...Palmer AC1305985 EN130.1.1 English Comp II Assignment # 4 September 27, 2013 How to properly maintain a personal computer In order for a personal computer to stay fast and be reliable, it must be properly maintained. A computer can stay in good condition if it is well taken care of. Common sense and the knowhow can keep your computer running smoothly for many years. We know dust and bacteria are things we cannot avoid, for this reason we need to constantly dust our homes. Well it goes the same for a computer. Dusting the mouse, keyboard, and the screen keeps your computer running faster. Every few months it’s also good to open the casing of the computer and remove any dust particles inside to keep the cooling fan functioning properly. The hard drive is main part of a PC. It is where all the files are stored; therefore, cleaning the hard drive and defragmenting it is necessary to keep the computer from slowing down and freezing up. To do this process, just go into your computers programs, find accessories and click to system tools. Go to defragment and start the process. This should be done every two to three months to keep your computer in top shape. Be sure you have good antivirus software installed in your computer and make sure it is always updated. Viruses are among one of the main causes of computer failure. You should do a complete virus scan on your computer regularly. Also a good way to avoid viruses is to avoid visiting websites that are...
Words: 557 - Pages: 3
...the world today, there are many companies and homes who own computers. Computers that store personal information, which can be stolen by hackers. It is important to install anti-virus software and ensure their personal computers are secured with passwords. In the military, they have top security firewalls, with these security measures hackers are not able to transfer personal information. Gene Spafford states, “The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards.” Spafford,G. (2012). Keeping your system updated increases the protection of important information, although it is hard to maintain a track record of updates. There are many ways to ensure the disposal of personal data is performed properly, one way to dispose data is to completely erase the information in the system and hard drive. Data storage depends on the current space of your hard drive, but it is important for security measures to be installed and updated frequently. In a computer, there is a control panel to control the users of your computer system, setting up a password for users to specifically view certain websites and also a folder in which only the authorized account holder may access. Identity theft is the most common thing that happens when information is stored without ensuring the security protection on computers are maintained and updated. As we all know your system will have many problems, there will be people out in...
Words: 590 - Pages: 3
...the world today, there are many companies and homes who own computers. Computers that store personal information, which can be stolen by hackers. It is important to install anti-virus software and ensure their personal computers are secured with passwords. In the military, they have top security firewalls, with these security measures hackers are not able to transfer personal information. Gene Spafford states, “The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards.†Spafford,G. (2012). Keeping your system updated increases the protection of important information, although it is hard to maintain a track record of updates. There are many ways to ensure the disposal of personal data is performed properly, one way to dispose data is to completely erase the information in the system and hard drive. Data storage depends on the current space of your hard drive, but it is important for security measures to be installed and updated frequently. In a computer, there is a control panel to control the users of your computer system, setting up a password for users to specifically view certain websites and also a folder in which only the authorized account holder may access. Identity theft is the most common thing that happens when information is stored without ensuring the security protection on computers are maintained and updated. As we all know your system will have many problems, there will be people out in...
Words: 591 - Pages: 3
...C0177, C0186, C0184, C0185, | Unit title: Computer Systems | Learner name: | Date issued: W/C 26th January 2016 | Assessor name: Mark Dollan | Completion date: W/E 1st Feb 2016 | Written by: M Dollan | Submitted on: | Verified by: Karl Indans | Assignment title: System Software & Configuration (ref: L3-CS02) | In this assessment you will have opportunities to provide evidence against the following criteria. Indicate the page numbers where the evidence can be found also PPD (Personal and Professional Development) and EE | Grading Criteria | Criteria ref | To achieve the criteria the evidence must show that the student is able to: | Task | Evidence | Page | P2 | Explain the purpose of operating systems | 1 | Written | | P3 | Explain the purpose of different software utilities | 3 | Written | | P6 | Configure a computer system to meet user needs | 5 | Practical | | P7 | Test a configured computer system for functionality | 6 | Practical | | M1 | Compare the features and functions of different operating systems | 2 | Written | | M3 | Evaluate the performance of a computer system | 7 | Written | | D1 | Explain how software utilities can improve the performance of computer systems | 4 | Written | | This is an official course assessment and you must make a good attempt at all criteria available, you must also make sure that you meet the deadline stated and hand in this assessment brief with your completed assessment Learning Outcomes: ...
Words: 2093 - Pages: 9
...2012 JAGANNATH UNIVERSITY DEPARTMENT OF LAW Shakil Ahmed 3rd Batch [CRIMES IN CYBER CAFÉ AND ITS RULES AND RAGULATION] The study investigates the cyber café rules around Bangladesh: law and reality. It evaluates whether the guideline for cyber café owners’ and users are properly maintained or not. This study also reveal how crime occurred on the cyber café and why and it also investigate whether the guidelines are sufficient or not. At last this study recommend some point by which we can maintain our cyber café institution properly and by how we can reduce crime occurred on the cyber café. Index Abstract ………………………………………………………………………...………. 2 2 2 2 2 2 2 2 3 5 5 5 5 6 7 8 8 9 13 14 17 17 19 1. Introductory part ………………………………………………………….……..…. 1.1 Aim of the study ……………………………………………….……….... 1.2 Object of the study ……………………………………………...……….. 1.3 Methodology ……………………………………………………….......... 2. Definition ………………………………………………………………….….......… 2.1 Cyber café ……………………………………………………….……..... 2.2 Necessity ……………………………………………………………….... 3. Amount of cyber café around Bangladesh …………………………………..………. 4. Law regarding cyber café ……………………………………………………....…… 4.1 BTRC ………………………………………………………………...….. 4.2 CCOAB …………………………………………………………….…..... 4.3 Guidelines ……………………………………………………….…..….... 4.4 Law and its Reality……………………………………………………...... 4.4.1 Reality in Dhaka………………………………………....… 4.4.2 Reality on other area ……………………………………..... 5. Crime in cyber café …………………………………………………………............. 5.1 Case...
Words: 6680 - Pages: 27
...Write a letter calling for Quotation for some electronic equipment for your college electronics laboratory. Write to M/S Electro products Ltd., R.G.Road, Chennai – 33. Assume that you are the H.O.D of ECE department in NIT - Chennai-16 National institute of technology Chennai-16 Date…………. To M/S Electro products Ltd., R.G.Road, Chennai – 33. Dear Sir, Sub: calling for quotation – reg. We require the following items for our concern before 16-05-2013. The details of our requirement are given below. S.No. | Items | Quantity | 1. | Function generator | 2 Nos | 2. | Multi meter | 2 Nos | 3. | IC Chips LM 339 | 3 Nos | 4. | IC Chips LM 7400 | 3 Nos | 5. | Diode IN 4007 | 20 Nos | We request you to quote your lowest price with complete details and delivery date. If your rates are competitive we would place an order for the same. Thanking you Yours faithfully, (k.subash) Prof. & Head of ECE Calling for quotation Sample 2 Assume yourself to be the purchase officer Royal Foundations Pvt. Ltd., Write a letter calling for Quotation to buy certain computer peripherals from Alpha technologies Pvt. Ltd., 25,Gandhi Street, Chennai. 25 Royal Foundations Pvt. Ltd. Chennai-25 Date…………. To Alpha technologies Pvt. Ltd., 25,Gandhi Street, Chennai. 25 Dear Sir, Sub: calling quotation for computer peripherals – reg. We require the following items for our concern before...
Words: 1752 - Pages: 8
...1.1 Computer viruses are illegal computer codes or programs embedded into an executable file that, when ran, can spread infections that alter programs or destroy data without your knowledge. They can copy themselves onto programs, thereby spreading its damaging effects. 1.2 The types of viruses include: Boot sector viruses which are programs that initialize in the operating system and infect the boot sector on floppy disks and hard drives and can damage the whole computer system from the moment the computer is switched on. Polymorphic viruses that mutate overtime and may guard itself with an encryption that automatically alters itself when certain conditions are met. This makes it harder to detect. Resident viruses are those that insert itself into the memory...
Words: 1861 - Pages: 8
...Subsidiary Diploma | Unit number and title | Unit 2 – Computer Systems | Assignment number and title | 1 – Components of a computer system | Start date | 21/9/15 | Hand in date | 1/11/15 | Assessor | WMG | Scenario You are a junior technician in a small business and you are responsible for the IT. The business has 10 computers in all comprised of desktop computers and a server. There are six employees based in the Head Office and your company have taken on a junior employee called Jamil who will be expected to help you out perform basic administrative tasks in the office as well as maintain the ICT systems. Task 1 – Computer hardware components You need to make sure Jamil has a reference guide for the machines in the business to help him understand the environment he will be working in and in case any components fail. You need to put together a presentation slideshow on internal computer components. a) You need to explain the function of internal hardware components of a computer b) Discuss how the components communicate with one another The components are: * Processor * RAM * Hard drive * Power supply unit * Fan * Heatsink * Motherboard * Graphic card and sound cards * CD/DVD drive This task will allow you to provide evidence for: P1 - Explain the function of computer hardware components Task 2 – Jamil asks for advice Jamil is about to buy a new computer and tablet but wants to understand the differences...
Words: 737 - Pages: 3
...paper will discuss the benefits and uses of virtual memory. Programs require memory to start and run on computers. When several jobs are being processed at the same time, the operating system must keep track of how the computer’s memory and make sure there is enough. Computers come with a limited amount of random access memory which is known as RAM. RAM is the main memory on a computer. If a user is running multiple applications at the same time, the RAM on it will not be enough to execute the processes. This is when virtual memory comes in and balances the process. Virtual memory is a memory management technique. Virtual memory is secondary memory that can act as if it were part of the main memory. When the RAM is used up, virtual memory places data by using the hard disk or another disk of some kind for space. The hard disk is much slower then RAM so the more virtual memory used, the slower your computer will run. The computer will look for areas on the RAM that are not in use and copy it to the hard disk to free up space on the RAM. Virtual memory keeps ‘active’ process in the RAM and keeps the ‘inactive’ processes on the address space on the disk. When an ‘inactive’ process is needed, it will bring that process back to the RAM from the disk. This process is running in the background without the user being aware. The disk runs much slower so the more RAM a computer has, the fast it will run. When using multiple or large applications, it is best to have as much physical...
Words: 788 - Pages: 4
...help us to develop and maintain software developments here are some questions that should be asked. 1. Which of your departments would need which of the different kind of software that we have? 2. What is the software that you would need to be distributed to the different departments from question 1? 3. Would you need them to be option or mandatory software updates? 4. Would there be any exceptions to the group that I assign the updates too. In other words is there anyone that you do not want to get the software? 5. Could I get a list of all you users and how many computers that the software updates will affect? 6. How often would you like the software deployed and how often is the systems backed up. 7. What kind of computer virus protection do you have? 8. How often would you like the software to be updated? 9. Do you have anyone that I could add to the administrator list that could help with the Maintenance of the software application? 10. Is there any software that you would like to be removed from your system and what is the name of said software? Hope this helps let me know if I can help you out anymore yours truly Sherry Thornton Dear Mr. Manager I have reviewed you following email and this is what I would do to I would make sure know of your computer have windows XP as a operating system let me know I could update them for you. Also I would use group policies to set it up where the computers that you need updated would...
Words: 726 - Pages: 3
...SUPPORT@ACTIVITYMODE.COM SEC 402 WK 7 CASE STUDY 2 DEVELOPING THE FORENSICS SEC 402 WK 7 Case Study 2 - Developing the Forensics, Continuity, Incident Management, and Security Training Write a five to seven (5-7) page paper in which you: 1. Consider that Data Security and Policy Assurance methods are important to the overall success of IT and Corporate data security. a. Determine how defined roles of technology, people, and processes are necessary to ensure resource allocation for business continuity. b. Explain how computer security policies and data retention policies help maintain user expectations of levels of business continuity that could be achieved. c. Determine how acceptable use policies, remote access policies, and email policies could help minimize any anti-forensics efforts. Give an example with your response. 2. Suggest at least two (2) models that could be used to ensure business continuity and ensure the integrity of corporate forensic efforts. Describe how these could be implemented. 3. Explain the essentials of defining a digital forensics process and provide two (2) examples on how a forensic recovery and analysis plan could assist in improving the Recovery Time Objective (RTO) as described in the first article. 4. Provide a step-by-step process that could be used to develop and sustain an enterprise continuity process. More Details hidden... Activity Mode aims to provide quality study notes and tutorials to the students of SEC 402 WK 7 Case Study 2...
Words: 1406 - Pages: 6
...Samsung Segmentation and Target Market Paper Positioning Statement The world has started to take on a healthier lifestyle. Watching what we eat and making sure to incorporate physical activity daily. In order to maintain these numbers many people have started to use technology to record the calories burned as well as monitor their heart rate while working out. Most people have a heart rate monitor and then have to record their information manually to another program in order to keep track of how well they are doing. Samsung has met with this issue by including a Smart watch called the Gear and the Gear Fit in which connects to its Samsung Galaxy 5 and automatically records information from your work out. The company has also included many other features that go along with the use of both its smart phone the Galaxy 5 and its Smart Watch the Gear and Gear Fit. Samsung has cornered the market with this innovative smart watch introducing a new way to stay fit and get healthy and making it easier to maintain records of all of your fitness endeavors. “Introducing Samsung’s first network-connected wearable.** So now you can make and answer calls when your phone isn’t nearby. You can also check texts, emails, updates— even stream and listen to music, right from your wrist.” (Samsung, 2014) Background “At Samsung, we follow a simple business philosophy: to devote our talent and technology to creating superior products and services that contribute to a better global society....
Words: 3181 - Pages: 13
..."How will Computer Information Systems fit into your professional life?" 1 "How will Computer Information Systems fit into your professional life?" Nicholas M. Hayes DeVry University 29 May 2015 "How will Computer Information Systems fit into your professional life?" 2 Computer Information Systems' mission is to develop, market, deliver and maintain seamlessly integrated, mission critical public safety software systems that will be continually enhanced to keep current with emerging Windows Technology and protect the agency's investment. To start off with an explanation how Computer Information Systems will fit into my professional life I'd like to discuss the basic concept behind what CIS is. Computer Information Systems program graduates and experts study the applications of technology aiding a variety of organizations while adding value to their offerings. To be able to apply technological efficiency, students and experts learn about multiple subjects. These subjects include but are not limited to ethics, communication, networking, software design, mathematics and systems analysis. I believe that the biggest impact that Computer Information Systems will have on my professional life would be focusing on practical applications of technology as it's used in many jobs and a good skill to have. Computer Information Systems will aid and fit into my professional life by making my life more on the interesting side and keep me up to date with all technological and...
Words: 441 - Pages: 2
...CIS 150 – Introduction to Computer Applications Computer Concepts Class Notes These notes are to accompany the Computer Concepts PowerPoint presentation. Please refer to these notes when viewing the presentation. Slides 2 & 3 identify the major objectives of this presentation and these notes. Slide 4: A computer is defined as an electronic device that operates under the control of internally stored instructions that can accept input, process data (both mathematical processes and logical processes), produce output, and store the results. Basically, a computer transforms data into information. There are 4 General Operations of a Computer (based on this definition): 1) Input Data is input into the computer. Data is the numbers, words, images, etc. that are given to the computer during the input process. Data is input using Input Devices: keyboard, mouse, joystick, touch screens, etc. 2) Process This is the manipulation of the data to create useful information. Data is processed very quickly within the computer, within billionths of a second. Once the raw facts are processed into a meaningful form it is called information. Computer processing is accomplished through the CPU (Central Processing Unit). The CPU interprets the instructions for the computer. It performs all logical and arithmetical operations as well as causes all input and output to occur. The CPU is contained on a Microprocessor chip. 3) Output ...
Words: 2871 - Pages: 12
...INTRODUCTION Accountants measure a business entity's income, expenses and changes resources. Back in the day, prior to the widespread use of spread sheet and computer applications, Accountants used journals and ledgers in which they recorded business transactions. Hence the term keeping the books. As computer applications became main stream, this keeping of the books Accountants do, has gradually migrated into computerized spreadsheets. Gradually, Accounting systems dedicated to this function were developed and the term Computerized Accounting was born ADVANTAGES * Faster and efficient in processing of information; * Automatic generation of accounting documents like invoices, cheques and statement of account; * With the larger reductions in the cost of hardware and software and availability of user-friendly accounting software package, it is relatively cheaper like maintaining a manual accounting system; * More timely information can be produced; * No more manual processing of the data- all automatically been posted to the various ledgers/accounts and * Many types of useful reports can be generated for management to make decisions 12.3 NEED AND REQUIREMENTS OF COMPUTERSIED ACCOUNTING The need for computerised accounting arises from advantages of speed, accuracy and lower cost of handling the business transactions. l Numerous Transactions The computerised accounting system is capable of handling...
Words: 1703 - Pages: 7