SlideShare a Scribd company logo
Rence Montanes
   The Terminologies
   Tools of the Trade
   Who are you CPU?
   How to became Dr. Watson?
   Hardening Windows
Difficult Material              Central Concept (CEPT)




Take it slowly, step by step.   This is a central concept (CEPT)
This will require some extra    you need to understand really
work.                           well.
Networking and Computer Troubleshooting
Applications are the
                                       only things users care
                                               about.




A network is a system that permits networked
applications running on different hosts to work
                   together.
   A network switch is a small hardware device
    that joins multiple computers together within
    one local area network (LAN). Technically,
    network switches operate at layer two (Data
    Link Layer) of the OSI model.
   Routers are physical devices that join
    multiple wired or wireless networks together.
    Technically, a wired or wireless router is a
    Layer 3 gateway, meaning that the
    wired/wireless router connects networks (as
    gateways do), and that the router operates at
    the network layer of the OSI model.
Networking and Computer Troubleshooting
Network cable is used to connect and transfer data
between computers and a network. There are different
types of network cable, and the appropriate type to
use will depend on the structure and topology of your
network. The most commonly used types of network
cable are the twisted pair, coaxial, Ethernet cross over,
and fiber optic.
Networking and Computer Troubleshooting
   Applications that require a network to function
   1970s
     E-mail, file downloading, and transfers

   1990s
     The Wide Web, instant messaging

   This century
     Web 2.0 with user-developed content, e.g., Wikipedia,
      YouTube
     Social networking, e.g., Facebook
     Streaming media
   Peer-to-Peer (P2P) Computing
     Clients provide service to each other.
     Made possible by growing PC processing power.

   Cloud Computing
     Resources are outsourced to a provider who is
      accessed entirely via a network.
     Users only need a PC or other intelligent device.
     Company does not need to maintain servers or
      applications.
Transmission Speed Measurements
Normally measured in bits per second (bps)
Usually not in bytes in per second (Bps)
Metric Prefixes
Kilobits per second          kbps (lower-    1,000 bps (not 1,024)
                             case k)
Megabits per second          Mbps            1,000,000 bps
Gigabits per second          Gbps            1,000,000,000 bps
Terabits per second          Tbps            1,000,000,000,000 bps
The Need for Speed
Application          100 kbps   1 Mbps   10 Mbps   100 Mbps

E-Mail (250 words)   0.02 sec   0 sec     0 sec     0 sec

Photo (2 MB)         2.7 min    16 sec    2 sec     0 sec

MP3 Song (3 min)     2.9 min    17 sec    2 sec     0 sec

Ltd. Quality TV       13 hrs     1 hr     8 min     1 min
(One Hour)
   A local area network (LAN) is a group of
    computers and network communication
    devices interconnected within a
    geographically limited area, such as a
    building or campus.
   A LAN tends to use only one type of
    transmission medium—cabling.
   They transfer data at high speeds.
   They exist in a limited geographical area.
   Their technology is generally less expensive.
   A wide area network (WAN) interconnects
    LANs. A WAN may be located entirely within
    a state or country, or it may be
    interconnected around the world.
   They exist in an unlimited geographical area.
   They are more susceptible to errors due to
    the distances data travels.
   They interconnect multiple LANs.
Networking and Computer Troubleshooting
Analog & Digital Tester                                             Tweezers          Ground Strap
                                 Precision Screws Set




  Brush      Screw Container     Anti-static bag Soldering paste   Soldering Lead     Soldering Iron




                                                         Eraser         Guitar Pick
              long nose pliers     Magnifying glass
   Flux




          Smart Tweezers             Hot Air Station    Bga (Ball Grid Array) rework system
   Make sure that it is license
   Best practice to copy the disk and keep it for
    safekeeping.
   ERD Commander
   Windows Password Resetter
   Anti Virus
   File Recovery Applications
Networking and Computer Troubleshooting
   The central processing unit (CPU) is the
    portion of a computer system that carries out
    the instructions of a computer program, and
    is the primary element carrying out the
    computer's functions. The central processing
    unit carries out each instruction of the
    program in sequence, to perform the basic
    arithmetical, logical, and input/output
    operations of the system.
Networking and Computer Troubleshooting
Networking and Computer Troubleshooting
Networking and Computer Troubleshooting
Networking and Computer Troubleshooting
   Fix Common PC Problems.
     your new device won’t appear on your desktop,
     an application you added won’t run,
     you see an error message,
     your computer is refusing to start up,
     your PC is acting funny,
     the keyboard & mouse do not respond,
     Your PC will not start-up.
   To check the options that are available,
    visit the following Web site:
    http://support.microsoft.com

   Or, visit the following MS Web site to find the
    computer manufacturers' contact
    information:
    http://support.microsoft.com/oemphone
Networking and Computer Troubleshooting
Networking and Computer Troubleshooting
   To contact Microsoft Customer Service and
    Support, telephone (800) (642-7676).
   Microsoft Customer Service hours of
    operation:
     Monday through Friday, 5:00 AM - 9:00 PM Pacific
      Time
     Saturday and Sunday, 6:00 AM – 3:00 PM Pacific
      Time
     Do Not mention any App that does not belong to
      MS.
   Is your PC showing an error message?
     write down the exact number and wording of the
       error message, and search for it on the Microsoft
       Fix it Solution Center.
   http://support.microsoft.com/gp/cp_fixit_mai
    n#tab0
     Make a copy of the error message - ‘Prnt Scrn’
      ▪ PrtSc (on laptops)
      ▪ Ctrl+Alt + Prnt Screen = Window of Concern
Networking and Computer Troubleshooting
   Close open programs and windows that
    you're not currently using.
   Uninstall or delete unwanted programs.
   Stop programs in System Configuration
    Start-up File. (Run -MSCONFIG)
   Defragment your hard drive. Run Registry
    Cleaner.
   Scan for viruses and spyware. Anti-virus &
    Malwarebytes.
   Reboot your computer and try loading the
    program again.
   Uninstall the software and then reinstall it
    from scratch.
   Reboot again.
 Control-Alt-Delete (often abbreviated to Ctrl-Alt-
  Del, also known as the "three-finger salute")
   a computer keyboard command to summon the
    ‘task manager ‘
   Right Click Task Bar.
 How to troubleshoot issues with Windows Task
  Manager –
   to view a dynamic display of programs running on
    your PC.
Networking and Computer Troubleshooting
   The Processes tab displays processes that are
    running on the computer.
     Click on Show Processes from all Users button.
     Click on the CPU column heading to see amount
      of usage for each process.
     Click ‘View’ – Update Speed to slow down display.
 Run the error code through Bing Search.
 Run the error message through Bing Search.
  ▪ Run Parts of the Error Message through Bing.
 Run your Question through Bing Search.
  ▪ Be Specific as Possible.
    ▪ Use Model Numbers.
 If you just downloaded a program, Bing that
 program for Review, problems, troubleshooting.
Networking and Computer Troubleshooting
 Install any start services
 Install AxtiveX controls, including IE and shell add-
  ins (common to both adware and spyware)
 Install kernel-mode rootkits and keyloggers (hard to
  impossible to detect)
 Access data belonging to all users on the machine
 Cause code to run whenever anyone logs on to the
  computer (including capturing user names and
  passwords entered in the Ctrl-Alt-Delete logon
  dialog
   Replace normal OS and program files with
    Trojan horses
   Disable or even uninstall anti-virus programs
   Cover its tracks in the event log to avoid
    detection
   Access any other computer you are also
    Administrator on and gain control of those
    computers as well.
   Please, do not pick a pet name, spouse name or anything
    else easily guessed by people who know you.
   Pick a password at least 8 characters long. I prefer 15 or
    more characters. Windows will accept a maximum of 127
    characters.
   Use both upper and lower case letters, numbers, and try to
    use characters as well. If you have multiple computers, do
    not repeat the same passwords on each one.
   Never write down passwords and leave them in plain sight,
    or send them in email.
   Once you set a Boot level BIOS password, it
    will be required every time the system is
    started.

   The system is completely disabled until
    the password is entered.

   This is normally accomplished by selecting
    the password option in the BIOS setup.
Proper use of the screensaver will help protect your
computer while you are away from it for short periods of
time.

This is especially important in business environments.
Just bring up the screensaver settings and enable
password protection. Here's how:

   Right click an open area of the desktop
   Left click properties from the choices
   Left click the screensaver tab
   Check the box to “On resume, password protect”
   Do not use any automated logins and be sure
    all users are password protected. Go to the
    control panel, click on administrative tools,
    click local security policy.

   Make sure all users have a password set for
    the account. I also recommend having only
    one administrator account on each machine.
Networking and Computer Troubleshooting

More Related Content

PPTX
Hacking tools and the case for layered security
DOCX
Chapter 12.0
PPTX
Operating systems
PPTX
Computer maintenance
DOCX
Chapter 10.0
PPTX
Ch 2 maintenance and safety
PDF
NWSLTR_Volume8_Issue1
DOCX
Computer maintenance work plan
Hacking tools and the case for layered security
Chapter 12.0
Operating systems
Computer maintenance
Chapter 10.0
Ch 2 maintenance and safety
NWSLTR_Volume8_Issue1
Computer maintenance work plan

What's hot (20)

PDF
11 & 12
PPTX
5 pc maintenance
PPT
The effects of using ict
PDF
Troubleshooting Fundamentals
PPT
The Computer System
PDF
Modul 1-sample-test
PPTX
Unit III - Basics of Computer Science
DOCX
lesson 3; inspect and test the configured cs and network handouts
DOC
Web design and_hosting
DOCX
Chapter 6.0
PDF
Computer maintenance-and-repair
PPTX
Lesson 1 computer safety and maintenance
PPTX
Types of computer system error
PDF
Mis Data Sheet 2010
DOCX
PPTX
Lo1.2 types of computer system error
PDF
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
PDF
IT Essentials (Version 7.0) - ITE Final Exam Answers
PPTX
TYPES OF COMPUTER SYSTEM ERRORS
PDF
K1102026669
11 & 12
5 pc maintenance
The effects of using ict
Troubleshooting Fundamentals
The Computer System
Modul 1-sample-test
Unit III - Basics of Computer Science
lesson 3; inspect and test the configured cs and network handouts
Web design and_hosting
Chapter 6.0
Computer maintenance-and-repair
Lesson 1 computer safety and maintenance
Types of computer system error
Mis Data Sheet 2010
Lo1.2 types of computer system error
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Final Exam Answers
TYPES OF COMPUTER SYSTEM ERRORS
K1102026669
Ad

Viewers also liked (17)

PDF
Compaq nc8000 Maintenance and Service Guide
PDF
Computer Network
PDF
Windows 8 Consumer Preview
PDF
Network Client Server
DOCX
Cilent to server network plan
PDF
Lecture 11 client_server_interaction
PPTX
Career paths in information technology
PPTX
Client Server Network By Usman Ihsan
PPT
04 Client Server Technology
PPTX
Client Server Architecture
PPTX
Client Server Architecture
PPTX
Computer hardware troubleshooting
PPTX
Client server architecture
PDF
CBSE XII Communication And Network Concepts
PDF
Client server technology
PPTX
Client server technology main
PPTX
Introduction to computer network
Compaq nc8000 Maintenance and Service Guide
Computer Network
Windows 8 Consumer Preview
Network Client Server
Cilent to server network plan
Lecture 11 client_server_interaction
Career paths in information technology
Client Server Network By Usman Ihsan
04 Client Server Technology
Client Server Architecture
Client Server Architecture
Computer hardware troubleshooting
Client server architecture
CBSE XII Communication And Network Concepts
Client server technology
Client server technology main
Introduction to computer network
Ad

Similar to Networking and Computer Troubleshooting (20)

PDF
Virginiatools
PDF
Virginiatools
PDF
Virginiatools
PPT
Network Administrator Career
PDF
Notes for banking railway opsc psc preparationx
PDF
Computer basics--computer basics2
PPTX
Ge powerpoint presentation group 4!
PDF
Computer basics
PPT
Introduction to Operating Systems
PPTX
PPTX
computing networks and operating system
PPTX
Embedded Systems
PDF
Computer basics--computer basics2
DOC
GUIDE HARDWARE AND SOFTWARE MAINTENANCE English
DOC
Manual en ingles
DOC
Manual en ingles
DOC
Manual en ingles
PPTX
Introduction To Computing
PPT
Lec no. 4 hardware and software basic
PPT
Hardware and Software Basics With Dr. Poirot
Virginiatools
Virginiatools
Virginiatools
Network Administrator Career
Notes for banking railway opsc psc preparationx
Computer basics--computer basics2
Ge powerpoint presentation group 4!
Computer basics
Introduction to Operating Systems
computing networks and operating system
Embedded Systems
Computer basics--computer basics2
GUIDE HARDWARE AND SOFTWARE MAINTENANCE English
Manual en ingles
Manual en ingles
Manual en ingles
Introduction To Computing
Lec no. 4 hardware and software basic
Hardware and Software Basics With Dr. Poirot

Recently uploaded (20)

PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Empathic Computing: Creating Shared Understanding
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Big Data Technologies - Introduction.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
cuic standard and advanced reporting.pdf
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Machine learning based COVID-19 study performance prediction
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Reach Out and Touch Someone: Haptics and Empathic Computing
Empathic Computing: Creating Shared Understanding
Encapsulation_ Review paper, used for researhc scholars
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Understanding_Digital_Forensics_Presentation.pptx
Big Data Technologies - Introduction.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Chapter 3 Spatial Domain Image Processing.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
cuic standard and advanced reporting.pdf
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Machine learning based COVID-19 study performance prediction
Unlocking AI with Model Context Protocol (MCP)
Advanced methodologies resolving dimensionality complications for autism neur...
Dropbox Q2 2025 Financial Results & Investor Presentation
20250228 LYD VKU AI Blended-Learning.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf

Networking and Computer Troubleshooting

  • 2. The Terminologies  Tools of the Trade  Who are you CPU?  How to became Dr. Watson?  Hardening Windows
  • 3. Difficult Material Central Concept (CEPT) Take it slowly, step by step. This is a central concept (CEPT) This will require some extra you need to understand really work. well.
  • 5. Applications are the only things users care about. A network is a system that permits networked applications running on different hosts to work together.
  • 6. A network switch is a small hardware device that joins multiple computers together within one local area network (LAN). Technically, network switches operate at layer two (Data Link Layer) of the OSI model.
  • 7. Routers are physical devices that join multiple wired or wireless networks together. Technically, a wired or wireless router is a Layer 3 gateway, meaning that the wired/wireless router connects networks (as gateways do), and that the router operates at the network layer of the OSI model.
  • 9. Network cable is used to connect and transfer data between computers and a network. There are different types of network cable, and the appropriate type to use will depend on the structure and topology of your network. The most commonly used types of network cable are the twisted pair, coaxial, Ethernet cross over, and fiber optic.
  • 11. Applications that require a network to function  1970s  E-mail, file downloading, and transfers  1990s  The Wide Web, instant messaging  This century  Web 2.0 with user-developed content, e.g., Wikipedia, YouTube  Social networking, e.g., Facebook  Streaming media
  • 12. Peer-to-Peer (P2P) Computing  Clients provide service to each other.  Made possible by growing PC processing power.  Cloud Computing  Resources are outsourced to a provider who is accessed entirely via a network.  Users only need a PC or other intelligent device.  Company does not need to maintain servers or applications.
  • 13. Transmission Speed Measurements Normally measured in bits per second (bps) Usually not in bytes in per second (Bps) Metric Prefixes Kilobits per second kbps (lower- 1,000 bps (not 1,024) case k) Megabits per second Mbps 1,000,000 bps Gigabits per second Gbps 1,000,000,000 bps Terabits per second Tbps 1,000,000,000,000 bps
  • 14. The Need for Speed Application 100 kbps 1 Mbps 10 Mbps 100 Mbps E-Mail (250 words) 0.02 sec 0 sec 0 sec 0 sec Photo (2 MB) 2.7 min 16 sec 2 sec 0 sec MP3 Song (3 min) 2.9 min 17 sec 2 sec 0 sec Ltd. Quality TV 13 hrs 1 hr 8 min 1 min (One Hour)
  • 15. A local area network (LAN) is a group of computers and network communication devices interconnected within a geographically limited area, such as a building or campus.  A LAN tends to use only one type of transmission medium—cabling.  They transfer data at high speeds.  They exist in a limited geographical area.  Their technology is generally less expensive.
  • 16. A wide area network (WAN) interconnects LANs. A WAN may be located entirely within a state or country, or it may be interconnected around the world.  They exist in an unlimited geographical area.  They are more susceptible to errors due to the distances data travels.  They interconnect multiple LANs.
  • 18. Analog & Digital Tester Tweezers Ground Strap Precision Screws Set Brush Screw Container Anti-static bag Soldering paste Soldering Lead Soldering Iron Eraser Guitar Pick long nose pliers Magnifying glass Flux Smart Tweezers Hot Air Station Bga (Ball Grid Array) rework system
  • 19. Make sure that it is license  Best practice to copy the disk and keep it for safekeeping.
  • 20. ERD Commander  Windows Password Resetter  Anti Virus  File Recovery Applications
  • 22. The central processing unit (CPU) is the portion of a computer system that carries out the instructions of a computer program, and is the primary element carrying out the computer's functions. The central processing unit carries out each instruction of the program in sequence, to perform the basic arithmetical, logical, and input/output operations of the system.
  • 27. Fix Common PC Problems.  your new device won’t appear on your desktop,  an application you added won’t run,  you see an error message,  your computer is refusing to start up,  your PC is acting funny,  the keyboard & mouse do not respond,  Your PC will not start-up.
  • 28. To check the options that are available, visit the following Web site: http://support.microsoft.com  Or, visit the following MS Web site to find the computer manufacturers' contact information: http://support.microsoft.com/oemphone
  • 31. To contact Microsoft Customer Service and Support, telephone (800) (642-7676).  Microsoft Customer Service hours of operation:  Monday through Friday, 5:00 AM - 9:00 PM Pacific Time  Saturday and Sunday, 6:00 AM – 3:00 PM Pacific Time  Do Not mention any App that does not belong to MS.
  • 32. Is your PC showing an error message?  write down the exact number and wording of the error message, and search for it on the Microsoft Fix it Solution Center.  http://support.microsoft.com/gp/cp_fixit_mai n#tab0  Make a copy of the error message - ‘Prnt Scrn’ ▪ PrtSc (on laptops) ▪ Ctrl+Alt + Prnt Screen = Window of Concern
  • 34. Close open programs and windows that you're not currently using.  Uninstall or delete unwanted programs.  Stop programs in System Configuration Start-up File. (Run -MSCONFIG)  Defragment your hard drive. Run Registry Cleaner.
  • 35. Scan for viruses and spyware. Anti-virus & Malwarebytes.  Reboot your computer and try loading the program again.  Uninstall the software and then reinstall it from scratch.  Reboot again.
  • 36.  Control-Alt-Delete (often abbreviated to Ctrl-Alt- Del, also known as the "three-finger salute")  a computer keyboard command to summon the ‘task manager ‘  Right Click Task Bar.  How to troubleshoot issues with Windows Task Manager –  to view a dynamic display of programs running on your PC.
  • 38. The Processes tab displays processes that are running on the computer.  Click on Show Processes from all Users button.  Click on the CPU column heading to see amount of usage for each process.  Click ‘View’ – Update Speed to slow down display.
  • 39.  Run the error code through Bing Search.  Run the error message through Bing Search. ▪ Run Parts of the Error Message through Bing.  Run your Question through Bing Search. ▪ Be Specific as Possible. ▪ Use Model Numbers.  If you just downloaded a program, Bing that program for Review, problems, troubleshooting.
  • 41.  Install any start services  Install AxtiveX controls, including IE and shell add- ins (common to both adware and spyware)  Install kernel-mode rootkits and keyloggers (hard to impossible to detect)  Access data belonging to all users on the machine  Cause code to run whenever anyone logs on to the computer (including capturing user names and passwords entered in the Ctrl-Alt-Delete logon dialog
  • 42. Replace normal OS and program files with Trojan horses  Disable or even uninstall anti-virus programs  Cover its tracks in the event log to avoid detection  Access any other computer you are also Administrator on and gain control of those computers as well.
  • 43. Please, do not pick a pet name, spouse name or anything else easily guessed by people who know you.  Pick a password at least 8 characters long. I prefer 15 or more characters. Windows will accept a maximum of 127 characters.  Use both upper and lower case letters, numbers, and try to use characters as well. If you have multiple computers, do not repeat the same passwords on each one.  Never write down passwords and leave them in plain sight, or send them in email.
  • 44. Once you set a Boot level BIOS password, it will be required every time the system is started.  The system is completely disabled until the password is entered.  This is normally accomplished by selecting the password option in the BIOS setup.
  • 45. Proper use of the screensaver will help protect your computer while you are away from it for short periods of time. This is especially important in business environments. Just bring up the screensaver settings and enable password protection. Here's how:  Right click an open area of the desktop  Left click properties from the choices  Left click the screensaver tab  Check the box to “On resume, password protect”
  • 46. Do not use any automated logins and be sure all users are password protected. Go to the control panel, click on administrative tools, click local security policy.  Make sure all users have a password set for the account. I also recommend having only one administrator account on each machine.