SlideShare una empresa de Scribd logo
1 de 14
Chapter 12:
Advanced Troubleshooting
Advanced troubleshooting means that the probable cause is difficult to diagnose. Advanced
troubleshooting uses not only your advanced diagnostic skills when working with hardware and
software, but also the interaction between technicians and customers or other technicians. Computer
problems can be attributed to hardware, software, networks, or some combination of the three. The
way in which you work with customers and other technicians can determine how quickly and
comprehensively the problem gets diagnosed and solve.
12.1 Six Steps for Advanced Troubleshooting Computer Components and Peripherals
Step 1: Identify the Problem
Step 2: Establish a Theory of Probable Cause
Step 3 – Test the Theory to Determine Cause.
Step 4 – Establish a plan of action to resolve the problem and implement the solution.
Step 5 – Verify Full System Functionality and, if applicable, Implement Preventive Measures.
Step 6 – Document Findings, Actions and Outcomes.
12.2 Common Problems and Solutions for Operating Systems
The troubleshooting process helps resolve problems with the operating system.
A stop error is a hardware or software malfunction that causes the system to lock up. An
example of this type of error is known as the Blue Screen of Death (BSOD) and appears when the system
is unable to recover from an error. The BSOD is usually caused by device driver errors.
The Event Log and other diagnostic utilities can be used to research a stop error or BSOD error.
To prevent these types of errors, verify that the hardware and software drivers are compatible and in
addition install the latest patches and updates for the windows.
Lab 12.2.1.4, 12.2.1.5, 12.2.1.6, 12.2.1.7 & lab 12.2.1.8
12.3 Troubleshooting Process to Networks
Network problems can be attributed to hardware, software, or a combination of the two.
Common problems related to Networks
(i) Network Connection Problems
These types of connection problems are often related to incorrect TCP/IP configurations, firewall
settings, or devices that have stopped working.
(ii) Email Failure
This is not being able to send or receive email is often caused by incorrect email software
settings, firewall settings, and hardware connectivity issues
(iii) FTP and Secure Internet Connection Problems
This is often caused by incorrect IP address, port setting, or security policy. Secure Internet
connection problems are often related to incorrect certificate settings and ports blocked by
software or hardware,
Exercises
Lab 12.3.1.4,……5,……..6,……..7,……..8
12.4 Troubleshooting Process to Laptops
These problems range from the simple, such as updating a driver, to more complex
problems, such as replacing an inverter. If there is a need to replace laptop components, make
sure that the correct replacement component and tools recommended by the manufacturer.
Step 1 – Identify the Problem.
Step 2 – Establish a Theory of Probable Cause.
Step 3 – Test the Theory to Determine Cause.
Step 4 – Establish a Plan of Action to Resolve the Problem and Implement the Solution.
Step 5 – Verify Full System Functionality and, if applicable, Implement Preventive Measures.
Step 6 – Document Findings, Actions and Outcomes.
Exercise
Lab 12.4.1.4,….5,….6,….7,…..8
Troubleshooting Process to Printers
With printer problems, a technician must be able to determine if the problem exists with the device,
cable connection, or the computer to which it is attached.
Step 1 – Identify the Problem.
Step 2 – Establish a Theory of Probable Cause.

Step 3 – Test the Theory to Determine Cause.
Step 4 – Establish a Plan of Action to Resolve the Problem and Implement the Solution.
Step 5 – Verify Full System Functionality and, if applicable, Implement Preventive Measures
Step 6 – Document Findings, Actions and Outcomes.
Exercise
Lab 12.5.1.4,….5,…6,……7,…….8
12.5 Troubleshooting Process to Security
Computer technicians must be able to analyze a security threat and determine the appropriate method
to protect assets and repair damage. This process is called troubleshooting
Common Problems
(i) Malware Settings
Malware protection problems are often related to incorrect software settings or configurations.
(ii) User Accounts and Permissions
Unauthorized access or blocked access is often caused by incorrect user account settings or
incorrect permissions
(iii) Computer Security
Computer security problems can be caused by incorrect security settings in the BIOS or on the
hard drive
(iv) Firewall and Proxy Settings
Blocked connections to networked resources and the Internet are often related to incorrect
firewall and proxy rules, and incorrect port settings
Step 1 – Identify the Problem.
Step 2 – Establish a Theory of Probable Cause.
Step 3 – Test the Theory to Determine Cause.
Step 4 – Establish a Plan of Action to Resolve the Problem and Implement the Solution.
Step 5 – Verify Full System Functionality and, if applicable, Implement Preventive Measures
Step 6 – Document Findings, Actions and Outcomes.
Exercise
Lab 12.6.1.4,…5,…6,….7,……8
Questions
1. A technician arrives and asks a customer, "Can you describe the problem?" The customer
replies, "All email messages that I send have the wrong date. I have restarted the computer
several times, but this does not seem to help."
What could be the problem?
The CMOS battery has failed.
The hard drive is beginning to fail.
The MBR is corrupted.
The CPU voltage is set too low.
2.
A customer using a Windows XP computer is complaining that a new card reader is not working. A
technician tests the card reader on a Windows 7 computer and does not detect any problems. What are
two possible solutions to the problem with the XP computer? (Choose two.)
Modify the options in the BIOS.
Update the CMOS firmware.
Install additional RAM.
Download and install the driver from the manufacturer of the card reader.
Install the driver from the CD provided with the card reader.
3.
A technician is replacing an internal hard drive used as a secondary drive on a PC. After connecting the
new hardware and powering up the computer, an "OS not found" error message is displayed. What is
the most probable cause for that error message?
The USB port has too many attached devices to supply adequate power.
The motherboard needs replacing to be able to support the new hard drive.
The BIOS needs updating.
The power supply is faulty.
The hard drive jumper is set incorrectly.
4.
4. A technician is upgrading an older PC with a dual core CPU. When the PC restarts, it is slower than it
was before the upgrade. The Performance tab from the Task Manager displays only one CPU graph.
What is the most probable solution to this problem?
Update the BIOS firmware to support the dual core CPU.
Increase the amount of RAM available.
Replace the HDD with a higher capacity hard drive.
Overclock the CPU.
5.
A laptop that is running Windows XP displays "Missing NTLDR" after the POST. What are the two most
probable reasons for this problem? (Choose two.)
There is a conflict with a newly installed device.
The index service is not indexing in the correct locations.
Boot.ini is missing or damaged.
The boot order is not set correctly in the BIOS.
BOOTMGR has been corrupted.
6.
Several times during the last few days, a user has experienced the Blue Screen of Death when plugging
an external hard drive into a laptop via USB. What is a possible solution for this problem?
Upgrade the operating system.
Research the boot error beep code to identify the source of the error.
Research the STOP error and the name of the module that produced the error.
Reinstall the operating system.
7. A computer repeatedly locks without any error message. Which two conditions may be the cause of
the problem? (Choose two.)
The index service is not running.
The computer has a virus.
An update has corrupted the operating system.
The UAC has been turned off.
The user has breached the user security policy.
The CPU needs to be upgraded.
8.
What are two possible solutions to any Windows computer restarting continuously and never displaying
the desktop? (Choose two.)
Upgrade the processor.
Press F8 to open the Advanced Options menu and choose Disable Automatic Restart on System
Failure.
Access the BIOS and change the boot order options.
Run chkdsk /F /R from the recovery console.
Upgrade the video card.
Reset the hard drive jumpers.
9.
A PC is not able to connect to a wired network. Pinging the loopback address is successful, but the
gateway cannot be reached. On the network switch all the interface lights are on, except for the
interface connected to the PC. The LED on the network card is off. What is the most likely cause of this
problem?
The gateway needs to be fixed.
The network cable is faulty.
The network switch is faulty.
The PC has an incorrect IP address for the DNS server.
10.
Users in a recently installed wireless network are complaining of slow data transfer and frequent loss of
connectivity. The technician checks that the wireless security is correctly implemented, and there is no
evidence of unauthorized users on the network. Which two problems might the technician suspect?
(Choose two.)
There is interference from outside sources.
The DHCP server is faulty.
The wireless signal is too weak.
The antenna on the access point is too powerful.
The network passwords need to be reissued to the users.
11.
A group of users is unable to connect to the network. When testing several of the PCs and issuing the
command ipconfig, the technician notices that all of them have an IP address in the 169.254.x.x range.
What is the most likely cause of this problem?
Your
Response
The Internet connectiion is down.
The DHCP server is not operational.
The gateway address is incorrect.
The DNS server is not operational.
12.
A technician is working on a laptop that has a dark display. After attaching an external display and
verifying that it works, the technician now has a better idea as to the problem. What could be the
problem?
The power inverter of the LCD screen or backlight lamp has failed.
The CPU has failed.
The motherboard has failed.
The display driver is incorrect.
13.
A technician replaces a laptop keyboard that was no longer functioning, and has verified that the newly
replaced keyboard functions properly. What is the final step the technician should take as part of the
troubleshooting process?
Document all findings, actions, and outcomes.
Implement preventive measures.
Research the problem.
Ask a list of closed-ended questions.
14.
A user complains that when a page is printed on a laser printer, the page smears when touched. What is
a possible cause of this issue?
The fuser has failed.
The pickup rollers are defective.
The EP drum is damaged.
The laser assembly is faulty.
15.
A technician finds that occasionally when a network printer is restarted, clients are unable to print to it,
receiving a "Document failed to print" message. What is a probable cause of this?
The printer is configured to get an IP address using DHCP.
The toner level in the EP cartridge is low.
The drum is damaged.
The printer does not have enough memory.
The power supply on the printer is failing.
16.
A user complains that a printer is outputting random characters instead of the desired document. What
is a probable cause of this?
An incorrect print driver is installed.
The printer does not have enough memory.
There is dirt or debris in the printer.
The pickup rollers are defective.
17.
A freshly installed Windows 7 laptop is plugged into the network and configured with an IP address. The
technician then attempts to ping the laptop from another computer. While the laptop is able to connect
to other devices, the ping requests fail. What is the likely cause?
The Windows Firewall is blocking ping requests.
The port speed for the NIC is incorrect.
The network drivers for the NIC are out of date.
TPM must be enabled.
18.
A computer displays this message when the computer boots: "MBR has been changed or modified."
What could cause this problem?
A boot sector virus has altered the master boot record.
A virus has altered the Windows kernel.
The CMOS battery has failed.
A RAM module is not fully inserted into the memory slot.
19.
Users are complaining that they are receiving spam from the email account that belongs to a co-worker.
What could cause this problem?
The email account belonging to the co-worker was hijacked because of malware.
The email client belonging to the co-worker is not configured properly.
The network adapter on the computer that is used by the co-worker is malfunctioning.
A virus has damaged the master boot record on the system that is used by the co-worker.
20.
A technician is troubleshooting a laptop that has the power light on and the hard drive spinning.
However, the laptop only displays vertical lines that change color. What is the problem?
The LCD screen inverter has failed.
The backlight lamp has failed.
The LCD screen has failed.
The BIOS is corrupt.
21.
A technician is troubleshooting a laser printer that outputs blank paper for all print jobs including printer
test pages. What is a probable cause?
The drum is failing to hold a charge.
The drum wiper blade is worn.
The laser printer does not have adequate memory.
The fuser has failed.
22.
A technician is troubleshooting a Windows 7 laptop infected with a virus that has damaged the master
boot record. The technician has booted the laptop using the installation media and is attempting to
repair the laptop from the command line interface. Which two commands can the technician use to
repair the corrupt master boot record? (Choose two.)
bootrec /fixboot
bootrec /fixmbr
chkdsk
regedit
regedt32

Más contenido relacionado

La actualidad más candente

ITE v5.0 - Chapter 12
ITE v5.0 - Chapter 12ITE v5.0 - Chapter 12
ITE v5.0 - Chapter 12Irsandi Hasan
 
Modul 1-sample-test
Modul 1-sample-testModul 1-sample-test
Modul 1-sample-teststacio
 
Ge powerpoint presentation group 4!
Ge powerpoint presentation group 4!Ge powerpoint presentation group 4!
Ge powerpoint presentation group 4!Kenneth Regalado
 
I Tservices Group Consultancy
I Tservices Group  ConsultancyI Tservices Group  Consultancy
I Tservices Group ConsultancyDBALLIANCE Ltd UK
 
Ict 9 module 3, lesson 3 conducting test on the installed computer system
Ict 9 module 3, lesson 3 conducting test on the installed computer systemIct 9 module 3, lesson 3 conducting test on the installed computer system
Ict 9 module 3, lesson 3 conducting test on the installed computer systemYonel Cadapan
 
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...Michael Lew
 
ITE v5.0 - Chapter 2
ITE v5.0 - Chapter 2ITE v5.0 - Chapter 2
ITE v5.0 - Chapter 2Irsandi Hasan
 
ITE v5.0 - Chapter 3
ITE v5.0 - Chapter 3ITE v5.0 - Chapter 3
ITE v5.0 - Chapter 3Irsandi Hasan
 
ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4Irsandi Hasan
 
Operating systems
Operating systemsOperating systems
Operating systemssandrahezro
 

La actualidad más candente (20)

ITE - Chapter 13
ITE - Chapter 13ITE - Chapter 13
ITE - Chapter 13
 
Test System and Network
Test System and NetworkTest System and Network
Test System and Network
 
ITE v5.0 - Chapter 12
ITE v5.0 - Chapter 12ITE v5.0 - Chapter 12
ITE v5.0 - Chapter 12
 
Ite pc v40_chapter8
Ite pc v40_chapter8Ite pc v40_chapter8
Ite pc v40_chapter8
 
Ite pc v40_chapter9
Ite pc v40_chapter9Ite pc v40_chapter9
Ite pc v40_chapter9
 
Ite pc v40_chapter2
Ite pc v40_chapter2Ite pc v40_chapter2
Ite pc v40_chapter2
 
Modul 1-sample-test
Modul 1-sample-testModul 1-sample-test
Modul 1-sample-test
 
Ge powerpoint presentation group 4!
Ge powerpoint presentation group 4!Ge powerpoint presentation group 4!
Ge powerpoint presentation group 4!
 
Ite pc v40_chapter5
Ite pc v40_chapter5Ite pc v40_chapter5
Ite pc v40_chapter5
 
I Tservices Group Consultancy
I Tservices Group  ConsultancyI Tservices Group  Consultancy
I Tservices Group Consultancy
 
Ict 9 module 3, lesson 3 conducting test on the installed computer system
Ict 9 module 3, lesson 3 conducting test on the installed computer systemIct 9 module 3, lesson 3 conducting test on the installed computer system
Ict 9 module 3, lesson 3 conducting test on the installed computer system
 
Ite pc v40_chapter1
Ite pc v40_chapter1Ite pc v40_chapter1
Ite pc v40_chapter1
 
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
 
Ite pc v40_chapter3
Ite pc v40_chapter3Ite pc v40_chapter3
Ite pc v40_chapter3
 
ITE v5.0 - Chapter 2
ITE v5.0 - Chapter 2ITE v5.0 - Chapter 2
ITE v5.0 - Chapter 2
 
ITE v5.0 - Chapter 3
ITE v5.0 - Chapter 3ITE v5.0 - Chapter 3
ITE v5.0 - Chapter 3
 
ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4
 
Ite v5.0 chapter4
Ite v5.0 chapter4Ite v5.0 chapter4
Ite v5.0 chapter4
 
ITE - Chapter 10
ITE - Chapter 10ITE - Chapter 10
ITE - Chapter 10
 
Operating systems
Operating systemsOperating systems
Operating systems
 

Similar a Chapter 12.0

Network Troubleshooting
Network TroubleshootingNetwork Troubleshooting
Network TroubleshootingJoy Sarker
 
IT Essentials (Version 7.0) - ITE Chapter 11 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 11 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 11 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 11 Exam AnswersITExamAnswers.net
 
Error,Failure and Risk
Error,Failure and RiskError,Failure and Risk
Error,Failure and RiskNazrul Islam
 
Introduction to Basic IT Knowledge.pptx
Introduction to Basic IT  Knowledge.pptxIntroduction to Basic IT  Knowledge.pptx
Introduction to Basic IT Knowledge.pptxsboral2
 
Network Administrator Career
Network Administrator CareerNetwork Administrator Career
Network Administrator CareerBill Kuhl
 
Troubleshooting-computer-system-network-1.pptx
Troubleshooting-computer-system-network-1.pptxTroubleshooting-computer-system-network-1.pptx
Troubleshooting-computer-system-network-1.pptxkylejustinferrer
 
Types of Computer System Errors.pptx
Types of Computer System Errors.pptxTypes of Computer System Errors.pptx
Types of Computer System Errors.pptxArjunePantallano1
 
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxMAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxRichardSugbo
 
Final exam results
Final exam resultsFinal exam results
Final exam resultsDale Vick
 
lesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handoutslesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handoutslorbz
 
apply problem solve.pdf
apply problem solve.pdfapply problem solve.pdf
apply problem solve.pdfdereje33
 
Network Troubleshooting.pptx
Network Troubleshooting.pptxNetwork Troubleshooting.pptx
Network Troubleshooting.pptxMohamedSafeer14
 
DIAGNOSE AND and Troubleshoot.pptx
DIAGNOSE AND and Troubleshoot.pptxDIAGNOSE AND and Troubleshoot.pptx
DIAGNOSE AND and Troubleshoot.pptxVincentAcapen
 

Similar a Chapter 12.0 (20)

Network Troubleshooting
Network TroubleshootingNetwork Troubleshooting
Network Troubleshooting
 
IT Essentials (Version 7.0) - ITE Chapter 11 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 11 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 11 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 11 Exam Answers
 
Error,Failure and Risk
Error,Failure and RiskError,Failure and Risk
Error,Failure and Risk
 
Introduction to Basic IT Knowledge.pptx
Introduction to Basic IT  Knowledge.pptxIntroduction to Basic IT  Knowledge.pptx
Introduction to Basic IT Knowledge.pptx
 
Lesson 3.2
Lesson 3.2Lesson 3.2
Lesson 3.2
 
Network Administrator Career
Network Administrator CareerNetwork Administrator Career
Network Administrator Career
 
Troubleshooting-computer-system-network-1.pptx
Troubleshooting-computer-system-network-1.pptxTroubleshooting-computer-system-network-1.pptx
Troubleshooting-computer-system-network-1.pptx
 
Types of Computer System Errors.pptx
Types of Computer System Errors.pptxTypes of Computer System Errors.pptx
Types of Computer System Errors.pptx
 
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxMAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
 
Final exam results
Final exam resultsFinal exam results
Final exam results
 
Kk3
Kk3Kk3
Kk3
 
lesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handoutslesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handouts
 
apply problem solve.pdf
apply problem solve.pdfapply problem solve.pdf
apply problem solve.pdf
 
Virginiatools
VirginiatoolsVirginiatools
Virginiatools
 
Virginiatools
VirginiatoolsVirginiatools
Virginiatools
 
Virginiatools
VirginiatoolsVirginiatools
Virginiatools
 
5 stepmainttut
5 stepmainttut5 stepmainttut
5 stepmainttut
 
Lesson 3.1
Lesson 3.1Lesson 3.1
Lesson 3.1
 
Network Troubleshooting.pptx
Network Troubleshooting.pptxNetwork Troubleshooting.pptx
Network Troubleshooting.pptx
 
DIAGNOSE AND and Troubleshoot.pptx
DIAGNOSE AND and Troubleshoot.pptxDIAGNOSE AND and Troubleshoot.pptx
DIAGNOSE AND and Troubleshoot.pptx
 

Último

Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesVijayaLaxmi84
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptxmary850239
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 

Último (20)

Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their uses
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 

Chapter 12.0

  • 1. Chapter 12: Advanced Troubleshooting Advanced troubleshooting means that the probable cause is difficult to diagnose. Advanced troubleshooting uses not only your advanced diagnostic skills when working with hardware and software, but also the interaction between technicians and customers or other technicians. Computer problems can be attributed to hardware, software, networks, or some combination of the three. The way in which you work with customers and other technicians can determine how quickly and comprehensively the problem gets diagnosed and solve. 12.1 Six Steps for Advanced Troubleshooting Computer Components and Peripherals Step 1: Identify the Problem Step 2: Establish a Theory of Probable Cause Step 3 – Test the Theory to Determine Cause.
  • 2. Step 4 – Establish a plan of action to resolve the problem and implement the solution. Step 5 – Verify Full System Functionality and, if applicable, Implement Preventive Measures. Step 6 – Document Findings, Actions and Outcomes. 12.2 Common Problems and Solutions for Operating Systems The troubleshooting process helps resolve problems with the operating system. A stop error is a hardware or software malfunction that causes the system to lock up. An example of this type of error is known as the Blue Screen of Death (BSOD) and appears when the system is unable to recover from an error. The BSOD is usually caused by device driver errors. The Event Log and other diagnostic utilities can be used to research a stop error or BSOD error. To prevent these types of errors, verify that the hardware and software drivers are compatible and in addition install the latest patches and updates for the windows. Lab 12.2.1.4, 12.2.1.5, 12.2.1.6, 12.2.1.7 & lab 12.2.1.8 12.3 Troubleshooting Process to Networks Network problems can be attributed to hardware, software, or a combination of the two. Common problems related to Networks (i) Network Connection Problems
  • 3. These types of connection problems are often related to incorrect TCP/IP configurations, firewall settings, or devices that have stopped working. (ii) Email Failure This is not being able to send or receive email is often caused by incorrect email software settings, firewall settings, and hardware connectivity issues (iii) FTP and Secure Internet Connection Problems This is often caused by incorrect IP address, port setting, or security policy. Secure Internet connection problems are often related to incorrect certificate settings and ports blocked by software or hardware, Exercises Lab 12.3.1.4,……5,……..6,……..7,……..8 12.4 Troubleshooting Process to Laptops These problems range from the simple, such as updating a driver, to more complex problems, such as replacing an inverter. If there is a need to replace laptop components, make sure that the correct replacement component and tools recommended by the manufacturer. Step 1 – Identify the Problem. Step 2 – Establish a Theory of Probable Cause.
  • 4. Step 3 – Test the Theory to Determine Cause. Step 4 – Establish a Plan of Action to Resolve the Problem and Implement the Solution. Step 5 – Verify Full System Functionality and, if applicable, Implement Preventive Measures. Step 6 – Document Findings, Actions and Outcomes. Exercise Lab 12.4.1.4,….5,….6,….7,…..8 Troubleshooting Process to Printers With printer problems, a technician must be able to determine if the problem exists with the device, cable connection, or the computer to which it is attached. Step 1 – Identify the Problem.
  • 5. Step 2 – Establish a Theory of Probable Cause. Step 3 – Test the Theory to Determine Cause. Step 4 – Establish a Plan of Action to Resolve the Problem and Implement the Solution. Step 5 – Verify Full System Functionality and, if applicable, Implement Preventive Measures
  • 6. Step 6 – Document Findings, Actions and Outcomes. Exercise Lab 12.5.1.4,….5,…6,……7,…….8 12.5 Troubleshooting Process to Security Computer technicians must be able to analyze a security threat and determine the appropriate method to protect assets and repair damage. This process is called troubleshooting Common Problems (i) Malware Settings Malware protection problems are often related to incorrect software settings or configurations. (ii) User Accounts and Permissions Unauthorized access or blocked access is often caused by incorrect user account settings or incorrect permissions (iii) Computer Security Computer security problems can be caused by incorrect security settings in the BIOS or on the hard drive (iv) Firewall and Proxy Settings Blocked connections to networked resources and the Internet are often related to incorrect firewall and proxy rules, and incorrect port settings Step 1 – Identify the Problem.
  • 7. Step 2 – Establish a Theory of Probable Cause. Step 3 – Test the Theory to Determine Cause. Step 4 – Establish a Plan of Action to Resolve the Problem and Implement the Solution. Step 5 – Verify Full System Functionality and, if applicable, Implement Preventive Measures
  • 8. Step 6 – Document Findings, Actions and Outcomes. Exercise Lab 12.6.1.4,…5,…6,….7,……8 Questions 1. A technician arrives and asks a customer, "Can you describe the problem?" The customer replies, "All email messages that I send have the wrong date. I have restarted the computer several times, but this does not seem to help." What could be the problem? The CMOS battery has failed. The hard drive is beginning to fail. The MBR is corrupted. The CPU voltage is set too low. 2. A customer using a Windows XP computer is complaining that a new card reader is not working. A technician tests the card reader on a Windows 7 computer and does not detect any problems. What are two possible solutions to the problem with the XP computer? (Choose two.) Modify the options in the BIOS. Update the CMOS firmware. Install additional RAM. Download and install the driver from the manufacturer of the card reader. Install the driver from the CD provided with the card reader. 3. A technician is replacing an internal hard drive used as a secondary drive on a PC. After connecting the
  • 9. new hardware and powering up the computer, an "OS not found" error message is displayed. What is the most probable cause for that error message? The USB port has too many attached devices to supply adequate power. The motherboard needs replacing to be able to support the new hard drive. The BIOS needs updating. The power supply is faulty. The hard drive jumper is set incorrectly. 4. 4. A technician is upgrading an older PC with a dual core CPU. When the PC restarts, it is slower than it was before the upgrade. The Performance tab from the Task Manager displays only one CPU graph. What is the most probable solution to this problem? Update the BIOS firmware to support the dual core CPU. Increase the amount of RAM available. Replace the HDD with a higher capacity hard drive. Overclock the CPU. 5. A laptop that is running Windows XP displays "Missing NTLDR" after the POST. What are the two most probable reasons for this problem? (Choose two.) There is a conflict with a newly installed device. The index service is not indexing in the correct locations. Boot.ini is missing or damaged. The boot order is not set correctly in the BIOS. BOOTMGR has been corrupted. 6. Several times during the last few days, a user has experienced the Blue Screen of Death when plugging an external hard drive into a laptop via USB. What is a possible solution for this problem? Upgrade the operating system. Research the boot error beep code to identify the source of the error. Research the STOP error and the name of the module that produced the error.
  • 10. Reinstall the operating system. 7. A computer repeatedly locks without any error message. Which two conditions may be the cause of the problem? (Choose two.) The index service is not running. The computer has a virus. An update has corrupted the operating system. The UAC has been turned off. The user has breached the user security policy. The CPU needs to be upgraded. 8. What are two possible solutions to any Windows computer restarting continuously and never displaying the desktop? (Choose two.) Upgrade the processor. Press F8 to open the Advanced Options menu and choose Disable Automatic Restart on System Failure. Access the BIOS and change the boot order options. Run chkdsk /F /R from the recovery console. Upgrade the video card. Reset the hard drive jumpers. 9. A PC is not able to connect to a wired network. Pinging the loopback address is successful, but the gateway cannot be reached. On the network switch all the interface lights are on, except for the interface connected to the PC. The LED on the network card is off. What is the most likely cause of this problem? The gateway needs to be fixed. The network cable is faulty.
  • 11. The network switch is faulty. The PC has an incorrect IP address for the DNS server. 10. Users in a recently installed wireless network are complaining of slow data transfer and frequent loss of connectivity. The technician checks that the wireless security is correctly implemented, and there is no evidence of unauthorized users on the network. Which two problems might the technician suspect? (Choose two.) There is interference from outside sources. The DHCP server is faulty. The wireless signal is too weak. The antenna on the access point is too powerful. The network passwords need to be reissued to the users. 11. A group of users is unable to connect to the network. When testing several of the PCs and issuing the command ipconfig, the technician notices that all of them have an IP address in the 169.254.x.x range. What is the most likely cause of this problem? Your Response The Internet connectiion is down. The DHCP server is not operational. The gateway address is incorrect. The DNS server is not operational. 12. A technician is working on a laptop that has a dark display. After attaching an external display and verifying that it works, the technician now has a better idea as to the problem. What could be the problem? The power inverter of the LCD screen or backlight lamp has failed. The CPU has failed. The motherboard has failed. The display driver is incorrect.
  • 12. 13. A technician replaces a laptop keyboard that was no longer functioning, and has verified that the newly replaced keyboard functions properly. What is the final step the technician should take as part of the troubleshooting process? Document all findings, actions, and outcomes. Implement preventive measures. Research the problem. Ask a list of closed-ended questions. 14. A user complains that when a page is printed on a laser printer, the page smears when touched. What is a possible cause of this issue? The fuser has failed. The pickup rollers are defective. The EP drum is damaged. The laser assembly is faulty. 15. A technician finds that occasionally when a network printer is restarted, clients are unable to print to it, receiving a "Document failed to print" message. What is a probable cause of this? The printer is configured to get an IP address using DHCP. The toner level in the EP cartridge is low. The drum is damaged. The printer does not have enough memory. The power supply on the printer is failing. 16. A user complains that a printer is outputting random characters instead of the desired document. What is a probable cause of this? An incorrect print driver is installed. The printer does not have enough memory. There is dirt or debris in the printer. The pickup rollers are defective. 17.
  • 13. A freshly installed Windows 7 laptop is plugged into the network and configured with an IP address. The technician then attempts to ping the laptop from another computer. While the laptop is able to connect to other devices, the ping requests fail. What is the likely cause? The Windows Firewall is blocking ping requests. The port speed for the NIC is incorrect. The network drivers for the NIC are out of date. TPM must be enabled. 18. A computer displays this message when the computer boots: "MBR has been changed or modified." What could cause this problem? A boot sector virus has altered the master boot record. A virus has altered the Windows kernel. The CMOS battery has failed. A RAM module is not fully inserted into the memory slot. 19. Users are complaining that they are receiving spam from the email account that belongs to a co-worker. What could cause this problem? The email account belonging to the co-worker was hijacked because of malware. The email client belonging to the co-worker is not configured properly. The network adapter on the computer that is used by the co-worker is malfunctioning. A virus has damaged the master boot record on the system that is used by the co-worker. 20. A technician is troubleshooting a laptop that has the power light on and the hard drive spinning. However, the laptop only displays vertical lines that change color. What is the problem? The LCD screen inverter has failed. The backlight lamp has failed. The LCD screen has failed. The BIOS is corrupt. 21.
  • 14. A technician is troubleshooting a laser printer that outputs blank paper for all print jobs including printer test pages. What is a probable cause? The drum is failing to hold a charge. The drum wiper blade is worn. The laser printer does not have adequate memory. The fuser has failed. 22. A technician is troubleshooting a Windows 7 laptop infected with a virus that has damaged the master boot record. The technician has booted the laptop using the installation media and is attempting to repair the laptop from the command line interface. Which two commands can the technician use to repair the corrupt master boot record? (Choose two.) bootrec /fixboot bootrec /fixmbr chkdsk regedit regedt32