RGCCISD Technology Academy Troubleshooting Presented By Diana - - PowerPoint PPT Presentation

rgccisd technology academy troubleshooting
SMART_READER_LITE
LIVE PREVIEW

RGCCISD Technology Academy Troubleshooting Presented By Diana - - PowerPoint PPT Presentation

RGCCISD Technology Academy Troubleshooting Presented By Diana Cantu Mayra Toscano Jesus Villarreal TJ Gonzalez Created by: Jesus Villarreal My Computer is Driving Me Crazy Agenda Introduction Computer Help (Hardware, Software,


slide-1
SLIDE 1

RGCCISD Technology Academy Troubleshooting

Presented By Diana Cantu Mayra Toscano Jesus Villarreal TJ Gonzalez

Created by: Jesus Villarreal

slide-2
SLIDE 2

My Computer is Driving Me Crazy…

slide-3
SLIDE 3

Agenda

Introduction Computer Help (Hardware, Software,

Programs, etc.)

How to Protect Yourself Online Other Computer Stuff/Tips

slide-4
SLIDE 4

Introduction

  • What is Troubleshooting?

Troubleshooting is a form of problem solving most often applied to repair of failed products

  • r processes.

In general, troubleshooting is the identification

  • f, or diagnosis of "trouble" in a system caused

by a failure of some kind. The problem is initially described as symptoms of malfunction, and troubleshooting is the process of determining the causes of these symptoms.

slide-5
SLIDE 5

Introduction

  • Troubleshooting:

85% of all Computer Related Problems

  • r Errors are caused by who?
slide-6
SLIDE 6

Introduction

  • The USER….
slide-7
SLIDE 7

Introduction

  • How to Troubleshoot a Computer?

Before calling technical service and paying for "help," take a look at your computer

  • yourself. A little common sense may help

you solve simple hardware and software problems. The following is a list of basic steps that may help you solve some computer headaches.

slide-8
SLIDE 8

Introduction

1. Restart the computer. Many software problems will correct themselves when you do. 2. Undo any changes done on the computer. 3. Check your cables. Keyboard / Mouse not working? Make sure they are plugged in. 4. Check the electric power plug or power strip. Plug a lamp into the same power outlet that's connected to your computer to make sure the outlet is working. 5. Make sure the computer and monitor are plugged in. 6. Disconnect peripheral devices (such as a printer) and restart the computer. 7. Listen for unusual sounds. Is the cooling fan running? Is the hard drive making noises?

slide-9
SLIDE 9

Computer Help

  • My computer is running slow, it is not as

fast as when I bought it? How do I make it run faster?

  • Hardware
  • Computer Viruses
  • Spyware/Malware/Adware
  • Programs Running at Startup
  • Software
slide-10
SLIDE 10

Hardware

  • RAM or Random Access Memory: RAM or

main memory is the most common type of memory found in computers and other devices, the memory available to programs.

  • 1. Older computers have between 256MB – 1GB.
  • 2. New computers have 1GB +
  • How much RAM do you have?
slide-11
SLIDE 11

Hardware

  • Activity 1:

How to Find Out How Much RAM you Have in your Computer? By using this path, Start > Settings > Control Panel> Double Click

  • n SYSTEM. This opens the SYSTEM

PROPERTIES window. Under the GENERAL tab, this window will indicate the amount of RAM you have.

slide-12
SLIDE 12

Virus

  • Computer viruses are small software

programs that are designed to spread from

  • ne computer to another without your

knowledge, runs against your wishes and interferes with daily computer operation.

  • A virus might corrupt or delete data on

your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk.

slide-13
SLIDE 13

Virus

  • Viruses are most easily spread by attachments in e-

mail messages or instant messaging. That is why it is essential that you never open e-mail attachments unless you know who it’s from and you are expecting it.

  • Viruses can be disguised as attachments of funny

images, greeting cards, or audio and video files.

  • Viruses also spread through downloads on the
  • Internet. They can be hidden in illicit software or
  • ther files or programs you might download.
slide-14
SLIDE 14

Virus

  • For example, a virus might attach itself to a

program such as a spreadsheet program.

  • Each time the spreadsheet program runs,

the virus runs, too, and it has the chance to reproduce (by attaching to other programs)

  • r cause damage to your computer or files.
slide-15
SLIDE 15

E-Mail Virus

  • An e-mail virus travels as an attachment to

e-mail messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim’s e-mail address book.

  • Some e-mail viruses don’t even require a

double-click, they launch when you view the infected message in the preview pane

  • f your e-mail software.
slide-16
SLIDE 16

E-Mail Virus

  • Examples include:
  • 1. Phishing e-mail: An e-mail falsely claiming

to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. “We are conducting maintenance and need your username and password.”

slide-17
SLIDE 17

E-Mail Virus

  • 2. Hoax: An e-mail message which is written

to deliberately spread fear, uncertainty and doubt. A bogus virus warning.

  • 3. The promise of free gifts or cash for

forwarding an e-mail.

  • 4. Political petitions.
  • 5. Chain letters “forward this message to ten

people for good luck”

slide-18
SLIDE 18

Troj an Horse

  • A Trojan horse is simply a computer
  • program. The program or software claims

to do one thing (it may be a game, picture, song, etc.) but instead does damage when you run it. It may change settings or may erase your hard disk.

  • Trojan horses do not replicate themselves

but they can be just as destructive.

slide-19
SLIDE 19

Worm

  • A worm is a small piece of software that

uses computer networks (Internet) and security holes to replicate itself.

  • A copy of the worm scans the network for

another computer that has a specific security hole. It copies itself to the computer using the security hole, and then starts replicating from there, as well.

slide-20
SLIDE 20

Worm

  • Worms find you.
  • They hunt you down.
  • You don’t have to do anything to get a

worm, just being on the internet is enough.

slide-21
SLIDE 21

Malware

  • Malware or Malicious software, is software

designed to gain access to or damage a computer system without the owner's permission.

  • Includes all types malicious, unwanted and

destructive software.

slide-22
SLIDE 22

Spyware

  • A type of malware that is installed secretly
  • n personal computers to collect

information about users, their computer or browsing habits without their knowledge.

  • While the term spyware suggests software

that secretly monitors the user’s behavior, the functions of spyware extend well beyond simple monitoring.

slide-23
SLIDE 23

Spyware

  • Spyware programs can collect various types
  • f personal information, such as Internet

surfing habits and sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software and redirecting Web browser activity.

slide-24
SLIDE 24

Spyware

  • Spyware is known to change computer

settings, resulting in slow connection speeds, different home pages, and/or loss of Internet

  • r functionality of other programs.
  • In an attempt to increase the understanding of

spyware, a more formal classification of its included software types is captured under the term privacy-invasive software.

slide-25
SLIDE 25

Adware

  • Adware or advertising-supported software

is any software package which automatically plays, displays, or downloads advertisements to a computer after the software is installed on it or while the application is being used.

  • Some types of adware are also spyware.
slide-26
SLIDE 26

How to Protect Y

  • urself
  • Be Careful What You Download
  • When you download a program or file from an

unknown source, you risk loading malicious software programs on your computer,

  • Fraudsters often hide these programs within

seemingly useful applications.

  • Think twice before you click on a pop-up

advertisement or download a “free” game or program.

slide-27
SLIDE 27

How to Protect Y

  • urself
  • Use Your Own Computer If You Can
  • It’s generally safer to access your personal

information from your own computer than from other computers.

  • If you need to use a computer other than your
  • wn, you don’t know if it contains viruses or

spyware.

  • If you do use another computer, be sure to

delete all of your “Temporary Internet Files” and clear all of your “History” and “Passwords” after you log off your account.

slide-28
SLIDE 28

How to Protect Y

  • urself
  • Activity 2:

How to Delete Temp. Internet Files, History, etc.?

  • 1. Open Internet Explorer.
  • 2. On the Menu bar, click

“Tools”.

  • 3. On the Tools menu, click
  • n “Internet Options”.
  • 4. Under “General Tab”, look for

Browsing history.

  • 5. Click on “Delete” button.
  • 6. Check off All Boxes, click

“Delete” button.

slide-29
SLIDE 29

How to Protect Y

  • urself
  • Don’t Respond to E-mails Requesting

Personal Information

  • Legitimate companies will not ask you to

provide or verify sensitive personal information through a non-secure means, such as e-mail.

  • If you have reason to believe that your

financial institution actually does need information from you, pick-up the phone and call the company yourself.

slide-30
SLIDE 30

How to Protect Y

  • urself
  • Don’t open e-mail from an unknown

sender.

  • Don’t open attachments from an unknown

sender.

  • Don’t click on Pop-Ups.
  • In addition, you should not permit your

browser to “remember” your username and password information.

slide-31
SLIDE 31

How to Protect Y

  • urself
  • Security Tip: Even though a web address in

an e-mail may look legitimate, fraudsters can mask the true destination.

  • Rather than merely clicking on a link

provided in an e-mail, type the web address into your browser yourself (or use a bookmark you previously created).

slide-32
SLIDE 32

How to Protect Y

  • urself
  • Be Smart About Your Passwords
  • The best passwords are ones that are difficult

to guess.

  • Try using a password that contains a

combination of numbers, letters (both upper and lower case), punctuation and special characters.

  • If possible, you should change your password

regularly and use a different password for each of your accounts.

slide-33
SLIDE 33

How to Protect Y

  • urself
  • Don’t share your password with others and

NEVER reply to “phishing” e-mails with your password or other sensitive personal information.

  • You should not store your password on

your computer. If you need to write down your password, store it in a secure, private place.

slide-34
SLIDE 34

How to Protect Y

  • urself
  • Log Out Completely
  • Closing or minimizing your browser or

typing in a new web address when you’re done using your online account may not be enough to prevent others from gaining access to your account information.

  • Instead, always click on the “Log Out”

button to terminate your online session.

slide-35
SLIDE 35

How to Protect Y

  • urself
  • Cons That Play on People’s Greed are Very

Common I. Examples:

1. Would you like to win the lottery? 2. Get a share of a rich ex-dictator bank account? Of course, would you be prepared to pay a little up front to facilitate the process? 3. Money laundering. 4. Money for chemicals to clean marked currency.

slide-36
SLIDE 36

How to Protect Y

  • urself

I. Examples:

  • 5. Gifts or bequests to charities.
  • 6. Type in your credit card number to claim your

4 night/3 day all expense paid vacation to Las Vegas.

  • 7. That’s just what fraudsters want you to do.
slide-37
SLIDE 37

How to Protect Y

  • urself
  • Stop and Think….
  • Never pay anything up front.
  • Don’t get involved in correspondence with

fraudsters.

  • If you get involved in a scam, don’t let

embarrassment prevent you from reporting the incident to the authorities.

  • Guard your bank and personal information

details carefully.

slide-38
SLIDE 38

Programs Running at Startup

  • Software that wants to run some of its

components at all times, whether the program is being used or not.

  • More and more programs are inserting things

into the startup process so that every time you turn on your computer all sorts of stuff is running in the background without asking you.

  • All of these processes or programs take up

memory, CPU time, and other resources and can significantly slow down or even crash your computer.

slide-39
SLIDE 39

Programs Running at Startup

  • Activity 3:

Shutdown Unnecessary Programs: By using this path, Start > Run > type “msconfig” > click on Startup Tab, you can close all unwanted programs running on your computer. Uncheck all except anti-virus program and reboot to see the effect on your computer.

slide-40
SLIDE 40

Software

  • Anti-Virus Software
  • 1. Symantec
  • 2. AVG
  • 3. McAfee
  • 4. Kaspersky, etc

– Lab 1: Download and Install Free AVG

slide-41
SLIDE 41

Software

  • Spyware/Malware Software
  • 1. Symantec Security
  • 2. Malwarebytes Anti-Malware
  • 3. Advanced SystemCare
  • 4. Spybot Search & Destroy
  • 5. Kaspersky, etc

– Lab 2: Download and Install Malwarebytes Anti-Malware

slide-42
SLIDE 42

Software

  • Important Updates
  • 1. Anti-virus
  • 1. Weekly
  • 2. Paid Subscription based
  • 2. Spyware/Malware
  • 1. Weekly
  • 3. Windows Update
  • 1. Weekly
  • 2. Automatic is the best method
slide-43
SLIDE 43

Software

  • Is your computer up to date?
  • Lab 3: How to install Windows Updates
  • What are your Windows Automatic

Update Settings?

  • Lab 4: Configure Automatic Windows Updates
slide-44
SLIDE 44

Screen Resolution

  • The display resolution typically refers to the

number of distinct pixels in each dimension that can be displayed.

  • Is simply the physical number of columns

and rows of pixels creating the display (ex., 800 x 600)

slide-45
SLIDE 45

Screen Resolution

  • Activity 4:

Change Display Properties: Right Click Desktop > Click Properties > Click the Settings Tab

  • What is your screen

resolution?

slide-46
SLIDE 46

Screen Resolution

  • Make your resolution smaller, click Apply.
  • What happens?
  • Make your resolution bigger, click Apply.
  • What happens?
slide-47
SLIDE 47

Questions?