Software Troubleshooting

Software Troubleshooting

Rating
Average: 4 (1 vote)
Software Troubleshooting
Course
Course
A+ Certification Prep
Subjects
Subjects
Career & Technical Education
Grade Levels
Grade Levels
10
11
12
Duration (hours)
Duration (Approx hours)
10
Overview
In this unit students will learn how to troubleshoot different software issues for a variety of applications.
Standards
220-1002 (Core 2) Objectives 3.1 - 3.5
Cyber Connections
Hardware and Software
Section Title
Lessons
Accordion Items
Title
3.1 - Given a scenario, troubleshoot Microsoft Windows OS problems
Content
  • Common Symptoms
  • Common Solutions
Title
3.3 - Given a scenario, use best practice procedures for malware removal
Content
  1. Identify and research malware symptoms
  2. Quarantine the infected systems
  3. Disable System Restore (in Windows)
  4. Remediate the infected systems
    1. Update the anti-malware software
    2. Scan and use removal techniques (safe mode, pre-installation environment) 
  5. Schedule scans and run updates
  6. Enable System Restore and create a restore point (in Windows)
  7. Educate the end user
Title
3.4 - Given a scenario, troubleshoot mobile OS and application issues
Content
  • Common Symptoms
    • Dim Display
    • Intermittent Wireless
    • No Wireless Connectivity
    • No Bluetooth Connectivity
    • Cannot Broadcast to External Monitor
    • Touchscreen Non-Responsive
    • Apps not Loading
    • Slow Performance
    • Unable to Decrypt Email
    • Extremely Short Battery Life
    • Overheating
    • Frozen System
    • No Sound from Speakers
    • Inaccurate Touch Screen Response
    • System Lockout
    • App Log Errors 
Title
3.5 - Given a scenario, troubleshoot mobile OS and application security issues
Content
  • Common Symptoms
    • Signal Drop / Weak Signal
    • Power Drain
    • Slow Data Speeds
    • Unintended WiFi Connection
    • Unintended Bluetooth Pairing
    • Leaked Personal Files / Data
    • Data Transmission Over Limit
    • Unauthorized Account Access
    • Unauthorized Location Tracking
    • Unauthorized Camera / Microphone Activation
    • High Resource Utilization