Preview

LAB 8

Good Essays
Open Document
Open Document
385 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
LAB 8
LAB 8: Troubleshooting
Task 1
Problem Description:
A user boots her computer and hears a sequence of six beeps. The computer uses AMI BIOS. What error is indicated by the six beeps? A different user with a computer using Phoenix BIOS hears a sequence of beeps with pauses in between. The sequence is beep – pause – beep beep beep – pause – beep – pause – beep beep beep. What error is indicated by this beep sequence?
The problem is the users are experience beeps when using their respective Bios systems. Six beeps means Gate A20 test error usually caused by an expansion card that has failed or the motherboard that is no longer working. The keyboard controller is a chip on the motherboard that communicates with your keyboard. It also controls the A20 gate that provides access to the high memory area (HMA). This component is indicating a failure. This is usually a problem with either the keyboard or the motherboard. I would recommend troubleshooting the keyboard it’s very easy so start with that, then troubleshoot the keyboard controller, followed by troubleshooting as a motherboard failure. After troubleshooting process the keyboard was the problem.
The Phoenix Bios experiencing the 1-3-1-3 is Test 8742 keyboard controller. An error of this sort is usually a problem with either the keyboard or the motherboard, possibly specific to the keyboard controller. The same process will apply troubleshoot the keyboard, troubleshoot the keyboard control, and then troubleshoot the motherboard.
Task 2: A user boots his computer and opens Internet Explorer. This is what he sees
I think this is a software issue. I would to see first if you have internet connection. Once you do that , and in fact you are connected to the internet I would troubleshoot the computer to your operation system you currently use, but they all are the same in the steps. For instance I use windows 8 I would Disabling Enhanced Protected Mode, Delete your browser history, Disable add-ons in Internet Explorer,

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The switches in the diagram booted at the same time. Based on the information provided in the diagram fill in the chart below:…

    • 326 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1230 Analysis 2

    • 195 Words
    • 1 Page

    What I can think of to return the computer to an operational state is troubling a video problem. It maybe relating to the graphic card and the program that may run with it. The graphics adapter may either be corrupted or installed wrong under a different version. For example if the graphic is supposed to be run on a x64 based window 7 instead of a x86 version.…

    • 195 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Documents NETW240 Wk4 Lab

    • 1983 Words
    • 10 Pages

    During the boot up process an activity indicator will be displayed in the name tab:…

    • 1983 Words
    • 10 Pages
    Satisfactory Essays
  • Satisfactory Essays

    I recently had to deal with a problem with the Event Name as: BlueScreen. The Locale ID of the fault can be designated by the numerical value as: 5146. I am a touch apprehensive as to whether such a typical fault has been triggered owing to a virus attack. What should I do to eliminate the fault and ensure that the problem does not occur all over again?…

    • 474 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab 18

    • 846 Words
    • 3 Pages

    8. With the DMM’s positive red lead, touch each of the conductors in the dish and record your findings.…

    • 846 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 6

    • 690 Words
    • 3 Pages

    1. Run your model. Compare the queue statistics of the 3 processes with those obtained for Part C in the previous Lab. How have they changed and what conclusions can you draw? (Note the sums of all capacities for both cases are equivalent – 12 in each).…

    • 690 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 18

    • 490 Words
    • 3 Pages

    In this exercise, you will create a connection that enables the workstation to connect to your server using virtual private networking.…

    • 490 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Lab 10

    • 1213 Words
    • 5 Pages

    Take a screen shot of the Devices and Printers control panel with the new printer icon you created by pressing Alt+Prt Scr, and then paste the resulting image into the lab09_worksheet file in the page provided by pressing Ctrl+V.…

    • 1213 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    NT1110Lab3Worksheet

    • 799 Words
    • 6 Pages

    1. Examine the following motherboard. One interesting thing you will see is the use of two BIOS chips. The M-BIOS chip is the Main BIOS chip and the B-BIOS chip is the Backup BIOS chip, which is used to rewrite the M-BIOS chip if it becomes corrupted. (Refer to the high-resolution images for closer inspection.)…

    • 799 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    Lab 5

    • 2594 Words
    • 10 Pages

    In gymnosperms, pollination is the transfer of pollen (Fig. 2) from male cones (where pollen is produced) to female cones, which house eggs. In these plants, pollen is carried from male cones to female cones by wind - gymnosperms were the first plants to evolve that did not need free water to transfer sperm to egg, and were therefore able to thrive in terrestrial habitats. Pollen grains are also protected by tough coats. After fertilization, seeds are produced with developing embryos…

    • 2594 Words
    • 10 Pages
    Good Essays
  • Good Essays

    Capstone Review

    • 2842 Words
    • 11 Pages

    3. A user reports that they cannot download a file from the internet. Using the OSI…

    • 2842 Words
    • 11 Pages
    Good Essays
  • Good Essays

    Lab 4

    • 575 Words
    • 3 Pages

    1.List four cell structures that were common to both plant and animal cells. (4 points)…

    • 575 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    1. What are some common risks, threats, and vulnerabilities commonly found in the LAN-to-WAN Domain that must be mitigated through a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    1. What are some common risks, and vulnerabilities commonly found in the System/Application Domain that must be mitigated with proper security countermeasures?…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    Compare the portions that address Internet and e-mail access of at least three different companies.…

    • 451 Words
    • 2 Pages
    Satisfactory Essays