SlideShare a Scribd company logo
1 of 14
Chapter 4: 
Overview of 
Preventive 
Maintenance 
IT Essentials 5.0 
© 2008 Cisco Systems, Inc. All rights reserved. Presentation_ID Cisco Confidential 1
Chapter 4 Objectives 
 4.1 Explain the purpose and benefits of preventive 
maintenance. 
 4.2 Identify and implement the steps of the 
troubleshooting process. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
The Purpose of Preventive Maintenance 
 Reduce the possibility of hardware or software 
problems by implementing a preventive Maintenance 
Plan based on at least two factors: 
•Computer location 
•Computer use 
 Benefits of Preventive Maintenance are: 
•Reduced computer down time and repair costs. 
• Increased data protection. 
•Extended life of the components. 
• Increased equipment stability. 
 Preventive Maintenance can be divided into: 
•Hardware maintenance 
•Software maintenance 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
Preventive Maintenance Tasks 
 Hardware Maintenance 
•Check the condition of cables, components, and peripherals. 
•Repair or replace any components that show signs of excess wear. 
•Keep components clean to reduce the likelihood of overheating. 
• Software Maintenance 
• Verify current version. 
•Review security, software, and driver updates. 
•Update virus definition files. 
•Scan for viruses and spyware. 
•Remove unwanted programs. 
•Scan hard drives for errors. 
•Defragment hard drives. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
The Troubleshooting Process 
 Follow an organized and 
logical procedure. 
 Eliminate variables one at a 
time. 
 Troubleshooting is a skill 
that is refined over time. 
 The first and last steps 
involve effectively 
communicating with the 
customer. 
Step Troubleshooting Process 
1 Identify the Problem 
2 Establish a Theory of Probable 
Cause 
3 Test the Theory to Determine 
Cause 
4 Establish a Plan of Action to 
Resolve the Problem and 
Implement the Solution 
5 Verify Full System Functionality 
and, if Applicable, Implement 
Preventive Measures 
6 Document Findings, Actions, 
and Outcomes 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
Data Protection 
 Before troubleshooting problems, always follow the 
necessary precautions to protect data on a computer. 
 If unsure that a backup has been done, do not attempt 
any troubleshooting activities until the following are 
verified: 
•Date of the last backup 
•Contents of the backup 
•Data integrity of the backup 
•Availability of all backup media for 
data restore 
 If no backup can be created, ask customer to sign a 
release form. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
Troubleshooting Process Steps 
Step 1 - Identify the problem 
 During the troubleshooting process, gather as much 
information from the customer as possible, but always be 
respectful. 
 Use the following strategy during this step: 
1. Start by using open-ended questions to obtain general information. 
2. Continue using closed-ended (yes/no) questions to get relevant 
information. 
3. Document the responses in the work order and in the repair journal. 
4. Verify the customer’s description by gathering data from the computer 
using applications such as: 
• Event Viewer 
• Device Manager 
• Beep Codes 
• BIOS Information 
• Diagnostic Tools 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
Troubleshooting Process Steps 
Step 2 - Establish a theory of probable cause 
 Create a list of the most common reasons why the error would 
occur. 
 Start with the easiest or most obvious causes at the top. 
Step 3 – Test the Theory to Determine cause 
 Determine the exact cause by testing the theories of probable 
cause one at a time, starting with the quickest and easiest. 
 After identifying an exact cause of the problem, determine the 
steps to resolve the problem. 
 If the exact cause of the problem has not been determined after 
all theories have been tested, establish a new theory of probable 
causes and test it. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Troubleshooting Process Steps 
Step 4 – Establish a Plan of Action to Resolve the 
Problem and Implement the solution 
After the exact cause of the problem is determined, 
establish a plan of action to resolve the problem and 
implement the solution. 
 Sometimes quick procedures can determine the exact 
cause of the problem or even correct the problem. 
 If a quick procedure does not correct the problem, further 
research is needed to establish the exact cause. 
 Divide larger problems into smaller problems that can be 
analyzed and solved individually. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
Troubleshooting Process Steps 
Step 5 – Verify Full System Functionality and, If 
Applicable, Implement Preventive Measures 
•Verify full system functionality and implement any 
preventive measures if needed. 
•Ensure that you have not created another problem 
while repairing the computer. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Troubleshooting Process Steps 
Step 6 – Document Findings, Actions, and Outcomes 
•Discuss the solution with the customer 
•Have the customer confirm that the problem has been 
solved. 
 Document the process: 
•Problem description 
•Steps to resolve the problem 
•Components used in the repair 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
PC Common Problems and Solutions 
 Storage device problems - loose or incorrect cable 
connections, incorrect drive and media formats, and 
incorrect jumper and BIOS settings. 
 Motherboard and internal component problems 
-incorrect or loose cables, failed components, incorrect 
drivers, and corrupted updates. 
 Power supply problems - faulty power supply, loose 
connections, and inadequate wattage. 
 CPU and memory problems - faulty installations, 
incorrect BIOS settings, inadequate cooling and 
ventilation, and compatibility issues. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
Chapter 4 Summary 
 Regular preventive maintenance reduces hardware 
and software problems. 
 Before beginning any repair, back up the data on a 
computer. 
 The troubleshooting process is a guideline to help 
solve computer problems in a logical and efficient 
manner. 
 Document every solution that is tried, even if it fails. 
The documentation that is created will become a useful 
resource. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14

More Related Content

What's hot

BIOS__Power-On-Self-Test.pptx
BIOS__Power-On-Self-Test.pptxBIOS__Power-On-Self-Test.pptx
BIOS__Power-On-Self-Test.pptx
SamiWhoo
 
It essentials pc hardware and software overview
It essentials pc hardware and software overviewIt essentials pc hardware and software overview
It essentials pc hardware and software overview
Ahmed Sultan
 

What's hot (20)

ITE v5.0 - Chapter 8
ITE v5.0 - Chapter 8ITE v5.0 - Chapter 8
ITE v5.0 - Chapter 8
 
ITE v5.0 - Chapter 12
ITE v5.0 - Chapter 12ITE v5.0 - Chapter 12
ITE v5.0 - Chapter 12
 
History of Windows Server
History of Windows ServerHistory of Windows Server
History of Windows Server
 
Unified Extensible Firmware Interface (UEFI)
Unified Extensible Firmware Interface (UEFI)Unified Extensible Firmware Interface (UEFI)
Unified Extensible Firmware Interface (UEFI)
 
ITE - Chapter 1
ITE - Chapter 1ITE - Chapter 1
ITE - Chapter 1
 
Bios vs uefi
Bios vs uefiBios vs uefi
Bios vs uefi
 
Uefi and bios
Uefi and biosUefi and bios
Uefi and bios
 
Windows server
Windows serverWindows server
Windows server
 
ITE v5.0 - Chapter 2
ITE v5.0 - Chapter 2ITE v5.0 - Chapter 2
ITE v5.0 - Chapter 2
 
BIOS__Power-On-Self-Test.pptx
BIOS__Power-On-Self-Test.pptxBIOS__Power-On-Self-Test.pptx
BIOS__Power-On-Self-Test.pptx
 
Windows Server 2012
Windows Server 2012Windows Server 2012
Windows Server 2012
 
The Basics of Network Troubleshooting
The Basics of Network TroubleshootingThe Basics of Network Troubleshooting
The Basics of Network Troubleshooting
 
Windows Server 2016 First Look (Part 1)
Windows Server 2016 First Look (Part 1)Windows Server 2016 First Look (Part 1)
Windows Server 2016 First Look (Part 1)
 
Installation windows server 2019 standard
Installation windows server 2019 standardInstallation windows server 2019 standard
Installation windows server 2019 standard
 
Bootable-USB.pptx
Bootable-USB.pptxBootable-USB.pptx
Bootable-USB.pptx
 
Bios and cmos
Bios and cmosBios and cmos
Bios and cmos
 
1 introduction to windows server 2016
1  introduction to windows server 20161  introduction to windows server 2016
1 introduction to windows server 2016
 
BIOS/UEFI
BIOS/UEFIBIOS/UEFI
BIOS/UEFI
 
Windows Registry
Windows RegistryWindows Registry
Windows Registry
 
It essentials pc hardware and software overview
It essentials pc hardware and software overviewIt essentials pc hardware and software overview
It essentials pc hardware and software overview
 

Viewers also liked

Follow Up Netacad[3.0]
Follow Up Netacad[3.0]Follow Up Netacad[3.0]
Follow Up Netacad[3.0]
Daniel Rosner
 

Viewers also liked (19)

ITE v5.0 - Chapter 9
ITE v5.0 - Chapter 9ITE v5.0 - Chapter 9
ITE v5.0 - Chapter 9
 
ITE - Chapter 3
ITE - Chapter 3ITE - Chapter 3
ITE - Chapter 3
 
CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2
 
CCNA Exploration 4 - Chapter 3
CCNA Exploration 4 - Chapter 3CCNA Exploration 4 - Chapter 3
CCNA Exploration 4 - Chapter 3
 
CCNA Exploration 4 - Chapter 4
CCNA Exploration 4 - Chapter 4CCNA Exploration 4 - Chapter 4
CCNA Exploration 4 - Chapter 4
 
CCNA Exploration 4 - Chapter 5
CCNA Exploration 4 - Chapter 5CCNA Exploration 4 - Chapter 5
CCNA Exploration 4 - Chapter 5
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6
 
CCNA Exploration 4 - Chapter 6
CCNA Exploration 4 - Chapter 6CCNA Exploration 4 - Chapter 6
CCNA Exploration 4 - Chapter 6
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
 
CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1
 
CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
 
CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
 
ITE - Chapter 4
ITE - Chapter 4ITE - Chapter 4
ITE - Chapter 4
 
Follow Up Netacad[3.0]
Follow Up Netacad[3.0]Follow Up Netacad[3.0]
Follow Up Netacad[3.0]
 
Ite v5.0 chapter4
Ite v5.0 chapter4Ite v5.0 chapter4
Ite v5.0 chapter4
 
It essentials (1)
It essentials (1)It essentials (1)
It essentials (1)
 

Similar to ITE v5.0 - Chapter 4

Ch 2 maintenance and safety
Ch 2 maintenance and safetyCh 2 maintenance and safety
Ch 2 maintenance and safety
mekashaw tizazu
 
Preventive maintenance and troubleshooting
Preventive maintenance and troubleshootingPreventive maintenance and troubleshooting
Preventive maintenance and troubleshooting
Christian Macatangay
 
Apply Problem Solving Techniques to Routine Malfunctions.pptx
Apply Problem Solving Techniques to Routine Malfunctions.pptxApply Problem Solving Techniques to Routine Malfunctions.pptx
Apply Problem Solving Techniques to Routine Malfunctions.pptx
wesendesta2
 
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxMAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
RichardSugbo
 
Troubleshooting.ppt
Troubleshooting.pptTroubleshooting.ppt
Troubleshooting.ppt
Guzalenka
 

Similar to ITE v5.0 - Chapter 4 (20)

Ite pc v40_chapter4
Ite pc v40_chapter4Ite pc v40_chapter4
Ite pc v40_chapter4
 
Lesson 3.2
Lesson 3.2Lesson 3.2
Lesson 3.2
 
Ch 2 maintenance and safety
Ch 2 maintenance and safetyCh 2 maintenance and safety
Ch 2 maintenance and safety
 
L05 slides
L05 slidesL05 slides
L05 slides
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
System administration(adeel khorram)
System administration(adeel khorram)System administration(adeel khorram)
System administration(adeel khorram)
 
Preventive maintenance and troubleshooting
Preventive maintenance and troubleshootingPreventive maintenance and troubleshooting
Preventive maintenance and troubleshooting
 
Apply Problem Solving Techniques to Routine Malfunctions.pptx
Apply Problem Solving Techniques to Routine Malfunctions.pptxApply Problem Solving Techniques to Routine Malfunctions.pptx
Apply Problem Solving Techniques to Routine Malfunctions.pptx
 
Plan training session
Plan training sessionPlan training session
Plan training session
 
Quick and dirty performance analysis
Quick and dirty performance analysisQuick and dirty performance analysis
Quick and dirty performance analysis
 
Net essentials6e ch13
Net essentials6e ch13Net essentials6e ch13
Net essentials6e ch13
 
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxMAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
 
Always Have a Fire Extinguisher and Other Lessons from the Celo Incentivized ...
Always Have a Fire Extinguisher and Other Lessons from the Celo Incentivized ...Always Have a Fire Extinguisher and Other Lessons from the Celo Incentivized ...
Always Have a Fire Extinguisher and Other Lessons from the Celo Incentivized ...
 
Oracle Diagnostics
Oracle                       DiagnosticsOracle                       Diagnostics
Oracle Diagnostics
 
4 pc repair
4 pc repair4 pc repair
4 pc repair
 
Guide on Raid Data Recovery
Guide on Raid Data RecoveryGuide on Raid Data Recovery
Guide on Raid Data Recovery
 
IS L02 - Development of Information Systems
IS L02 - Development of Information SystemsIS L02 - Development of Information Systems
IS L02 - Development of Information Systems
 
Chap07
Chap07Chap07
Chap07
 
Troubleshooting.ppt
Troubleshooting.pptTroubleshooting.ppt
Troubleshooting.ppt
 
API Training 10 Nov 2014
API Training 10 Nov 2014API Training 10 Nov 2014
API Training 10 Nov 2014
 

More from Irsandi Hasan

More from Irsandi Hasan (20)

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3
 
CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
 
CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

ITE v5.0 - Chapter 4

  • 1. Chapter 4: Overview of Preventive Maintenance IT Essentials 5.0 © 2008 Cisco Systems, Inc. All rights reserved. Presentation_ID Cisco Confidential 1
  • 2. Chapter 4 Objectives  4.1 Explain the purpose and benefits of preventive maintenance.  4.2 Identify and implement the steps of the troubleshooting process. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
  • 3. The Purpose of Preventive Maintenance  Reduce the possibility of hardware or software problems by implementing a preventive Maintenance Plan based on at least two factors: •Computer location •Computer use  Benefits of Preventive Maintenance are: •Reduced computer down time and repair costs. • Increased data protection. •Extended life of the components. • Increased equipment stability.  Preventive Maintenance can be divided into: •Hardware maintenance •Software maintenance Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
  • 4. Preventive Maintenance Tasks  Hardware Maintenance •Check the condition of cables, components, and peripherals. •Repair or replace any components that show signs of excess wear. •Keep components clean to reduce the likelihood of overheating. • Software Maintenance • Verify current version. •Review security, software, and driver updates. •Update virus definition files. •Scan for viruses and spyware. •Remove unwanted programs. •Scan hard drives for errors. •Defragment hard drives. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
  • 5. The Troubleshooting Process  Follow an organized and logical procedure.  Eliminate variables one at a time.  Troubleshooting is a skill that is refined over time.  The first and last steps involve effectively communicating with the customer. Step Troubleshooting Process 1 Identify the Problem 2 Establish a Theory of Probable Cause 3 Test the Theory to Determine Cause 4 Establish a Plan of Action to Resolve the Problem and Implement the Solution 5 Verify Full System Functionality and, if Applicable, Implement Preventive Measures 6 Document Findings, Actions, and Outcomes Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
  • 6. Data Protection  Before troubleshooting problems, always follow the necessary precautions to protect data on a computer.  If unsure that a backup has been done, do not attempt any troubleshooting activities until the following are verified: •Date of the last backup •Contents of the backup •Data integrity of the backup •Availability of all backup media for data restore  If no backup can be created, ask customer to sign a release form. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
  • 7. Troubleshooting Process Steps Step 1 - Identify the problem  During the troubleshooting process, gather as much information from the customer as possible, but always be respectful.  Use the following strategy during this step: 1. Start by using open-ended questions to obtain general information. 2. Continue using closed-ended (yes/no) questions to get relevant information. 3. Document the responses in the work order and in the repair journal. 4. Verify the customer’s description by gathering data from the computer using applications such as: • Event Viewer • Device Manager • Beep Codes • BIOS Information • Diagnostic Tools Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
  • 8. Troubleshooting Process Steps Step 2 - Establish a theory of probable cause  Create a list of the most common reasons why the error would occur.  Start with the easiest or most obvious causes at the top. Step 3 – Test the Theory to Determine cause  Determine the exact cause by testing the theories of probable cause one at a time, starting with the quickest and easiest.  After identifying an exact cause of the problem, determine the steps to resolve the problem.  If the exact cause of the problem has not been determined after all theories have been tested, establish a new theory of probable causes and test it. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
  • 9. Troubleshooting Process Steps Step 4 – Establish a Plan of Action to Resolve the Problem and Implement the solution After the exact cause of the problem is determined, establish a plan of action to resolve the problem and implement the solution.  Sometimes quick procedures can determine the exact cause of the problem or even correct the problem.  If a quick procedure does not correct the problem, further research is needed to establish the exact cause.  Divide larger problems into smaller problems that can be analyzed and solved individually. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
  • 10. Troubleshooting Process Steps Step 5 – Verify Full System Functionality and, If Applicable, Implement Preventive Measures •Verify full system functionality and implement any preventive measures if needed. •Ensure that you have not created another problem while repairing the computer. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
  • 11. Troubleshooting Process Steps Step 6 – Document Findings, Actions, and Outcomes •Discuss the solution with the customer •Have the customer confirm that the problem has been solved.  Document the process: •Problem description •Steps to resolve the problem •Components used in the repair Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
  • 12. PC Common Problems and Solutions  Storage device problems - loose or incorrect cable connections, incorrect drive and media formats, and incorrect jumper and BIOS settings.  Motherboard and internal component problems -incorrect or loose cables, failed components, incorrect drivers, and corrupted updates.  Power supply problems - faulty power supply, loose connections, and inadequate wattage.  CPU and memory problems - faulty installations, incorrect BIOS settings, inadequate cooling and ventilation, and compatibility issues. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
  • 13. Chapter 4 Summary  Regular preventive maintenance reduces hardware and software problems.  Before beginning any repair, back up the data on a computer.  The troubleshooting process is a guideline to help solve computer problems in a logical and efficient manner.  Document every solution that is tried, even if it fails. The documentation that is created will become a useful resource. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
  • 14. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14

Editor's Notes

  1. Cisco Networking Academy program IT Essentials 5.0 Chapter 4: Overview of Preventive Maintenance
  2. The purpose of this chapter is to introduce preventive maintenance and the troubleshooting process. Upon completion of this chapter, students will be able to perform tasks related to: 4.1 Explain the purpose of preventive maintenance 4.2 Identify the steps of the troubleshooting process
  3. 4.1.1 Preventive Maintenance Overview 4.1.1.1 Benefits of Preventive Maintenance Be proactive in computer equipment maintenance and data protection. By performing regular maintenance routines, you can reduce potential hardware and software problems. This will reduce computer down time and repair costs. A preventive maintenance plan is developed based on the needs of the equipment. A computer exposed to a dusty environment, such as a construction site, will need more attention than equipment in an office environment. High-traffic networks, such as a school network, may require additional scanning and removal of malicious software or unwanted files. Document the routine maintenance tasks that must be performed on the computer equipment and the frequency of each task. This list of tasks can then be used to create a maintenance program. Preventive maintenance is used to reduce the likelihood of hardware or software problems by systematically and periodically checking hardware and software to ensure proper operation. To protect the computer, extend the life of the components, and protect the data, proper preventive maintenance is required. Performance issues may arise without regular maintenance and cleaning. Reliable and stable equipment is a result of good preventive maintenance procedures.
  4. 4.1.1.2 Preventive Maintenance Tasks Make sure that the hardware is operating properly. Check the condition of cables, components, and peripherals. Repair or replace any components that show signs of abuse or excess wear. Keep components clean in order to reduce the likelihood of overheating. Use these tasks as a guide to create a hardware maintenance program that fits the needs of your computer equipment. Remove the dust from fan intakes. Remove dust from power supply. Remove dust from components inside the computer. Clean mouse and keyboard. Check and secure any loose cables. For example, some environments, such as construction sites, may require computer equipment to be cleaned more often than other environments. Software Maintenance Verify that the installed software is current. Follow the policies of the organization when installing security updates, operating system updates, and program updates. Many organizations do not allow updates until extensive testing has been completed. This testing is done to confirm that the update will not cause problems with the operating system and software. Use the tasks listed on the slide as a guide to create a software maintenance schedule that fits the needs of your computer equipment. Verify current version. Review security updates. Review software updates. Review driver updates. Update virus definition files. Scan for viruses and spyware. Remove unwanted programs. Scan hard drives for errors. Defragment hard drives. For example, high-traffic networks, such as a school network, may require additional scanning and removal of malicious software or unwanted files. 4.1.1.3 Clean the Case and Internal Components When dust accumulates inside the computer, it prevents the flow of air and reduces the cooling of components. Several components are important to keep clean: Heat sink and fan assembly RAM Adapter cards Motherboard Fans Power supply Internal drives 4.1.1.4 Inspect Internal Components The best method of keeping a computer in good condition is to examine the computer on a regular schedule. This is a basic checklist of components to inspect. CPU heat sink and fan assembly - Examine the CPU heat sink and fan assembly for dust buildup. Make sure that the fan can spin freely. Check that the fan power cable is secure. Check the fan while the power is on to see the fan turn. RAM connections - The RAM chips should be seated securely in the RAM slots. Sometimes the retaining clips can loosen. Reseat them, if necessary. Use compressed air to remove dust. Storage devices - Inspect all storage devices. All cables should be firmly connected. Check for loose, missing, or incorrectly set jumpers. A drive should not produce rattling, knocking, or grinding sounds. Read the manufacturer’s documentation to learn how to clean the optical drive and tape heads. You can buy laser lens cleaning kits for computer optical drives. Tape head cleaning kits are also available. Adapter cards - Adapter cards should be seated properly in their expansion slots. Loose cards can cause short circuits. Secure adapter cards with the retaining screw or clip to avoid having the cards come loose in their expansion slots. Use compressed air to remove dirt and dust on the adapter cards and the expansion slots. Screws - Loose screws can cause problems if they are not immediately fixed or removed. A loose screw in the case can cause a short circuit or roll into a position where the screw is hard to remove. Cables - Examine all cable connections. Look for broken and bent pins. Ensure that all connector retaining screws are finger-tight. Make sure cables are not crimped, pinched, or severely bent. Power devices - Inspect power strips, surge suppressors (surge protectors), and UPS devices. Make sure that there is proper and unobstructed ventilation. Replace the power device if it does not work properly. Keyboard and mouse - Use compressed air to clean the keyboard, mouse, and mouse sensor. 4.1.1.5 Environmental Concerns Follow these guidelines to help ensure optimal computer operating performance: Do not obstruct vents or airflow to the internal components. A computer can overheat if air circulation is obstructed. Keep the room temperature between 45 to 90 degrees Fahrenheit (7 to 32 degrees Celsius). Keep the humidity level between 10 to 80 percent.
  5. 4.2.1 Identify the steps of the troubleshooting process NOTE: The term customer, as used in this course, is any user that requires technical computer assistance. 4.2.1.1 Introduction to Troubleshooting Troubleshooting requires an organized and logical approach to problems with computers and other components. A logical approach to troubleshooting allows you to eliminate variables and identify causes of problems in a systematic order.
  6. 4.2.1.1 Introduction to Troubleshooting Some repairs, such as replacing a hard drive or reinstalling an operating system, may put the data on the computer at risk. Make sure that you do everything possible to prevent data loss while attempting repairs. Some data is irreplaceable. Before you attempt any type of repair or modification to a computer, make sure that the data has been properly backed up. CAUTION: Although data protection is not one of the six troubleshooting steps, you must protect data before beginning any work on a customer's computer. If your work results in data loss for the customer, you or your company could be held liable. A liability release form should contain at least the following information: Permission to work on the computer without a current backup available. Release from liability if data is lost or corrupted. Description of the work to be performed.
  7. 4.2.1.2 Identify the problem When you are talking to the customer, you should follow these guidelines: Ask direct questions to gather information. Do not use industry jargon when talking to customers. Do not talk down to the customer. Do not insult the customer. Do not accuse the customer of causing the problem. By communicating effectively, you will be able to elicit the most relevant information about the problem from the customer. Open-ended questions are used first to obtain general information and allow the customer to explain the details of the problem in their own words. Use the information collected from open-ended questions, narrow down the problem with closed-ended questions. Closed-ended questions generally require a "yes" or "no" answer. These questions are intended to get the most relevant information in the shortest time possible. The information obtained from the customer should be documented in the work order and in the repair journal. Write down anything that you think may be important for you or another technician. Often, the small details can lead to the solution of a difficult or complicated problem. Event ViewerWhen system, user, or software errors occur on a computer, the Event Viewer is updated with information about the errors. The Event Viewer application records the following information about the problem: What problem occurred Date and time of the problem Severity of the problem Source of the problem Event ID number Which user was logged in when the problem occurred Although the Event Viewer lists details about the error, you might need to further research the solution. Device ManagerThe Device Manager displays all of the devices that are configured on a computer. Any device that the operating system determines to be acting incorrectly is flagged with an error icon. This type of error has a yellow circle with an exclamation point (!). If a device is disabled, it is flagged with a red circle and an "X". A yellow question mark (?) indicates that the hardware is not functioning properly because the system does not know which driver to install for the hardware. Beep CodesEach BIOS manufacturer has a unique beep sequence for hardware failures. When troubleshooting, power on the computer and listen. As the system proceeds through the POST, most computers emit one beep to indicate that the system is booting properly. If there is an error, you might hear multiple beeps. Document the beep code sequence, and research the code to determine the specific hardware failure. BIOS InformationIf the computer boots and stops after the POST, investigate the BIOS settings to determine where to find the problem. A device might not be detected or configured properly. Refer to the motherboard manual to make sure that the BIOS settings are accurate. Diagnostic ToolsConduct research to determine which software is available to help diagnose and solve problems. There are many programs available that can help you troubleshoot hardware. Often, manufacturers of system hardware provide diagnostic tools of their own. For instance, a hard drive manufacturer, might provide a tool that you can use to boot the computer and diagnose why the hard drive does not boot Windows. Student Activity –Indentify the Problem Drag and Drop
  8. 4.2.1.3 Establish a theory of probable cause The second step in the troubleshooting process is to establish a theory of probable causes. Even though the customer may think that there is a major problem, start with the obvious issues before moving to more complex diagnoses. List the easiest or most obvious causes at the top with the more complex causes at the bottom. Here is a list of obvious issues to check: Device is powered off Surge protector is turned off Power switch for an outlet is turned off Loose external cable connections Non-bootable disk in floppy drive Incorrect boot order in BIOS You will test each of these causes in the next steps of the troubleshooting process. 4.2.1.4 Test the Theory to Determine cause As you become more experienced at troubleshooting computers, you will work through the steps in the process faster. For now, practice each step to better understand the troubleshooting process. If necessary, escalate the problem to a technician with more experience.  Before you escalate, document each test that you try. Information about the tests is vital if the problem needs to be escalated to another technician.
  9. 4.2.1.5 Establish a Plan of Action to Resolve the Problem and Implement the Solution Establish a plan of action to resolve the problem and implement the solution. Evaluate the problem and research possible solutions. Prioritize solutions starting with the easiest and fastest to implement. Create a list of possible solutions and implement them one at a time. If you implement a possible solution and it does not work, reverse the solution and try another.
  10. 4.2.1.6 Verify Full System Functionality and, If Applicable, Implement Preventive Measures After the repairs to the computer have been completed, continue the troubleshooting process by verifying full system functionality and implementing any preventive measures. Whenever possible, have the customer verify the solution and system functionality.
  11. 4.2.1.7 Document Findings, Actions, and Outcomes After the repairs to the computer have been completed, you should finish the troubleshooting process by closing with the customer. Communicate the problem and the solution to the customer verbally and in all documentation. Document in the work order and technician’s journal.
  12. 4.2.2.1 PC Common Problems and Solutions
  13. Chapter 4 Summary