Preview

It 282 Troubleshooting Installation

Powerful Essays
Open Document
Open Document
1382 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It 282 Troubleshooting Installation
Troubleshooting Installation

IT 282
February 27, 2011

Axia College Material
Appendix C

Troubleshooting Installation

A computer technician must be familiar with troubleshooting different operating system issues.

Complete the following activity by reading the scenarios and providing appropriate solutions.

Scenario One

As a support technician for a small company, your job is to support the PCs and their users, the employees. Ben, a coworker, comes to you with a problem. For some reason, Windows XP is not booting correctly on his computer. Ben is worried, because he has many important data files in several locations on the hard drive. He does not know which files are located in which folders. Ben is also worried about losing his saved e-mail addresses, individual e-mails, and his favorite links on Microsoft Internet Explorer®. You try everything you know to recover Ben’s computer, but nothing works. Ben’s system is corrupted beyond repair.

Prepare a list of steps you would take to fix this problem, including the steps involved in reinstalling Windows XP and recovering the data Ben needs.

1. Use the Windows Disk: The first thing to try when troubleshooting a Windows boot problem is to boot from the startup disk to check if the startup record for the active partition is corrupted, or if it is the start up files for XP. 2. Using the last known good configuration: Windows XP has the option to boot from the last known good configuration. This will boot without any changes that might have created the problem, basically turning back time on the computer to get rid of problems. To use it, restart the computer and when you see the message asking you to select the operation system, or hear the single beep, press F8 to display the Windows Advanced Options menu. Select Last Know Good Configuration from the menu. If it does not work, then that means the backup copy of the settings is also corrupted. 3. Use System Restore: System

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT1230 Analysis 2

    • 195 Words
    • 1 Page

    What I can think of to return the computer to an operational state is troubling a video problem. It maybe relating to the graphic card and the program that may run with it. The graphics adapter may either be corrupted or installed wrong under a different version. For example if the graphic is supposed to be run on a x64 based window 7 instead of a x86 version.…

    • 195 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    I own a HP 8740w Elitebook loaded with Windows 7 OS and since the past few days or so I find that it demands approximately five (5) minutes to get started. The PC gets stalled at a black screen and finally the login screen loads completely. It is only in the safe mode that the PC is able to run…

    • 474 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    A computer repair shop chooses to back up the users data if there is an issue with the owners computer software. Then they just reinstall the operating system. What the computer repair shop doesnt do is reinstall the users applications.…

    • 250 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Task 3

    • 4254 Words
    • 17 Pages

    In the event of full system failure, the computer will have to be returned to the company so that the technical team can assess the cause of full system failure, make the necessary upgrade/replacements…

    • 4254 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    ISSC362 Lab 4 Assessment

    • 412 Words
    • 2 Pages

    5. During the scanning step of the hacking attack process, you identified known software vulnerabilities in a Windows XP Professional Workstation. List the name and number of the critical Microsoft® vulnerabilities identified. What is vulnerability “MS08-067”?…

    • 412 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. You disassemble and reassemble a computer. When you first turn it on, you see no lights and hear no sounds. Nothing appears on the monitor screen. What is the most likely cause of the problem?…

    • 452 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    |What are four possible sources for the error messages, and how do you troubleshoot them? |…

    • 1069 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 4 Quiz

    • 419 Words
    • 2 Pages

    Develop the contingency planning policy statement. b. Conduct the business impact analysis. c. Identify preventative controls. d. Develop recovery strategies. e. Develop an IT contingency plan. f. Plan testing, training, and exercises. g. Plan maintenance.…

    • 419 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Random Shi

    • 592 Words
    • 3 Pages

    You are a desktop technician for Contoso, Ltd., working at the Windows 7 help desk. When a user calls or emails you with a computer problem, it is your job to travel to that user’s workstation and resolve it. To account for your time and to build up a company troubleshooting database, you must document each of your calls as well as the troubleshooting process for each computer on which you work.…

    • 592 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Chapter 18 WOS review

    • 590 Words
    • 3 Pages

    Which command can you perform at the Windows RE command prompt to repair the OS boot record on Windows 7?…

    • 590 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3110 Unit 8 Lab

    • 586 Words
    • 2 Pages

    8. What is the purpose of having documented IT systems, application, and data recovery procedures and steps? Information stored and processed on IT systems is vulnerable to degradation, accidental or intentional corruption or deletion, hardware/software failures and natural or man-made disasters. Backup and recovery procedures and plans are essential to ensuring recovery of information and the ability to continue IT support…

    • 586 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lord Kmoes

    • 3128 Words
    • 13 Pages

    Follow the safety precautions to help prevent any damage to yourself and your notebook. • Never cover or block the air vents including those located at the base of the notebook. • Always operate your notebook on a hard flat surface. Using your notebook on a carpet or other soft material can block the vents. • Do not place your notebook computer or adapter on exposed skin while it is operating. The surface temperature of the base will rise during operation. Sustained contact with exposed skin can burn or cause discomfort. • Do not place this device underneath heavy loads or in an unstable position. • This device must not be exposed to or used near magnetic fields, as magnetic interference may affect the performance of the notebook. • Do not expose this device to high levels of direct sunlight, highhumidity or wet conditions. • This device must NOT be exposed to or used near liquid, rain, or moisture. • The notebook is supplied with a UK power cord. Only use this power cord to avoid damage to your notebook. • Notebooks are designed to be used with approved batteries. In order to guarantee safe and optimal use of your notebook, you should only use approved battery packs. It is also recommended that you use a genuine adapter; using a…

    • 3128 Words
    • 13 Pages
    Good Essays
  • Good Essays

    Lab #9

    • 650 Words
    • 3 Pages

    1. When you are notified that a user’s workstation or system is acting strangely and log files indicate system compromise, what is the first thing you should do to the workstation or system and why?…

    • 650 Words
    • 3 Pages
    Good Essays
  • Good Essays

    You just have to fool the system into believing that the System BIOS is corrupt. This you do by giving your system a hard time reading the System BIOS by shorting the 2 high address pins. And when it could not read the System BIOS properly, ROM Checksum Error is detected "so to speak" and Bootblock recovery is activated.…

    • 1203 Words
    • 5 Pages
    Good Essays
  • Good Essays

    It was the morning of July 31 1996, when the first worker fired up the Novell NetWare 3.12 file server as he always did. This time, however the server did not boot up. A message popped up on the screen saying that a section of the file server was being fixed and then it crashed. When it crashed "it took nearly every program down along with it, destroying any means of finding them and scattering the millions of lines of coding like a handful of sand thrown onto beach" (Gaudin, 2000). Even when the server was down, however, the programs could be taken off the backup tape and the machines could run. But the backup tape was nowhere to be found. The Plant manager went to the individual workstations to retrieve any programs that workers had saved to their desktops, but there was also nothing to be found. There were no programs and no backup tapes. The manager then made a decision to run the machines with programs that already had been loaded the day before and the machines run like that – some, for days, some for weeks until they choked inventory or exhausted their raw material (Gaudin, 2000).…

    • 910 Words
    • 4 Pages
    Good Essays