Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Flowchart for troubleshooting networks, pc power issues, etc.

Posted on 2006-06-26
2
Medium Priority
?
317 Views
Last Modified: 2012-08-13
I am a computer repair tech and I also do networking and whatever else comes up. I am not as experienced as I would like to be even though I have had lots of classes. Is there anyplace I can go to download some flowcharts to take with me on service calls or even use here at the shop for troubleshooting network connectivity, or no internet, or hardware or software issues such as pc wont boot?. Really a place that I can get some flowcharts for lots of different issues that I can use for guidance instead of racking my brain trying to remember what to check and what causes what. My goal is to be better prepared as a tech to solve problems without having to ask my boss for help or taking forever to figure it out. I know this is not always possible but the more prepared I am the better tech I will be.
0
Comment
Question by:bostonstaus
  • 2
2 Comments
 
LVL 32

Accepted Solution

by:
Mark earned 750 total points
ID: 16991995
Here is a list of flowcharts that may help.This one is for power supply but there are links on the left side of the page for other flowcharts.
http://www.fonerbooks.com/power.htm
0
 
LVL 32

Expert Comment

by:Mark
ID: 17003380
this is the network flowchart http://www.fonerbooks.com/network.htm
0

Featured Post

Ask an Anonymous Question!

Don't feel intimidated by what you don't know. Ask your question anonymously. It's easy! Learn more and upgrade.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Last Mile Wireless The term last mile wireless is a bit deceptive as it can be much more than a mile. It is also called WiMax and 802.16. It generally refers to relatively short distance point-to-point / point-to-multipoint secure wireless connecti…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…
Despite its rising prevalence in the business world, "the cloud" is still misunderstood. Some companies still believe common misconceptions about lack of security in cloud solutions and many misuses of cloud storage options still occur every day. …
Suggested Courses
Course of the Month10 days, 15 hours left to enroll

886 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question