain the purpose of data protection. Identify the problem. Establish a theory of probable causes. Test the theory to determine the exact cause. Establish a plan of action to resolve the problem and implement the solution. Verify the full system functionality, and if applicable, implement preventive measures. Document finding, actions and outcomes.
  • 14. Purpose of Data Protection Before you begin troubleshooting problems, always follow the necessary precautions to protect data on a computer. Some repairs, such as replacing a hard drive or reinstalling an operating system, might put the data on the computer at risk. Make sure that you do everything possible to prevent data loss while attempting repairs.
  • 15. A data backup is a copy of the data on a computer hard drive that is saved to media such as a CD, DVD, or tape drive. In an organization, backups are routinely done on a daily, weekly, and monthly basis. Data Backup
  • 16. Here is a list of items to verify with the customer about data backups: Date of the last backup Contents of the backup Data integrity of the backup Availability of all backup media for a data restore
  • 17. If the customer does not have a current backup and you are not able to create one, you should ask the customer to sign a liability release form. A liability release form should contain at least the following information: Permission to work on the computer without a current back-up available Release of liability if data is lost or corrupted. Description of the work to be performed.
  • 18. Identify the Problem Here is a list of some of the important information to gather from the customer: Customer Information Company name Contact name Address Phone number
  • 19. Computer configuration Connection type Network environment Operating system information Manufacturer and model Closed-ended questions Description of problem Open-ended questions
  • 20. Conversation Etiquette Do not accuse the customer of causing the problem. When you are talking to the customer, you should follow these guidelines: Ask direct questions to gather information. Do not use industry jargon when talking to customers. Do not talk down to the customer. Do not insult the customer.
  • 21. Open-Ended Questions What problems are you experiencing with your computer? Closed-Ended Questions Has anyone else used your computer recently? Have you changed your password recently? What where you doing when the problem was identified?
  • 22. Documenting Responses Document the information obtained from the customer in the work order and in the repair journal. Write down anything that you think might be important for you or another technician. Often, the small details can lead to the solution of a difficult or complicated problem. It is now time to verify the customer’s description of the problem by gathering data from the computer.
  • 23. Event Viewer When system, user, or software errors occur on a computer, Event Viewer is updated with information about the errors.
  • 24.
  • 25. Device Manager displays all of the devices that are configured on a computer. Any device that the operating system determines to be acting incorrectly is flagged with an error icon.