Netacad

Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

Chapter 5 –Operating System

Chapter 5 – Operating System

Objectives

At the end of the chapter, the students will be able to:

 Explain the characteristics and basic functions of modern operating systems


 Describe and compare types of operating systems to include purpose, limitations, and
compatibilities
 Determine operating system based on customer needs
 Install an operating system
 Navigate a GUI (Windows)
 Explain the advantages of Virtualization and install Virtual PC
 Identify and apply common preventive maintenance techniques for operating systems
 Troubleshoot operating systems

The Purpose of an Operating System

In this chapter, you will learn about the components, functions, and terminology related to the
Windows 7, Windows Vista , and Windows XP operating systems. The operating system (OS) controls
almost all functions on a computer.

Characteristics:

 Multi-user – Two or more users have individual accounts that allow them to work with
programs and peripheral devices at the same time.
 Multitasking – The computer is capable of operating multiple applications at the same time.
 Multiprocessing – The operating system can support two or more CPUs.
 Multithreading – A program can be broken into smaller parts that are loaded as needed by the
operating system. Multithreading allows individual programs to be multitasked.

Basic Function of an Operating System

1. All computers rely on an operating system (OS) to provide the interface for interaction
between users, applications, and hardware.
2. The operating system boots the computer and manages the file system.
3. The operating system has four main roles: Control hardware access, Manage files and folders,
Provide user interface and Manage applications

Regardless of the size and complexity of the computer and the operating system, all operating
systems perform the same four basic functions:

1. Control hardware access - The operating system manages the interaction between
applications and the hardware. To access and communicate with the hardware, the operating
system installs a device driver for each hardware component. A device driver is a small
program written by the hardware manufacturer and supplied with the hardware component.
The process of assigning system resources and installing drivers can be performed with Plug
and Play (PnP). The operating system automatically detects the PnP-compatible hardware and

Computer Maintenance and Tech Support By: Dr. Patrick D. Cerna Page 47
Chapter 5 –Operating System

installs the driver for that component. The operating system then configures the device and
updates the registry, which is a database that contains all the information about the
computer. The registry contains information about applications, users, hardware, network
settings, and file types.

2. Files and Folder Management - The operating system creates a file structure on the hard disk
drive to allow data to be stored. A file is a block of related data that is given a single name and
treated as a single unit. Program and data files are grouped together in a directory. The files
and directories are organized for easy retrieval and use. Directories can be kept inside other
directories. These nested directories are referred to as subdirectories. Directories are called
folders in Windows operating systems, and subdirectories are called subfolders.

3. User interface - The operating system enables the user to interact with software and
hardware. There are two types of user interfaces:

• Command Line Interface (CLI) – The user types commands at a prompt.

• Graphical User Interface (GUI) – The user interacts with menus and icons.

Most operating systems, such as Windows Vista and Windows 7, include both a GUI
and a CLI.

4. Application management - The operating system manages all programs to ensure that the
correct resources are allocated to the applications. The operating system locates an
application and loads it into the RAM of the computer. Applications are software programs,
such as word processors, databases, spreadsheets, games, and many other applications. The
operating system ensures that each application has adequate system resources. Application
programming interface (API) is a set of guidelines used by programmers to ensure that the
application they are developing is compatible with an operating system. Here are two
examples of APIs:

• Open Graphics Library (OpenGL) – Cross-platform standard specification for


multimedia graphics
• DirectX – Collection of APIs related to multimedia tasks for Microsoft Windows
• Windows API – Allows applications from older versions os Windows to operate on
newer versions
• Java -APIs related to the development of Java programming

Processor Architecture

There are two common architectures used by CPUs to process data: x86 (32-bit architecture) and x64
(64-bit architecture). x86 uses a Complex Instruction Set Computer (CISC) architecture to process
multiple instructions with a single request. Registers are storage areas used by the CPU when
performing calculations. x86 processors use fewer registers than x64 processors. x64 architecture is
backward compatible with x86 and adds additional registers specifically for instructions that use a 64-
bit address space. The additional registers of the x64 architecture allow the computer to process much
more complex instructions at a much higher rate.

Computer Maintenance and Tech Support By: Dr. Patrick D. Cerna Page 48
Chapter 5 –Operating System

32-bit Windows Operating System and x86 Processor Architecture

• Capable of addressing 4 GB of RAM


• x86 uses a Complex Instruction Set Computer (CISC)
• x86 processors use fewer registers than x64 processors

64-bit Windows Operating System and x64 Processor Architecture


• Capable of addressing 128+ GB of RAM
• Enhanced performance for memory management
• Additional security features
• x64 architecture is backward compatible with x86
• Process much more complex instructions at a much higher rate

There are three main differences between 32-bit and 64-bit operating systems. A 32-bit operating
system, such as Windows XP Professional, is capable of addressing only 4 GB of RAM, while a 64-bit
operating system can address more than 128 GB of RAM. Memory management is also different
between these two types of operating systems, resulting in enhanced performance of 64-bit
programs. A 64-bit operating system, such as Windows Vista 64-bit and Windows 7 also have
additional security features.

Fig. 5. 1 - 32-bit and 64-bit Compatibility in Windows OS

Types of Operating Systems

There are two distinct types of operating systems: desktop operating systems and network operating
systems. A desktop operating system is intended for use in a small office/home office (SOHO) with a

Computer Maintenance and Tech Support By: Dr. Patrick D. Cerna Page 49
Chapter 5 –Operating System

limited number of users. A network operating system (NOS) is designed for a corporate environment
serving multiple users with a wide range of needs.

Fig.5.2 – Types of Operating System

The differences between desktop operating systems are typically related to availability and how much
can be accomplished using the GUI:

• Windows and MAC OS users can perform the majority of tasks through the GUI.
• Linux and UNIX users must understand and use the CLI to perform some tasks.

The code for an operating system will be either open source or proprietary:
• Open source applications can be read and modified. There are few restrictions on
downloading, using, or rewriting open source software. Programmers openly share code with
other programmers. Linux distributions are open source.
• Proprietary applications cannot be read or modified. Proprietary software agreements restrict
the use of the software, identifying where and when the software may be used. Microsoft
Windows products are proprietary.

Network Operating System (NOS) – it has the several characteristics including supports multiple users
runs, multi-user applications, robust and redundant and provides increased security compared to
desktop operating systems.

Computer Maintenance and Tech Support By: Dr. Patrick D. Cerna Page 50
Chapter 5 –Operating System

Common NOS Includes:

 Microsoft Windows – Network operating systems offered by Microsoft are Windows 2000
Server, Windows Server 2003, Windows Server 2008, and Windows Server 2012. Windows
Server operating systems use a central database called Active Directory to manage network
resources.
 Linux – Linux operating systems include Red Hat, Caldera, SuSE, Debian, Fedora, Ubuntu and
Slackware.
 UNIX – Various corporations offered proprietary operating systems, based on UNIX

Customer Requirements for an OS

An operating system should be compatible with all applications that are installed on a computer.
Before recommending an OS to your customer, investigate the types of applications that your
customer will be using. If the computer will be part of a network, the operating system must also be
compatible with the operating systems of the other computers in the network. The network type
determines what operating systems are compatible. Microsoft Windows networks can have multiple
computers using different versions of Microsoft operating systems.

To select the proper operating system for a customer first determine includes: Budget constraints,
Compatibility with current hardware, Compatibility with new hardware, How the computers will be
used, Compatibility with existing applications and Types of new applications to be used

Identify Minimum Hardware Requirements

Customer may need to upgrade or purchase additional hardware to support the required applications
and OS. A cost analysis will indicate if purchasing new equipment is a better idea than upgrading.
Possible hardware upgrades: RAM capacity, Hard drive size, CPU, Video card memory and speed and
Motherboard. Operating systems have minimum hardware requirements that must be met for the OS
to install and function correctly. Identify the equipment that your customer has in place. If hardware
upgrades are necessary to meet the minimum requirements for an OS, conduct a cost analysis to
determine the best course of action. In some cases, it may be less expensive for the customer to
purchase a new computer than to upgrade the current system.

Fig.5.3 – Typical Requirements of Windows 7 OS

Computer Maintenance and Tech Support By: Dr. Patrick D. Cerna Page 51
Chapter 5 –Operating System

Hardware Compatibility

Most operating systems have an HCL. HCLs can be found on the manufacturer's website. HCL includes
list of hardware that is known to work with the operating system. Use Microsoft Compatibility Center
for Windows 7 and Vista.

Operating System Upgrades

Operating systems must be upgraded periodically. To remain compatible with the latest hardware and
software. Because support for older OS is eventually withdrawn. Ensure that the new OS is compatible
with the computer. Use Microsoft Upgrade Advisor to scan the system for incompatibility issues
before upgrading. Upgrade Advisor is free and downloadable from the Microsoft Windows website.
Backup all data prior to beginning the upgrade.

Data Migration

One of the following tools can be used to migrate data and settings:

 User State Migration Tool migrates all user files and settings to the new OS.
 Windows Easy Transfer migrates personal files and settings when switching from an old
computer to new.

Installing the Operating System

Reasons to perform a clean installation of an OS: When a computer is passed from one employee to
another and when the operating system is corrupted. Another is when the primary hard drive is
replaced in a computer.

Before performing a clean installation: Back up all data first, Explain to the customer that existing
data will be erased and Confirm that all needed data has been successfully transferred.

Hard Drive Setup Procedures

Operating system setup methods: Install an OS over a network from a server and Install from OS files
stored on CDs or DVDs or USB.

Partitioning and Formatting includes: Hard drive must be logically divided (partitioned)File system
must be created on the hard drive. Then, during the installation phase, most operating systems will
automatically partition and format the hard drive.

The installation and initial booting of the operating system is called the operating system setup.
Although it is possible to install an operating system over a network from a server or from a local hard
drive, the most common installation method is with CDs and DVDs. To install an OS from a CD or DVD,
first configure the BIOS setup to boot the system from the CD or DVD.

Hard Drive Partitioning

Before installing an operating system on a hard drive, the hard drive must be partitioned and
formatted. When a hard drive is partitioned, it is logically divided into one or more areas. When a hard

Computer Maintenance and Tech Support By: Dr. Patrick D. Cerna Page 52
Chapter 5 –Operating System

drive is formatted, the partitions are prepared to hold files and applications. During the installation
phase, most operating systems automatically partition and format the hard drive. A technician should
understand the process relating to hard drive setup

• Primary partition – This partition is usually the first partition. A primary partition cannot be
subdivided into smaller sections. There can be up to four partitions per hard drive.
• Active partition – This partition is the partition used by the operating system to boot the
computer. Only one primary partition can be marked active.
• Extended partition – This partition normally uses the remaining free space on a hard drive or
takes the place of a primary partition. There can be only one extended partition per hard
drive, and it can be subdivided into smaller sections called logical drives.
• Logical drive – This drive is a section of an extended partition that can be used to separate
information for administrative purposes.
• Formatting – This process prepares a file system in a partition for files to be stored.
• Cluster – A cluster is also called a file allocation unit. It is the smallest unit of space used for
storing data.
• Track – A track is one complete circle of data on one side of a hard drive platter. A track is
broken into groups of 512 bytes, called sectors.
• Cylinder – A cylinder is a stack of tracks lined up one on top of another to form a cylinder
shape.
• Drive mapping – Drive mapping is a letter assigned to a physical or logical drive.

Hard Drive Formatting

The disk must first be partitioned and formatted. This is similar to preparing a large garden plot.
Partitioning is similar to laying out footpaths and ditches for irrigation and drainage. This defines the
size and shape of your garden. Formatting is similar to laying out rows or beds. These are sized
according to the crops that you wish to plant.

The FAT32 file system records the position of files on the disk using File Allocation Tables and 32-bit
addressing (FAT32). The New Technology File System (NTFS) uses a journaling system to record
changes to the file system and a Master File Table (MFT) to record information about each file. NTFS is
usually more reliable than FAT32 and incorporates security.

Install the Operating System

When a computer boots up with the Windows installation CD, the Windows 7 installation process
starts with three options:
• Install now - Sets up and installs the Windows 7 OS.
• What to know before installing Windows - Opens Help.
• Repair your computer - Opens the System Recovery Options.

Under Install now three options are available:


• Upgrade - Upgrades Windows but keeps your current files, settings, and programs.
You can use this option to repair an installation.
• Custom (advanced) - Installs a clean copy of Windows in your choice of location and
allows you to change disks and partitions. It is also known as a clean installation.
• Quit - Exits Setup.

Computer Maintenance and Tech Support By: Dr. Patrick D. Cerna Page 53
Chapter 5 –Operating System

Custom Installation Options – Disk Cloning

With Microsoft System Preparation


 Follow these steps for disk cloning:
1. Create a master installation on one computer.
2. Run Sysprep.
3. Create a disk image of the configured computer using third-party disk-cloning
software.
4. Copy the disk image onto a server.
 When the destination computer is booted:
1. A shortened version of the Windows setup program runs.
2. Setup installs drivers, creates user accounts, and configures network settings.
 Windows 7 has several different types of custom installations.
1. Network Installation - Requires all setup files to be copied to a network server.
2. Preboot Execution Environment (PXE) Installation - Uses a PXE boot program and a
client’s network card to access the setup files.
3. Unattended Installation - Uses a network distribution point that uses an answer file.
4. Image-based Installation - Uses Sysprep and a disk-imaging program, that copies an
image of the OS directly to the hard drive with no user intervention.
5. Remote Installation - Downloads the installation across the network.
 Repair Disc- For Windows 7. Use the system repair disc to boot the computer
 System Image Recovery – For Windows 7. It allows users to back up the contents of their hard
drive, including personal files and settings.
 Factory Recovery Partition – Some computers with Windows 7 preinstalled from the factory
contain a hidden recovery partition with an image of the bootable partition.
 Automated System Recovery (Windows XP Professional only) – The ASR is a backup of the
system state, services, and OS components. Used with Windows installation disc to recover
computer.

Fig 5.4 – Boot Sequence for Windows 7

Pressing the F8 key during the boot process opens the Windows Advanced Startup Options menu,
which allows you to select how to boot Windows.

 Safe Mode – Starts Windows but only loads drivers for basic components, such as the
keyboard and display.

Computer Maintenance and Tech Support By: Dr. Patrick D. Cerna Page 54
Chapter 5 –Operating System

 Safe Mode with Networking Support – Starts Windows identically to Safe Mode and also loads
the drivers for network components.

 Safe Mode with Command Prompt – Starts Windows and loads the command prompt instead
of the GUI interface.

 Last Known Good Configuration – Enables a user to load the configurations settings of
Windows that was used the last time that Windows successfully started. It does this by
accessing a copy of the registry that is created for this purpose.

Windows Registry

The Windows Registry files are an important part of the Windows 7 boot process. These files are
recognized by their distinctive names, which begin with HKEY_ followed by the name of the portion of
the operating system under their control.

• Every setting in Windows—from the background of the desktop and the color of the screen
buttons to the licensing of applications—is stored in the Registry.

• Each user has a unique section of the Registry. The Windows login process pulls system
settings from the Registry to reconfigure the system to the state that it was in the last time
that you turned it on.

• The Registry is also responsible for recording the location of Dynamic Link Library (DLL) files. A
DLL file consists of program code that can be used by different programs to perform common
functions. As a result, DLL files are very important to the functionality of an operating system
and any application users may install.

Fig 5.5 – Windows Registry

Computer Maintenance and Tech Support By: Dr. Patrick D. Cerna Page 55
Chapter 5 –Operating System

Multiboot Procedures

Multiple OS can be installed on one computer.To create a dual-boot system in Microsoft Windows:
• Must have more than one hard drive or a hard drive with more than one partition.
• Install the oldest OS on the primary partition or the hard drive marked with an active
partition.
• Install the second OS on the second partition or hard drive.
• The boot files are automatically installed in the active partition.
 During the dual-boot process:
• The BOOTMGR file indicates that more than one OS is present.
• You are prompted to choose the OS that you want to load.
• NOTE: In Windows XP, the BOOT.INI file fills the role of the BOOTMGR file.

Directory Structures

 The root level of the Windows directory structure, the partition, is usually labeled drive C.
• Contains a set of standardized directories, called folders, for the operating system,
applications, configuration information, and data files.
• Directories may contain subdirectories. Subdirectories are commonly called
subfolders.
 Drive Mapping - letters are used to name physical or logical drives.
 Mounting a Volume - mapping a drive to an empty folder on a volume. Mounted drives are
assigned drive paths instead of letters.

Run Line Utility

Enter commands to configure settings and system modifications. To access in Windows 7 select Start >
Search box > Type run > Enter. Common Commands includes:
• CMD –Used to execute command line programs.
• DXDIAG - Displays details for all DirectX components and drivers.
• EXPLORER – Opens Windows Explorer.
• MMC - Opens the Microsoft Management console (MMC).
• MSCONFIG - Opens the System Configuration Utility.
• MSINFO32 - Displays complete system summary of the compute

Virtualization

Host machine uses its system resources to host a virtual machine. Hosting a virtual machine allows
users to access the functionality and resources provided by an OS that is not on the local PC. Provides
access to applications, file-sharing services, and other productivity tools. Users can further increases
the functionality of their system by running multiple virtual machines.

The software that creates and manages a virtual machine on a host machine is called the hypervisor,
or Virtual Machine Manager (VMM). Allocates the physical system resources, such as CPU, RAM, and
hard drive, to each virtual machine as needed. Windows Virtual PC is the virtualization platform for
Windows 7 Allows you to partition system resources for a Window OS among virtual machines.

Computer Maintenance and Tech Support By: Dr. Patrick D. Cerna Page 56
Chapter 5 –Operating System

Fig. 5.6 – Virtual Machine PC Requirements

Preventive Maintenance Planning

To ensure that an OS remains fully functional, you must implement a preventive maintenance plan. A
preventive maintenance plan provides the following benefits to users and organizations including:
decreased downtime, improved performance, improved reliability and decreased repair costs

Components of a preventive maintenance plan:


 Updates to the operating system and applications
 Updates to anti-virus and other protective software
 Hard drive error checking
 Hard drive backup
 Hard drive defragmentation
 Device drive updates
 Firmware updates
 Startup programs

The CLI at command launches tasks at a specified time using the command line interface. The
Windows Task Scheduler launches tasks at a specified time using a graphical interface. To access the
Windows Task Scheduler in Windows 7 and Windows Vista, select Start > All Programs > Accessories >
System Tools > Task Scheduler. Both of these tools allow users to set commands to run at a certain
time just once, or to repeat at selected days or times.

Some preventive maintenance consists of cleaning, inspecting, and doing minor repairs. Some
preventive maintenance uses application tools that are either already in the operating system or can
be loaded onto the user's hard drive. Most preventive maintenance applications can be set to run
automatically according to a schedule.
Two utilities that are useful tools for preventive maintenance are:

• CHKDSK - CHKDSK checks the integrity of files and folders and scan the hard disk surface for
physical errors. Consider using them at least once a month and also whenever a sudden loss
of power causes the system to shut down.

• Defrag - As files increase in size, some data is written to the next available space on the disk. In
time, data becomes fragmented, or spread all over the hard drive. It takes time to seek each
section of the data. Defrag gathers the noncontiguous data into one place, making files run
faster.

Computer Maintenance and Tech Support By: Dr. Patrick D. Cerna Page 57
Chapter 5 –Operating System

Backup the Hard Drive

Use the Microsoft Backup Tool to perform backups. Establish a backup strategy that will allow for the
recovery of data. Decide how often the data must be backed up and the type of backup to perform. It
is only necessary to make copies of the files that have changed since the last backup. To access the
backup utility in Windows 7, select Start > Control Panel > Backup and Restore.

Just as the system restore points allow the restoration of OS configuration files, backup tools allow
recovery of data. You can use the Microsoft Backup Tool to perform backups as required. It is
important to establish a backup strategy that includes data recovery. The organization’s requirements
will determine how often the data must be backed up and the type of backup to perform.

It can take a long time to run a backup. If the backup strategy is followed carefully, it will not be
necessary to backup every file at every backup. It is only necessary to make copies of the files that
have changed since the last backup. For this reason, there are several different types of backup.

Types of Backups

1. A normal backup is also called a full backup. During a normal backup, all selected files on the
disk are archived to the backup medium. These files are marked as having been archived.
2. A copy backup will copy all selected files. It does not mark the files as having been archived.
3. A differential backup backs up all the files and folders that have been created or modified
since the last normal backup or the last incremental backup. The differential backup does not
mark the files as having been archived. Copies will be made from the same starting point until
the next incremental or full backup is performed.
4. An incremental backup procedure backs up all the files and folders that have been created or
modified since the last normal or incremental backup. It marks the files as having been
archived. This has the effect of advancing the starting point of differential backups without
having to re-archive the entire contents of the drive.
5. Daily backups only back up the files that are modified on the day of the backup. Daily backups
do not mark the files as being archived.

There are many types of backup media available for computers:

• Tape drives are devices that are used for data backup on a network server drive. Tape drives
are an inexpensive way to store a large amount of data.
• The Digital Audio Tape (DAT) tape standard uses 4 mm digital audiotapes to store data in the
Digital Data Storage (DSS) format.
• Digital Linear Tape (DLT) technology offers high-capacity and relatively high-speed tape
backup capabilities.
• USB flash memory can hold hundreds of times the data that a floppy disk can hold. USB flash
memory devices are available in many capacities and offer better transfer rates than tape
devices.
• Optical media, such as CDs, DVDs, and Blu-ray Discs, are plastic discs used to store data. Many
formats and capacities of optical media are available. A DVD holds much more data than a CD,
and a Blu-ray Disc holds much more data than a DVD.
• External Hard Disk Drives (HDDs) are hard drives that are connected to your computer using a
USB, FireWire, or external Serial ATA (eSATA) connection. External HDDs can hold very large
amounts of data and can transfer data very quickly.

Computer Maintenance and Tech Support By: Dr. Patrick D. Cerna Page 58
Chapter 5 –Operating System

Fig. 5.7 – Types of Backup

Troubleshooting Process

Step 1 Identify the problem

Step 2 Establish a Theory of Probable Cause

Step 3 Test the Theory to Determine Cause

Step 4 Establish a Plan of Action to Resolve the Problem and Implement the Solution

Step 5 Verify Full System Functionality and Implement Preventive Measures

Step 6 Document Findings, Actions, and Outcomes

Step 1 - Identify the Problem


 Computer configuration
• Operating system, patches and updates, network environment, connection type
 Open-ended questions
• What problems are you experiencing with your computer?
• What software has been installed on your computer recently?
• What were you doing when the problem was identified?
• What operating system do you have installed on your computer?
• What updates or patches have been installed on your computer?
 Closed-ended questions
• Has anyone else used your computer recently?
• Does the computer boot up successfully?
• Have you changed your password recently?
• Have you received any error messages on your computer?

Computer Maintenance and Tech Support By: Dr. Patrick D. Cerna Page 59
Chapter 5 –Operating System

Step 2 - Establish a Theory of Probable Causes


 Create a list of the most common reasons why the error would occur and list the easiest or
most obvious causes at the top with the more complex causes at the bottom.
• Incorrect settings in BIOS
• Caps lock key is set to ON
• Non-bootable media in the floppy drive during computer boot up
• Password has changed
• Incorrect monitor settings in control panel
• Operating system update failure
• Driver update failure
• Malware infection
• Hard drive failure
• Corrupt operating system files

Step 3 - Test the Theory to Determine Cause


 Testing your theories of probable causes one at a time, starting with the quickest and easiest.
• Log in as a different user.
• Use third party diagnostic software.
• New software or software updates have just been installed.
• Uninstall recently installed applications.
• Boot into safe mode to determine if the problem is driver-related.
• Roll back newly updated drivers.
• Examine Device Manager for device conflicts.
• Examine event logs for warnings or errors.
• Check the hard drive for errors and fix file system issues.
• Use the system file checker to recover corrupt system files.
• Use system restore if a system update or service pack has been installed.

Step 4 - Establish a Plan of Action to Resolve the Problem and Implement the Solution
 If a quick procedure does not correct the problem, you might need to research the problem
further to establish the exact cause.
 Divide larger problems into smaller problems that can be analyzed and solved individually.
 Create a list of possible solutions and implement them one at a time. If you implement a
possible solution and it does not work, reverse the solution and try another.

Fig. 5.8 – Solution Expert

Computer Maintenance and Tech Support By: Dr. Patrick D. Cerna Page 60
Chapter 5 –Operating System

Step 5 - Verify Full System Functionality and Implement Preventive Measures


 Verifying full system functionality and implementing any preventive measures if needed.
• Shut down the computer and restart it.
• Check event logs to make sure there are no new warnings or errors.
• Check Device Manager to see that there are no warnings or errors.
• Run DxDiag to make sure DirectX is running correctly.
• Make sure applications run properly.
• Make sure network shares are accessible.
• Make sure the Internet can be accessed.
• Re-run system file checker to ensure all files are correct.
• Re-run scandisk to make sure no problems remain on the hard drive.
• Check task manager to ensure no programs are running incorrectly.
• Re-run any third party diagnostic tools.
 Have the customer verify the solution and system functionality.

Step 6 - Document Findings, Actions, and Outcomes


 Discuss the solution with the customer.
 Have the customer confirm that the problem has been solved.
 Give the customer all appropriate paperwork.
 Document the process in the work order and in your technician’s journal:
• Problem description
• Solution
• Components used
• Amount of time spent in solving the problem
Common Problems and Solutions
 Operating system problems can be attributed to hardware, application, or configuration
issues, or to some combination of the three.

Fig. 5.8 – Common Problems and Solutions

Reference Materials

[1] Mueller S, Prowse D. and Soper M.E. (2011). Comp TIA A+ 220-801 and 220-802 Authorized Cert
Guide, 3rd Edition
[2] Meyers, Mike (2012). CompTIA A+ Certification Exam Guide, 8th Edition.Mc Graw Hill

[3] Anfinson, D. and Quamme K. (2008). IT Essentials: PC Hardware and Software Components
Guide. Third Edition, Cisco Press

Computer Maintenance and Tech Support By: Dr. Patrick D. Cerna Page 61

You might also like