Вы находитесь на странице: 1из 25

Unit 8: Troubleshoot and Repair Maintenance Features of Motherboard

 Motherboard varies greatly in supporting various types of components.


Content:  Motherboard supports a single type of CPU and few types of memories.
8.1 Mother Board (Form factor, Parts, Chipset and controller, Buses and BIOS, Ports, Processor,  Video cards, hard disks, sound cards have to be compatible with the motherboard to
Memory, Input/output Devices) function properly.
8.2 Power Supply (SMPS Concept, UPS)  Motherboards, cases, and power supplies must be compatible to work properly
8.3 Input Devices (Keyboard, Mouse, Light Pen, Scanner, Optical Character Recognition) together.
8.4 Installing, Repairing and Upgrading Operating System Form Factor
8.5 PC Maintenance and Troubleshooting Strategies The form factor is the specification of a motherboard – the dimensions, power supply type,
8.6 Maintaining and Optimizing Operating System Performance location of mounting holes, number of ports on the back panel, etc.
8.7 Troubleshooting Operating System and Applications Startup Problems The form factor affects where individual components go and the shape of the computer's case.
8.8 Troubleshooting Hardware Problems There are several specific form factors that most PC motherboards use so that they can all fit in
8.9 Connecting to and Setting up a Network using Operating System standard cases.
8.10 Operating System Resources on a Network and Security Strategies A PC motherboard is the main circuit board within a typical desktop computer, laptop or server.
8.11 Supporting Printers Its main functions are as follows:
8.12 Video Display Problems (Video Modes, Resolution, Color, Size)  To serve as a central backbone to which all other modular parts such as CPU, RAM,
8.13 Virus Detection and Protection (Background of viruses, Virus scanning and Antivirus and hard drives can be attached as required to create a computer
software)  To be interchangeable (in most cases) with different components (in particular CPU
8.14 Disaster Recovery (Risk of data, Backup methods devices and media, Backup scheduling, and expansion cards) for the purposes of customization and upgrading
Recovery of data)
 To distribute power to other circuit boards
 To electronically co-ordinate and interface the operation of the components
Specific Objective:
Some of the form factors standards are listed below:
 Troubleshoot different parts of a computer (motherboard, power supply and input devices)
XT, AT, ATX, Nano-ITX, Mobile-ITX, HPTX, ATX/EATX/SSI EEB/SSI CEB,MicroATX,
 Install, repair and upgrade Operating System. FlexATX, DTX/Mini-DTX, Mini-ITX
 Troubleshoot other hardware problems.
 Set up a small network using network devices and cabling. Parts
 Troubleshoot display problems. Processor Socket
 Install antivirus software and demonstrate virus scanning. The processor socket is the central piece of a motherboard, usually being located near the center
 Learn and show how to backup data for disaster recovery. of the motherboard. It’s also the central piece because it holds the processor – the brain of your
computer.
8.1 Mother Board (Form factor, Parts, Chipset and controller, Buses and BIOS) Power Connectors
The power connector, commonly a 20 or 24-pin connector, can be situated either near the right
edge of the motherboard, or somewhere close to the processor socket on older motherboards.
Newer motherboards have an additional 4-pin or 8-pin connector near the processor, used to
supply additional power directly to the processor.
Memory Slots
The memory slots are used to house the computer’s memory modules. The number of slots can
The motherboard serves as a single platform to connect all of the parts of a computer together. It vary, depending on motherboard, from 2, in low-end motherboards, all the way up to 8 memory
connects the CPU, memory, hard drives, optical drives, video card, sound card, and other ports slots, on high-end and gaming motherboards.
and expansion cards directly or via cables. It can be considered as the backbone of a computer. Video Card Slot
Motherboard contains ports to connect all of the internal components. It provides a single socket Motherboard video card slots come in three main different types: PCI, AGP, and PCI Express.
for CPU, whereas for memory, normally one or more slots are available. Motherboards provide The connectors are physically different for each card type, and they are not interchangeable.
ports to attach the floppy drive, hard drive, and optical drives via ribbon cables. Motherboard Expansion Slots
carries fans and a special port designed for power supply. Expansions have the role of letting you install additional components to enhance or expand the
There is a peripheral card slot in front of the motherboard using which video cards, sound cards, functionality of your PC.
and other expansion cards can be connected to the motherboard. The number of slots is usually dependent on the format of the motherboard – larger
On the left side, motherboards carry a number of ports to connect the monitor, printer, mouse, motherboards (full ATX) have more, while smaller formats (micro-ATX) have fewer, if any.
keyboard, speaker, and network cables. Motherboards also provide USB ports, which allow IDE and SATA Ports
compatible devices to be connected in plug-in/plug-out fashion. For example, pen drive, digital IDE and SATA ports are used to provide connectivity for the storage devices and optical drives.
cameras, etc. The IDE interface is somewhat outdated, it was replaced by the smaller and much faster SATA
interface. SATA is an interface used to connect ATA hard drives to a computer's motherboard. computer manufacturers design systems so that the BIOS is copied from ROM to RAM each
SATA transfer rates start at 150MBps, which is significantly faster than even the fastest time the computer is booted. This is known as shadowing.
100MBps ATA/100 drives.
BIOS Chip and Battery Ports
The BIOS chip contains the basic code needed to take your computer through the boot process, A port is a physical docking point using which an external device can be connected to the
up to the point where the operating system takes over. Since the BIOS code is stored on a computer. It can also be programmatic docking point through which information flows from a
memory chip that needs constant power to function, a battery is also present to keep the chip program to the computer or over the Internet.
powered when the computer is unplugged. Let us now discuss a few important types of ports −
Northbridge and Southbridge Serial Port
The Northbridge is responsible for coordinating the data flow between the memory, the video  Used for external modems and older computer mouse
card and the processor.  Two versions: 9 pin, 25 pin model
A secondary chip, known as Southbridge, has a similar function, coordinating the data flow  Data travels at 115 kilobits per second
between the processor and peripherals such as sound cards or network cards. Parallel Port
Front Panel Connectors, USB Headers and Audio Header  Used for scanners and printers
The front panel connector is where all the elements present on the front of your case are  Also called printer port
connected. Power button, reset button, power led, audio connectors and USB connectors – they  25 pin model
are all connected to the front panel or the corresponding headers.
 IEEE 1284-compliant Centronics port
PS/2 Port
Chipset and controller
 Used for old computer keyboard and mouse
A chipset is a group of interdependent motherboard chips or integrated circuits that control the
flow of data and instructions between the central processing unit (CPU) or microprocessor and  Also called mouse port
external devices. A chipset controls external buses, memory cache and some peripherals. A CPU  Most of the old computers provide two PS/2 port, each for the mouse and keyboard
is unable to function without impeccable chipset timing. In computing and especially in  IEEE 1284-compliant Centronics port
computer hardware, a controller is a chip, an expansion card, or a stand-alone device that Universal Serial Bus (or USB) Port
interfaces with a peripheral device.  It can connect all kinds of external USB devices such as external hard disk, printer,
In desktop computers the controller may be a plug in board, a single integrated circuit on the scanner, mouse, keyboard, etc.
motherboard, or an external device. In mainframes the controller is usually either a separate  It was introduced in 1997.
device attached to a channel or integrated into the peripheral. There are different types of  Most of the computers provide two USB ports as minimum.
controller Graphics controller, ATA/ATAPI or SCSI controller, USB controller, Programmable  Data travels at 12 megabits per seconds.
Interrupt Controller, Keyboard controller, Memory controller etc.  USB compliant devices can get power from a USB port.
VGA Port
Buses and BIOS  Connects monitor to a computer's video card.
A bus is a common pathway through which information flows from one computer component to  It has 15 holes.
another. This pathway is used for communication purpose and it is established between two or  Similar to the serial port connector. However, serial port connector has pins, VGA port
more computer components. A bus is capable of being a parallel or serial bus and today all has holes.
computers utilize two bus types, an internal bus or local bus and an external bus, also called the Power Connector
expansion bus. An internal bus enables communication between internal components such as a  Three-pronged plug.
video card and memory. An external bus is capable of communicating with external components  Connects to the computer's power cable that plugs into a power bar or wall socket.
such as a USB device. A computer or device's bus speed is listed in MHz, e.g., 100 MHz FSB. Firewire Port
The throughput of a bus is measured in bits per second or megabytes per second. Data sharing,
 Transfers large amount of data at very fast speed.
Addressing, Power, Timing etc are the major functions of bus in computer.
 Connects camcorders and video equipment to the computer.
BIOS, which stands for Basic Input Output System, is software stored on a small memory chip
on the motherboard which is non-volatile firmware used to perform hardware initialization  Data travels at 400 to 800 megabits per seconds.
during the booting process (power-on startup), and to provide runtime services for operating  Invented by Apple.
systems and programs. The BIOS firmware comes pre-installed on a personal computer's system  It has three variants: 4-Pin FireWire 400 connector, 6-Pin FireWire 400 connector, and
board, and it is the first software to run when powered on. BIOS instructs the computer on how 9-Pin FireWire 800 connector.
to perform a number of basic functions such as booting and keyboard control. Ethernet Port
It performs POST, which is the sequence of system checks that the BIOS goes through every  Connects to a network and high speed Internet.
time computer is started The BIOS is typically stored in a ROM chip that comes with the  Connects the network cable to a computer.
computer (it is often called a ROM BIOS). Because RAM is faster than ROM, though, many  This port resides on an Ethernet Card.
 Data travels at 10 megabits to 1000 megabits per seconds depending upon the network - It consumes less access time as compared to main memory.
bandwidth. - It stores the program that can be executed within a short period of time.
Digital Video Interface, DVI port - It stores data for temporary use.
 Connects Flat panel LCD monitor to the computer's high-end video graphic cards. Disadvantages
 Very popular among video card manufacturers. - Cache memory has limited capacity.
- It is very expensive.
Processor ii) Primary Memory/Main Memory
Primary memory holds only those data and instructions on which the computer is currently
working. It has a limited capacity and data is lost when power is switched off. It is generally
made up of semiconductor device. These memories are not as fast as registers. The data and
instruction required to be processed resides in the main memory. It is divided into two
subcategories RAM and ROM.
Characteristics of Main Memory
- These are semiconductor memories.
A processor, or "microprocessor," is a small chip that resides in computers and other electronic
- It is known as the main memory.
devices to receive input and provide the appropriate output. A processor performs arithmetical,
logical, input/output (I/O) and other basic instructions that are passed from an operating system - Usually volatile memory.
(OS). Most other processes are dependent on the operations of a processor. - Data is lost in case power is switched off.
The central processor of a computer is also known as the CPU, or "central processing unit." This - It is the working memory of the computer.
processor handles all the basic system instructions, such as processing mouse and keyboard - Faster than secondary memories.
input and running applications. Besides the central processing unit, most desktop and laptop - A computer cannot run without the primary memory.
computers also include a GPU. This processor is specifically designed for rendering graphics iii) Secondary Memory
that are output on a monitor. This type of memory is also known as external memory or non-volatile. It is slower than the
There are different types of processors in computer: main memory. These are used for storing data/information permanently. CPU directly does not
 CPU – central processing unit access these memories, instead they are accessed via input-output routines. The contents of
 GPU – graphics processing unit secondary memories are first transferred to the main memory, and then the CPU can access it.
 VPU – video processing unit For example, disk, CD-ROM, DVD, etc.
 TPU – tensor processing unit Characteristics of Secondary Memory
 NPU – neural processing unit - These are magnetic and optical memories.
 PPU – physics processing unit - It is known as the backup memory.
 DSP – digital signal processor - It is a non-volatile memory.
 ISP – image signal processor - Data is permanently stored even if power is switched off.
- It is used for storage of data in a computer.
 SPU or SPE – synergistic processing element in the Cell microprocessor
- Computer may run without the secondary memory.
 FPGA – field-programmable gate array
- Slower than primary memories.
Memory
Computer memory is the storage space in the computer, where data is to be processed and Input/output Devices
instructions required for processing are stored. The term memory identifies data storage that I/O devices are the pieces of hardware used by a human (or other system) to communicate with a
comes in the form of chips, and the word storage is used for memory that exists on tapes or computer. Input/output or I/O (or, informally, io or IO) is the communication between an
disks. Moreover, the term memory is usually used as shorthand for physical memory, which information processing system, such as a computer, and the outside world, possibly a human or
refers to the actual chips capable of holding data. another information processing system.
Memory is primarily of three types − Inputs are the signals or data received by the system and outputs are the signals or data sent from
i) Cache Memory it. In computing, an input device is a piece of computer hardware equipment used to provide
Cache memory is a very high speed semiconductor memory which can speed up the CPU.It acts data and control signals to an information processing system such as a computer or information
as a buffer between the CPU and the main memory. It is used to hold those parts of data and appliance. Examples of input devices include keyboards, mouse, scanners, digital cameras and
program which are most frequently used by the CPU. The parts of data and programs are joysticks.
transferred from the disk to cache memory by the operating system, from where the CPU can An output device is any piece of computer hardware equipment which converts the
access them. electronically generated information into human-readable form. Output unit is responsible for
Advantages providing the output in user readable form, it can be text, graphics, tactile, audio, and video.
- Cache memory is faster than main memory.
Some of the Output devices are Visual Display Units (VDU) i.e. a Monitor, Printer, Graphic indicate when the DC voltages are in spec, so that the computer is able to safely power up and
Output devices, Plotters, Speakers etc. boot. The most recent ATX PSU standard is version 2.31 as of mid-2008.
The main tasks of power supply
Motherboard Troubleshooting • Both a rectifier and transformer
Motherboard failures can be divided into three types: – Converts AC house current to regulated DC
 Power failure – Steps down voltage from 110 V or 220 V to 3.5, 5, and 12 V to provide the required
 Bus failure voltages and currents that are needed to operate the components of the computer
• Power supply features:
 Component failure.
– Form factor determines power supply size
– Wattage ratings
Due to the complexity in the structure and components in computer motherboards, the failure
– Maximum amount of power watts required by the computer
rate is relatively high. Repair the failure using the following steps.
 Check that there is no sign of physical damage. Determine whether the motherboard Characteristics of Power Supply
seems burned, blown, foam board, has a broken connector, corrosion, exploded • Depends on the components of the computer
capacitors or dirty fans and chips, etc. • Available PC power-supply ratings are as follows:
 Check that BIOS battery provides sufficient voltage. • AT clone: 250 watts
 Clean out the dust using a soft brush. Clean the dust off the motherboard. Check the • 400-watt switching power supply will not necessarily use more power than a 250-watt
motherboard after each step. The failure may have been caused by dust. supply. A larger supply may be needed if you use every available slot on the
 Using a multimeter, measure the motherboard supply voltages (5V, 12V, 3.3V, motherboard or every available drive bay in the personal computer case. It is not a
etc.). If there is an abnormal voltage, check if the power supply is faulty. good idea to have a 250-watt supply if you have 250 watts total in devices, since the
supply should not be loaded to 100 percent of its capacity.
 Check the all chip clock, input and output signals. Until you find the faulty
• According to PC Power & Cooling, Inc., some power consumption values (in watts)
component.
for common items in a personal computer are:
 Remove and replace the failed component(s) with the same type, then boot to test
operation.
 Use the tangent line by line method to find short routes. If you find some signal
line and ground or 5V voltage line short circuit, trace the circuit board to determine the
failure source.
 If the above steps fail to fix the problem, find a motherboard with the same
characteristics and replace it completely.

8.2 Power Supply (SMPS Concept, UPS)

A power supply unit (or PSU) converts mains AC to low-voltage regulated DC power for the
internal components of a computer.Modern personal computer universally use switched-mode
power supplies.
Some power supplies have a manual switch for selecting input voltage, while others
automatically adapt to the mains voltage. The desktop computer power supply changes
alternating current from a wall socket to low-voltage direct current to operate the processor and
peripheral devices. Several direct-current voltages are required, and they must be regulated with
some accuracy to provide stable operation of the computer.
Most modern desktop personal computer power supplies conform to the ATX specification, SMPS is a power supply that uses a switching regulator to control and stabilize the output
which includes form factor and voltage tolerances. While an ATX power supply is connected to voltage by switching the load current on and off. Switching power supplies have high efficiency
the mains supply, it always provides a 5 Volt standby (5VSB) voltage so that the standby and are widely used in a variety of electronic equipment, including computers and other
functions on the computer and certain peripherals are powered.ATX power supplies are turned sensitive equipment requiring stable and efficient power supply.
on and off by a signal from the motherboard. They also provide a signal to the motherboard to Advantages of switched-mode power supplies:
Problem Possible Cause Solution
 Higher efficiency of 68% to 90%
 Regulated and reliable outputs regardless of variations in input supply voltage
 Small size and lighter
Disadvantages:
 Generates electromagnetic interference
 Complex circuit design Press the ON button once to turn on
 Expensive compared to linear supplies The UPS will not turn on The unit has not been the UPS. Please note that the LCD
Uninterruptible power supply (UPS) or there is no output turned on. screen may be lit even though the
It is a power supply that contains a battery that keeps it running once power is lost. It also UPS is OFF.
has the capability to help reduce the impact of power surges. It keeps systems running until
power is restored within a short space of time, or make the transition between a primary power
source that has failed to a secondary power source (for example, a generator) that will keep The UPS is not Be sure that the power cable is
things running for longer. connected to utility securely connected to the unit and to
The functions of UPS of a computer are power. the utility power supply.
1. Providing backup power supply while mains fails so that electronics especially
critical electronics like servers, PC, routers, switches etc won’t shut down and lose
data. Reduce the load to the UPS,
2. Providing clean power sources. Online UPS can eliminate spikes, noise, surges The input circuit
disconnect nonessential equipment
caused by mains and output pure sine wave power to loads. breaker has tripped.
and reset the circuit breaker.
3. Most UPS can be remotely monitored. Advanced UPS are built with intelligent
management functions which can auto shut down (not like the shutdown by power-
off) PC.
During normal operation, you may find your UPS not functioning as expected. This may be due Check the utility power supply to the
The unit shows very
to a malfunction, configuration issue, or the install environment. UPS by plugging in a table lamp. If
low or no input
the light is very dim, check the
utility voltage
utility voltage.

The battery
Be sure that all battery connections
connector plug is not
are secure.
securely connected.

Do not attempt to use the UPS.


There is an internal
Unplug the UPS and have it serviced
UPS fault.
immediately

The UPS is operating on Reduce the load to the UPS,


The input circuit
battery, while connected disconnect nonessential equipment
breaker has tripped.
to utility power and reset the circuit breaker.

Move the UPS to a different outlet


on a different circuit. Test the input
There is very high,
voltage with the utility voltage
very low, or distorted
display. If acceptable to the
input line voltage.
connected equipment, reduce the
UPS sensitivity.

The UPS display will indicate the


The UPS is in current operating mode that is
Problem Possible Cause Solution
8.3 Input Devices (Keyboard, Mouse, Light Pen, Scanner, OCR)

The UPS has been Troubleshooting keyboard


shut down remotely None. The UPS will restart Most of the circuitry associated with the computer’s keyboard is located on the keyboard itself.
Display interface LEDs However, the keyboard interface circuitry is located on the system board. Therefore, the steps
through software or automatically when utility power is
flash sequentially required to isolate keyboard problems are usually confined to the keyboard, its connecting cable,
an optional accessory restored.
card. and the system board.

Keyboard Symptoms
Typical symptoms associated with keyboard failures include the following:
➤ No characters appear onscreen when entered from the keyboard.
➤ Some keys work, whereas others do not work.
➤ A Keyboard Error—Keyboard Test Failure error appears.
Contact APC Support for further
➤ A KB/Interface Error—Keyboard Test Failure error appears.
Possible Internal assistance. Take care to note the
Fault LED illuminates ➤ An error code of six short beeps is produced during bootup (BIOS dependent).
Fault exact fault message on the LCD
➤ The wrong characters are displayed. An IBM-compatible 301 error code appears.
Display
➤ An Unplugged Keyboard error appears.
➤ A key is stuck.

Basic Keyboard Checks


The keys of the keyboard can wear out over time. This might result in keys that don’t make good
contact or that remain in contact (stick) even when pressure is removed.
The UPS has shut None. The UPS will return to The stuck key produces an error message when the system detects it; however, it has no way of
All LEDs are illuminated
down and the battery normal operation when the power is detecting an open key.
and the UPS is plugged
has discharged from restored and the battery has a An unplugged keyboard, or one with a bad signal cable, also produces a keyboard error message
into a wall outlet
an extended outage. sufficient charge. during startup. Ironically, this condition might produce a configuration error message that says
“Press F1 to continue.”
If the keyboard produces odd characters on the display, check the Windows keyboard settings in
Allow the battery to recharge for at Device Manager If the keyboard is not installed or is incorrect, install the correct keyboard type.
The Replace Battery LED The battery has a least four hours. Then, perform a Also, be certain that you have the correct language setting specified in the Keyboard Properties
is illuminated weak charge self-test. If the problem persists dialog box (found by double-clicking the Keyboard icon in Control Panel).
after recharging, replace the battery Keyboard Hardware Checks
If you suspect a keyboard hardware problem, isolate the keyboard as the definite source of the
problem. Because the keyboard is external to the system unit, detachable, and inexpensive,
The replacement simply exchange it with a known-good keyboard.
Be sure that the battery connector is
battery is not If the new keyboard works correctly, remove the back cover from the faulty keyboard and check
securely connected.
properly connected. for the presence of a fuse in the +5V DC supply and check it for continuity. Neither the older
five-pin DIN nor the six-pin PS/2 mini-DIN keyboards can be hot-swapped. Disconnecting or
plugging in a keyboard that has this type of fuse while power is on can cause the keyboard to
Wiring faults fail. If the fuse is present, simply replace it with a fuse of the same type and rating. If replacing
detected include the keyboard does not correct the problem, and no configuration or software reason is apparent,
If the UPS indicates a site wiring the next step is to troubleshoot the keyboard receiver section of the system board. On most
missing ground, hot-
The UPS displays a site fault, have a qualified electrician system boards, this ultimately involves replacing the system board.
neutral, polarity
wiring fault message inspect the building wiring. Troubleshooting Mouse Problems
reversal, and
(Applicable for 120 V units only.) Most problems with mice are related either to its port connection, the mouse driver, the trackball
overloaded neutral
circuit. in a trackball mouse or a trackball unit, and the operation of the mouse buttons.
In newer systems, the mouse is typically connected to the USB port or the dedicated PS/2 mouse
port on the back of the unit. In ATX systems, the keyboard and mouse have been given
Charge the battery. Batteries require
recharging after extended outages
and wear out faster when put into
The UPS battery is
service often or when operated at
UPS does not provide weak due to a recent
elevated temperatures. If the battery
expected backup time outage or is near the
is near the end of its service life,
end of its service life.
consider replacing the battery even
if the replace battery indicator is not
the same six-pin mini-DIN connector and, unfortunately, they do not work interchangeably. If the correct driver for the installed mouse is not available, you must install one from the
Although plugging the mouse into the keyboard connector should not cause any physical manufacturer. This typically involves placing the manufacturer’s driver disk or disc in the
damage, it does cause problems with getting the system to work. These connections tend to be appropriate drive and loading the driver using the Update Driver (requires disk from original
color-coded so you can check to ensure the mouse is connected to the green connector. equipment manufacturer
For PnP-compatible mice, installation and configuration has become a fairly routine process. [OEM]) Option on the Device Manager Mouse Properties page. If the OEM driver fails to
Connect the mouse to the PS/2 mouse port and let the system auto detect it and install the basic operate the mouse in Windows, you should contact the mouse manufacturer for an updated
Windows mouse drivers. Windows driver.
However, specialty mice—including USB-connected mice, wireless mice, and infrared mice—
along with other pointing devices might require special drivers that are supplied by the Troubleshooting: Pen and touch
manufacturer and loaded from the disk or disc that accompanies the device. Older serial mice If you encounter problems with pen or touch functions on your pen
used one of the PC’s serial ports as their interface. These ports had to be properly configured for
the serial mouse to work properly. display, refer to the following table.
When a trackball mouse is moved across the table, the trackball picks up dirt or lint, which can The pen does not position The driver may not be installed properly. You will only be
hinder the movement of the trackball, typically evident by the cursor periodically freezing and the screen cursor, or able to use the pen tip to move the screen cursor and click
jumping onscreen. On most mice, you can remove the trackball from the mouse by a latching otherwise work properly. with the pen tip.
mechanism on its bottom. For pen displays that combine pen input and touch, basic
Twisting the latch counterclockwise enables you to remove the trackball. touch movement will continue to be recognized, but other
Then, you can clean dirt out of the mouse. actions and gestures will not.
The other mechanical part of the mouse is its buttons. These items can wear out under normal Install (or reinstall) the driver software for the tablet.
use. When they do, the mouse should simply be replaced. The pen does not draw or Some applications require that you turn on the pressure
However, before doing so, check the Properties of the mouse in the operating system to ensure ink with pressure capabilities within the application or the selected tool before
that the button functions have not been altered. It would be a shame to throw away a perfectly sensitivity. the pen will respond as a pressure-sensitive tool.
good mouse because it had been set up for left-hand use in the operating system. Verify that your application supports pressure sensitivity.
Clicking is difficult. Try using a lighter Tip Feel.
Mouse Hardware Checks
The hardware check for the mouse involves isolating it from its host port. Double-clicking is Be sure you are quickly tapping the screen twice in the same
Simply replace the mouse to test its electronics. If the replacement mouse works, the original difficult. place on the tablet active area. Wacom recommends using the
mouse is probably defective. If its electronics are not working properly, few options are side switch to double-click.
available for actually servicing a mouse. It might need a cleaning, or a new trackball. However, Open the Wacom Tablet Properties and go to the Pen tab. Try
the low cost of a typical mouse generally makes it a throwaway item if simple cleaning does not increasing the Tip Double Click Distance or using a
fix it. lighter Tip Feel.
If the new mouse does not work either, chances are good that the mouse’s electronics are Set an ExpressKey to Double Click and use it to issue
working properly. In this case, the mouse driver or the port hardware must be the cause of the double-clicks.
problem. If the driver is correct for the mouse, the port hardware and CMOS configuration must The pen selects Open the Wacom Tablet Properties Pen tab. Move the Tip
be checked. everything, or will not Feel slider toward Firm, or select Customize... and increase
The system board typically contains all of the port hardware electronics and support so it must stop drawing. the Click Threshold setting.
be replaced to restore the port/mouse operation at that port. However, if the system board mouse If this does not help, see Testing your Cintiq.
port is defective, another option is to install a mouse that uses a different type of port (for The pen may need cleaning, or the pen nib may be worn.
example, use a USB mouse to replace the PS/2 mouse). See Care and maintenance.
Mouse Configuration Checks The eraser selects Open the Wacom Tablet Properties Eraser tab. Move
When a mouse does not work in a Windows system, restart it and move into safe mode by everything or will not the Eraser Feel slider toward Firm, or select Customize...
pressing the F5 function key while the “Starting Windows” message is displayed. This starts the stop erasing. and increase the Click Threshold setting.
operating system with the most basic mouse driver available. If the mouse does not operate in If the problem persists, see Testing your Cintiq.
safe mode, you must check the mouse hardware and the port to which the mouse is connected. The pen may need cleaning, or the pen nib may be worn.
If the mouse works in safe mode, the problem exists with the driver you are trying to use with it. See Care and maintenance.
It might be corrupt or it could be having a conflict with some other driver. To check the driver,
You notice a screen delay Open the Wacom Tablet Properties Pen tab.
consult Device Manager. If Device
at the beginning of pen or On the Pen tab, decrease the Tip Double Click Distance. If
Manager shows a conflict with the mouse, remove the driver and allow the system’s PnP process
inking strokes. that does not work, move the Tip Double Click
to reinstall it.
Distance slider to the Off position in order to turn off double-
click assist.
Try turning off the operating system inking features. zoom-out when working verify that the Zoom with Scroll Wheel function is not
You have to press hard Open the Wacom Tablet Properties Pen tab. Move the Tip with Adobe Photoshop®. selected in the Photoshop Preferences options.
with the pen when Feel slider toward Soft. Rotation gestures do not Rotation may work in different ways, depending on the
clicking, drawing, or Select Customize... and decrease the Sensitivityand Click work consistently, or do application. For best recognition of this gesture, start with
writing. Threshold settings. not work at all. your fingers positioned diagonally on the tablet surface and
The pen tip does not Be sure you are using a compatible Wacom pen, such as the keep them at least 25 mm (1 inch) apart.
function. pen that shipped with your product, or a Wacom tool
specified for use with the product. Scanners Troubleshooting
Check the Pen tab and verify that a Click function is assigned If you encounter problems with scannar functions, refer to the following table.
to the tip.
Changing the settings of Make sure you are changing the settings for the tool and
the pen or other tool has application that you are currently using. See Application-
no effect. specific settings and Working with multiple tools.
The pen side switch does Be sure you are using a compatible Wacom pen, such as the
not work. pen that shipped with your pen tablet, or a Wacom tool
specified for use with the product.
Be sure to press the side switch when the pen tip is within 10
mm (0.4 inch) of the tablet active area. Do this without
pressing down on the pen tip.
In the Tablet Properties, verify that the side switch is set to
the function you have specified for the application and tool
you are using.
Check the Side Switch mode. If Click & Tap is selected, you
will need to first press the side switch while touching the pen
tip to the tablet surface in order to perform a click function.
See advanced options.
The screen cursor jumps Do not place a tool on the tablet when it is not in use, or when
back. you are using another pointing device.
When using a multiple Cycle pen control for your pen tablet between your displays
monitor system, you by pressing an ExpressKey or pen button set to Display
cannot use the pen to Toggle.
control the other Verify that the Screen Area in the Mapping tab is set to Full.
monitor(s). You can also use your pen to control the other monitors in
mouse mode. To use mouse mode, first set a pen button
to Mode Toggle.... Then use the button to toggle between Pen
mode and Mouse mode.
Touch does not work. Enable touch by pressing an ExpressKey that is set to Touch
On/Off.
Open the Tablet Properties, click on the Touch icon, and go to
the Standard Gestures, My Gestures, or Touch Options tab.
Be sure the Enable Touchoption is selected.
Touch does not seem to If the tablet driver does not load properly, basic touch
fully work. The screen movement will be recognized, but other actions and gestures
cursor can be moved, but will not. Install the driver software for the tablet. Try
more complex actions do reinstalling the pen tablet driver.
not work.
The tablet does not If you hold your fingers too close together, the tablet may not
reliably recognize multi- recognize them as being separate. Try moving your fingers a
finger touch. little further apart.
You cannot zoom-in or If zoom functions do not operate correctly in Photoshop,
therefore is unresponsive. available connections on the back of the scanner. Verify that
the cable coming from the computer is connected to the
"Computer In" port.
Make sure the scanner is receiving power. Push the power
button, which can be located on the top or on the side.
Check to see if the scanner appears in My Computer. If it
does not appear, it is possible the scanner, scanner software,
or scanner driver (TWAIN) was not installed properly.
Contact your technology coordinator.
You receive an error You will need to reset the scanner.
message similar to Close any Scanner software.
"Scanner Initialization Disconnect the cable that connects the scanner to the
failed", "Scanner not computer.
found" or the TWAIN_32 Turn the power switch on the back of the scanner to OFF.
error, when trying to use Turn the computer off, wait 60 seconds, and then turn the
the scanner. computer on again.
Turn the power switch on the back of the scanner to ON.
Reconnect the cable that connects the computer and the
scanner.
The scanner should be working again. If not you may need to
contact your technology coordinator.
Scanner has stopped A cable might be loose. Ensure that both the USB cable and
working properly. power cable are securely connected.
(If the scanner stops Unplug the power cable from the power source, wait 60
scanning, complete the seconds, and then plug it back in.
following steps, in the Reboot your computer.
presented order. After A software conflict might exist on your computer. You might
each step, start a scan to need to uninstall and then reinstall the scanner software via
see if the scanner is Control Panel's Add/Remove Programs.
working again. If the Reinstall the software. If the problem persists, you may need
problem persists, proceed to contact your technology coordinator.
with the next step.)
The scanned documents, Check to see if the glass has smudges on them from repeated
both written text and and prolonged use.
images have smudges. Check your original document. It is possible this is the way
the original appeared.
Try scanning again and see if the cleaning fixed the issue. If
necessary repeat the cleaning process.
The Light Bar Flashes or When the light bar flashes or blinks, the built-in diagnostics
Blinks on the Scanner. are reporting the hardware is not functioning as expected.
Turn off the computer that is connected to the scanner
Disconnect power cord and USB cable from the back of the
scanner.
Unlock the Transport Lock several times, if necessary. Make
sure it is opened.
Wait 60 seconds before reconnecting the USB Cable and the
Problem Solution power cord to the scanner.
The computer does not Verify the cables are connected properly to the back of the Turn on the computer and rescan to test.
recognize a scanner has scanner. If problem persists, contact your technology coordinator.
been connected to it, and If the scanner is a parallel port scanner, it likely has two
NOTE: These troubleshooting procedures are for scanners in general. Each individual scanner
may have more specific issues or problems. Consult your manufacturer's To Install a New Operating System on Your Computer
website/manual for more specific troubleshooting issues. 1. Determining Which Operating System to Install
Check the system requirements. If you’ve decided that you want to install a new operating
TROUBLESHOOT OCR system, you’ll first need to figure out which one you want to use. Operating systems have
varying system requirements, so if you have an older computer, make sure that you can handle a
OCR stands for Optical Character Recognition. It is a widespread technology to recognise text newer operating system.
inside images, such as scanned documents and photos. OCR technology is used to convert
 Most Windows installations require at least 1 GB of RAM, and at least 15-20 GB of hard
virtually any kind of images containing written text (typed, handwritten or printed) into
disk space. Also, your CPU needs to be powerful enough to run the OS you want to run.
machine-readable text data.
Make sure that your computer can accommodate this. If not, you may need to install an
A scanner is a physical machine used for scanning paper documents into a computer in picture
older operating system, such as Windows XP.
form. OCR refers to software that can translate the picture image of a document into a document
that can be used and modified in a word processing program or text editor.  Linux operating systems typically don’t require as much space and computing power as
Windows operating systems. The requirements vary depending on the distribution you
choose (Ubuntu, Fedora, Mint, etc.).
The results of Optical Character Recognition (OCR) are somewhat dependent on the quality of
the electronic document, so here are some tips to help you improve OCR results: Decide whether to purchase or download. Windows licenses need to be purchased. Each
license comes with a key good for one installation. Most Linux distributions are free to
download and install as much as you’d like, though some Enterprise versions are closed and
 Set the scanner color settings to Grayscale, or Black and White if the text is black
require purchase (Red Hat, SUSE, etc.).
against a white background
 If supported by your scanner, adjust brightness and contrast to achieve deep blacks and Research your software compatibility. Make sure that the operating system you want to install
bright whites supports the programs that you want to use. If you use Microsoft Office for work, you won’t be
 Set the scan quality (resolution) to 300dpi or better able to install it on a Linux machine. There are substitute programs available, but the
 Start with a good original document. Wrinkles and creases might hinder OCR functionality may be limited.
accuracy  Many games that work on Windows will not work on Linux. The number of supported
 Ensure scanner glass is clean and free from smudges titles is growing, but be aware that if you are an avid gamer your library might not transfer
 Keep your pages as straight as possible during scanning. Skewed pages require more over smoothly.
processing in the OCR engine
 Depending on the quality of your scanner, you might need to attempt several scans of Obtain your new operating system. If you’ve purchased a copy of Windows from a store, you
the same document to process the best resulting image should have received an installation disc along with your product code. If you don’t have the
disc but have a valid code, you can download a copy of the disc online. If you are installing
 If your text is on a patterned or colored background, try to obtain another version on a
Linux, you can download an ISO of the distribution from the developer’s website.
plain white background. Text against colored backgrounds or gradients will require
several attempts with different settings until the right configuration for successful  An ISO file is a disc image that needs to be burned to a disc or copied to a bootable USB
OCR is found drive
 Some smudges can be manually repaired by using white correction fluid to cover
Backup your data. When you are installing a new operating system, you are most likely going
unwanted artifacts to be wiping the hard drive in the process. This means that you will lose all of your files on the
 If supported by your scanner, enable the despeckle setting to remove noise from your computer unless you back them up. Always make sure that any important files are copied to a
image backup location before starting the installation process. Use an external hard drive or burn the
 If supported by your scanner, increase text smoothing to remove harsh blends and data to DVDs.
grain  If you are installing the operating system alongside your existing one, you most likely will
not have to delete any data. It is still wise to backup important files just in case.
 You cannot backup programs; they will need to be reinstalled once you have finished
installing your new operating system.

2. Installing Your New Operating System


8.4 Installing, Repairing and Upgrading Operating System
Determine your installation order. If you are installing a Linux distribution that you want to Set your Linux options. Before installation begins, your Linux installer will ask you for your
run alongside Windows, you need to install Windows first and then Linux. This is because timezone, and you will need to create a username and password. You will use this to log in to
Windows has a very strict boot loader that needs to be in place before Linux is installed, your Linux distribution as well as authorize system changes.
otherwise Windows won’t load.  Windows users will fill out personal information after the installation is complete.

Boot from your installation disc. Insert the installation disc into your optical; drive, and reboot Wait for the installation to complete. Depending on the speed of your computer, this can take
your computer. Normally a computer boots from the hard drive first, so you will need to adjust up to an hour to finish. Most installations are hands-off at this point. Your computer may reboot
some settings in your BIOS in order to boot from the disc drive. You can enter the BIOS by several times during the installation process.
hitting the designated Setup key during the boot process. The key will be displayed on the same
screen as your manufacturer’s logo. Create your Windows login. Once your Windows installation is complete, you will need to
 Common Setup keys include F2, F10, F12, and Del/Delete. create a username. You can also choose to create a password, though this is not necessary. After
 Once you are in the Setup menu, navigate to the Boot section. Set your DVD/CD drive as creating your login info, you will be asked for your product key.
the first boot device. If you are installing from a USB drive, make sure that the drive is  In Windows 8, you will be asked to customize the colors first. After that, you can choose to
inserted and then select it as the first boot device. either log in with a Microsoft account or use a more traditional Windows username.
 Once you’ve selected the correct drive, save your changes and exit Setup. Your computer
will reboot. Install your drivers and programs. Once the installation is complete, you will be taken to your
new desktop. From here, you can begin installing your programs and make sure that your drivers
Try your Linux distribution before installing. Most Linux distributions come with a copy that are installed and up to date. Make sure to install an antivirus program if you are going to be
can be loaded directly from the installation disc. This will allow you to “test drive” your new connecting to the internet.
operating system before you commit to the installation process. Once you are ready to install,
click the Installation program on the desktop. Installing Specific Operating System
 This is only possible with Linux distributions. Windows does not allow you to test out the Below Links provide you guidelines for installing different OS.
operating system before you install. Install Windows 7 -https://www.wikihow.com/Install-Windows-7-(Beginners)
Install Windows 8. - https://www.wikihow.com/Install-Windows-8
Wait for the Setup program to load. No matter which operating system you choose, the setup Install Ubuntu.- https://www.wikihow.com/Install-Ubuntu-Linux
program will need to copy some files to your computer before it can continue. This can take Install Linux Mint.- https://www.wikihow.com/Install-Linux-Mint
several minutes, depending on the speed of your computer’s hardware. Install Fedora.- https://www.wikihow.com/Install-Fedora
 You will most likely need to choose some basic options, such as language and keyboard Install Mac OS X.- https://www.wikihow.com/Install-OS-X-Mountain-Lion
layout.
Repairing Operating System
Enter your product key. If you are installing Windows 8, you will need to enter your product Every OS has its own methods for repairing. Below we will discuss the method to repair a
key before you can begin the installation. Older Windows versions will ask for the product key windows operating system installation.
after installation is complete. Linux users will not need a product key unless it is a purchased
If there are problems with computer, repairing an existing installation of Windows is needed.
version such as Red Hat.
Startup Repair can’t correct hardware failures. Below are the steps to be followed to repair
windows OS.
Choose your installation type. Windows will give you the option of Upgrading or performing a
Custom installation. Even if you are upgrading an older version of Windows, it is highly 1. Choose Start→Turn Off Computer→Restart to restart your computer and watch the screen
recommended that you choose Custom and start from scratch. This will minimize problems that carefully.
may arise later from combining old settings and new ones.
You should see a message to press a function key (F2 probably) or another key combination to
 If you are installing Linux, you will be given the option to install alongside your existing
enter the BIOS (Basic Input Output System) screen.
operating system (Windows), or to erase the disk and install Linux by itself. Choose the
option that best meets your needs. If you choose to install alongside Windows, you will be 2. Press the designated key or key combination.
given the option to choose how much hard disk space you want to designate for Linux. You have only a few seconds to press this key to interrupt the startup process and enter the BIOS
screen.
Format your partitions. If you are installing Windows, you will need to choose which hard
drive partition you want to install it on. Deleting partitions will wipe the data on the partition 3. Look for an option called First Boot Device, Boot Sequence, or something similar; press the
and return the space to the Unallocated section. Select the unallocated space and create a new arrow keys on your keyboard to select this field and then press Enter.
partition. You may have to select Advanced Options or another submenu to find it.
 If you are installing Linux, the partition needs to be formatted in the Ext4 format.
4. In the resulting screen, select CDROM/DVD and then press the Esc key until you return to the The utility scans your installation of Windows to determine which files need to be repaired or
main BIOS screen. Follow the onscreen instructions to save your new settings and exit BIOS replaced.
setup. 8. Follow any onscreen instructions.
Your computer will restart from the CD/DVD drive. If you’re asked whether you want to replace a current version of a file with an older version,
click No. If the installation process finds a newer version of a file on your computer, it means
5. Insert the Windows installation CD into the drive and restart your computer. that you’ve upgraded the file from an online source; you should keep the newer file.
If you’re prompted to press any key to start the Windows installation from the CD/DVD drive, 9. Wait to see what the utility reports:
do so. o Successful repair: If the problem with your Windows installation is relatively minor,
Windows XP users: You see a different startup screen than Windows Vista and 7 users. Choose Startup Repair may be able to bring it back to health without erasing your software
Install Windows XP and then press F8 to accept the Windows XP licensing agreement. Then and personal files.
choose the operating systems you’d like to repair, press the R key on your keyboard, and then o Failure to repair: If Startup Repair can’t cure your PC’s illness, it displays a report
follow the onscreen instructions. that provides some details on the problem. Make full notes and discuss the issue with
the manufacturer’s support department or a repair technician.

Things that can go wrong when you upgrade your operating system
#1: Insufficient hardware
#2: Setup errors and freezes
#3: Driver problems
#4: Activation error
#5: Application incompatibilities
#6: Wrong OS edition
#7: Data loss
#8: Performance problems
#9: Permissions/access problems
#10: Interface problems/learning curve
https://www.techrepublic.com/blog/10-things/10-things-that-can-go-wrong-when-you-upgrade-
6. (Windows Vista and 7 users only) Select language settings and click Next. In the next screen, your-operating-system/
click Repair Your Computer. In the next screen, select the operating system or version of
Windows that you want to repair and click Next. Upgrade a Computer's Operating System
If the maker of your computer preinstalled the recovery software on your hard drive, check the In the rapidly changing world of both computer technology and consumer expectations,
Web site for directions on how to proceed. You may be asked to press one of the function keys operating systems evolve rapidly. When a new version of the operating system for your
as the system restarts to go to a hidden partition. computer becomes available there are lines waiting to get it and install it on their machines. This
7. In the System Recovery Options window, select Startup Repair. deals with upgrading a Windows operating system and some of the pitfalls that can exist or arise
in this process.
Preparing PC Maintenance Strategies
Step 1:- Perform a back-up of all your important data to some media other than your hard disk. Hardware maintenance is the testing and cleaning of equipment. Software maintenance is the
If the installation crashes or has a problem during the upgrade process, you run the updating of application programs in order to meet changing information requirements, such as
risk of losing some or all of your data. adding new functions and changing data formats. It also includes fixing bugs and adapting the
Step 2:- Defragment the computer's hard disks. Compress all files until there are no fragmented software to new hardware devices.
files on your drives. During the installation of a new operating system there are Simple things like downloading files, clicking on harmful sites by accident, and allowing dust to
many files that will be written to the hard disk and it is best to have them copied into settle on the keyboard can build up to the computer slowing down and possibly being unusable.
files on your hard disk that are continuous and not fragmented. However, by running anti-malware programs, deleting files as needed, and cleaning out the dust
Step 3:- Make a new folder for the new operating system to be installed into. Normally the on a computer, can all prolong the lifespan of computer for years of extra effective use. Whether
upgrade will be placed in the current windows directory. It is best to install into a they're tasks that should be done every day, once a month, once a year, or only when needed,
different directory so that some files that are currently on your system are preserved below is a list of maintenance tasks to perform to get the most out use of computer.
until you are sure that everything works correctly. An alternate to this is to copy the
entire contents of your current windows directory into a new directory that you can Daily:
store copies of the files in, until you are sure things are running properly on your  Try to back up data at least once per day
new operating system.  Run a malware scan to stay on top of virus prevention.
 Check for updates every day so you don't miss any crucial upgrades, nor will you have to
Performing the Upgrade spend hours installing dozens at a time if you procrastinate it.
Step 1:- Reboot your computer after completing the operations in step 1. Beginning the upgrade  If you use your computer for many hours at a time during the day, then plan to restart it at
process is best done with a fresh system. Rebooting the computer will restore it to a least once. This way, temporary files won't build up and slow down use over time.
known state and begin the upgrade with a system that has only a limited number of
 Never shut down by using the power button – always use the option from the start menu.
computer processes currently running.
Never leave your computer on overnight.
Step 2:- Place the upgrade disk in the CD drive and it will auto-run to begin the installation.
There will be information that you need to enter during the start of this process.
Monthly:
Have your CD serial number available. Answer all questions that are asked by the
 Use the defragmentation tool to keep your PC running fast and efficiently.
installation program and accept all the default values that the program offers unless
you know exactly what you are doing. The default values are best for most  Scan your hard drive for errors to make sure there are no physical problems occurring. This
inexperienced users. doesn't check for viruses or malware, but more so physical and logical problems.
Step 3:- Reboot your computer a final time once the installation of the upgrade has completed.  Clean out your disk drive every few weeks. Similar to defragmentation, these are small
Again, this is the best method of starting from a known point in case you experience pieces of trash that quietly accumulate over time.
problems with your system.  Physically clean your computer by using compressed air to blow out dust and small pieces
of dirt. These small particles build up over time and can lead to computers physically
After the Upgrade overheating and other mechanical problems.
Step 1:- Reboot the computer and perform a disk defragmentation on the hard drives. Before
files begin to clutter things up again, make sure that the hard disk is in order. This Yearly:
will provide most of the free space your hard disk has available for new programs  Backup your hard drive as an image, so if your PC ever crashes you won't have to reinstall
and files from scratch. This should be done twice a year, just to be safe.
Step 2:- Go through the programs that you have on your system and make sure that they all  Do a thorough cleaning of the computer. This goes beyond simply using compressed air
open and operate without errors. Upgrading an operating system on your computer and actually opening it up to get rid of all of the smaller bits and pieces of dirt stuck in
can cause problems with your current software. If you experience problems, check there.
the manufacturer's website for patches and fixes to problems with certain operating
systems. As Needed:
Step 3:- Restore all your backed up files and data in case some were lost or changed during the  Uninstall programs that you don't use anymore to free up space.
installation of the upgrade.  Practice safe browsing by not downloading files from or spending time on sites you aren't
familiar with or may be untrustworthy since this is how people generally get malware.
 Change passwords frequently as a general preventative measure against hackers.
8.5 PC Maintenance and Troubleshooting Strategies
PC Maintenance and Troubleshooting can be done by regular Maintenance and Troubleshooting Additional Maintenance Tips:
of different hardware and software components. By performing regular PC Maintenance and  Get a good surge protector for plugging your computer into the wall.
Troubleshooting we can extend the life span of PC.  Make sure your computer is plugged in properly and set up in a safe way. No wires should
be loose and hanging around near any open heat sources.
PC Troubleshooting Strategies
Troubleshooting is the process for identifying and fixing problems. Computer troubleshooting
may involve hardware or software and can sometimes involve both at the same time. The basic
process of troubleshooting is to check the most general possible problems first, and then
gradually check for more specific problems.

Strategies for fixing a hardware problem


 Reboot - power cycling your computer is one of the best and easiest ways to troubleshoot.
It tends to just reset everything and hopefully get rid of whatever glitch is causing issues.
 Unplug peripheral devices - remove any tool that is connected to a computer like an extra
drive, or a scanner.

 Check your cables and power cords to make sure they are connected properly.

 Memory - do you have enough memory? Various files and applications can quickly
overtake your memory. 8.6 Maintaining and Optimizing Operating System Performance

 Check printer - make sure you send a document to the correct printer and look for printer Maintaining operating system is the practice of keeping operating system in a good
jams. Check that the printer has paper and ink. state of repair and Optimizing OS is the process of modifying OS to make it work
more efficiently by enhancing OS capabilities to the extent that all components operate
Strategies for fixing a software problem at better level. The following steps can be taken to maintain and optimize the
performance of operating system.
 Make sure the software is installed correctly. Like in hardware, restarting the program
might just fix the glitch.
Maintaining Operating System Performance:
 Make sure your software is updated.
 Experiencing slow downs? Try to make a habit of clearing your cache and cookies, and stay
current with your software updates. PC cleaning tools: Cleaning your PC of all the files like cache, temporary files, logs,
 Remember that sometimes you might encounter a problem you can't fix. To prevent and fragments, etc. ensures that your PC stays fast and junk free. These
permanent loss, make sure you back up your data. Try saving it online (cloud storage), in files can take up a lot of space if not treated in time and may also cause
flash drives, or even as attachments in an email to yourself. software errors and system slow down.
 What if you try all these ideas and still encounter issues? Many companies like Microsoft
have a list of frequently asked questions (FAQs) and tips. Save your instructions and Defragmentation tools: If you are using a hard disk drive (HDD) for storage and not a
manuals - these are a great reference for your troubleshooting questions. Try a search solid state drive (SSD), then a defragmentation tool will put all the data in
engine to see if other people have probably encountered the same problem. sequence to make it easier for the hard drive to quickly access it. Since in
hard drives, data is written in random fragments that are scattered every
time you access a file.

Automatic driver updaters: Keeping your hardware drivers updated is the best
way to ensure your connected devices work properly without any loss in
performance.
Uninstaller apps: Apart from the data in the main directory, programs also create  Update computer hard disk drivers
registry entries and other files in the system for different purposes. The  Using Parallel Processing
built-in uninstaller only uninstalls a program from its main directory.  Reducing CPU Time by Modifying Program Compilation Optimization
Uninstaller app will delete all the connected data and ensure nothing is  Reducing CPU Time by Using More Memory or Reducing I/O
left behind.  Disable programs that run on startup
 Set Energy Settings to High Performance
Virus and Malware removal programs: Malware and viruses are always developing  Disable shadows, animations and visual effects
and a new virus threat arises every day. Antivirus software is there to fight
 Remove Malware, Spyware, and Adware
them and ensure OS stays safe.
 Uninstall Unused Programs
CPU and GPU temperature monitoring tools: PC overheating is a really serious  Run Error Checking
issue and it can lead to data corruption and even permanent damage to OS  Make sure OS is up to date
as well as PC components. CPU and GPU are the main heating
components and keeping a tab on their temperature will help keep them Method2: Improve performance of OS with PC Optimization Software
cool when needed. Want to use easier method to improve computer performance, choose and download
Disk space analysis tools: Understanding what is on PC will help to keep PC clean professional optimization software.
and free from useless data. Disk space analysis tools scan PC and show all
data in an easy to use manner. https://coggle.it/diagram/WsIfS8GZi5VNYe7T/t/maintaining-and-optimizing-
operating-systems
Hard drive health monitoring tools: Hard drives have limited life and they can be
easily damaged or get corrupted over time. There is a need to keep a tab on
hard drive’s health to save data and be prepared for the inevitable.

System Information Tools: It provide all the information about your PC software and
8.7 Troubleshooting Operating System and Applications Startup Problems
hardware components. Such as speed and type of CPU, GPU, RAM, Motherboard, and
hard drive, etc. Troubleshooting Operating System
The troubleshooting process helps resolve problems with the operating system. Use the
All-in-one Utilities: There are some really cool all-in-one utilities that offer multiple troubleshooting steps as a guideline to help you diagnose and repair problems.
PC utility software in a single package to automatically optimize performance and fix The first step in the troubleshooting process is to identify the problem. Figure 1 shows a list of
problems. open-ended and closed-ended questions to ask the customer.
Step 1: Identify the Problem
Optimizing Operating System Performance Open-ended  What operating system is installed on the computer?
Questions  What programs have been installed recently?
Optimization of OS helps in better and faster performance of OS. The performance is  What updates or service packs have been installed?
achieved by following below methods:  What error messages have you received?
 What were you doing when the problem was discovered?
Method 1: Optimize Your Computer Performance Manually Closed-ended  Does anyone else have this problem?
 Choose a good SSD instead of the old internal HDD Questions  Have you changed your password recently?
 Have you made any changes to your computer?
 Partition your computer internal hard disk reasonably
 Does anyone else have access to your computer?
 Troubleshoot PC internal hard disk to fix all possible problems  Has this problem happened before?
 Clean up your computer hard disk completely After you have talked to the customer, you can establish a theory of probable cause. Figure 2
o Remove all duplicate and trash files. shows a list of some common probable causes for operating system problems.
o Remove all temporary files Step 2: Establish a Theory of Probable Cause
o Remove unnecessary large files and applications Common causes of  Corrupted or missing system files
operating system problems  Incorrect device driver
 Defragment your PC regularly
 Failed update or service pack installation Verify  Reboot the computer.
 Corrupted registry Solution and  Access all drives and shared resources.
 Failing or faulty hard drive Full System  Check event logs to ensure there are no new warnings or errors.
 Incorrect password Functionality  Check Device Manager to ensure there are no warnings or errors.
 Virus infection  Make sure applications run properly.
 Spyware  Make sure the Internet can be accessed.
After you have developed some theories about what is wrong, test your theories to determine the  Check Task Manager to ensure that there are no unidentified programs
cause of the problem. Figure 3 shows a list of quick procedures that can determine the exact running.
cause of the problem or even correct the problem. If a quick procedure corrects the problem, you In the final step of the troubleshooting process, you must document your findings, actions, and
can go to step 5 to verify full system functionality. If a quick procedure does not correct the outcomes. Figure 6 shows a list of the tasks required to document the problem and the solution.
problem, you might need to research the problem further to establish the exact cause. Step 6: Document Findings, Actions and Outcomes
Step 3: Test the Theory to Determine Cause Document Findings  Discuss the solution implemented with the customer.
Common steps to determine  Reboot the computer.  Have the customer verify the problem has been solved.
cause  Examine the event logs.  Provide the customer with all paperwork.
 Run sfc /scannow.  Document the steps taken to solve the problem in the work order
 Roll back or reinstall the device driver. and the technician's journal.
 Uninstall recent updates or service packs.  Document any components used in the repair.
 Run system restore.  Document the time spent to resolve the problem.
 Run CHKDSK.
 Log in as a different user.
 Boot to the last known good configuration. Troubleshooting Applications Startup Problems
 Run a virus scan. The next time you have a application problem, try these troubleshooting tips in the order they're
 Run a spyware scan. listed below. Carefully document the steps you take. That way, if a tech support call becomes
After you have determined the exact cause of the problem, establish a plan of action to resolve necessary, at least you'll have a good idea of what isn't causing the problem.
the problem and implement the solution. Figure 4 shows some sources you can use to gather 1. Free up RAM by closing other open programs.
additional information to resolve an issue. 2. Restart the Application software
Step 4: Establish a Plan of Action to Resolve the Problem and Implement the Solution 3. Shut down and restart your computer.
If no solution is achieved in the previous  Helpdesk Repair Logs 4. Use the Internet to find help
step, further research is needed to  Other Technicians 5. Undo any recent hardware or software changes.
implement the solution  Manufacturer FAQs 6. Uninstall the software, and then reinstall it.
 Technical Websites 7. Look for software patches.
 Newsgroups
8. Scan for viruses and malware.
 Computer Manuals
9. Check for a firewall conflict.
 Device Manuals
 Online Forums
10. Boot up in Safe Mode.
 Internet Search 11. Defragment your hard drive.
After you have corrected the problem, verify full functionality and, if applicable, implement
preventive measures. Figure 5 shows a list of the steps to verify the solution. Conclusion
If the tips listed above haven't solved your software problem, it may be time to call tech support.
Step 5: Verify Full System Functionality and, If Applicable, Implement Preventive
At minimum, you'll be able to help them narrow down the problem by describing the
Measures
troubleshooting steps you've already taken on your own.
8.8 Troubleshooting Hardware Problems  Removing, repairing and replacing faulty RAM, hard disk or
Hardware troubleshooting processes primarily aim to resolve computer video/graphic card.
hardware problems using a systematic approach. The process starts by first  Cleaning dusts from RAM and Video carts slot/ports and from cooling
identifying the problem and finding different issues that can cause such a fan.
problem and eventually leading to implementing a solution or alternative.  Tightening cable and jumpers on motherboard and/or components.
Hardware troubleshooting is generally done on hardware equipment  Software related hardware problems such as device driver update or
installed within a computer, server, laptop or related device. installation.
Some processes within hardware troubleshooting include:
8.9 Connecting to and Setting up a Network using Operating System
Connect to a wired Network  WPA2 (also called 802.11i standard)- latest and best
Steps encryption standard
 Install network adapter  Methods 2: Disable SSID broadcasting
 Connect network cable to Ethernet RJ-45 port and network port o SSID(Service Set Identifier) = name
(wall jack, router, switch) o Not considered a strong security method because software
o Verify lights can be used to discover an SSID that is not broadcasted
 Windows assumes dynamic IP address  Method 3: Filter MAC addresses
o Automatically configures the network connection o Only computer with registered MAC addresses are allowed
 Verify Internet connectivity to connect
Two keys to troubleshooting will be device Manager and Network and o Considered a weak security measure and does not use
sharing center encryption
o Verify device manager recognizes adapter without errors. o To find out the MAC address of a computer use the
 If error occurs, try updating NIC drivers ipconfig/ all command
o If adapter has no errors, open network and sharing center
 A red X indicates a problem 8.13 Virus Detection and Protection (Background of viruses, Virus
 Click X to start windows Network Diagnostic scanning and Antivirus software)
o After windows has resolved the problem
 Should see a clear path from the computer to the A computer virus is a type of malware that is designed to spread from
internet computer to computer and perform harmful activities such as corrupting and
Connect to a Wireless Network disrupting systems or destroying data.
 Wireless networks type Computer virus types
o Wireless networks are created using access points A list of well-known computer virus types:
 Memory Resident Virus - stays in memory after it executes and after
o Access point can provide either unsecured public hotspots
its host program is terminated. In contrast, non-memory-resident viruses
or secured private hotspots only are activated when an infected application runs.
 If network is unsecured, verify that windows has configured the  Overwriting Virus - will copy its own code over the host computer
network as a public network system's file data, which destroys the original program.
o For some hotspots, a home page appears and you must enter  Direct Action Virus - is considered to be “non-resident” and functions
a code or agree to the terms of use by selecting one or more files to infect each time the code is executed.
o Make sure you are using a password protected windows The primary intentions of this virus is copying itself and to spread
user account. infection whenever the code is executed.
 Boot Sector Virus - infects computer systems by copying code either to
Method used by access point to secure wireless network: the boot sector on a floppy disk or the partition table on a hard drive.
 Method 1: Requiring a security key and using data encryption During startup, the virus is loaded into memory. Once in memory, the
o Three main protocols for encryption virus will infect any non-infected disks accessed by the system.
 WEP(Wired Equivalent Privacy) – no longer  Cluster Virus - associates itself with the execution of programs by
considered secure because key used for encryption modifying directory table entries to ensure the virus itself will start
is static when any program on the computer system is started. If infected by this
 WPA(Wi-Fi Protected Access)- also called TKIP virus it will look like every program on your PC is infected; however,
and is stronger than WEP because encryptions keys this virus is only in one place on the system.
are constantly changing
 Macro Virus - is written in a macro language and infects Microsoft  Microsoft recommends that you disable SMB1 on Windows for security
Word or similar applications (e.g., word processors and spreadsheet reasons.
applications) and causes a sequence of actions to be performed
automatically when the application is started or something else triggers Antivirus software
it. It's recommended to always use an antivirus program on your PC – even
when antivirus software can't protect your computer against all viruses.
Computer virus symptoms (signs) It's better to have some protection than no protection at all.
A few computer virus symptoms are: You should only use one antivirus program on your computer.
 Computer and/or internet suddenly slower The free antivirus programs are:
 Computer behaves weird  Bitdefender Antivirus Free
 PC freezes and crashes a lot  Kaspersky Free Antivirus
 Unusual error messages appear  Kaspersky Security Cloud Free etc
 Files have been automatically deleted or added If you need more functions (e.g., multi-layer ransomware protection) and
 Unwanted advertisements appear settings, then you can try a paid antivirus program.
 Emails have been sent from your account to your contacts Most antivirus companies offer the option to download and try their paid
 Sudden hardware problems (e.g., display acting weird) antivirus programs for free for 30 days.
 Antivirus software and/or its shields are turned off automatically The paid antivirus programs are:
 PC automatically restarts (reboots) by itself  Bitdefender Antivirus
 Kaspersky Antivirus etc
Computer virus prevention tips Free second opinion virus scanners
 Keep your operating system and software always up-to-date
It's also recommended to use second opinion virus scanners to get more
 Use a firewall
complete detection coverage, because some programs may detect viruses
 Use antivirus software
that others might miss.
 Don't ignore security warnings from Windows or your antivirus
The free second opinion virus scanners are:
software  Malwarebytes
 Don't install and use pirated software
 Kaspersky Virus Removal Tool
 If you don't use Java, then remove or disable it
 Kaspersky TDSSKiller
 Don't click on OK, Yes or Run when a pop-up window appears and ask
 ESET Online Scanner
you to install unknown software. Here's one example: “Your windows You can use these scanners to scan your PC periodically (e.g., once a week)
computer could be at risk! Install this repair tool to protect and clean or when you think your PC is infected. You can use virus scanners alongside
your system by clicking Secure Now as soon as possible” Don't fall for your current antivirus software. This way you get the chance to use other
this trick! antivirus software on your PC without any problems.
 Before you want to install free software (freeware) first check if its
reliable by reading reviews about it
Computer virus detection and removal
 Always download software from the official link or from a trusted
website Step 1: Delete temporary files
 Don't click on a link (in emails or web pages) if you don't trust it. Deleting your temporary files can speed up the scanning process and also free up
 Use a secure and safe web browser like Google Chrome or Mozilla disk space. You don't need to install any extra software, because Windows has a
Firefox and keep it updated built-in tool called “Disk Cleanup”.
 When installing software, always pay attention and always read 1. Open Windows Disk Cleanup.
everything clearly before clicking Next, OK, Install, Continue, etc. Three ways to open this tool:
 Go to the Windows search bar and search for cleanup and click on Disk Malwarebytes will now scan your computer for viruses and other types of malware.
Cleanup when it appears. This process can take up to 15 minutes.
 Press the [Windows] + [R] key on your keyboard, enter cleanmgr.exe, and then When the scan is completed it will show you the results of the scan.
click on OK. 3. If something is found, you click on Remove Selected.
 Open Windows Explorer or File Explorer (Windows 10), right-click on Malwarebytes may ask you to restart your PC.
the (C:) drive, choose Properties and then click on Disk Cleanup(located in
the General tab). Step 4: Kaspersky Virus Removal Tool
2. Select the Windows drive (when asked for and if not already selected). You can download Kaspersky Virus Removal Tool here.
(C :) is the default installation location for Windows. 1. Start Kaspersky Virus Removal Tool.
3. Click on OK. 2. Accept the End User License Agreement.
The tool will now calculate how much disk space you will be able to free on your 3. Click on Change parameters.
system drive. 4. Select System drive and click on OK.
4. Select the type of files you want to delete. 5. Click on Start scan.
5. Click on OK. Kaspersky will now scan your computer for viruses and other types of malware.
6. Click on Delete Files. This process can take up to 40 minutes.
When the scan is completed it will show you the results of the scan.
Step 2: Full system scan with your antivirus software 6. If something is found, you click on Continue.
First, update your antivirus software and then run a full system scan with the
program. Step 5: ESET Online Scanner
You can download ESET Online Scanner here.
Step 3: Malwarebytes Click on SCAN NOW to download this tool.
Download Malwarebytes 1. Start ESET Online Scanner.
When you install Malwarebytes it will automatically enable a two-week trial 2. Accept the Terms of Use.
version of the premium version, but if you don't want the two-week trial, then you 3. Choose between:
can easily disable it in the settings.  Enable detection of potentially unwanted applications
 Disable detection of potentially unwanted applications
Enable the “Scan for rootkits” option 4. Click on Scan.
You will only have to change the following setting once. ESET will now scan your computer for viruses and other types of malware. This
1. Start Malwarebytes. process can take up to 40 minutes.
2. Click on Settings (located on the left). When the scan is completed it will show you the results of the scan.
3. Click on Protection (located at the top). 5. If something is found, you choose one of the following options:
4. Go to Scan Options.  Select the threats you want to delete and click on Clean selected.
5. Enable Scan for rootkits.  Click on Clean all.
6. Now you will have the Delete application's data on close option
Scan for Malware (optional).
1. Open Malwarebytes. 7. Click on Finish.
2. Click on Scan Now.
Disaster Recovery (Risk of data, Backup methods devices and media, failures. Disaster recovery helps in designing strategies that can restore hardware,
Backup scheduling, Recovery of data) applications and data quickly for business continuity.
Disaster recovery can be considered as a subset of business continuity. In order to design a
Disaster Recovery proper disaster recovery strategy, risk assessment and business impact analysis need to be
Disaster recovery in information technology is part of security planning and is developed in completed. These steps help in identifying the information technology services that can
conjunction with a business continuity plan. Disaster recovery is a set of policies and support the critical business activities of the organization. Again, these steps would also help
procedures which focus on protecting an organization from any significant effects in case of a in bringing the recovery point objectives and recovery time objectives. Disaster recovery
negative event, which may include cyberattacks, natural disasters or building or device measures can be classified mainly into three types:
 Preventive measures Differential backup
 Corrective measures With a differential backup, only the changed or new data since the last full backup will be
 Detective measures backed up. This means of course that an initial full backup is required first so that the
software knows which documents are new or changed. When restoring such a backup both
Preventive measures aim at preventing an event from occurring. Corrective measures are for
the “base” backup and the differential backup files need to be restored.
correcting a system in case of a negative event or disaster. Detective measures focus on
Pros:
detecting and discovering negative events.
A regular differential backup requires much less space than a full backup.
A good disaster recovery plan helps in achieving business continuity even in case of disasters
Cons:
and negative events. The security management team of most organizations has regular checks
Restoring such a backup is slower than a full backup.
and exercises in order to assure good disaster recovery measures are followed by individual
Managing them is harder as two files are required.
department and the organization as a whole.
Incremental backup
An incremental backup also just backs up new or changed documents, but it bases these
Risk of data changes on the previous incremental backup as opposed to the initial full backup. Only the
Data risk is the potential for a loss related to your data. The term applies to failures in the first ever incremental backup is based on the initial “base” backup.
storage, use, transmission, management and security of data. The following are common Pros:
types of data risk. A regular differential backup requires much less space than a full backup or differential
Compliance risk is the potential for losses and legal penalties due to failure to comply with backup.
laws or regulations. Cons:
A data breach is the download or viewing of data by someone who isn't authorized to access Restoring such a backup is slower than a full backup or differential backup.
it. Managing them is more complex as all the files from a backup “chain” are required for a
Data loss is the inability to obtain data that you once possessed. restoration.
Data rot is a general tendency for data to become corrupt with time.
Deanonymization is the potential of identifying people in data that has been anonymized.
Data is anonymized to protect individual privacy when releasing information for purposes Backup devices and media
such as value added services, disclosure, research and peer review. Data are back-up for future use and to backup data there are different types of devices used
Regulatory risk is the potential for losses due to a change in laws and regulations. by institutions. Some of the popular backup devices that are used currently are listed below:
Dark data is data that an organization collects but doesn't use. It is common for USB stick: USB flash drives are basically miniature hard drives connected to computer using
organizations to have more dark data than regular data. The primary drivers of this are a USB port. The drives price depends on their capacity.
inexpensive data storage and sensors. External hard drive: An external hard drive is perfect when used as backup storage media. It
Data corruption is when data becomes physically or logically damaged due to errors in has the lowest cost per gigabyte when compared to the other backup devices
writing, reading, storage, transmission or processing. Network attached storage: It can be used as a multimedia server, and can function as an
Data remanences are residual representations of data that remain after deleting files or email or lightweight database server. NAS offers data redundancy, meaning it will generate a
reformatting data storage devices. It is common for operating systems to logically delete files backup of your backups
leaving them physically present on a storage device. Cloud storage: It is popular among businesses these days, due to its benefits such as allowing
Data sovereignty is the idea that data is controlled by the laws and practices of the nation users to access data anywhere on smartphone devices, as well as enabling to work
where it is located. In some cases, nations pass laws requiring certain data to be controlled with the most current hardware and up-to-date software.
and/or physically stored domestically.
Privacy is the right to live aspects of your life unobserved and unrecorded. It is a freedom In computer technologies, a backup storage device is used to make copies of data that is
that is commonly valued by people across cultural boundaries. actively in use. Backup machines provide redundancy of data residing on primary storage.
Should the storage medium, such as a hard disk drive, fail or become corrupted, the original
data is recovered from copies on the backup hardware.
Methods for data backups The media used for backup storage are:-
Full Backup
With a full backup, all data is backed up to a target drive or disk with each backup. This
means that all documents and files are stored in one file, which makes working with the
backups and managing them simple.
Pros:
Creating such a backup is quicker than a differential or incremental backup.
Managing them is easier as only one file needs to be restored.
Cons:
A regular full backup requires much more space than a differential or incremental backup.
Remote backup appliances: A remote backup appliance backs up data that sits outside a has been deleted and possibly overwritten, where data recovery involves specific
corporate data center. manipulation of the bits recorded on a drive.
Virtual server backup: Virtual server backup is a software-based version of physical backup
hardware. Certain key data recovery techniques that apply to disk failures and other scenarios are
Physical disk backup devices: Disk, disk-to-tape storage: Enterprises use backup storage sometimes called in-place repair and read-only data recovery. The first type of approach uses
devices to provide redundant copies of data that an organization considers critical utilities and other resources to try to fix disk errors. A read-only approach creates a copy of a
to sustained business operations. drive, where data can be extracted. In another approach, professionals may try to physically
Local backup for primary storage: Local backup places data copies on external HDDs or repair a failed disk with replacement parts.
tape systems, typically housed in or near an on-premises data center. The data is
transmitted over a secure high-bandwidth network connection or the A key to understanding data recovery is to look at the difference between older magnetic
corporate intranet. drive mediums and new solid-state drives, which record data in different ways.
Integrated backup storage appliances: An integrated device is a file server equipped with
HDDs and the vendor's proprietary backup software 8.10 Operating System Resources on a Network and Security Strategies
Cloud backup storage: Public, private and hybrid: Cloud backup transmits data copies via a Operating System Resources on a Network also known as Shared resources on a
network to a remote location. The backup storage is hosted on servers owned by Network, refer to computer data, information, or hardware devices that can be easily
third-party cloud service providers, accessed from a remote computer through a local area network (LAN) or enterprise
NAS devices: NAS device come with massive HDD storage capacity and often are intranet. Successful shared resource access allows users to operate as if the shared resource
earmarked for archiving, backup and shared storage, particularly in midsize were on their own computer. The most frequently used shared network environment objects
organizations or those seeking to decrease their reliance on tape. are files, data, multimedia and hardware resources like printers, fax machines and scanners.
Portable backup storage devices, storage at the edge: Several types of removable Shared LAN points are used by a variety of system resources, such as hard drives, printers,
media are associated with backup storage devices, including cartridge-encrypted scanners and network cards.
tape drives, optical media and USB drives. File and printer sharing occur via two network communication mechanisms: peer-to-peer
(P2P) sharing and the client-server network model.
Backup scheduling Sharing network resources requires abiding by certain constraints, as follows:
 Security: Organizations present ongoing opportunities for unauthorized shared
Backup scheduling is one of the most important features in data backup software. It allows resources. Security mechanisms should be implemented to provide efficient
completely eliminating manual backups (with all filtering, compressing, transferring to the parameters.
storage, and other).  Compatibility: Various client-server operating systems may be installed, but the
The main features of backup scheduling are as follows: client must have a compatible OS or application to access shared resources.
Automation of all tasks. By scheduling backup tasks you can automate all backups and Otherwise, the client may encounter issues that create communication delays and
make them run without supervision. requires troubleshooting.
Flexible schedule configuration. For each type of data you can specify their own backup  Mapping: Any shared OS hardware drive, file or resource may be accessed via
schedules and perform them on any time frame, from minute to monthly intervals. For mapping, which requires a shared destination address and naming conventions.
example, you may want to backup databases two times a day.  File Transfer Protocol (FTP) and File Sharing: FTP is not affected by shared
E-mail notifications. Once you’ve established a backup schedule, you can forget about resources because the Internet is FTP’s backbone. File sharing is an LAN concept.
manual checking and control results of all backup procedures through e-mail notifications.
On the other hand, OS programs managing the key resources are giving
Run backups as Windows/other service. The utility can run as service under operating
systems, which allows launching tasks without loading the interface, and even without user relatively simple names depending on the resource they manage:
logged on. Key Resource OS Program
Processors Processor Scheduling
Recovery of data Storage Memory management
Data recovery refers to the salvaging or securing of data from failed or compromised I/O devices I/O management
hardware systems. In data forensics and espionage, the term refers to techniques for obtaining Data File management
"hard to get" data, usually during hardware or system failures, or when system data has been
erased. A Network Operating System runs on a server and provides the server the capability to
In the general data recovery category, a few different types of techniques are applied to manage data, users, groups, security, applications, and other networking functions. The
specific scenarios. Hardware data recovery techniques work on situations where a system primary purpose of the network operating system is to allow shared file and printer access
failure prevents easy access to a hard drive. With more sophisticated hardware, this problem among multiple computers in a network, typically a local area network (LAN), a private
is easily solved. Another type of data recovery technique applies to disk level failure, where network or to other networks.
more elaborate approaches may be required. Other types of data recovery pertain to data that
Examples of network operating systems include Microsoft Windows Server 2003, Microsoft printer. Some applications only print to the default Windows printer. Is your printer set
Windows Server 2008, UNIX, Linux, Mac OS X, Novell NetWare, and BSD as the default?
Operating system security is the process of ensuring OS integrity, confidentiality and  Problems with the Operating System or printer driver can be indicated if you cannot
availability. And the methods and techniques with ensures OS integrity, confidentiality and print from a system prompt, but can print a test page by pressing a button on the printer.
availability are Operating system security Strategies Check online for a newer driver, or a driver compatible with your OS. Try deleting the
printer from Windows list of printers, then installing service to it again?
OS security refers to specified steps or measures used to protect the OS from threats, viruses,  Connectivity problems, such as a bad cable or port, can also be indicated if print jobs
worms, malware or remote hacker intrusions. OS security encompasses all preventive-control do not come out, but you can print a test page on the printer by pressing a button on it.
techniques, which safeguard any computer assets capable of being stolen, edited or deleted if Try swapping out printer cables with one that is known to be good. Try checking the
OS security is compromised. state of the port: is it in the right mode for your printer? EPP? ECP? Bi-directional?
OS security encompasses many different techniques and Strategies which ensure safety from  Problems with the printer itself are indicated if none of the above is possible. This
threats and attacks. OS security allows different applications and programs to perform category includes being out of ink or toner, paper jams, wrong paper, too much heat or
required tasks and stop unauthorized interference. humidity, and other problems.
OS security may be approached in many ways, including adherence to the following:
 Performing regular OS patch updates In Ink jet printer’s dots of ink are sprayed onto a sheet of paper. There is no fusing
 Installing updated antivirus engines and software necessary, as the ink generally dries quickly. Some ink jet printers use only one color of ink,
 Scrutinizing all incoming and outgoing network traffic through a firewall while others use multiple tones to create color output. Typically, color ink jet printers use
 Creating secure accounts with required privileges only (i.e., user management) the CMYK system of printing, mixing separate amounts of Cyan, Magenta, Yellow, and
Black ink to make other colors.
Some ink jet printers do not have a separate black ink supply, but simulate black by
8.11 Supporting Printers combining other colors. This sort of printer is known for lower quality output.
A printer is an external output device that takes data from a computer and generates output in The size of the dots of ink can vary greatly from one model of printer to another. Smaller
the form of graphics / text on a paper. dots give greater resolution. If a printer has the ability to vary the size of the dots, this can
There are different types of printer and different ways a printer can connect to and make the output much smoother.
communicate with a computer. The standard media connections are: parallel, serial, USB, Servicing an ink jet printer is often accomplished by using software to align the output of the
FireWire, network cable, and SCSI. Some printers are also accessible by infrared, WiFi, or print head, to blow out a clog in one or more jets, or to simply inform the device that an ink
Bluetooth wireless connections. The Printer driver should be installed to the device that gives cartridge has been replaced. Older models required manual cleaning of the print head.
command to printer. If printer used in network with same OS then install driver in one PC It is important not to leave an ink jet printer turned on indefinitely. This will reduce the life of
and share it. If other computers will run other operating systems, install other drivers for the the print head and dry out the ink supply. It is also important to use the correct type
printer by clicking Additional Drivers. of paper to avoid smears, poor print quality, and other problems.

There are two types of printers.


Impact Printers Laser printer works like a photocopy machine. Laser printers produce images on paper by
An impact printer makes contact with the paper. It usually forms the print image by pressing directing a laser beam at a mirror which bounces the beam onto a drum.
an inked ribbon against the paper using a hammer or pins. Some examples of impact printers
The drum has a special coating on it to which toner (an ink powder) sticks. Using patterns of
are: - Dot-Matrix Printers, Daisy-Wheel Printers etc.
small dots, a laser beam conveys information from the computer to a positively charged drum
Non-Impact Printers
to become neutralized. From all those areas of drum which become neutralized, the toner
Non-impact printers do not use a striking device to produce characters on the paper; and
detaches. As the paper rolls by the drum, the toner is transferred to the paper printing the
because these printers do not hammer against the paper they are much quieter. Some non-
letters or other graphics on the paper. A hot roller bonds the toner to the paper. Laser printers
impacted printers are: - Ink-Jet Printers, Laser Printers etc.
use buffers that store an entire page at a time. When a whole page is loaded, it will be
Dot matrix printers are not used much anymore. They work by having a series of pins in the
printed.
print head hit an ink-soaked ribbon, which leaves a mark on a sheet of paper on the other side
Common problems with laser printers are described:
of the ribbon. The print head moves back and forth horizontally, while the paper advances on
a roller vertically. The only advantage that they have at this time is that they are useful when  If the output is faded, smeared, wavy, speckled, or streaked, you may be low on
printing on actual carbon forms Service is expensive compared to the cost of simply toner. Try shaking the cartridge to prolong its life. Replace the cartridge with a new one
replacing a dot matrix printer that has worn out. if possible.
The troubleshooting printing, suggest isolating a problem into one of four areas:  Paper will not perform well if it is too hot, too wet, too dry, too thick, too thin, or
 Problems with the application that you are printing from are indicated if you can print simply the wrong kind of paper. Do not open packages of paper until you are ready to
from a system prompt or other application, but not from the one you want to use. use them. Do not store the paper where it can become damaged by heat or moisture. Use
Determine if the application is installed properly, and if it is supposed to support your fresh paper, of an appropriate type for the printer.
 Paper jams often occur in laser printers. A technician servicing such a printer should the answer is a positive one, then the next typical area to look at is a double check, a check of
become familiar with the path that paper is meant to follow through the printer, and the power cord and data cable. When this thing also doesn't resolve the problem, and then
should be able to troubleshoot that path for shreds of paper that can clog it. starts the critical troubleshooting.

Common symptoms
A short list of troubleshooting ideas for shared printers.
Here are the common symptoms which can indicate some problems;
 Is the printer online? It is surprising how many people expect a device to work that has VGA mode
not been turned on, or has not be set to "on line" mode. The new model monitors are not at all expected to be set as VGA as its default video running
 Is the network printer configured correctly on the PC? This means, have you installed mode. But they cannot be configured in a way that it never supports a VGA format video. So
the correct driver, are you sending print job in the right language, for the right size paper, the configuration should be checked by one, before complaining that the video is not
etc.? supported by the device. There has to be some place in the control panel where the video
supporting formats are to be chosen. One should go there and check, whether VGA format
 Is the correct network printer selected? Many users will send a print job and not be support is enabled there or not. If not checked in there, one should check that in and recheck,
aware that they sent it to the wrong printer. whether the video is viewable or not. If that resolves the problem, the trouble shooting for
that issue cones to an end there. If not, then one is needed to then problems elsewhere.
 Is there enough hard disk space available on the PC? When preparing a print job to send,
a workstation must compose it as a temporary file. If the workstation does not have No image on screen
enough room for the file, the print job will either fail or be incomplete. Another common problem we face many a times is the blank screen or no display at all, or
one may find the screen showing he command, no video to display. Very simple thing to
 Can you print successfully from another application? If so, the problem is likely related check out there is to see the power chord of the device and whether power is reaching the
to your installation of the problem application. It is possible that the application cannot output device it not. For the command shown, no video to display, one should check on the
print to this sort of printer. data cable. Most of such cases are solved there effectively, but if not, then one can look after
another common problematic area. Not only that, but many a time it happens that he video
cards are having incomplete videos. This also may cause a no display at the video screen.
 Can you print successfully from the host PC using the identical application? This applies
Generally videos are downloaded or copied from somewhere, and it happens sometimes that
to shared printers. It is not really diagnostic unless the two workstations are alike in all
the download was not completed or some strings have gone missing due to a pause break
ways.
during the downloading process. Again, during a file being copied or moved to some other
devices, some parts have not begun copied properly due to a common problem of hardware
 Can you print to a file and then send the file to the host PC to successfully print? If this acceleration. So, that must be checked by a try to play the videos at some other devices.
works, then the problem is with data transmission. If this does not work, then the
problem is with the application or print driver on the remote PC. Overheat shutdown
Many a times, one can see that the entire display goes off, while a video is about to play. This
 For DOS applications, you may need to exit the application before printing occurs. thing starts a thought in one's mind that the video is a bad format or badly configured or may
be corrupted. But another thing that may be happening to make the system shut down almost
never comes to mind. The thing is the temperature. The system has a capacity to bear the
8.12 Video Display Problems (Video Modes, Resolution, Color, Size) temperature. But if it crosses the limit, then it is sure to go off. Sometimes, what happens is
Video mode is the mode that a video adapter is currently running. For example, in graphics the system is running for a long time and it is already at its limited point of temperature. So,
mode, the video card or display device is capable of displaying graphics. However, whenever the high pixel video is allowed to play, then the temperature limited is exceeded
in text mode, the display only displays text. Each mode is capable of different maximum and that excess temperature make the system shut down.
resolution and maximum colors.
Resolution is a measure used to describe the sharpness and clarity of an image or picture Dead pixels
and is often used as a metric for judging the quality of monitors, printers, digital images and
a various other hardware and software technologies.

Video Display Problems


There are multiple video formats now a day. More video formats mean more problems. More
problems essentially mean more precautions and more troubleshooting. One may face such
problems as to see nothing on screen. But there is one embarrassing question out there. The
question may seem to be foolish, but many a times this scenario happens, for which no image Another common issue for problems in video is the low pixels of video
is scene on the screen. The question is whether the video output device is plugged in or not. If image. The colours of the video image may seem to be faded out or may be distorted at
places. This is due to the bad quality of the input file, and nothing can be done there. But still,
one can try to find out the quality of the video. If the video format is VGA or 3GP, then one saying that the video file is corrupted, one should check the file with other displays or
can go to the control panel and check out whether all the types of video output format are monitors. If the problem is caused in a cathode ray tube display monitor, then one must check
selected or not. Checking in the video formats, may improve the rendering quality of the the file in a LCD monitor and see if it is running correctly or showing the same problem. If
video. If one finds all the videos from different sources are showing the same dead pixels, the trouble is displayed there also, then one is needed to search and check for other
then there must be a problem in the display system, and one should try to contact the problematic issues. The colours of the video image may seem to be faded out or may be
manufacturer for that purpose. distorted at places. This is due to the bad quality of the input file, and nothing can be done
there. But still, one can try to find out the quality of the video. If the video format is VGA or
Artifacts 3GP, then one can go to the control panel and check out whether all the types of video output
Many a times the graphic quality is not supported be the system, one is handling for the format are selected or not. Checking in the video formats, may improve the rendering quality
videos to be displayed. For that, one may need graphic card additionally inserted or installed of the video. If one finds all the videos from different sources are showing the same dead
for finding a better video rendering experience. Apart from that, one faces these types of pixels, then there must be a problem in the display system, and one should try to contact the
problems, when they go with cathode tube display monitors. There magnetic distortion manufacturer for that purpose.
creates problems to show a good quality video every time. So, before concluding the video to
be badly configured or before saying that the video file is corrupted, one should check the file Distorted image
with other displays or monitors. If the problem is caused in a cathode ray tube display
monitor, then one must check the file in a LCD monitor and see if it is running correctly or
showing the same problem. If the trouble is displayed there also, then one is needed to search
and check for other problematic issues.

Color patterns incorrect


Incorrect color patterns are very common in the cathode ray tube displays. But it is not even
uncommon in LCD displays. The first concern is the graphics control and hardware
acceleration properties. The old systems cannot accelerate with the fast and good quality Distorted image may be due to the dismantling of the LCD
video images, or the rendering of the images are not properly fetched out there. But if that pixels. The pixels don't collaborate with each other every time. If this is the case then one
video is rendered well and smoothly at some other LCD display, then the problem is sure to must contact with the manufacturer to replace the system within warranty period. The other
be with the old model display. If the problem persists in the LCD screen also, then the case area of concern is the graphics control and hardware acceleration properties. The old systems
reverses. Neither of the devices are having a problem. The problem lies within the video. In cannot accelerate with the fast and good quality video images, or the rendering of the images
another instance, the colour pattern remains effected throughout the video and that remains are not properly fetched out there. But if that video is rendered well and smoothly at some
same for all the video files in that device. Then the problem lies in the video settings of the other LCD display, then the problem is sure to be with the old model display. If the problem
system. One is recommended to check the video rendering settings by go in to the control persists in the LCD screen also, then the case reverses. Neither of the devices are having a
panel. problem. The problem lies within the video. In another instance, the colour pattern remains
effected throughout the video and that remains same for all the video files in that device.
Dim image Then the problem lies in the video settings of the system. One is recommended to check the
The video images may dim or show some attaching pixels on it. The LCD monitor one is video rendering settings by go in to the control panel. This changing display configuration
using is having lots of pixel on it. Some pixels might doom down, some may show extra causes the image to be distorted or even broken screen images.
brightness, and again some may show different colours. If this problem continues, then one
must contact with the manufacturer and go for a warranty replacement. Otherwise, sometimes Discoloration (degaussing)
the videos show a slow move on playing. This may be due to hardware acceleration problem. An old system generally displays this kind of problems. The entire video turns reddish or
One might free up some space on the system or can remove the temp files from the system to bluish or even may turn greenish. The cathode tubes generally functions by putting cathode
get better quality output. One may also use some registry cleaners to make the unused rays on the pixels, and if this ray is not properly emit or refracted on the pixels, his type of
unwanted files out of the system. This lessens the pressure on the hard disk, and thus the hard problems continues. Otherwise hardware slowing down also creates such problems. For
disk performance may increase by a lot. confirming the case, one may check the video in some new LCD monitors. If this is not the
case in the new device, then it is time, when one should go for replacing the monitor or at
Flickering image least install a new tube by replacing the old one.
The image flickering is a very common problem in old devices. Many a times the graphic
quality is not supported be the system, one is handling for the videos to be displayed. For BSOD
that, one may need graphic card additionally inserted or installed for finding a better video The screen goes off and turns blue at times. The video is stopped and the entire system hangs
rendering experience. Apart from that, one faces these types of problems, when they go with down. The system was running at good condition, until the video was played. As soon as the
cathode tube display monitors. There magnetic distortion creates problems to show a good video is allowed to render, the system turns blue and everything is stopped. For such
quality video every time. So, before concluding the video to be badly configured or before condition, one must try to restart the system and check it again. The system has a capacity to
bear the temperature. But if it crosses the limit, then it is sure to go off. Sometimes, what
happens is the system is running for a long time and it is already at its limited point of
temperature. So, whenever the high pixel video is allowed to play, then the temperature
limited is exceeded and that excess temperature make the system shut down. Under that
condition, one should allow the system to cool down for a while, and check the video again.
If the problem remains then also, then the system is not supporting the video quality. That
may be either for its too high quality, or may be its too low quality.

Thus a video may face problems, due to many reasons. The reason may be about the system
configuration, or may be due to setting problem, or may be due to the device incompatibility.
Once the exact reason is identified, then troubleshooting becomes much easier.

Вам также может понравиться