...Palmer AC1305985 EN130.1.1 English Comp II Assignment # 4 September 27, 2013 How to properly maintain a personal computer In order for a personal computer to stay fast and be reliable, it must be properly maintained. A computer can stay in good condition if it is well taken care of. Common sense and the knowhow can keep your computer running smoothly for many years. We know dust and bacteria are things we cannot avoid, for this reason we need to constantly dust our homes. Well it goes the same for a computer. Dusting the mouse, keyboard, and the screen keeps your computer running faster. Every few months it’s also good to open the casing of the computer and remove any dust particles inside to keep the cooling fan functioning properly. The hard drive is main part of a PC. It is where all the files are stored; therefore, cleaning the hard drive and defragmenting it is necessary to keep the computer from slowing down and freezing up. To do this process, just go into your computers programs, find accessories and click to system tools. Go to defragment and start the process. This should be done every two to three months to keep your computer in top shape. Be sure you have good antivirus software installed in your computer and make sure it is always updated. Viruses are among one of the main causes of computer failure. You should do a complete virus scan on your computer regularly. Also a good way to avoid viruses is to avoid visiting websites that are...
Words: 557 - Pages: 3
...Properly Maintain Your Computer 1 How to Properly Maintain Your Computer Properly Maintain Your Computer 2 With technology on the rise, computers have taken over and become a necessity in our daily lives. With high speed Internet we have many uses for our computers such as looking for the best shopping deals, gathering news from around the world, watching videos or exploring the web. For some people their careers depend on a computer. Graphic design artists use illustrator and Photoshop to come up with designs for a company logo or website. All these uses put wear and tear on a computer. Like a car, your computer needs to be properly cared for and looked after. There are a few simple steps one can follow to maintain a well functioning computer. Before going above and beyond and taking your computer fully apart you might want to first make sure you have a good anti-virus software installed onto your computer. It is very important that you have this because malware can be very harmful. Also you don’t want to let your hard drive work to hard; your computer is an expensive tool. Clearing out unused files and programs will help take some load off. This is called...
Words: 526 - Pages: 3
...Faith Integration Paper (Relationship between God, Family, Society) In the field and study of computer science in relation to one’s relationship to others, I believe they can co-exist and that computer science can complement the Christian faith, if kept in perspective. For example, both computer science and Christianity affect the lives of other’s worldwide, especially loved ones at large. As computer science makes technological advances and progresses in discovering and applying new technology, we are able to do more in reaching out and keeping in touch with those who are close to us, for example our parents, society and, more importantly to God. With this in mind, the opportunities are limitless as knowledge increase and evolve, intertwining into the fabric of our relationship to others, thus benefiting others in an ever changing world. Computer science provides an opportunity to learn various ways of communicating to our family with knowledge and information and to others in many areas that would have been very difficult to access otherwise. One fine example is keeping in touch with loved ones who live overseas or perhaps maintain that important continuity of relationship, by letting others know that they are loved and respected. With computer technology, there are many websites that provide knowledge ample opportunities of maintaining communications with friends and family, while at the same time utilizing the opportunity of propagating the gospel of Christ as God...
Words: 1100 - Pages: 5
...Lancaster, California in which I used to work at as a customer service representative. First the paper will give an overview of the company. Then, a depiction of the network that is being used by the call center will be explained. The Lancaster call center consisted of over 200 cubicles with a computer and a phone line in which connects to their main servers in the back of the building. Also there were QA offices in the back in which monitored random customer service representatives in order to maintain quality control and ensure that all representatives were following the guidelines given to them. The call center offered a separate training room in which also had its own software in which did not disrupt the live calls flowing through the center. I had to break down each section of the call center in order to get a full idea of how everything is connected in the network. First I will discuss the training area; there are about 50 computers in the training area in which are all connected to each other through a Local Area Network (LAN). Also a main computer upfront in which can monitor how well the trainees are picking up on the training software through tests given to the trainees. The computers also have intranet access in which you can look up anything having to do with Starwood or any of its affiliates. There is no live material in which you look at in the training room. So I would think...
Words: 1097 - Pages: 5
...The needs of the company are to have an OS that is fast, reliable, compatible, and secure. Other features that will be required are easy to maintain, upgrade, and manage. Finally the overall need is to have an OS that is good with game development. Breaking down the list of needs a reliable OS is an OS that doesn’t require frequent maintenance. Compatible is an OS that easily works with other devices, and other OS’s. OS security is very important, security is how safe are the files on the computer and what is required to access them. Speed, how fast the computer can complete a task, this will be second most important for rendering images and code for games. Looking at the needs of the company my recommendation would be for the company to run PC’s with Windows 7. I recommend this OS for several reasons: its newer, resource management, security options, very compatible, easy to maintain and upgrade. When it comes to any large task that requires a PC to be tasked, resource management is going to be crucial. In the field of game development the largest task is going to be rending and compiling the game. Both of these require lots of memory, CPU time and hard drive activity. Windows 7 can stand up to the task because of it new and improved resource management system over Vista and XP. Its more streamlined programming allows for less usage by the OS to running tasks in the background, and more integrated drivers allow for better control over the hardware and what it...
Words: 854 - Pages: 4
...Individual assignment In the world today, there are many companies and homes who own computers. Computers that store personal information, which can be stolen by hackers. It is important to install anti-virus software and ensure their personal computers are secured with passwords. In the military, they have top security firewalls, with these security measures hackers are not able to transfer personal information. Gene Spafford states, “The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards.” Spafford,G. (2012). Keeping your system updated increases the protection of important information, although it is hard to maintain a track record of updates. There are many ways to ensure the disposal of personal data is performed properly, one way to dispose data is to completely erase the information in the system and hard drive. Data storage depends on the current space of your hard drive, but it is important for security measures to be installed and updated frequently. In a computer, there is a control panel to control the users of your computer system, setting up a password for users to specifically view certain websites and also a folder in which only the authorized account holder may access. Identity theft is the most common thing that happens when information is stored without ensuring the security protection on computers are maintained and updated. As we all know your system will have many problems, there...
Words: 590 - Pages: 3
...2012 JAGANNATH UNIVERSITY DEPARTMENT OF LAW Shakil Ahmed 3rd Batch [CRIMES IN CYBER CAFÉ AND ITS RULES AND RAGULATION] The study investigates the cyber café rules around Bangladesh: law and reality. It evaluates whether the guideline for cyber café owners’ and users are properly maintained or not. This study also reveal how crime occurred on the cyber café and why and it also investigate whether the guidelines are sufficient or not. At last this study recommend some point by which we can maintain our cyber café institution properly and by how we can reduce crime occurred on the cyber café. Index Abstract ………………………………………………………………………...………. 2 2 2 2 2 2 2 2 3 5 5 5 5 6 7 8 8 9 13 14 17 17 19 1. Introductory part ………………………………………………………….……..…. 1.1 Aim of the study ……………………………………………….……….... 1.2 Object of the study ……………………………………………...……….. 1.3 Methodology ……………………………………………………….......... 2. Definition ………………………………………………………………….….......… 2.1 Cyber café ……………………………………………………….……..... 2.2 Necessity ……………………………………………………………….... 3. Amount of cyber café around Bangladesh …………………………………..………. 4. Law regarding cyber café ……………………………………………………....…… 4.1 BTRC ………………………………………………………………...….. 4.2 CCOAB …………………………………………………………….…..... 4.3 Guidelines ……………………………………………………….…..….... 4.4 Law and its Reality……………………………………………………...... 4.4.1 Reality in Dhaka………………………………………....… 4.4.2 Reality on other area ……………………………………..... 5. Crime in cyber café …………………………………………………………............. 5.1 Case...
Words: 6680 - Pages: 27
...the public offering at best value software for your computer systems. TRM Vision: To offer customers the option to highly secure information technologies to enable the efficient and effective accomplishment of software on their computer systems. TRM Strategic Goals: Goal 1: Use IT to improve TRM Business processes and customer focus Goal 2: Create a secure IT environment and computer software Goal 3: Maintain a world-class business in hiring the appropriate person for installation of software, updates and any fixing needed with the program. Goal 1: Use IT specialist to help install TRM software and customer focus. Objective 1: to have the availability of information to support our business processes, customers, and citizens in affordable and easy to manage software for their business, home and school computers. Objective 2: Achieve sales by helping customers learn the software product and how to manage programs and viruses on their computer. Objective 3: Advance in the knowledge and ability to install the software properly and in a timely manner. Objective 4: To properly provide the best customer service needed to customers and to be able to raise sales on software. Goal 1: Knowledge of TRM software and computer systems. Strategy | Target Timeline | 1 month | 2 months | 3 months | Review current knowledge of Software | | X | | | Ability to install software | | X | | | Knowledge of TRM computer systems | | | X | | | | | | | Goal 2:...
Words: 808 - Pages: 4
...Individual assignment In the world today, there are many companies and homes who own computers. Computers that store personal information, which can be stolen by hackers. It is important to install anti-virus software and ensure their personal computers are secured with passwords. In the military, they have top security firewalls, with these security measures hackers are not able to transfer personal information. Gene Spafford states, “The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards.†Spafford,G. (2012). Keeping your system updated increases the protection of important information, although it is hard to maintain a track record of updates. There are many ways to ensure the disposal of personal data is performed properly, one way to dispose data is to completely erase the information in the system and hard drive. Data storage depends on the current space of your hard drive, but it is important for security measures to be installed and updated frequently. In a computer, there is a control panel to control the users of your computer system, setting up a password for users to specifically view certain websites and also a folder in which only the authorized account holder may access. Identity theft is the most common thing that happens when information is stored without ensuring the security protection on computers are maintained and updated. As we all know your system will have many problems, there...
Words: 591 - Pages: 3
...offer advantages that cannot be obtained through the sole use of a standalone computer. There are two common types of network, Peer-to-Peer and Client/Server. Peer-to-Peer is the simpler of the two while client server remains the more complex. Both types offer advantages and disadvantages over the others. “In a peer-to-peer network, every computer can communicate directly with every other computer.” (Dean, 2010) This set-up allows for all computers to have access to each other and the same level of authority. Because of this fact no one computer can do more or less than any other computer on the network. They do, however; each have the ability to limit and share only a portion of their resources and the ability to prevent access to certain data. As they are set up directly to each other every computer has the ability to send and receive information to and from every other computer on the network. Using Peer-to-Peer networks though however does have its advantages and disadvantages. First let’s look at the advantages. The main advantage to a Peer-to-Peer network is how simple it is to configure. This allows them to be deployed in areas where high-end technical expertise may be limited. Due to this fact they can be seen in areas from local home networks to small businesses and at times even larger companies may implement them. Another advantage is that they are less expensive to both set up and maintain. This makes them more prominent in the areas described above. However Peer-to-Peer...
Words: 616 - Pages: 3
...Student Name | Annapurna Sunkara | What action is being performed (verb) | To whom/what is the action directed (receiver of the verb) | How is the action performed (procedure, tools, equipment) | Why is action performed (purpose) | Operate telephone switchboard to answer, screen and forward calls, providing information, taking messages and scheduling appointments | Customers, Clients | Telephone, e-mail | To provide information to clients and schedule appointments | Greet persons entering establishment, determine nature and purpose of visit, and direct or escort them to specific destinations | Clients, Customers | - | To assist clients and customers and to make them satisfied about the establishment | Transmit information or documents to customers, using computer, mail, or facsimile machine | Customers, Clients | Telephone, email, mail, facsimile machine | To co-ordinate the process. | Collect, sort, distribute and prepare mail, messages and courier deliveries | Customers, Clients | Mail, telephone, computer | To co-ordinate the process | Provide information about establishment such as location of departments or offices, employees within the organization, or services provided | Customers, Clients | - | To help clients in getting familiar with the establishment and clarify their queries | File and maintain records | HR manager | Data entry | For future reference | Hear and resolve complaints from customers and public | Customers | Telephone...
Words: 1977 - Pages: 8
... | | |1. 24.0 Use appropriate |Information: acquires and |Thinking Skills |Thinking Skills: students |LAFS.1112.L.3.AP.6a: Use |Standard 1 Information Manager | |verbal and written |evaluates |Thinking skills include |will think |grade-appropriate general academic and|Florida students locate, | |communications in the |information, organizes and |critical thinking, |creatively, critically, and |domain-specific words and phrases |comprehend, interpret, | |performance of nursing |maintains |problem-solving, creativity, |strategically |accurately within writing. |evaluate, maintain, and apply | |functions |information, interprets or |and innovation. These skills |to achieve goals, make |LAFS.1112.L.3.AP.6b: Use newly |information, concepts and ideas| | |communicates |involve the ability to: |effective decisions,...
Words: 780 - Pages: 4
...(verb) To whom/what is the action directed (receiver of the verb) How is the action performed (procedure, tools, equipment) Why is action performed (purpose) Maintain Personnel files alphabetically Organization Perform Administrative functions Computer Office personnel Assist Public and employees verbally Answer personnel questions Follow Company policy Mindfully Dispensing Information Process forms Review Personnel changes Monitor Staff time Time clock Payroll items Handle Directors calendar Directory Keep organization File paperwork File cabinet Keep organization Type paperwork Computer As needed Answer Incoming calls Multi-line switchboard Direct to appropriate employee Task Statements 1 Maintain personnel files alphabetically for organization. 2 Perform administrative functions with a computer for office personnel. 3 Assist public and employees verbally by answering personnel questions. 4 Follow company policy mindfully to dispense information. 5 Process forms for review of personnel changes. 6 Monitor staff time on the time clock for payroll items 7 File paperwork in a file cabinet for organization. 8 Answer incoming calls on a multi-line switchboard and direct to appropriate employee. KSA Statements: Human Resource Receptionist Student Name Dominique Jordan Task Statement Knowledge Skill Ability Background image of page 1 (copy/paste all task statements here) (cognitive skill) (learned) (competence) 1 Maintain personnel files alphabetically for organization. Knowledge of handling...
Words: 299 - Pages: 2
...Subsidiary Diploma | Unit number and title | Unit 2 – Computer Systems | Assignment number and title | 1 – Components of a computer system | Start date | 21/9/15 | Hand in date | 1/11/15 | Assessor | WMG | Scenario You are a junior technician in a small business and you are responsible for the IT. The business has 10 computers in all comprised of desktop computers and a server. There are six employees based in the Head Office and your company have taken on a junior employee called Jamil who will be expected to help you out perform basic administrative tasks in the office as well as maintain the ICT systems. Task 1 – Computer hardware components You need to make sure Jamil has a reference guide for the machines in the business to help him understand the environment he will be working in and in case any components fail. You need to put together a presentation slideshow on internal computer components. a) You need to explain the function of internal hardware components of a computer b) Discuss how the components communicate with one another The components are: * Processor * RAM * Hard drive * Power supply unit * Fan * Heatsink * Motherboard * Graphic card and sound cards * CD/DVD drive This task will allow you to provide evidence for: P1 - Explain the function of computer hardware components Task 2 – Jamil asks for advice Jamil is about to buy a new computer and tablet but wants to understand the differences...
Words: 737 - Pages: 3
...Computing BTEC Level 3 90-credit Diploma In Information Technology (QCF) Unit no: 2 | Learner group: C2250, C0183, C0177, C0186, C0184, C0185, | Unit title: Computer Systems | Learner name: | Date issued: W/C 26th January 2016 | Assessor name: Mark Dollan | Completion date: W/E 1st Feb 2016 | Written by: M Dollan | Submitted on: | Verified by: Karl Indans | Assignment title: System Software & Configuration (ref: L3-CS02) | In this assessment you will have opportunities to provide evidence against the following criteria. Indicate the page numbers where the evidence can be found also PPD (Personal and Professional Development) and EE | Grading Criteria | Criteria ref | To achieve the criteria the evidence must show that the student is able to: | Task | Evidence | Page | P2 | Explain the purpose of operating systems | 1 | Written | | P3 | Explain the purpose of different software utilities | 3 | Written | | P6 | Configure a computer system to meet user needs | 5 | Practical | | P7 | Test a configured computer system for functionality | 6 | Practical | | M1 | Compare the features and functions of different operating systems | 2 | Written | | M3 | Evaluate the performance of a computer system | 7 | Written | | D1 | Explain how software utilities can improve the performance of computer systems | 4 | Written | | This is an official course assessment and you must make a good attempt at all criteria available, you must also make sure that...
Words: 2093 - Pages: 9