rgccisd technology academy troubleshooting
play

RGCCISD Technology Academy Troubleshooting Presented By Diana - PowerPoint PPT Presentation

RGCCISD Technology Academy Troubleshooting Presented By Diana Cantu Mayra Toscano Jesus Villarreal TJ Gonzalez Created by: Jesus Villarreal My Computer is Driving Me Crazy Agenda Introduction Computer Help (Hardware, Software,


  1. RGCCISD Technology Academy Troubleshooting Presented By Diana Cantu Mayra Toscano Jesus Villarreal TJ Gonzalez Created by: Jesus Villarreal

  2. My Computer is Driving Me Crazy…

  3. Agenda  Introduction  Computer Help (Hardware, Software, Programs, etc.)  How to Protect Yourself Online  Other Computer Stuff/Tips

  4. Introduction • What is Troubleshooting? Troubleshooting is a form of problem solving most often applied to repair of failed products or processes. In general, troubleshooting is the identification of, or diagnosis of "trouble" in a system caused by a failure of some kind. The problem is initially described as symptoms of malfunction, and troubleshooting is the process of determining the causes of these symptoms.

  5. Introduction • Troubleshooting: 85% of all Computer Related Problems or Errors are caused by who?

  6. Introduction • The USER….

  7. Introduction • How to Troubleshoot a Computer? Before calling technical service and paying for "help," take a look at your computer yourself. A little common sense may help you solve simple hardware and software problems. The following is a list of basic steps that may help you solve some computer headaches.

  8. Introduction 1. Restart the computer. Many software problems will correct themselves when you do. 2. Undo any changes done on the computer. 3. Check your cables. Keyboard / Mouse not working? Make sure they are plugged in. 4. Check the electric power plug or power strip. Plug a lamp into the same power outlet that's connected to your computer to make sure the outlet is working. 5. Make sure the computer and monitor are plugged in. 6. Disconnect peripheral devices (such as a printer) and restart the computer. 7. Listen for unusual sounds. Is the cooling fan running? Is the hard drive making noises?

  9. Computer Help • My computer is running slow, it is not as fast as when I bought it? How do I make it run faster?  Hardware  Computer Viruses  Spyware/Malware/Adware  Programs Running at Startup  Software

  10. Hardware • RAM or Random Access Memory: RAM or main memory is the most common type of memory found in computers and other devices, the memory available to programs. 1. Older computers have between 256MB – 1GB. 2. New computers have 1GB + • How much RAM do you have?

  11. Hardware • Activity 1: How to Find Out How Much RAM you Have in your Computer? By using this path, Start > Settings > Control Panel> Double Click on SYSTEM. This opens the SYSTEM PROPERTIES window. Under the GENERAL tab, this window will indicate the amount of RAM you have.

  12. Virus • Computer viruses are small software programs that are designed to spread from one computer to another without your knowledge, runs against your wishes and interferes with daily computer operation. • A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk.

  13. Virus • Viruses are most easily spread by attachments in e- mail messages or instant messaging. That is why it is essential that you never open e-mail attachments unless you know who it’s from and you are expecting it. • Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. • Viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download.

  14. Virus • For example, a virus might attach itself to a program such as a spreadsheet program. • Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) or cause damage to your computer or files.

  15. E-Mail Virus • An e-mail virus travels as an attachment to e-mail messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim’s e-mail address book. • Some e-mail viruses don’t even require a double-click, they launch when you view the infected message in the preview pane of your e-mail software.

  16. E-Mail Virus • Examples include: 1. Phishing e-mail: An e-mail falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. “We are conducting maintenance and need your username and password.”

  17. E-Mail Virus 2. Hoax: An e-mail message which is written to deliberately spread fear, uncertainty and doubt. A bogus virus warning. 3. The promise of free gifts or cash for forwarding an e-mail. 4. Political petitions. 5. Chain letters “forward this message to ten people for good luck”

  18. Troj an Horse • A Trojan horse is simply a computer program. The program or software claims to do one thing (it may be a game, picture, song, etc.) but instead does damage when you run it. It may change settings or may erase your hard disk. • Trojan horses do not replicate themselves but they can be just as destructive.

  19. Worm • A worm is a small piece of software that uses computer networks (Internet) and security holes to replicate itself. • A copy of the worm scans the network for another computer that has a specific security hole. It copies itself to the computer using the security hole, and then starts replicating from there, as well.

  20. Worm • Worms find you. • They hunt you down. • You don’t have to do anything to get a worm, just being on the internet is enough.

  21. Malware • Malware or Malicious software, is software designed to gain access to or damage a computer system without the owner's permission. • Includes all types malicious, unwanted and destructive software.

  22. Spyware • A type of malware that is installed secretly on personal computers to collect information about users, their computer or browsing habits without their knowledge. • While the term spyware suggests software that secretly monitors the user’s behavior, the functions of spyware extend well beyond simple monitoring.

  23. Spyware • Spyware programs can collect various types of personal information, such as Internet surfing habits and sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software and redirecting Web browser activity.

  24. Spyware • Spyware is known to change computer settings, resulting in slow connection speeds, different home pages, and/or loss of Internet or functionality of other programs. • In an attempt to increase the understanding of spyware, a more formal classification of its included software types is captured under the term privacy-invasive software.

  25. Adware • Adware or advertising-supported software is any software package which automatically plays, displays, or downloads advertisements to a computer after the software is installed on it or while the application is being used. • Some types of adware are also spyware.

  26. How to Protect Y ourself • Be Careful What You Download • When you download a program or file from an unknown source, you risk loading malicious software programs on your computer, • Fraudsters often hide these programs within seemingly useful applications. • Think twice before you click on a pop-up advertisement or download a “free” game or program.

  27. How to Protect Y ourself • Use Your Own Computer If You Can • It’s generally safer to access your personal information from your own computer than from other computers. • If you need to use a computer other than your own, you don’t know if it contains viruses or spyware. • If you do use another computer, be sure to delete all of your “Temporary Internet Files” and clear all of your “History” and “Passwords” after you log off your account.

  28. How to Protect Y ourself • Activity 2: How to Delete Temp. Internet Files, History, etc.? 1. Open Internet Explorer. 2. On the Menu bar, click “Tools”. 3. On the Tools menu, click on “Internet Options”. 4. Under “General Tab”, look for Browsing history. 5. Click on “Delete” button. 6. Check off All Boxes, click “Delete” button.

  29. How to Protect Y ourself • Don’t Respond to E-mails Requesting Personal Information • Legitimate companies will not ask you to provide or verify sensitive personal information through a non-secure means, such as e-mail. • If you have reason to believe that your financial institution actually does need information from you, pick-up the phone and call the company yourself.

  30. How to Protect Y ourself • Don’t open e-mail from an unknown sender. • Don’t open attachments from an unknown sender. • Don’t click on Pop-Ups. • In addition, you should not permit your browser to “remember” your username and password information.

  31. How to Protect Y ourself • Security Tip : Even though a web address in an e-mail may look legitimate, fraudsters can mask the true destination. • Rather than merely clicking on a link provided in an e-mail, type the web address into your browser yourself (or use a bookmark you previously created).

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend