ITE_PC_v40_Chapter5

  • Upload
    krvosaj

  • View
    216

  • Download
    0

Embed Size (px)

Citation preview

  • 8/14/2019 ITE_PC_v40_Chapter5

    1/67

    2007 Cisco Systems, Inc. All rights reserved. Cisco PublicITE PC v4.0Chapter5 1

    Chapter 5:

    Operating Systems

    IT Essentials: PC Hardware and Software v4.0

  • 8/14/2019 ITE_PC_v40_Chapter5

    2/67

    ITE PC v4.0Chapter 5 2 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    The Purpose of an Operating System

    The operating system (OS) controls almost all functionson a computer.

    Learn about the components, functions, and

    terminology related tothe Windows 2000 andWindows XP operatingsystems.

  • 8/14/2019 ITE_PC_v40_Chapter5

    3/67

    ITE PC v4.0Chapter 5 3 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Roles of an Operating System

    All computers rely on an operating system (OS) toprovide the interface for interaction between users,applications, and hardware.

    The operating system boots the computer andmanages the file system.

    Almost all modern operating systems can support morethan one user, task, or CPU.

    The operating system has four main roles:

    Control hardware access

    Manage files and folders

    Provide user interface

    Manage applications

  • 8/14/2019 ITE_PC_v40_Chapter5

    4/67

    ITE PC v4.0Chapter 5 4 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Characteristics of Operating Systems Control hardware access

    OS automatically discovers and configures PnP hardware

    File and folder management

    User interface

    Command line interface (CLI)

    Graphical user interface (GUI)

    Application management

    Open Graphics Library (OpenGL)

    DirectX

  • 8/14/2019 ITE_PC_v40_Chapter5

    5/67

    ITE PC v4.0Chapter 5 5 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    The Types of Operating Systems

    Graphical User Interface(GUI): The user interactswith menus and icons.

    Command Line Interface(CLI): The user typescommands at a prompt.

    Most operating systems include both a GUI and a CLI.

  • 8/14/2019 ITE_PC_v40_Chapter5

    6/67

    ITE PC v4.0Chapter 5 6 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Compare Operating Systems

    Terms often used when comparing operating systems:

    Multi-user Two or more users can work with programsand share peripheral devices, such as printers, at the sametime.

    Multi-tasking The computer is capable of operatingmultiple applications at the same time.

    Multi-processing The computer can have two or morecentral processing units (CPUs) that programs share.

    Multi-threading A program can be broken into smallerparts that can be loaded as needed by the operating system.Multi-threading allows individual programs to be multi-tasked.

  • 8/14/2019 ITE_PC_v40_Chapter5

    7/67ITE PC v4.0Chapter 5 7 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Real Mode Executes only one program at a time

    Addresses only 1 MB of system memory at a time

    Directly accesses memory and hardware

    Subject to crashes

    Available to all modern processors

    Only used by DOS and DOS applications

    Program Codedirectly controls PC

    hardware.

    PC hardware can beinterrupted by bad

    code.

  • 8/14/2019 ITE_PC_v40_Chapter5

    8/67ITE PC v4.0Chapter 5 8 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Protected Mode Has access to all memory

    Can manage multiple programs simultaneously

    Allows the system to use virtual memory

    Provides 32-bit access to memory, drivers, and I/O transfers

    Each program is assigned a space in memory

    Computer is protected from program errors

    Program Codedirectly controlsPC hardware.

    PChardwarecannot beinterrupted

    by bad code.

    HardwareAbstraction

    Layer(HAL)

    Programtalks to

    HAL

    HAL controlshardwareand stops

    errors.

  • 8/14/2019 ITE_PC_v40_Chapter5

    9/67ITE PC v4.0Chapter 5 9 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Virtual Real Mode Allows a real-mode application to run within a protected-mode

    operating system

    Creates virtual machines for each program that runs in real mode

    Each virtual machine receives 1 MB of memory and access to

    hardware

    In the event of a program error, only the virtual machine isaffected

    OS provides virtual machine to host the code and protect the PC

    Program operates invirtual machine

    PC hardwarecontrolled by

    virtual machine;errors are

    stopped

    Program Code

  • 8/14/2019 ITE_PC_v40_Chapter5

    10/67

  • 8/14/2019 ITE_PC_v40_Chapter5

    11/67ITE PC v4.0Chapter 5 11 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Compare Operating Systems

    Desktop operating systems:

    Microsoft Windows: Windows XP

    Macintosh: Mac OS X

    Linux: Fedora, Ubuntu, and others

    UNIX

    A desktop OS has the followingcharacteristics:

    Supports a single user

    Runs single-user applications

    Shares files and folders on a smallnetwork with limited security

  • 8/14/2019 ITE_PC_v40_Chapter5

    12/67ITE PC v4.0Chapter 5 12 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Network Operating Systems (NOS) Common NOS include:

    Novell Netware

    Microsoft Windows Server

    LinuxUNIX

    A network OS has the followingcharacteristics:

    Supports multiple users

    Runs multi-user applications

    Is robust and redundant

    Provides increased security compared to

    desktop operating systems

  • 8/14/2019 ITE_PC_v40_Chapter5

    13/67

    ITE PC v4.0Chapter 5 13 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Determine Proper Operating System

    Create an accurate profile of your customer byanalyzing the daily, weekly, and monthly computeractivities

    Select appropriate software and hardware to satisfyexisting and future requirements

    To select the proper operating system:

  • 8/14/2019 ITE_PC_v40_Chapter5

    14/67

    ITE PC v4.0Chapter 5 14 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    What Does Your Customer Require? Office applications

    word processing, spreadsheets, orpresentation software

    Graphics applicationsPhotoshop or Illustrator

    Animation applications

    Flash

    Business applicationsaccounting, contact management,sales tracking or database

  • 8/14/2019 ITE_PC_v40_Chapter5

    15/67

    ITE PC v4.0Chapter 5 15 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Identify Minimum Hardware Requirements

    Customer may need to upgrade or purchase additionalhardware to support the required applications and OS.

    A cost analysis will indicate if purchasing newequipment is a better idea than upgrading.

    Common hardware upgrades:

    RAM capacity

    Hard drive size

    Processor speedVideo card memory and speed

  • 8/14/2019 ITE_PC_v40_Chapter5

    16/67

    ITE PC v4.0Chapter 5 16 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Hardware Compatibility List (HCL) Most operating systems have an HCL.

    HCLs can be found on the manufacturer's website.

    HCL includes list of hardware that is known to work with

    the operating system.

  • 8/14/2019 ITE_PC_v40_Chapter5

    17/67

    ITE PC v4.0Chapter 5 17 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Installing the Operating System

    Reasons to perform a clean installation of an OS:

    When a computer is passed from one employee to another

    When the operating system is corrupted

    When a new replacement hard drive is installed in acomputer

    Before performing a clean installation:

    Back up all data first

    Explain to the customer that existing data will be erased

    Confirm that all needed data has been successfullytransferred

  • 8/14/2019 ITE_PC_v40_Chapter5

    18/67

    ITE PC v4.0Chapter 5 18 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Hard Drive Setup Procedures

    Operating system setup methods:

    Install an OS over a network from a server

    Install from a copy of the OS files stored on the hard

    drive Install from OS files stored on CDs or DVDs

    Partitioning and Formatting

    Hard drive must be logically divided (partitioned)

    File system must be created on the hard drive

    During the installation phase, most operating systemswill automatically partition and format the hard drive

  • 8/14/2019 ITE_PC_v40_Chapter5

    19/67

    ITE PC v4.0Chapter 5 19 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Hard Drive Setup ProceduresA technician should understand the process related tohard drive setup.

  • 8/14/2019 ITE_PC_v40_Chapter5

    20/67

    ITE PC v4.0Chapter 5 20 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Prepare the Hard Drive

    The first portion of the installation process deals withformatting and partitioning the hard drive.

    The second portion prepares the disk to accept the file

    system. The file system provides the directory structure that

    organizes the user's operating system, application,configuration, and data files.

    Examples of file systems:The FAT32 file system

    The New Technology File System (NTFS)

  • 8/14/2019 ITE_PC_v40_Chapter5

    21/67

    ITE PC v4.0Chapter 5 21 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Install the Operating System

    Define currency and numerals

    Text input language

    Name of user

    Name of company

    Product key

    Computer name

    Administrator password

    Date and time settings

    Network settings

    Domain or workgroup information

    During the Windows XP installation the user must provide:

  • 8/14/2019 ITE_PC_v40_Chapter5

    22/67

    ITE PC v4.0Chapter 5 22 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Create Administrator Account

    Setup creates the administrator account with the username administrator

    Change this name to keep the administrator account secure

    Only use the administrator account occasionally for criticalsystem changes

    Create a fictitious user account to use as a template

    Use secure passwords

    These should be a minimum of 7 characters, containing at leastone of each (letter, number, and symbol)

  • 8/14/2019 ITE_PC_v40_Chapter5

    23/67

    ITE PC v4.0Chapter 5 23 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Complete the Installation

    When Windows XP installationcompletes:

    Computer will reboot

    Log in for the first timeRegister Windows XP and verify that you areusing a legal copy of the OS

    Verification enables you to downloadpatches and service packs

    Use Microsoft Update Manager toscan for new software and to:

    Install all service packs

    Install all patches

  • 8/14/2019 ITE_PC_v40_Chapter5

    24/67

    ITE PC v4.0Chapter 5 24 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Check Device Manager for Conflicts

    Look for warning icons (yellow exclamation points)

    Double-click to learn about the problem

    Click the plus (+) sign to expand the category

    May be able to ignore an error

  • 8/14/2019 ITE_PC_v40_Chapter5

    25/67

    ITE PC v4.0Chapter 5 25 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Custom Installation Options

    Follow these steps for disk cloning:

    Create a master installation on one computer

    Run SysprepCreate a disk image of the configured computer using third-party disk-cloning software

    Copy the disk image onto a server

    When the destination computer is booted,

    A shortened version of the Windows setup program runs

    Setup configures only user-specific and computer-specificsettings

    An answer file provides data normally required during set up

    With Microsoft System Preparation

  • 8/14/2019 ITE_PC_v40_Chapter5

    26/67

    ITE PC v4.0Chapter 5 26 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    The Boot Sequence for Windows XP Power On Self Test (POST)

    POST for each adapter card that has a BIOS

    BIOS reads the Master Boot Record (MBR)

    MBR takes over control of the boot process and starts NT Loader(NTLDR)

    NTLDR reads the BOOT.INI file to know which OS to load andwhere to find the OS on the boot partition

    NTLDR uses NTDETECT.COM to detect any installed hardware NTLDR loads the NTOSKRNL.EXE file and HAL.DLL

    NTLDR reads the registry files and loads device drivers

    NTOSKRNL.EXE starts the WINLOGON.EXE program and displays

    the Windows login screen

  • 8/14/2019 ITE_PC_v40_Chapter5

    27/67

    ITE PC v4.0Chapter 5 27 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    NTLDR and the Windows Boot Menu

    If more than one OS is present on thedisk, BOOT.INI gives the user achance to select which to use.

    Otherwise:NTLDR runs NTDETECT.COM to getinformation about installed hardware

    NTLDR then uses the path specified in theBOOT.INI to find the boot partition

    NTLDR loads two files that make up thecore of XP: NTOSKRNL.EXE and HAL.DLL

    NTLDR reads the Registry files, chooses ahardware profile, and loads device drivers.

  • 8/14/2019 ITE_PC_v40_Chapter5

    28/67

    ITE PC v4.0Chapter 5 28 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    The Windows Registry

    Recognized by distinctive names, beginning withHKEY_

    Every setting in Windows is stored in the registry

    Changes to the Control Panel settings, FileAssociations, System Policies, or installed software arestored in the registry

    Each user has their own section of the registry

    The Windows logon process uses the registry to set thesystem to the state that it was in the last time the userlogged in

  • 8/14/2019 ITE_PC_v40_Chapter5

    29/67

    ITE PC v4.0Chapter 5 29 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    The Windows Registry Files

  • 8/14/2019 ITE_PC_v40_Chapter5

    30/67

    ITE PC v4.0Chapter 5 30 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    The NT Kernel and Security Authority

    Next, the NT kernel, NTOSKRNL.EXE, takes over

    It starts the login file, WINLOGON.EXE

    That program starts the Local Security Administration file,LSASS.EXE (Local Security Administration)

    LSASS.EXE is the program that displays the XP welcomescreen

    There are few differences between the Windows XPand the Windows 2000 boot process

  • 8/14/2019 ITE_PC_v40_Chapter5

    31/67

    ITE PC v4.0Chapter 5 31 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Manipulating Operating System Files After you have installed Windows XP, you can use

    MSCONFIG for post-installation modifications:

    This boot configuration utility allows you to set programs thatwill run at startup, and to edit configuration files

  • 8/14/2019 ITE_PC_v40_Chapter5

    32/67

    ITE PC v4.0Chapter 5 32 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Manipulating Operating System Files The registry is a database that contains information and

    settings for all of the hardware, software, users andpreferences. REGEDIT allows users to edit the registry.

  • 8/14/2019 ITE_PC_v40_Chapter5

    33/67

    ITE PC v4.0Chapter 5 33 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Manipulating Operating System FilesPressing the F8 key during the boot process opens the

    Windows Advanced Startup Options menu, which allowsyou to select how to boot Windows.

    Safe Mode Starts Windows but only loads drivers for basic

    components, such as the keyboard and display.

    Safe Mode with Networking Support Starts Windowsidentically to Safe Mode and also loads the drivers for networkcomponents.

    Safe Mode with Command Prompt Starts Windows and loadsthe command prompt instead of the GUI interface.

    Last Known Good Configuration Enables a user to load theconfigurations settings of Windows that was used the last time thatWindows successfully started. It does this by accessing a copy ofthe registry that is created for this purpose.

  • 8/14/2019 ITE_PC_v40_Chapter5

    34/67

    ITE PC v4.0Chapter 5 34 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Describing Directory Structures Windows file system naming conventions:

    Maximum of 255 characters may be used

    Characters such as a period (.) or a slash (\ /) are not allowed

    An extension of three or four letters is added to the filename toidentify the file type

    Filenames are not case sensitive

    Windows filename extension examples:

    .doc - Microsoft Word

    .txt - ASCII text only

    .jpg - graphics format

    .ppt - Microsoft PowerPoint

    .zip - compression format

  • 8/14/2019 ITE_PC_v40_Chapter5

    35/67

    ITE PC v4.0Chapter 5 35 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Describing Directory Structures

    Each file has a set of attributes that control how the filemay be viewed or altered.

    The following are the most common file attributes:

    R - The file is read-onlyA - The file will be archived the next backup

    S - The file is marked as a system file and a warning is given ifan attempt is made to delete or modify the file

    H - The file is hidden in the directory display

  • 8/14/2019 ITE_PC_v40_Chapter5

    36/67

    ITE PC v4.0Chapter 5 36 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    The ATTRIB Command

  • 8/14/2019 ITE_PC_v40_Chapter5

    37/67

    ITE PC v4.0Chapter 5 37 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    NTFS and FAT32 FAT32 is used where files need to be accessed by

    multiple versions of Windows. FAT32 is not as secureas NTFS

    NTFS can support more and larger files than FAT32,and provides more flexible security features for folders,files, and sizes

    Partitions can be converted from FAT32 to NTFS usingthe CONVERT.EXE utility, but not in the reverse

    direction

  • 8/14/2019 ITE_PC_v40_Chapter5

    38/67

    ITE PC v4.0Chapter 5 38 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Navigating a Graphical User Interface (GUI)

    A GUI provides graphical representations of all the files,folders, and programs on a computer.

  • 8/14/2019 ITE_PC_v40_Chapter5

    39/67

    ITE PC v4.0Chapter 5 39 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Customizing the Desktop

    To customize any of these, simply right-click the item andthen select Properties.

    Taskbar

    Recycle Bin Desktop background

    Window appearance

  • 8/14/2019 ITE_PC_v40_Chapter5

    40/67

    ITE PC v4.0Chapter 5 40 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    The Start Menu

    Customized to two styles, XP andClassic

    Accessed by clicking the Start button

    The Start menu includes:A nested list of all installed applications

    A list of recently opened documents

    A list of other elements, including; a

    search feature, a help center, and systemsettings

  • 8/14/2019 ITE_PC_v40_Chapter5

    41/67

    ITE PC v4.0Chapter 5 41 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    My Computer

    When you right-click My Computerandselect Properties, there are severalsettings that can be customized:

    Computer nameHardware settings

    Virtual memory

    Automatic updates

    Remote access

    Files can also be moved and copied usingMy Computer

  • 8/14/2019 ITE_PC_v40_Chapter5

    42/67

    ITE PC v4.0Chapter 5 42 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Launching Applications

    Applications can be launched in several ways:

    Click the application on the Start menu

    Double-click the application shortcut icon on the desktop

    Double-click the application executable file in My Computer

    Launch the application from the Run window or command line

    To view and configure network connections, right-click the

    My Network Places icon. Connect to or disconnect from a network drive

    Right-click Properties to configure existing networkconnections, such as a wired or wireless LAN connection

  • 8/14/2019 ITE_PC_v40_Chapter5

    43/67

    ITE PC v4.0Chapter 5 43 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Control Panel Applets

  • 8/14/2019 ITE_PC_v40_Chapter5

    44/67

    ITE PC v4.0Chapter 5 44 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Display Settings

    Change the resolutionand color quality

    Change wallpaper,

    screen saver, powersettings, and otheroptions, by clicking theAdvanced button

  • 8/14/2019 ITE_PC_v40_Chapter5

    45/67

    ITE PC v4.0Chapter 5 45 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Device Manager

    Used to view settings fordevices in the computer

    An exclamation markindicates a problem with adevice

  • 8/14/2019 ITE_PC_v40_Chapter5

    46/67

    ITE PC v4.0Chapter 5 46 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Task Manager

    View all applications thatare currently running

    Close any applications that

    have stopped responding Monitor the performance of

    the CPU and virtualmemory

    View all processes that arecurrently running

    View information about thenetwork connections

  • 8/14/2019 ITE_PC_v40_Chapter5

    47/67

    ITE PC v4.0Chapter 5 47 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Event Viewer and Remote Desktop

    Event Viewer

    Logs a history of events regarding applications,security, and the system.

    These log files are a valuable troubleshooting tool.

    Remote Desktop

    Allows one computer to remotely take control of

    another computer. This troubleshooting feature is only available with

    Windows XP Professional.

  • 8/14/2019 ITE_PC_v40_Chapter5

    48/67

    ITE PC v4.0Chapter 5 48 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Performance SettingsSettings for advanced visuals and for virtual memory

  • 8/14/2019 ITE_PC_v40_Chapter5

    49/67

    ITE PC v4.0Chapter 5 49 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Add or Remove an Application Utility to install or uninstall applications

    Tracks installation files for future thorough uninstall, ifdesired

  • 8/14/2019 ITE_PC_v40_Chapter5

    50/67

    ITE PC v4.0Chapter 5 50 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Upgrading an Operating System

    Upgrade Paths

  • 8/14/2019 ITE_PC_v40_Chapter5

    51/67

    ITE PC v4.0Chapter 5 51 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Upgrading to Windows XP Insert the Windows XP CD. Select Start > Run.

    In the Run box, where D is the drive letter for the CD-ROM, type D:\i386\winnt32 and press Enter. TheWelcome to the Windows XP Setup Wizard displays.

    Choose Upgrade to Windows XP and click Next. TheLicense Agreement page displays.

    Read the license agreement and click the button toaccept this agreement.

    Click Next. The Upgrading to the Windows XP NTFSFile System page displays.

    Follow the prompts and complete the upgrade. When

    the install is complete, the computer will restart.

  • 8/14/2019 ITE_PC_v40_Chapter5

    52/67

    ITE PC v4.0Chapter 5 52 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Preventive Maintenance PlanningComponents of a preventive maintenance plan:

    Updates to the operating system and applications

    Updates to anti-virus and other protective software

    Hard drive error checking

    Hard drive backup

    Hard drive defragmentation

  • 8/14/2019 ITE_PC_v40_Chapter5

    53/67

    ITE PC v4.0Chapter 5 53 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Schedule Tasks The DOS AT command launches tasks at a specified time using

    the command line interface

    Information about the AT command is available at this path: Start >Run > cmd Then type AT /? at the command line.

    The Windows Task Scheduler launches tasks at a specified timeusing a graphical interface

    Access the Windows Task Scheduler by following this path: Start > AllPrograms > Accessories > System Tools > Scheduled Tasks

    Examples of scheduled tasks to run

    ScanDisk (Windows 2000) and CHKDSK (Windows XP) check theintegrity of files and folders and scan the hard disk surface for physicalerrors.

    Defrag: Gathers the noncontiguous data into one place, making filesrun faster

  • 8/14/2019 ITE_PC_v40_Chapter5

    54/67

    ITE PC v4.0Chapter 5 54 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Automatic Updates An automatic update service scans the system for

    needed updates, and recommends what should bedownloaded and installed.

    Automatic update services can setup to download and

    install updates as soon as they are available or asrequired, and install them when the computer is nextrebooted.

  • 8/14/2019 ITE_PC_v40_Chapter5

    55/67

    ITE PC v4.0Chapter 5 55 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Restore Point

    An image of the current computer settings. If the computercrashes, the OS can roll back to a restore point.

    The restore point utility only operates on OS andapplication files.

    Anti-virus software should be run to remove malwarebefore creating a restore point.

    When to create a restore point:

    Before updating or replacing the OS When an application or driver is installed

    Manually at any time

  • 8/14/2019 ITE_PC_v40_Chapter5

    56/67

    ITE PC v4.0Chapter 5 56 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Backup the Hard Drive Backup tools allow for recovery of data.

    Use the Microsoft Backup Tool to perform backups.

    Establish a backup strategy that will allow for the

    recovery of data. Decide how often the data must be backed up and the

    type of backup to perform.

    Windows XP uses Volume Shadow Copying, which

    allows users to continue to work even as a backup istaking place.

    It is only necessary to make copies of the files thathave changed since the last backup.

  • 8/14/2019 ITE_PC_v40_Chapter5

    57/67

    ITE PC v4.0Chapter 5 57 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Types of Backups

    YesSelected files and folders thatchanged since the last backup

    Incremental

    NoSelected files and folders that

    changed during the dayDaily

    NoSelected files and folders thatchanged since the last backup

    Differential

    NoSelected files and foldersCopy

    YesSelected files and foldersNormal

    Clearmarker

    Description

  • 8/14/2019 ITE_PC_v40_Chapter5

    58/67

    ITE PC v4.0Chapter 5 58 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Step 1 Gather data from the customer

    Step 2 Verify the obvious issues

    Step 3 Try quick solutions first

    Step 4 Gather data from the computer

    Step 5 Evaluate the problem and implement the solution

    Step 6 Close with the customer

    Troubleshooting Process

  • 8/14/2019 ITE_PC_v40_Chapter5

    59/67

    ITE PC v4.0Chapter 5 59 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    1. Gather Data from the Customer Customer information

    Company name, contact name, address, phone number

    Computer configuration

    Operating system, patches and updates, network environment,connection type

    Use a work order to collect information

    Description of problem

    Open-ended questions

    What were you doing when the problem was identified?

    Closed-ended questions

    Are you currently logged into your network?

  • 8/14/2019 ITE_PC_v40_Chapter5

    60/67

    ITE PC v4.0Chapter 5 60 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    2. Verify the Obvious Issues

    Examine the most obvious causes of a problem.

    Is the caps lock key set to ON?

    Is there a non-bootable disk in the floppy drive?

    Are the drive settings and boot order configured correctly inBIOS?

    Can you log on as another user?

    Was the computer turned off without being shut down properly?

    Has the password changed?

    Does the monitor have power?

    Does the display have the correct settings?

  • 8/14/2019 ITE_PC_v40_Chapter5

    61/67

    ITE PC v4.0Chapter 5 61 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    3. Try Quick Solutions First Use the Last Known Good Configuration settings

    Enter Safe Mode to troubleshoot video problems

    Uninstall an application that was recently added

    Roll back the system using a System Restore point

    Examine the Device Manager for device conflicts

    Run cleanmgr to clean up temp files

    Run chkdsk/f to repair problems with the hard drive Run defrag to speed up the hard drive

    Reboot the computer

    Login as a different user

  • 8/14/2019 ITE_PC_v40_Chapter5

    62/67

    ITE PC v4.0Chapter 5 62 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    4. Gather Data from the Computer

    Examine system files.

    Run diagnostic software.

    Refer to the computer user manual or BIOS website for

    the meaning of beep codes. Examine the event logs to determine the cause of

    computer problems.

  • 8/14/2019 ITE_PC_v40_Chapter5

    63/67

    ITE PC v4.0Chapter 5 63 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    You may need to conduct further research

    Refer to repair manuals

    Study the product documentation

    Visit the manufacturers website Consult repair journals

    Talk to technicians who may have repaired similar problems.

    Implement the most likely solution first

    Return the computer to the original state before trying thenext solution

    It may be necessary to test many potential solutions beforethe problem is resolved

    5. Evaluate Problem & Implement Solution

  • 8/14/2019 ITE_PC_v40_Chapter5

    64/67

    ITE PC v4.0Chapter 5 64 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    6. Close with the Customer

    When you are confident that the problem is resolved:

    Document the customer information, problem description,and steps to resolve the issue in the work order.

    Explain to the customer how you solved the problem . Let the customer verify that the problem has been solved.

    Complete all documentation including sales orders, timelogs, and receipts.

    Complete the work order.

    Update the repair journal. You can use the notes from thejournal for future reference.

  • 8/14/2019 ITE_PC_v40_Chapter5

    65/67

    ITE PC v4.0Chapter 5 65 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Common Problems and Solutions

    Boot the computer in safe mode anduninstall any recently installedapplications.

    The computer will not finishloading Windows.

    Remove any floppies and CDs from the

    computer and verify that the HDD is setas a bootable device in the BIOS setup.

    The computer will no longer boot

    to Windows and gives the errorInvalid systems disk

    Use the Roll Back Driver option toremove the new video driver.

    Remove any unnecessary programsfrom the Startup tab and reboot thecomputer.

    The computer displays thedesktop in 16 color VGA modeafter updating the video drivers.

    Possible SolutionProblem Symptom

  • 8/14/2019 ITE_PC_v40_Chapter5

    66/67

    ITE PC v4.0Chapter 5 66 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Chapter 5 Summary Consider the customer's needs when selecting an OS.

    The main steps in setting up a customer's computer includepreparing the hard drive, installing an operating system,creating user accounts, and configuring installation options.

    A GUI shows icons of all files, folders, and applications on thecomputer.

    Establish a backup strategy that allows for the recovery ofdata.

    Preventive maintenance helps to ensure optimal operation ofthe OS.

    Tools for troubleshooting an OS problem include WindowsAdvanced Options menu, event logs, device manager, andsystem files.

  • 8/14/2019 ITE_PC_v40_Chapter5

    67/67