How To Run Scan Disk in Windows 2000 and Windows XP
How To Run Scan Disk in Windows 2000 and Windows XP
How To Run Scan Disk in Windows 2000 and Windows XP
Scan Disk is one of the most common maintenance tools bundled with an operating system. This
is an application that checks the computer’s hard drive for errors and bad sectors. Once Scan Disk finds
an error in the hard drive, it will attempt to fix it.
What Does Scan Disk Do?
Scan Disk is designed to repair damaged hard drive sectors and clusters on your computer’s
hard drive. Scan Disk also checks and repairs the integrity of file systems such as FAT, FAT32, and
NTFS.
Scan Disk requires exclusive access to a drive when it executes. Hence, if one or more of
the files are open on the drive that you want to scan, Scan Disk may display a prompt asking if you
want to schedule the drive check the next time you restart your computer.
Once Scan Disk finishes its task, it provides a report that contains the errors it has found and the
amount of disk space it has scanned. It is therefore important for users to use the Scan Disk application
because it ensures that their data is safe from being corrupted. Aside from this, there is a guarantee that
their computer will perform at optimum levels.
The earliest Scan Disk version appeared in MS DOS 6.2. In Windows 95 and 98, Scan Disk was
given a graphical user interface (GUI). In this graphical environment, the user can find:
4. A list of options will appear indicates that the programs that start up each time you load Windows.
5. Tick only those that are necessary and click OK.
6. Restart your computer. Click Restart.
If you are a Windows 2000 and Windows NT users, you can still use the same program msconfig.exe.
Since Microsoft did not include the utility in these two versions of Windows, you have to download it. Once
you have downloaded the file into your computer, follow these steps:
1. Unzip the file.
2. Copy the msconfig.exe file into the C:\winnt\system32 folder.
3. To access the utility, click Start, select Run and type in: msconfig. Ignore the error messages about
not being able to find the following files:
o config.sys o autoexec.bat o
win.ini o system.ini
The following are the procedures on how to maintain computer system and networks:
In order to perform the maintenance of your computer efficiently, a maintenance schedule is made
to guide the personnel in the proper maintenance procedure. This will help them remember the
maintenance task that needs to be done in order to improve the functionality of the computer system and
networks.
Networks are used to transmit information and electricity through cables. When installing these
networks, at most care must be applied to protect the network installers from injury. Procedures must also
be followed to ensure that those around the network cables do not become the victims of electrical fires or
other hazards.
1. Duct Systems
Networks are sometimes installed in duct systems. There is a concern that the network
cables might become damaged during construction, so the ducts must be built away from
planned future road construction and utilities, according to the International
Telecommunication Union.
Optical Lasers
Networks that use optical lasers uses invisible radiation that is emitted by these lasers. Before
installing the laser, the laser operation manual and safety guide must be read, according to Net
Ap. No one should stare inside the optical ports from where the lasers emit their light or else
blindness could result. When working with the laser, safety goggles must always be worn.
Falling
Many networks are run along utility poles, which are wooden poles that have network cables raised
high above the ground. When installing these cables, falling can be disastrous given the height of
the utility poles. Therefore, network installers should wear safety harnesses to ensure that they do
not fall.
De-Energize
Some networks have cables that are electrically charged. These cables must be de-energized and
tests should be used to ensure that the cables do not have any remaining electricity in them. The
tools that are used for repairing the cables are insulated so that electricity does not travel through
them and into the hands of the line repairer.
Cable Safety Standards
Network cables must have certain characteristics to be legally used for networks. The cables must
not produce flames that can ignite anything. They must not have halogen. They must not produce
acidic fumes. They must be resistant to ionizing radiation. Cables must be coded so that those
working with the cables can identify what they are.
Cable Inspection
Networks must only be installed by licensed professionals. Building inspectors must check the
network cables to ensure that they are installed properly and that they will not create a fire hazard.
These building inspections are especially important when the property containing the network
cables is sold.
General Safety
Safe working conditions help prevent injury to people and damage to computer equipment. A safe
work space is clean, organized, and properly lighted. Everyone must understand and follow safety
procedures. .
These are some of the basic safety precautions to observe when working on a computer:
• Remove your watch and jewelry and secure loose clothing.
• Turn off the power and unplug equipment before performing service.
• Cover sharp edges inside the computer case with tape.
• Never open a power supply or a CRT monitor.
• Do not touch areas in printers that are hot or that use high voltage.
• Know where the fire extinguisher is located and how to use it.
• Keep food and drinks out of your work space.
• Keep your work space clean and free of clutter.
• Bend your knees when lifting heavy objects to avoid injuring your back.
Electrical Safety
Follow electrical safety guidelines to prevent electrical fires, injuries, and fatalities in the home and
the workplace. Power supplies and CRT monitors contain high voltage.
CAUTION
Only experienced technicians should attempt to repair power supplies and CRT monitors.
Some printer parts become hot during use, and other parts might contain high voltage. Check the
printer manual for the location of high-voltage components. Some components retain a high voltage even
after the printer is turned off. Make sure that the printer has had time to cool before making the repair.
Electrical devices have certain power requirements. For example, AC adapters are manufactured
for specific laptops. Exchanging power cords with a different type of laptop or device may cause damage
to both the AC adapter and the laptop.
Follow fire safety guidelines to protect lives, structures, and equipment. To avoid an electrical
shock and to prevent damage to the computer, turn off and unplug the computer before beginning a repair.
The following are general information on electrical safety:
• Electrical equipment that is plugged into a power source should NEVER be handled if your hands
or feet are wet.
• Do not allow cables and plugs to get wet. Thus, keep liquids away from electrical equipment.
• Unplug equipment by pulling on the plug, not the cord.
• Damaged electrical equipment that constitute an electrical hazard are not to be used until
properly repaired or replaced.
• Never connect electrical cords in series.
• All electrical circuit disconnects or panels must not be blocked.
• Ground pins on the plugs and the devices plugged into the receptacles must be intact.
• Do not store flammable liquids near electrical equipment.
Fire Safety
Fire can spread rapidly and can be very costly. Proper use of a fire extinguisher can prevent a
small fire from getting out of control. When working with computer components, be aware of the possibility
of an accidental fire and know how to react. Be alert to notice odors being emitted from computers and
electronic devices. When electronic components overheat or short out, they emit a burning odor. If there
is a fire, follow these safety procedures:
• Never fight a fire that is out of control or not contained.
• Always have a planned fire escape route before beginning any work.
• Get out of the building quickly.
• Contact emergency services for help.
• Locate and read the instructions on the fire extinguishers in your workplace before you use them.
Be familiar with the types of fire extinguishers used in your country or region. Each type of
fire extinguisher has specific chemicals to fight different types of fire.
Types of Fires
Not all fires are the same. Different fuels create different fires and require different types of fire
extinguishing agents.
Class A
Class A fires are fires in ordinary combustibles such as wood, paper, cloth,
trash, and plastics.
Class B
Class B fires are fires in flammable liquids such as gasoline, petroleum oil and
paint. Class B fires also include flammable gases such as propane and butane.
Class B fires do not include fires involving cooking oils and grease.
Class C
Class C fires are fires involving energized electical equipment such as motors,
transformers, and appliances. Remove the power and the Class C fire becomes one
of the other classes of fire.
Class D
Class D fires are fires in combustible metals such as potassium, sodium,
aluminum, and magnesium.
Class K
Class K fires are fires in cooking oils and greases such as
animals fats andvegetable fats.
• Processor
This section shows the following tests conducted against the processor: Core Processor Tests,
AMD 64-Bit Core Tests, Math CoProcessor Tests - Pentium Class FDIV and Pentium Class FIST, MMX
Operation, 3DNow! Operation, SSE Instruction Set, SSE2 Instruction Set, and MP Symmetry.
• Motherboard
This section shows the following tests conducted against the motherboard: DMA Controller Tests,
System Timer Tests, Interrupt Test, Keyboard Controller Tests, PCI Bus Tests, and CMOS RAM/Clock
Tests.
• Memory, Cache Memory, and Video Memory
This section shows the following tests conducted against the various types of memory: Inversion
Test Tree, Progressive Inversion Test, Chaotic Addressing Test, and Block Rotation Test.
• Input Device
This section shows the following tests conducted against the input device: Verify Device, Keyboard
Repeat, and Keyboard LEDs. Mouse
This section shows the following tests conducted against the mouse: Buttons, Ballistics, Text Mode
Positioning, Text Mode Area Redefine, Graphics Mode Positions, Graphics Area Redefine, and Graphics
Cursor Redefine.
• Video
This section shows the following tests conducted against the video: Color Purity Test, True Color
Test, Alignment Test, LCD Test, and Test Cord Test.
• Multimedia
This section shows the following tests conducted against the multimedia components: Internal
Speaker Test, FM Synthesizer Test, PCM Sample Test, CD/DVD Drive Read Test, CD/DVD Transfer
(KB/Sec), CD/DVD Transfer Rating, CD/DVD Drive Seek Test, CD/DVD Seek Time (ms), CD/DVD Test
Disk Read, and CD/DVD Tray Test.
• ATAPI Devices
This section shows the following tests conducted against ATAPI devices: Linear Read Test, Non-
Destructive Write, and Random Read/Write Test.
• Hard Disk
This section shows the following tests conducted against the hard disk: Read Test, Read Verify
Test, Non-Destructive Write Test, Destructive Write Test, Mechanics Stress Test, and Internal Cache Test.
• USB
This section shows the following tests conducted against the USB: Controller Tests and Functional
Tests.
• Hardware ID
The compare test is used to determine the machine ID for the system. This test is not available for
the Sun Blade X6275 server module.
Print Results Report
The Print Results Report option enables you to print results of the diagnosis of your server if it is
connected to a printer through a parallel port.
Exit
The Exit option exits the PC-Check software and reboots the server module.
Viewing the PC-Check Results
You can use the text file editor to view the results when you run PC-Check manually. To do this, you need
to know the name of the file or files produced by the tests.
PC-Check Filenames
When you run a test, the header of the screen where you invoke the test shows you the name of the
output file. For example, when you run the continuous burn-in test, the name of the output file is
PCCHECK.BRN, as you can see in the following figure.
Page
Other files are named PCCHECK.xxx, for example, PCCHECK.JNL or PCCHECK.HII. The .HII
file is especially important because it shows the entire host configuration at the time of failure.
Viewing PC-Check Files with the Text File Editor
When you know the name of the output file, you can use the text file editor to view the file.
1. Select the System Information Menu option on the PC-Check Main Menu and press Enter.
The System Information Menu appears, as shown here:
2. Select the Text File Editor and press Enter. You are prompted for a file name.
3. Type in the file name (for example, PCCHECK.JNL) and press Enter.
The editor opens with the file displayed, as shown here:
In general, testing is finding out how well something works. In terms of human beings, testing tells
what level of knowledge or skill has been acquired. In computer hardware and software development,
testing is used at key checkpoints in the overall process to determine whether objectives are being met
Safety Precautions
Occupational Health and Safety (OHS) Policy –An Information and Communication Technology
(ICT) student should know how to behave when working in the computer laboratory, and how to implement
a safe way of accomplishing every task.
Occupational Safety and Health (OSH) is a planned system of working to prevent illness and injury where
you work by recognizing and identifying hazards and risks.
Occupational Health and Safety standards
Each student has a responsibility to their colleagues and their organization to report and act upon
any potential workplace hazard. Students need to be aware of the type of hazards that are possibly present
in their work environment.
Procedure
1. Identify the hazard.
2. Clear the area close to the hazard.
3. Partition the hazard off or clearly identify the area to protect other people from harm.
4. If the hazard can easily and safely cleared, then do so.
If not…
5. Report the hazard to the appropriate person (such as teacher in charge, principal etc.) to obtain
assistance.
6. Following clearing of the hazard fill out the correct documentation to assist in identifying
improved practice to reduce further incidence of hazards.
System Restore
System Information maintains a history of device drivers that are installed on your computer. If you
are unsure of a computer's recent history, you can use System Information to better understand what has
happened in the past
To start Microsoft System Information, use either of the following methods:
• Click Start, point to Programs, point to Accessories, point to System Tools, and then click System
Information.
• Click Start, click Run, type msinfo32.exe in the Open box, and then click OK.
To start System Restore
• Click Start, point to Programs, point to Accessories, point to System Tools, and then click System
Restore; or
• Click Start, click Run, type System Restore in the Open box, and then press Enter key. Then, it
will prompt you to the dialogue box shown below:
• Click Next button, then it will prompt you to restore your computer to the state it was working
properly. Tick on Show More Restore Points then check the box below to display other possible
options you can choose.
Network Monitoring
Network monitoring refers to the practice of overseeing the operation of a computer network using
specialized management software tools. Network monitoring systems are used to ensure availability and
overall performance of computers (hosts) and network services.
Network Monitoring Software Tools
The ping program is one example of a basic network monitoring program. Ping is a network
administration utility or tool used to test connectivity on an Internet Protocol (IP) network. It also measures
the latency or delay between two computers. Ping is a software tool available on most computers that
sends Internet Protocol (IP) test messages between two hosts
1. Open the Command Prompt or Terminal. Every operating system has a command line interface
that will allow you to run the Ping command.
The Ping command operates virtually and identically on all systems. If using Windows, open the
Command Prompt. Click the Start button and enter "cmd" into the Search field. Windows 8 users
can type "cmd" while on the Start screen. Press Enter to launch the Command Prompt.
2. Type ping followed by an IP address or a website address then press Enter key to execute the
command. Here is a brief explanation of commonly used ping commands:
o ping 127.0.0.1 (This is a "loopback ping" - your computer trying to talk to itself. If the loopback step
fails, it might be because the TCP drivers are corrupted, the network adapter might not be working,
or another service is interfering with IP.)
o ping <IP address> (This will ping the IP address of a device like a local computer, remote server
or any client that receives an IP address to verify that it is reachable and that you can communicate
with it properly.) Example: ping 192.168.1.1 (this is the default IP address of
NETGEAR routers) o ping<website address> (This command will test for the Internet connectivity
and DNS functionality.) Example: ping www.netgear.com, ping google.com
The first arrow shows the computer we are trying to reach is responding. (The DNS address
"www.netgear.com" is displayed into the equivalent IP address, 10.1.1.86.) This also shows that the
computer is Figure Command Prompt Window online and it has Internet access.
The second arrow shows that all of the sent packets are received showing that there is 0% loss.
This means that the connection is available and stable.
The third arrow shows the average time it took to answer. "Average = 0ms" is the best possible
result. This kind of result is usually received if the device you tried to reach is within the same network.
When a computer communicates with another computer on the network, it sends out both the
other computer’s MAC-address and the MACaddress of its own. In that way the receiving computer will
not only recognize that this packet is for it but also who sent this data packet so a return response can be
sent to the sender.
In an Ethernet network as described here, all computers hear all network traffic since they are
connected to the same bus. This network structure is called multi-drop.
One problem with this network structure is that when you have, let say ten (10) computers on a
network and they communicate frequently and due to that they send out data packets randomly, collisions
occur when two or more computers sends data at the same time. When that happens, data gets corrupted
and has to be resent. On a network that is heavy loaded, even the resent packets collide with other packets
and have to be resent. In reality this soon becomes a bandwidth problem. If several computers
communicate with each other at high speed they may not be able to utilize more than 25% of the total
network bandwidth since the rest of the bandwidth is used for resending previously corrupted packets.
The way to minimize this problem is to use network switches.
Identify Safety Procedures and Potential Hazards for Users and Technicians
Safety in the lab and in the work place is an important issue when working on computers and other
electrical devices. General safety guidelines and fire safety guidelines protect the technician and the
equipment.
Follow the basic safety guidelines to prevent cuts, burns, electrical shock, and damage to eyesight.
As a best practice, make sure that a fire extinguisher and first aid kit are available in case of fire or injury.
Installing network cables, whether copper or fiber-optic, can be dangerous. Often, cables must be
pulled through ceilings and walls where there are unexpected obstacles or toxic materials. You should
wear clothing that protects you from these materials. For example, wear long pants, a longsleeved shirt,
sturdy shoes that cover your feet, and gloves. Most importantly, wear safety glasses. If possible, ask
building management, or someone responsible for the building, if there are any dangerous materials or
obstacles that you need to be aware of before entering the ceiling area.
All levels of technicians should know the hazards before working with network cables and
equipment. This section describes the safety hazards of working with copper cables, which, like fiber-optic
cables, can be dangerous to handle.
Caution
When handling cable, always wear eye protection. Never touch the ends of any type of cable to bare
skin.
When you cut copper cable, the small copper strands can puncture your skin or cut you. The small
pieces that come off after cables are cut often fly into the air. Remember to always wear safety glasses
when cutting any type of cable.
The cutting and crimping tools used to repair set of terminate copper cables can be dangerous if not
used properly. Read the instructions that comes with the tool. Practice using the tool on scrap cable, and
ask an experienced installer for help if you need it.
Remember that copper cable conducts electricity. A faulty equipment, static electricity, or lightning
can energize even a disconnected cable. If in doubt, test the cable you are working on with a simple voltage
detector before touching it.
•
How long can the report be? It is difficult to predict in advance exactly how long a report will be.
Technically speaking, writing reports for hardware and other facilities should be specific and
itemized.
A hardware report can help you to:
• identify the hardware components inside your computer – CPU, memory, motherboard etc;
• understand conflicting hardware inside your computer; and
• help the computer repair person to understand your computer with a written, detailed hardware
report (therefore he can find the missing drivers faster, for example).
Sample Detailed Technical Report
3) It stores the applications and programs that run on the PC, as well as any work created by users.
a. CD/DVD c. Hard drive
b. RAM d. Zip drive
4) These cards are installed inside a PC and are responsible for determining the quality of the visuals
output by the computer.
a. Audio Card c. LAN Card
b. Graphics Card d. Adapter card
5) These are the two leading companies when it comes to manufacturing processors.
a. HP and Dell c. AMD and Intel
b. Epson and Canon d. Acer and Asus
6) This card allows a computer to be connected to a network. A 10/100/1000 Mbps (Megabits per
second) card is the standard card specifications today
a. Audio Card c. Network Card
b. Graphics Card d. Adapter card
8) A cabling is used to connect your wired network adapters to a router or network switch.
a. Internet c. coaxial
b. Ethernet d. fiber optic
9) A glue that holds your home network together
a. router c. Hub
b. DSL d. Ethernet cable
10) The standard transfer speed of your wireless connection is __________.
a. 802.11g c. 802.11m
b. 801.11g d. 802.11j
11) The wired half of your router has a speed of _____________.
a. 10/100 Mbps c. 100/1000 Mbps
b. 10/10/100 Mbps d. 10/10/1000 Mbps
12) Routers have two types of ports available at the back. Which is not part of it?
a. LAN c. MAN
b. WAN d. WLAN
13) It basically means to create a redundant copy of a data.
a. Data Backup c. System restore
b. Image copy d. hardcopy
14) It refers to any kind of malicious codes, objects or content that infiltrates your computer, resulting in
damage and causing your system to act in an undesirable manner.
a. Software c. Malware
b. Spyware d. Firmware
15) Software is used to identify problems on a computer or piece of equipment.
a. Network software tool c. Diagnostic Software tool
b. Hardware Software tool d. Firmware software tool
16) Disk ________ rearranges fragmented data so your disks and drives can work more efficiently.
a. Defragmenter c. software
b. Fragmenter d. defrag
17) It is a system-defined database which is used by an Operating System to store all the information
needed to configure the Windows settings.
a. Registry c. Registration
b. Register d. Registering
18) This is an application that checks the computer’s hard drive for errors and bad sectors.
a. Scan c. Scan Disk
b. System Restore d. Data backup
19) It is a computer maintenance utility that is included in the Microsoft Windows operating system and
it is designed to free up space on the hard drive.
a. Network software tool c. Scan Disk
b. Data Backup d. Disk Cleanup
20) Network Diagnostic Tool is an efficient and reliable tool to help you determine and identify the
possible network issues that prevent you from using your computer to the fullest.
a. Burn-in c. Diagnostic Software tool
b. Hardware Software tool d. Network Diagnostic tool
3) It stores the applications and programs that run on the PC, as well as any work created by users.
a. CD/DVD c. Hard drive
b. RAM d. Zip drive
4) These cards are installed inside a PC and are responsible for determining the quality of the
visuals output by the computer.
a. Audio Card c. LAN Card
b. Graphics Card d. Adapter card
5) These are the two leading companies when it comes to manufacturing processors.
a. HP and Dell c. AMD and Intel
b. Epson and Canon d. Acer and Asus
6) This card allows a computer to be connected to a network. A 10/100/1000 Mbps (Megabits per
second) card is the standard card specifications today
a. Audio Card c. Network Card
b. Graphics Card d. Adapter card
8) A cabling is used to connect your wired network adapters to a router or network switch.
a. Internet c. coaxial
b. Ethernet d. fiber optic
9) A glue that holds your home network together
a. router c. Hub
b. DSL d. Ethernet cable
10) The standard transfer speed of your wireless connection is __________.
a. 802.11g c. 802.11m
b. 801.11g d. 802.11j
11) The wired half of your router has a speed of _____________.
a. 10/100 Mbps c. 100/1000 Mbps
b. 10/10/100 Mbps d. 10/10/1000 Mbps
12) Routers have two types of ports available at the back. Which is not part of it?
a. LAN c. MAN
b. WAN d. WLAN
13) It basically means to create a redundant copy of a data.
a. Data Backup c. System restore
b. Image copy d. hardcopy
14) It refers to any kind of malicious codes, objects or content that infiltrates your computer, resulting
in damage and causing your system to act in an undesirable manner.
a. Software c. Malware
b. Spyware d. Firmware
15) Software is used to identify problems on a computer or piece of equipment.
a. Network software tool c. Diagnostic Software tool
b. Hardware Software tool d. Firmware software tool
16) Disk ________ rearranges fragmented data so your disks and drives can work more efficiently.
a. Defragmenter c. software
b. Fragmenter d. defrag
17) It is a system-defined database which is used by an Operating System to store all the information
needed to configure the Windows settings.
a. Registry c. Registration
b. Register d. Registering
18) This is an application that checks the computer’s hard drive for errors and bad sectors.
a. Scan c. Scan Disk
b. System Restore d. Data backup
19) It is a computer maintenance utility that is included in the Microsoft Windows operating system
and it is designed to free up space on the hard drive.
a. Network software tool c. Scan Disk
b. Data Backup d. Disk Cleanup
20) Network Diagnostic Tool is an efficient and reliable tool to help you determine and identify the
possible network issues that prevent you from using your computer to the fullest.
a. Burn-in c. Diagnostic Software tool
b. Hardware Software tool d. Network Diagnostic tool