You are on page 1of 11

TERM PAPER

Of
Operating system
TOPIC:- What should be done for proper working of
your computer system? Give general guidelines.

Submitted By:- Submitted


To:-
1.)Introduction:- Frequent reads and write to a diskette can
wear out quickly . Keepp diskette away
It is important to learn that how to protect from heat, moisture and magnetic fields.
and care for a computer and protect the Some common source of magnetic fields
personal information that is stored on the are phones,sound speakers, car alarm
computer and the service we use. This activators and laser printers. Another way
term paper offers some valuable tips on to safeguard your data is to run error
how to care for your computer and the checking utility provided by your
services you use. This gives some operating system. This software is
important guidelines for the proper designed to find surface damage and data
working of a computer system. corruption on hard drive. Mny companies
sell programs that can maintain, optimize
Electrical fluctuations pose a significant and safeguard the data on your system.
threat to your system and mostly cause of You can find these types of system utilities
data loss and burned out components. You and programs in any computer store or
can protect your system from such bookstore. Computer virses are easily
fluctuations in several ways: never plug spread from system to system when you
your system directly into a power outlet. share information with other system. Take
Be sure your surge protector includes a protactive approach . it is much easier to
enough outlets for all peripherals and prevent contracting a virus than it is to
modem jack. Modem are very susceptible remove it. Use anti-virus on your
to power surges and destroyed often by computer. Most anti-virus provide both
surges coming through the phone lines detection and removal. The anti-virus
instead of power outlet. Unplug your software must be updated time to time to
system during lighting storms, even if it is detect new virus.
surge protected. Uninterruptable Power
Supply (UPS) is very helpful for your
system. It can provide several minutes
worth of power in case of power failure. 2.)Proper computer care:-
Most of UPS also work as a surge
protector. Computers will work properly for a very
The information that you store or put into long time if they are properly cared for. A
your system represents your time nad frequently asked questionc is “How can I
efforts. Here are some suggestions to do care for my computer properly?”
protect your files: the generalrule to
protect your data is simple –always The steps for care of computer are very
maintain backups. It is teh simplest way to simple, and I will cover good steps to keep
save your data or work to more locations the hardware and software of your
as to a diskette and to hard drive. CD- computer running smoothly in this term
ROM or personal file storage on another paper:-
comuter are other alternatives for file
backup purposes. In most cases, it is legal, One of the best things a computer owner
for backup purpose only, to make one copy can do is protect their hardware, and
of purchased software. Don’t use diskette prevent physical damage to the computer.
as working as working media-that is work Damage to your computer’s hardware can
on file while it is on the hard drive , then result in very costly repairs, or a need to
transfer it to a diskette when done. replace the whole machine.
A few simple steps: enough force to create a gyroscopic
effect, and if the computer is
1.) Do not leave your laptop power moved, the little heads that read the
cable where it can be kicked, or data can strike the platters, causing
stepped on. This can cause a damage to the drive. Close your
variety of problems, ranging from a laptop, or power down your
broken internal power jack to a external drive before moving it.
computer falling off a desk and
becoming an expensive 5.) Keep your laptop on a hard
paperweight. Be mindful of surface! As tempting as it can be to
children and pets when placing the set your laptop on your bed, and
cable. The cable usually runs surf away. We recommend that
directly into the motherboard, and laptop computers always sit on a
is best left un-tampered with. hard surface for two reasons. One
is that allowing a laptop to sink
2.) Keep drinks and other liquids into a bed can cover the fan grills,
away from your computer, and cause overheating, and a loss
specially when you are using a of airflow.
laptop or notebook. A liquid spill
into your computer can cause
irreversible damage to many
components, and can result in an The other important piece of the puzzle is
extremely expensive repair or taking good care of the software. This can
replacement. It is specially be done in a few simple steps:-
worthwhile to note that all of the
important inner workings of a 1.) Always shut down your computer
laptop sit directly below the properly, whenever at all possible – This is
keyboard, so a coffee spill on the one of the best ways to prevent data
keyboard of a laptop can be corruption, and windows issues.
devastating.
2.) If the computer locks up, give it a
good 30 seconds to think before taking any
drastic measures.
3.) Keep your computer clean. It is
good to blow out the fans and grills 3.) Uninstall programs that you no longer
on any computer about once a use. If a program has been sitting for
month. Less built up dust means months on your computer without any
better airflow through the attention, it is probably a good idea just to
computer, and a more reliable, get rid of it. You can almost always
cooler running system. If your reinstall it again if you need it, and it wont
computer has an air filter, this muck things up any if it is not there.
should also be cleaned or changed
monthly. 4.) Re-start your computer at least once a
week. If you have a desktop computer that
4.) Don’t move your computer if it is is almost always on, it can be good for the
turned on! This goes for external system to re-start time to time. This also
hard drives as well. Most goes for laptops that are kept in standby.
computers contain a hard drive that
uses spinning metal platters to store
data. These platters spin with
3.)Securing Of Computer we’ll talk about two topics: trust and
information in the clear as it crosses the
System:- Internet.
Think of your computer as you would your
4.1.) Trust:-
house or your apartment. What do you
Human beings are trusting by nature. We
know about how that living space works,
trust much of what we hear on the radio,
what do you routinely do to keep it secure,
see on television, and read in the
and what have you installed to improve its
newspaper. We trust the labels on
security
packages. We trust the mail we receive.
We trust our parents, our partner or
You know that if you have a loud
spouse, and our children. We trust our co-
conversation, folks outside your space can
workers.
probably hear you. You also routinely lock
the doors and close the windows when you
Only within the last few years, when
leave, and you don’t give the keys to just
Internet commerce began to spread, it has
anyone. Some of you may install a security
become inadequate to rely principally on
system to complement your practices. All
trust. Since the days of the ARPAnet,
of these are part of living in your home.
we’ve changed the way we use computer
networks while others have changed the
Let’s now apply similar thinking to your
underlying technologies, all in an attempt
home computer. Email, instant messaging
to improve the security of the Internet and
and most web traffic go across the Internet
the trust we place on it.
in the clear, that is, anyone who can
capture that information can read it. These
Let’s dig deeper into two examples of
are things you ought to know. You should
what we trust in our daily lives. When you
always select and use strong passwords
receive mail through the post office, many
and exercise due care when reading all
envelopes and the letters in them contain
email, especially the unsolicited variety.
the sender’s address. Have you ever
Finally, you can add a firewall, an anti-
wondered if those addresses were valid,
virus program, patches, and file encryption
that is, do they match the address of the
to improve the level of security on your
person or persons who really sent them?
home computer.
While you could check to see that those
addresses are valid and refer to the person
they name, it’s not an easy task.
The rest part of this term paper describes
How would you go about it? Would you
the things you want to know, do, and
call the phone number provided with the
install to improve the security and
letter? That number could also be invalid,
working of your system:-
and the person that answers the phone
could be as misleading as the original
4.)Important Things:- address. Perhaps you could call directory
assistance or the police department that has
One starting point for solving computer jurisdiction over the town where the letter
security problems is being aware of how was supposedly from. They might be
the Internet and some of its technologies helpful, but that is likely to take lots of
work. If you know how they work, you time. Most people wouldn’t bother.
can evaluate solutions to the problems that
comes. You can also use the Internet more And it’s not just return addresses either.
safely and responsibly. In this section, How about advertisements, news stories,
or the information printed on groceries? windows open, even passersby can hear. If
Suppose you were on a low-fat diet. You’d you want privacy, you and your
want to buy foods low in fat. To select the conversation partner need to go to another
right foods, you’d read the product label at room and close the doors and windows.
the grocery store. How do you know that
the label information is valid? What’s to The Internet works much the same way,
say it’s not forged? And how would you except the room is much, much bigger.
know? When you send email, browse a web site,
or chat online with someone, the
The Internet has many of the same issues, conversation between you and that person
and email is one of the best examples. In does not go directly from your computer to
an email message, an intruder can easily his or her computer. Instead, it goes from
fabricate where the came from. But this your computer to another computer to still
information forging – called spoofing by another computer and so on, eventually
intruders and security professionals – is reaching his or her computer. Think of all
not limited to just email. In fact, the basic of these computers as an Internet “room.”
unit of information transferred on the
Internet – called a packet – can also be Anyone, or, more accurately, any program,
easily forged or spoofed. in that Internet room that can hear that
conversation can also probably understand
What does this mean and why should you it. Why? Because just like the conversation
care? It means that any information you at home, most Internet conversations are in
receive from some other computer on the the clear, meaning that the information
Internet should not be trusted exchanged between computer systems is
automatically and unconditionally. When not concealed or hidden in any way.
you trust an email message that turns out
to have a harmful virus attached to it, your Again, this is how the Internet works. You
computer can be infected, your files need to know that the information sent
destroyed, and your work lost. And that’s across the Internet may be at risk of others
why you should care. listening in, capturing what you send, and
using it for their own benefit.
This is how the Internet works. It was built
on trust. Over time, there have been 5.)Install and Use Anti-
technological changes that are worthy of a
higher level of our trust than before. Virus:-
Nonetheless, a true sense of insecurity is
better than a false sense of security. So, If someone rang your doorbell and wanted
think about the information you trust. Be to come into your home to sell you
critical and cautious. something or to use something, you would
need to make a decision whether or not to
let them in. If they were a neighbor or
someone you know, you would probably
let them in. If you didn’t know them but
4.2) Information in the Clear:- believed their story and found them to be
otherwise acceptable, say they were neat
and clean and not threatening, you would
When you have a conversation with probably also let them in, but you would
someone in your living space, everybody watch them closely while they were in
within earshot can hear the words and your space.
probably understand them. If your
conversation is especially loud and your
Anti-virus programs work much the same you’d try not to upset them. You would
way. These programs look at the contents politely listen to their story and then send
of each file, searching for specific patterns them on their way. After you closed the
that match a profile – called a virus door, you may call the police or the
signature of something known to be telephone number given in the report that
harmful. For each file that matches a initially brought them to your attention.
signature, the anti-virus program typically
provides several options on how to With viruses, you have the chance to react
respond, such as removing the offending to them when they have been discovered
patterns or destroying the file. on your home computer. Depending upon
the specific characteristics of the virus,
To understand how anti-virus programs you might be able to clean the infected
work, think about scam artists – people file. Or you might be forced to destroy the
who visit your home to try to get you to file and load a new copy from your
buy a phony product or service, or to let backups or original distribution media.
them in. Once inside, they may try to steal Your options depend upon your choice of
your valuables or try to harm you in some anti-virus program and the virus that’s
way. been detected.

There are a variety of ways you might find In your home, you look at those who come
out about a specific scam artist lurking in to your door and you look at what you
your neighborhood. Perhaps you see a receive in the mail. These are two of the
television report or read a newspaper ways that items can get into your living
article about them. They might include space, so you examine them, sometimes
pictures and excerpts of the story the scam closely, sometimes not.
artist uses to scam their victims. The news
report gives you a profile of someone you Viruses can reach your computer in many
need to be on the lookout for. You watch ways, through floppy disks, CD-ROMs,
for that person until either the story fades email, web sites, and downloaded files. All
away or you hear that they have been need to be checked for viruses each time
caught. you use them. In other words, when you
insert a floppy disk into the drive, check it
Anti-virus programs work much the same for viruses. When you receive email, check
way. When the anti-virus program vendors it for viruses .When you download a file
learn about a new virus, they provide an from the Internet, check it for viruses
updated set of virus signatures that include before using it. Your anti-virus program
that new one. Through features provided may let you specify all of these as places
by the updated anti-virus program, your to check for viruses each time you operate
home computer also automatically learns on them. Your anti-virus program may
of this new virus and begins checking each also do this automatically. All you need to
file for it, along with checking for all the do is to open or run the file to cause it to
older viruses. However, unlike scam be checked.
artists, viruses never completely fade
away. Their signatures remain part of the Just as you walk around your living space
master version of all virus signatures. to see if everything is OK, you also need to
“walk” around your home computer to see
Suppose a scam artist was at your front if there are any viruses lurking about. Most
door. What would you do? Perhaps you anti-virus programs let you schedule
would not encourage them to come in nor periodic exams of all files on your home
buy their product but, at the same time, computer on a regular basis, daily for
example. If you leave your computer 5. The Heuristics test: Does
turned on over night, think about the virus checker do
scheduling a full-system review during heuristics tests? How are
that time. these defined?

Some anti-virus programs have more These tests, the DURCH tests , help you
advanced features that extend their compare anti-virus programs. Once you
recognition capabilities beyond virus have made your selection, install it and use
signatures. Sometimes a file won’t match all of its capabilities all of the time.
any of the known signatures, but it may
have some of the characteristics of a virus. 6.)System Patch:-
This is comparable to getting that “there is
something not quite right here, so I’m not
Most vendors provide patches that are
going to let them in” feeling as you greet
supposed to fix bugs in their products.
someone at your door. These heuristic
However, sometimes a patch fixes one
tests, as they’re called, help you to keep up
problem causes another. For example, did
with new viruses that aren’t yet defined in
you ever have a repairperson fix an
your list of virus signatures.
appliance but in the process, they
scratched the floor or damaged a
An anti-virus program is frequently an
countertop during their visit? The repair
add-on to your home computer, though
cycle for a computer have to be repeated
your newly purchased computer might
until a patch completely fixes a problem.
include a trial version. At some point, say
after 60 days, you must purchase it to
Vendors often provide free patches on
continue using it. To decide whether to
their web sites. When you purchase
make that purchase or to look elsewhere,
programs, it’s a good idea to see if and
use these steps for evaluating anti-virus
how the vendor supplies patches, and if
programs:
and how they provide a way to ask
questions about their products. Just as
1. The Demand test: Can
appliance vendors often sell extended
you check a file on demand,
warranties for their products, some
for example, when you
software vendors may also sell support for
want to send an attachment
theirs.
as part of the KRESV tests?
2. The Update test: Can you
Have you ever received a recall notice for
update the virus signatures
your car or another product you’ve
automatically? Daily
purchased? Vendors send these notices to
updation is best.
product owners when a safety-related
3. The Respond test: What
problem has been discovered. Registering
are all the ways that you
your purchase through the warranty card
can respond to an infected
gives the vendor the information they need
file? Can the virus checker
to contact you if there is a recall.
clean a file?
4. The Check test: Can you
check every file that gets to Program vendors also provide a recall-like
your home computer, no service. You can receive patch notices
matter how it gets there, through email by subscribing to mailing
and can those checks be lists operated by the programs’ vendors.
automated? Through this type of service, you can learn
about problems with your computer even
before you discover them and, hopefully, be a problem. You need to
before intruders have the chance to exploit know what your computer
them. Consult the vendor’s web site to see provides so that you can
how to get email notices about patches as undo a patch if necessary.
soon as they’re available.

When you find a patch on the vendor’s site


or you receive notice that a patch is 7.) Install and Use Firewall
available then follow the steps below to Program:-
evaluate a patch before you install it:
Firewall acts like a guard when it looks at
1. The Affected test: Does network traffic destined for or received
this patch affect one of the from another computer. The firewall
programs on your determines if that traffic should continue
computer? If it doesn’t on to its destination or be stopped. The
affect your computer, firewall is important because it keeps the
you’re done. unwanted out and permits only appropriate
2. The Break test: Can you traffic to enter and leave the computer.
tell from the vendor’s web
site or the patch’s To do this job, the firewall has to look at
description if installing it every piece of information – every packet
breaks something else that – that tries to enter or leave a computer.
you care about? If Each packet is labelled with where it came
installation does break from and where it wants to go. Some
something, then you have to packets are allowed to go anywhere, while
decide how to proceed. Try others can only go to specific places. If the
notifying the vendor of the firewall allows the packet to proceed, it
program that might break to moves the packet on its way to the
learn what their strategy is destination. In most cases, the firewall
for addressing this problem. records where the packet came from,
Also, use your web browser where it’s going, and when it was seen.
to learn if anyone else has
experienced this problem Here is a set of steps for gathering
and what he or she did information and programming your
about it. firewall:-
3. The Undo test: Can you
undo the patch? That is, can 1. The Program test: What’s
you restore your computer the program that wants to
to the way it was before make a connection to the
you installed the patch? Internet? Although many
Vendors are building most programs may need to make
patches with an uninstall the same type of connection
feature that enables you to to the same Internet
remove a patch that has destination, you need to
unwanted consequences. In know the name of each.
addition, some computers Avoid general rules that
also come with features that allow all programs to make
help you restore them to a a connection. This often
previously known and results in unwanted and
working state should there unchecked behavior.
2. The Location test: What’s The files you select are
the Internet location of the those that you can neither
computer system to which easily recreate nor reinstall
your computer wants to from somewhere else, such
connect? Locations consist as the CD-ROMs or the
of an address and a port floppy disks that came with
number. Sometimes a your computer.
program is allowed to
connect to any Internet Be realistic. That check
location, such as a web register you printed does
browser connecting to any not constitute a backup
web server. Again, you from which you can easily
want to limit programs so recreate the files needed by
that they only connect to your checking account
specific locations where program. You’re probably
possible. not going to re-enter all that
3. The Allowed test: Is this data if the files are
connection allowed or destroyed. Just as you
denied? Your firewall rules protect your irreplaceable
will contain some of each. valuables, back up the files
4. The Temporary test: Is you cannot replace easily.
this connection temporary
or permanent? For example, 2. The Often question: How
if you’re going to connect often should you back them
to this specific location up? In the best of all cases,
more than five times each you should back up a file
time you use the computer, every time it changes. If
you probably want to make you don’t, you’ll have to
the connection permanent. reintroduce all the changes
This means that you ought that happened since your
to add a rule to your last backup. You need to
firewall rules. If you aren’t store your files safely after
going to make this every use .
connection often, you 3. The Media question:
should define it as Where should you back
temporary. them up to that is what
media should you use to
hold backed up files? The
answer is- whatever you
have. It’s a question of how
many of that media you
8.) Backups of Important Files have to use and how
convenient it is. For
and Folders:- example, most computers
have a floppy disk drive.
Ask these questions to decided what to do You could back up your
about backing up files on your computer: - irreplaceable files to
floppies. That process just
1. The Files question: What takes lots of time and may
files should you back up? not be as convenient as
using another media. Larger No matter how you acquire a program, it
capacity removable disk runs on your computer at the mercy of the
drives and writable CD- program’s author. Anything, any
ROMs also work well, take operation, any task that you can do, this
less time, and are more program can also do. If you are allowed to
convenient. remove any file, the program can too. If
4. The Store question: Where you can send email, the program can too.
should you store that media If you can install or remove a program, the
once it contains your program can too. Anything you can do, the
backed up files? No matter intruder can do also, through the program
how you back up your files, you have just installed and run.
you need to be concerned
about where those backed Apply these same practices when you buy
up copies live. You already a program:-
know that intruders try to
break into your home  Learn as much as you can
computer to gain access to about the product and what
your files and your it does before you purchase
computer’s resources. it.
Another way to gain access  Understand the refund or
to the same information is return policy before you
by stealing your backups. It make your purchase.
is more difficult, though,  Buy from a local store that
since a robber must you already know or a
physically be where your national chain with an
backups are, whereas an established reputation.
intruder can access your
home computer from To decide if you should install and run a
literally anywhere in the program on your home computer, follow
world. The key is to know these steps:
where the media is that
contains your backed up 1. The Do test: What does the
files. program do? You should be
able to read a clear
9.) Care When Downloading description of what the
and Installing Programs:- program does. This
description could be on the
Internet is not the same. There are neither web site where you can
standards nor many certification download it or on the CD-
organizations. Anyone who writes a ROM you use to install it.
program can distribute it through any You need to realize that that
means available, such as through if the program was written
with malicious intent, the
the web or by sending you a copy. author/intruder isn’t going
Speaking of that, have you ever received a to tell you that the program
CD-ROM in the mail? How do you know will harm your system.
that it contains what the label says? you They will probably try to
don’t know. It’s difficult to know. mislead you. So, learn what
you can, but consider the
source and consider
whether you can trust that reading this document, you know more
information. about securing your computer system and
2. The Changes test: What the extra costs required to do this job. Do
files are installed and what these tasks described here and improve
other changes are made on working of your computer system.
your system when you
install and run the program? 11.) References:-
Again, to do this test, you 1.) http://onlyhardwareblog.co
may have to ask the m/2010/09/proper-
author/intruder how their computer-care/
program changes your 2.) http://www.2dix.com/pdf-
system. 2010/what-should-be-done-
3. The Author test: Who is for-proper-working-of-
the author? Once you get your-computer-system-
this information, use it to pdf.php
try to contact them to verify 3.) www.ex-
that the contact information designz.net/articleread.asp
works. Your interactions
with them may give you
more clues about the
program and its potential
effects on your computer
and you.
4. The Learn test: Has
anybody else used this
program, and what can you
learn from him or her? Try
some Internet searches
using your web browser.
Somebody has probably
used this program before
you, so learn what you can
before you install it.

10.) Summary:-
There is the initial money that you pay to
purchase your computer system. Then
there are additional costs to tailor it and to
keep you and the others who use your
system safe. These additional costs are
also your responsibility, and they are part
of the total cost of ownership of your
computer system.

This Term Paper helps you think about the


problems you face when you have work on
your computer system and gives you
advice on how to solve these problems. By

You might also like