NCJ Number
200018
Journal
Law Enforcement Technology Volume: 30 Issue: 4 Dated: April 2003 Pages: 66,68,73
Date Published
April 2003
Length
7 pages
Annotation
This article discusses computer problems and getting technical support to solve them.
Abstract
Figuring out where a computer problem originates is often difficult because of the many components that work in concert together. Knowing where computers’ most common problems start helps one to communicate better with technical support, making their job easier, and getting the computer up and running more quickly. Hardware makes up the computer’s physical components, such as its hard drive, removable disk drives, peripherals, memory, processor, and system cards. Hard drive problems result from their data storage capacity becoming corrupted. Problems with removable disk drives usually have to do more with the disk than the drive. Not having enough memory, or installing large programs that use a lot of memory usually results in programs crashing, running improperly, or not opening if too many other applications are running. The most common problems with system cards include cards not seated properly inside the computer or improperly installed or conflicting drivers. The most common hardware problem involves peripherals either operating improperly or not working at all. Software comprises the tools – operating system and individual applications – that are used on the computer. Software incompatibility arises when users install software or files no one else is using. Software problems happen when tech support installs software upgrades, updates or patches that are meant to make the system run better. Network problems are sometimes to blame for software and hardware problems. Computer viruses and worms are a bigger problem for police departments than most people think. Security measures like constantly updated virus protection and well-maintained firewalls are only part of preventive maintenance. When calling technical support, tell them what version of Windows is being used, the version of the problematic software, what other programs were running when the problem occurred, whether the computer is networked, and whether the computer has been changed or modified in any way.