Categories of Computer Problems
Categories of Computer Problems
CSC 347 4
Here’s a summary of the information about identifying and solving computer problems:
1. Hardware Problems
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 1/21
2. Software Problems
1. Basic Troubleshooting:
Restart the computer.
2. Updates and Antivirus:
Verify that all software and operating system updates are installed.
Ensure antivirus software is active and up to date.
3. Recently Installed Programs:
If the problem occurred after installing new software, uninstall it and reinstall.
Look for solutions online (e.g., forums, tutorials, or official support pages).
Keep detailed notes of the steps you take to identify or resolve the issue for future reference.
This structured approach simplifies computer troubleshooting and helps address issues effectively.
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 2/21
Lecture 6: PC Diagnostics, Repairs, and Maintenance
CSC 347 6
Here’s a concise summary of common computer problems and how to distinguish between hardware
and software issues:
1. Physical Signs:
Loud noises or smoke: Likely a hardware issue, especially with the SMPS (Switched Mode
Power Supply).
Blank or distorted screen: Indicates possible hardware faults.
Series of beeps: Indicates hardware issues, often signaling specific faults (check the beep
code documentation).
2. No Response:
If the computer is entirely dead, it’s likely a hardware issue, such as power failure.
3. Error Codes on Boot:
Boot errors can be caused by both hardware and software issues. Record the error code for
diagnosis.
1. Error Messages:
Errors during booting or while using specific programs often indicate software problems.
2. Recent Changes:
Recent software installations, updates, or changes to BIOS settings can cause software
problems.
3. Virus/Malware Exposure:
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 3/21
If the system behaves erratically, check for malware or viruses.
Note error messages, codes, and system behavior to assist in pinpointing the cause.
Investigate recent changes to hardware or software.
For hardware issues, check physical components; for software issues, check updates, settings, and
antivirus status.
This approach helps differentiate between hardware and software issues effectively.
Diagnostics Software
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 4/21
Paid tools with advanced features for PC diagnostics (e.g., Norton Utilities, AIDA64, or PC-
Doctor).
Often used by professionals for in-depth analysis.
6. Free/Open-Source Diagnostics Software:
Free alternatives that offer diagnostic tools for hardware and software issues (e.g.,
MemTest86, HWiNFO, CrystalDiskInfo).
Ideal for personal or basic use without incurring additional costs.
Each type of diagnostic software serves a specific purpose and can be used based on the issue and user
expertise. Combining these tools can provide comprehensive diagnostics and troubleshooting.
Computer Maintenance
CSC 347 9
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 5/21
Computer Maintenance Overview
Definition:
Computer maintenance involves regularly checking, repairing, and optimizing computers to ensure they
function efficiently and reliably.
1. Hardware Maintenance:
Dust Control: Prevent overheating by cleaning internal components.
Overheating Prevention: Ensure proper ventilation and cooling systems.
RAM Upgrade: Add more memory if applications demand higher performance.
2. Storage Optimization:
Disk Defragmenter: Reorganize fragmented data for faster access.
Disk Cleanup: Remove temporary files and unused system data.
Excess and Unused Files: Regularly delete unnecessary files.
3. System Scans and Updates:
Scan Disk/Check Now: Detect and fix disk errors.
Antivirus and Malware Protection: Use reliable security tools to safeguard your PC.
Updating Software: Keep your OS and applications current for better stability and security.
4. System Settings:
Startup Folder: Disable unnecessary programs at startup to improve boot time.
Software Inventory: Remove unused or outdated software to free resources.
5. User Habits:
Deleting Browsing History: Clears cached data, improving browser performance.
Endurance: Regularly monitor and maintain your system to prolong its lifespan.
By following these practices, you can maintain a reliable and efficient computer system while reducing
the risk of failures.
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 6/21
Hardware Repairs
– Clean any dust or foreign material out of the case while it is open
CSC 347 11
CSC 347 12
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 7/21
Hardware Repairs Overview
Definition:
Hardware repair involves fixing physical components of a computer or troubleshooting related issues.
1. Preparation:
Gather your toolkit (screwdrivers, thermal paste, anti-static wrist strap, etc.).
2. Initial Checks:
Check for power before proceeding with any repairs.
Verify external connections (e.g., cables, power cords).
3. Testing:
Perform the Power-On Self-Test (POST) to detect hardware issues.
If POST doesn’t help, open the case for further inspection.
4. Cleaning:
Remove dust or foreign materials from inside the case to prevent overheating.
5. Boot Testing:
Attempt to boot using the hard drive or a bootable CD/DVD.
6. Configuration:
Access the CMOS setup program to check and correct configuration settings.
Identify and undo any unwanted changes in the system.
7. Problem Isolation:
Narrow the issue down to a specific hardware component or software program.
8. Consult Professionals:
If all else fails, seek professional assistance.
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 8/21
7. Unresponsive Computer:
Inspect power supply, RAM, or motherboard.
8. External Device Malfunction:
Test the device on another computer to rule out device failure.
Replacing Components:
Power Supply: Replace if there are power irregularities.
Hard Drive: Replace or reformat and reinstall a fresh OS if the drive fails.
RAM: Replace faulty memory sticks to restore performance.
Peripheral Maintenance:
Check cables, clean connectors, and update device drivers regularly.
By systematically diagnosing and addressing these issues, you can effectively repair and maintain
computer hardware.
Malware
– a) Boot sector,
– b) File Allocation Table,
– c) Partition table, and
Malware Overview
Definition:
Malware (short for malicious software) refers to any software designed with harmful intent. It can:
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 9/21
1. Boot Sector:
The part of a hard drive or storage device containing essential startup instructions. Malware
in the boot sector can prevent the computer from starting properly.
2. File Allocation Table (FAT):
A system that keeps track of where files are stored on a disk. Malware targeting the FAT can
corrupt or hide files.
3. Partition Table:
Contains information about disk partitions. Malware affecting this area can render the disk
unreadable or inaccessible.
4. .Com and .Exe Files:
Executable files are often infected because they run programs, making them an easy target
for malware to spread.
Key Takeaways
Understanding these vulnerabilities is essential for preventing, detecting, and removing malware
effectively.
Computer Virus
• Types of PC Virus: Boot Sector Virus, Macro Virus, and email virus
• How do Computer Viruses Spread?
• Deadly effect of virus
• Symptoms of Computer Virus Infection
• How to Prevent Viruses?
• How to Remove a Virus?
CSC 347 15
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 10/21
the presence of a virus.
– Clean up the virus: must be able to get rid of the virus it
finds on your computer; otherwise, it is useless.
– Protect your System from viruses: Must have the ability
to load a piece of the program into memory at boot-up time,
to protect you from getting a virus in the first place.
– Provide Automatic updates: Must regularly and
automatically check back with the manufacturer for
information on new viruses.
Definition:
A computer virus is a piece of malicious code designed to disrupt the normal functioning of a computer.
Key Features:
Self-replicates to infect multiple systems.
Can spread across networks, potentially paralyzing them.
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 11/21
Frequent pop-up ads or error messages.
Unusual system behavior (slow performance or crashes).
Unauthorized changes to system settings or files.
New or unknown programs running automatically.
Disabled antivirus or security programs.
1. Virus Scanning:
Should detect viruses in storage devices and RAM.
2. Virus Cleanup:
Must remove detected viruses effectively.
3. Real-Time Protection:
Load at boot time to block incoming threats immediately.
4. Automatic Updates:
Regular updates to stay current with the latest virus definitions.
By following these practices and using a robust antivirus program, you can protect your system from
most virus threats.
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 12/21
Computer Security
CSC 347 17
Physical Security
CSC 347 18
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 13/21
access network resources and are often associated with devices
that enables the user to generate one-time password
authenticating their identity.
• Privacy Filters – either film or glass add-ons that are placed
over a monitor or laptop screen to prevent the data on the
screen from being readable when viewed from the sides.
CSC 347 19
• Retinal
– It is one form of biometric device that can be used to
identify user
– Matches are made based upon identification of the
blood vessel in an individual retina.
– Slightly expensive.
• Tailgating – it refers being so close to someone
when they enter a building that you are able to
come in right behind them without needing use a
key, a card, or any other security device.
CSC 347 20
Digital Security
CSC 347 21
• FIREWALL
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 14/21
– Device that provides secure connectivity between
networks (internal/external; varying levels of trust)
– Used to implement and enforce a security policy for
communication between networks
– Separate local network from the Internet
– FUNCTIONS OF FIREWALL: Restrict incoming and
outgoing traffic by IP address, ports, or users
– Block invalid packets
CSC 347 22
• Antispyware
– Just as antivirus seeks out and stops viruses from
entering and spreading
– Purpose of antispyware software
– The OS from Microsoft are the one most affected by
spyware, and Microsoft has released Windows
Defender and Security Essentials
CSC 347 23
CSC 347 24
• Directory permissions
– Can do to improve or change the security of the
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 15/21
directory services deployed.
– Can ensure that they don’t become a tool for an
attacker bent on compromising organization’s security
1. Physical Security
Protects hardware, media, and information from unauthorized physical access.
Examples include locked doors, shredding sensitive documents, and using biometric
scanners.
2. Digital Security
Focuses on protecting against harmful data, malware, and unauthorized access.
Includes antivirus programs, firewalls, and user authentication mechanisms.
3. Minimizing Risks and Backup Strategies
Ensures error recovery through backups and proper error handling.
4. Encryption
Safeguards sensitive files by making them unreadable to unauthorized users.
1. Locking Doors:
Prevents unauthorized access to computer systems and sensitive information.
2. Biometric Devices:
Examples: Fingerprint, retina, and palm scanners.
Provide reliable and personal authentication.
3. Badges and RFID:
Used for identification and granting access to secure areas.
4. RSA Tokens:
Devices that generate one-time passwords for secure network access.
5. Privacy Filters:
Shields monitor or laptop screens to prevent unauthorized viewing.
6. Tailgating Prevention:
Ensures unauthorized individuals cannot follow authorized personnel into secure areas.
1. Antivirus Software:
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 16/21
Scans for and removes malicious software.
Uses signature-based and generic-based detections.
Runs continuously and updates regularly to counter new threats.
2. Firewalls:
Separates local networks from the internet.
Restricts traffic by IP, port, or user.
Blocks invalid packets and enforces security policies.
3. Antispyware:
Detects and removes spyware that can steal sensitive information.
Examples: Microsoft Defender and Security Essentials.
4. User Authentication:
Employs strong passwords with the following characteristics:
At least 7-14 characters.
Includes uppercase, lowercase, numbers, and symbols.
Avoids dictionary words, names, or previous passwords.
5. Directory Permissions:
Controls access to sensitive directories to prevent unauthorized changes or attacks.
1. Strong Passwords:
Use unique, complex passwords and change them regularly.
2. Update Software:
Keep operating systems and applications up to date to patch vulnerabilities.
3. Backup Strategies:
Regularly back up important data to recover from potential loss.
4. Encryption:
Encrypt sensitive files to protect them from unauthorized access.
By implementing these physical and digital security measures, organizations and individuals can greatly
reduce the risk of data breaches and system compromises.
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 17/21
Rootkit, hackers and much more
CSC 347 26
CSC 347 27
Computer security threats pose significant risks to the smooth functioning of PCs and digital systems.
These threats are becoming increasingly sophisticated as the world transitions to a more digital
landscape. Here are the most common types of threats:
Definition: Malicious programs that replicate themselves and infect files, rendering them non-
functional.
Impact: Spreads rapidly, damaging files and programs on the infected system.
b. Computer Worms
c. Scareware
Definition: Malware designed to trick users into purchasing fake security software by showing
false virus alerts.
Impact:
Constant pop-ups about fake malware threats.
Lures users into paying for fraudulent software.
d. Keylogger
e. Rootkit
Adware: Displays unwanted advertisements that can slow down the system and compromise
privacy.
Trojan Malware: Malicious programs disguised as useful applications to gain unauthorized access.
Hackers: Individuals or groups who exploit system vulnerabilities for personal gain or disruption.
Mitigation Measures
By understanding and addressing these threats, users can better protect their systems and maintain
secure computing environments.
To ensure robust computer security and protect your system from cyber threats, follow these best
practices:
Why?
Attachments from unknown senders can carry harmful malware, ransomware, or viruses.
Best Practices:
Only open email attachments from trusted sources.
Scan attachments with antivirus software before downloading or opening them.
By adhering to these tips, you can significantly enhance the security of your computer and protect your
sensitive data from potential threats.
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 21/21