Professional Documents
Culture Documents
Ebook - Lesson - 8 - Software Troubleshooting
Ebook - Lesson - 8 - Software Troubleshooting
Here are two crash screens and the solutions to resolve these problems:
Apple Pinwheel/Beach
Blue Screen of Death (BSOD) Solutions
Ball
If the operating system cannot be found, then your PC will fail to boot
up.
This happens if the Boot loader file has been replaced or deleted or if
you are trying to load the boot file from an external source like USB drive
or optical drive.
• Remove any removable media from optical disc tray and USB drives.
Windows may not shut down properly owing to virus or bugs in a software.
Improper shutdown may be caused by hardware issues such as PSU problems.
• You cannot see the login You can try the following
screen or desktop. methods:
• You cannot get into the • Start in VGA Mode.
operating system. • Run the FC to check for
issues with the system.
• Update/rollback the driver
for the graphics card.
• Hit the F6 Key to get these
options.
• In Windows 10, insert the
recovery disc.
Common Symptoms of OS—Missing NTLDR
When the Windows boot loader is missing, you will see the error
message “Missing Operating System”.
Missing
Operating
The bootloader is important since it starts the system. System
Here are some issues related to missing DLL and some probable remedies:
Compatibility Error:
• Occurs when files fail to open after double-clicking on them
• May occur when a file extension has been deleted
a. Missing NTLDR
b. Missing GUI
c. Missing GRUB
d. Frozen Screen
a. Missing NTLDR
b. Missing GUI
c. Missing GRUB
d. Frozen Screen
That’s correct. b
Explanation: If the GUI is missing, then you cannot see the login screen or desktop.
Slow system performance is a very common problem. Following are the symptoms of the problem and the
solutions to resolve it:
Kernel Panic:
If one is slightly higher, you will have to move the mouse to the top of the
screen to go to the next screen.
• Tools associated with • SFC allows you to • In Windows OS, you • Is used to run many • You can create the
BIOS and UEFI check scan and repair can see errors in the different commands to recovery disc or use
the temperature and system files Event View help you view and the Windows DVD
current status of • The command • Boot errors are containing the repair
modify your operating
motherboards’ stored in disc
components prompt is system
sfc/scannow c:\windows\ntbtlog.t • Allows you complete • You can create a disk
• You can run basic xt in Windows OS in this location–
control over the OS
hardware tests and • In Linux OS, Control
• Can be used to enable Panel/Backup and
access networks and individual log files
USB drives and disable devices, restore a system
are stored in the–
/var/log folder create and format HDD repair disk
using diskpart
command, and repair
MBR
OS Tools for Troubleshooting (contd.)
The different editions of Windows Vista operating systems are:
• This tool moves • These tools are used to • This is a central event • Use the Safe Mode to
fragmented files in a edit the Windows log. load essential drivers
logical order. Registry. • It contains three very and programs that the
• It improves the read and • The registry contains important logs – operating system needs
write process. Kernel, drivers, services, Application, Security, to function.
apps, security, user and Setup Files • Press F8 Key on boot to
• The command prompt is
defrag. interface, and other • These logs provide access advanced
critical settings. information on options.
• You can set up a weekly warnings, errors, critical
defrag schedule by • You can use these tools
issues, successful
going to Control to import and export
audits, and failed
panel/administrative files. audits.
tools/task scheduler.
Other OS Tools for Troubleshooting (contd.)
Some more operating system tools that we can use to fix issues are:
Uninstall/Reinstall/
Windows 8/10—Inbuilt Refresh Option Windows 8/10—Reset PC
Repair
• This tool helps you • The Windows 8 or 10 • This option takes your
perform a clean install refreshes or reinstalls operating system back
and factory reset on your Windows OS without to factory settings.
system. deleting personal files.
Remember to back up
your files before
selecting this option.
KNOWLEDGE
CHECK
Which of the following tools factory resets your system?
a. REGEDIT/REGSRV32
b. Event Viewer
c. Uninstall/Reinstall/Repair
d. Disk Defrag
KNOWLEDGE
CHECK
Which of the following tools factory resets your system?
a. REGEDIT/REGSRV32
b. Event Viewer
c. Uninstall/Reinstall/Repair
d. Disk Defrag
That’s correct. c.
Explanation: The Uninstall/Reinstall/Repair tool performs a clean install and factory resets your system.
These look like legitimate pop-up blockers but may cause malware
infection.
These sites look legitimate but are used to gain your information for
illegal activities.
This is done through DNS poisoning that changes your DNS record to go
to another IP address.
• At times, the browser displays • Malware infections can cause • Run anti-virus or system restore
error messages giving security systems to slow down. from the recovery disc.
alerts. • Internet connectivity issues can
• When you see invalid certificates, also be a result of such infections.
click on the padlock to view the • Virus and malware can rename
certificate. system files, encrypt files, deny
• You might find that the certificate access to files, and change file
has either expired or is not signed permissions.
properly (un-trusted CA). • They can control your system lock
down programs i.e. system
restore and updates.
Operating System Lock-Up
When your e-mails have been compromised, then it is called a hacked e-mail
address.
You know your e-mail address has been hacked when spam e-mails get sent to
your contacts.
You might start receiving odd replies from your contacts and get bounced e-
mail messages.
Change your e-mail password as soon as you become aware that your e-mail
address has been hacked.
Rogue Antivirus
Spam includes:
• Unsolicited e-mails
• Advertisements
• Phishing attacks
• Virus
SPAM DETECTED
To avoid PC spamming:
• Stops malware • Use this option if all • This is the UNIX and • System restore • For system
infection else fails Linux version of allows you to create restoration in Linux,
• Ensures that • You can use the command prompt restore points to go create snapshot
antivirus signatures recovery console to • Use it to modify back in time to using the LVM
are up-to-date operating system snapshot tool.
change system files correct issues
and disable services files, shut down the • You can delete • Allows to create an
PC, and start it up initial snapshot of
• It is located in the programs but not
• You can perform the full image and
recovery disk personal files then incremental
certain application • You can access it
configuration as snapshots of only the
through various changed portions of
well.
paths the image
PC Tools for Troubleshooting (contd.)
The various tools to combat virus attacks are:
Pre-Installation MSCONFIG
Event Viewer Refresh/Restore Safe Boot
Environments
• Pre-installation • It is a centralized log The Refresh option: • This allows you to set Safe boot has the
environments allow database • Allows you to reinstall the option to boot into following options:
you to load the • It contains Windows safe boot mode when • Safe boot: Minimum—
minimum Windows information and error the PC loads next Loads only Windows
operating system • Keeps personal files
messages and settings essential components
• Use it for • Is only available in • Safe boot: Alternate
troubleshooting and shell— Does not
Windows 8/10
recovery access any network
• Safe boot: Active
The Restore option: Directory repair—
• Allows you to revert to Contains file explorer
a previous system and active directory
configuration
• Keeps personal
information intact
Best Practice Procedure for Malware Removal
The best procedure for malware removal are:
• You can detect • Disconnect your • Disable the restore • Download the latest
malware through odd system from network point as malware can signatures
message being • Take out all infect it • Ensure that automatic
displayed with removable media • Do not take snapshot updates are enabled
unusual icons and • Do not transfer any of an infected image • Copy updates from
applications files another PC
• It also slows down the
system performance
Best Practice Procedure for Malware Removal (contd.)
The best procedure for malware removal are:
Schedule scans and run updates Enable system restore Educate end user
• Schedule scans and run antivirus • This step is only applicable for • Educate users to make sure that
Windows OS malware infections do not happen
• Install a standard antivirus
program like Microsoft, • Re-enable system restore and again
Symantec, and McAfee create a restore point • Choose any method of training
• Go into Safe Mode to run antivirus like one-to-one, posters, e-mails,
and login messages
• If all else fails, use the recovery
console
KNOWLEDGE
CHECK
Which of the following tools is a centralized log database that contains information and error messages?
a. Safe Boot
b. Event Viewer
c. Terminal
d. Recovery Console
KNOWLEDGE
CHECK
Which of the following tools is a centralized log database that contains information and error messages?
a. Safe Boot
b. Event Viewer
c. Terminal
d. Recovery Console
That’s correct. b.
Explanation: The Event Viewer is a centralized log database that contains information and error messages.
Cannot Broadcast to
Dim Display Intermittent Wireless
External Monitor
• Dim displays make it difficult to • At times, you may get wireless • You cannot broadcast to a Smart
see the display connectivity TV, Chromecast, or Apple TV
• It could also be that you get no
wireless connectivity, Wi-Fi, and
Some common solutions are as Some common solutions are as
Bluetooth
follows: follows:
• Change brightness settings Some common solutions are as • Check app requirements
follows:
• Replace the display or backlight • Check that all devices are on the
• Move the device closer to the same network
access point
• Check connectivity between the
• Check the settings to see if devices
wireless is enabled
• Check the settings to see if you can
connect to the paired device
Common Symptoms—Mobile Devices (contd.)
Here are some issues that you might face while working with mobile devices:
• When you press the screen or • When this problem occurs, you • At times, battery runs out quicker
device buttons, nothing is cannot read e-mails. This is than expected
displayed mainly related to corporate e-
mails • This can result in bad reception
• Overheating results in hot phones • Frozen system means that the • No sound from speakers often
phone has crashed and it is non- results in no sound coming from
• It may also lead to automatic responsive
shutdowns phone
Some common solutions are as Some common solutions are as Some common solutions are as
follows: follows: follows:
• Change or update apps having • Try a soft/hard reset • Check your volume
high CPU usage • Do a factory reset • Insert the headphones and check
• Avoid direct sunlight for sound
• Avoid charging/discharging • Check the app settings
battery constantly • Do a factory reset
Some Other Common Symptoms—Mobile Devices (contd.)
Here are some other common issues that you might face while working with mobile devices:
• This means that the screen is not • This means that you can not • Slow performance means that
responding in its usual manner access your phone apps are not launching or are
Some common solutions are as performing slow
follows:
Some common solutions are as
follows: • Avoid too many incorrect unlock Some common solutions are as
• Close some apps down attempts follows:
• Restart the device • Use your Google login to access • Restart the phone
your Android device • Stop and restart the app
• Replace the digitizer or reseat the
wires • Remember that iOS allows you • Update the app
delayed reattempt but locks down
after 10 incorrect attempts
• Take advantage of Windows
delayed re-attempts
KNOWLEDGE
CHECK
What is the key combination to restart an Apple iOS?
That’s correct. a.
Explanation: The key combination to restart an Apple iOS is the Power + Home button.
A weak signal means that you do not have signal for phone usage or
Internet usage.
Wi-fi Signal
Power Drain
Power drain refers to battery running out quicker than usual. Power drain happens due
to:
• Heavy application usage
• Increased network usage
Slow data speed means that your device is running slower than usual.
Unusual network activity can be a cause for this.
Leaked files mean that someone has unauthorized access to your device
(root access) or account.
Personal
Data
In case of a breach:
Microsoft OneDrive
• Is illegal
d. Run the Wi-Fi analyzer tool to check for interference from neighbor access points
d. Run the Wi-Fi analyzer tool to check for interference from neighbor access points
That’s correct. d
Explanation: If you have slow data speed on your mobile device, then run the Wi-Fi analyzer tool to check for interference from neighbor access points.
d. Allows you to modify operating system files, shut down the PC, and start it.
While working with mobile devices, you might face issues like dim
5 users.