You are on page 1of 23

ESIBA BUSINESS SCHOOL

Institut lJniversitaire d'Agoènyivé


ESIBA _ IUA
Master II

Chargé du Cours

Dr Yawavi Edem AKPEMADO


Assist ant à l'Université de Lomé
Course obiectiyes

This course is meant to students in preparation for a


master's degree in Information Technology & Mobile
Network and Securify. The course introduces them to a
variety of specific vocabulary in the wide field of
computer science, software engineering and mobile
network and security.

By the end of this course, the students should be able to:


- IJse an ayerage vocabulary of 200 words relating to
computer science, software engineering and mobile
network and security
And
- Express them in a comprehensible and acceptable oral and
written English language.
PART VI: APPLICATTON DEVELOPPERS/ LOCAL EREA NETWORK
ADMIMSTRATOR
Text 1: The Internet

The Internet connects computers in three \Mays. First, one individual can exchange

a message with another individualby computer; this is called electronic mail 1e-

mail). In a variation of e-mail, an individual can send a message to group of users

who belong to an electronic bulletin board service, which is a kind of discussion

group. By far the most common use of the Internet is e-mail, both for individuals

and for groups.

Second, an individual can entei the files of a computer at a remote site to access

library holdings, scholarly information, and govemment documents. Third, if the

individual finds important information in a file, he may transfer that file back to his

o\Mn computer by means of a file transfer protocol, or FTP.

As a result of his electronic communication, the world is shrinking. V/e are creating

an information age. People who never meet face-to-face are communicating daily,

across great distances, across political and geographic boundaries.

For example, the internet is changing how scientists do their work. It is cheaper and

quicker to display the results of research on the Net than to publish an article in

print. Reaction to netv discoveries is immediate and inteqactive. These days,


\
scientists are discussing their work and reacting to others' work on a daily basis.

The networks are also influencing business practices in marketing, advertising, and

hiring. Consumers are reporting their needs directly to companies, and they are

sending suggestions for changes in product design. IJnemployed workers are

42

.1
turning to electronic employment services, which listjob requirements andbenefîts

in a far wider geographic aîeathan was possible before the Internet.

In addition, the electronic discussion groups are creating a ne\M style of social
relations. People of similar interests are talking to each other using only text on a

screen. Physical features such as age, appearance, and social class are hidden

behind the screen. From their homes, e-mail users are finding new friends to discuss

movies, hobbies, family life, health problems, fashion, travel, and politics. These

discussions can be private 1if the message is sent to an individual e-mail address;

or quite public 1if everyone in the group receives the message;.

Politicians are paying attention to the political debate in electronic discussion

groups, because the Intemet is a good place to learn which issues really interest the

voters. In some cases, politicians are changing their positions in response to the

opinions on the Internet.

lAdapted from Changing Perspectives, book t, page zt,PatriciaWilcox Peterson;

1. N{ention fiom the text o groups of people whose life is influencedby the
intemet.

z. The author says that the world is becoming smaller because of electronic

communication.

a) Which sentence in the text states that ideai


b) Do you agree with the author: Give three reasons why you agree or disagree.

43
F Vocabulary
Which words or expressions in the text are similar in meaning to the
fbllowing definitionsi

a. To show on the screen.

b. Activities people enJoy doing in their free time.

c. Information on a computer that is stored under a particular name.

d. Far away

e. A place in a computer information system where you can read or leave a

message.

F Change the following sentences into passive voice.

a. The Information Revolution is changing the way we live.

b. Did the child eat all the foodr


c. She wanted her husband to forgive her.

d. People say football is the best spor1.

F Put the right article (a an, they or Owhere no article is needed. Do not copy
the se,ntences. Write only the number and the article or 0 Example: ro. an

Is. ...t. . ..market research. ...2. . ..useful instrument in businessr

Yes, it is. . ...:. . ...important aid to trade.

Many Syrians ur. ,ro* emigrating to. . ..+. . ..Europe in .. ..s . . ..great numbers.

My uncle has been. . ...6. ...university lecturer for several years.

I live in.....2..... two stores building in....a....heart of the city.

44
A- SayinFrench
1. The processing of data is carried out by a computer, controlled by a program

settled by a programmer.

2. IJS computer manufacturers earn about half of their income from selling

spare pafts.

B- Say in English
1. Les disquettes, clé USB ne sont pas autorisées.
z. Les TIC sont des instruments de communication, de recherche et de gestion

administrative.

3. Avisez-nous dès que vous recevrez le message

45
TEXT 2:

Front pockets and purses are slowly being emptied of civilization's most basic and

enduring tools: the key. It is being swallowed by the cellphone. New technology

lets smartphones unlock hotels, office and house doors and open garages and even

car doors. It is a not-too-distant cousin of the technology that allows key fobs to
unlock automobiles remotely and key cards to be waved beside electronic pads at

office entrances. V/hat is new is that it is on the device more people are using as the

Swiss army knife of electronics- in equal parts phone, memo pad, stereo, rlâp, GPS,

camera and game machine. The phone simply sends a signal through the Internet

and a converter box to a deadbolt or doorknob. Other systems use internal company

networks, like General Motors' OnStar system, to unlock car doors.

Because neady everyone has a cellphone, a number of start-ups, iock companies

and carmakers are betting on broad acceptance ofthe technology. Schlage, a major

lock maker, markets a system that lets homeowners use their mobile phones to

unlock their doors from miles away and manage their home heating and air-

conditioning, lights and securiÿ cameras. Customers buy locks that are controlled

by wireless radio signals sent from Internet-connected boxes in their homes.

1. Choose the letter (a, b or cl that corresponds to the axrswer. Do not copythe

sentence. Just write the nr:mber and the letter. Ex. : t.D

Pockets and purses are being emptied ofl

a- Keys b- smartphones c- tools

2. Answerby TRUE oTFALSE

46
a- Carmakers and lock companies are sure of the popularity of the new
technology.

b- With the new technology users can lock and unlock their premises a clistance

away.

) Vocabulary

A Find in the text words or expressions that are approximate in meaning as

r. Device used for communication

z. Almostsimilar 3.

The sum total of culture, belief and way of life


+. Network connecting other networks and computers

s. Device for changing radio signals from one frequency to another.

B. From number o to number g choose the correct opposite lettered a,b or cr

NBtDo not copy üe words. Writc Ex. to,d

o. Remotely: a- distantly b- close c-mile

z-Customers: a- clients b- suppliers c- purchaser

s- Enduring: a- lasting b- resistant c- ephemeral

> Linguistic compete,nce


*Choose the correct alrirver from the brackets. Do not copy the sentence. Just

write the number andwords chosen. e.g.r 9. has travelled

1. Decades ago computers lweren't used, used, were using;.

47
z. our boss would have attended the meeting if he (\Mere, had been, was;
present.

3. The sales manager has to give up, he has (any, no, none) choice.

4. The staff discussed labout, with, 6theissue yesterday. G nothing

*Put the verbs in brackets into correct tense. Do not copy the sentence. Er: zo.

Tü[ill go

s. Before he repaired the computers the technician 1to identiÿy the breakdown.

6. The manager will have his new car 1to overhaul; next week.

*Put into passive voice

i. The technician will repair the computers.

8. The boss bought the laptops from Japan technology.

) Translation

1. Translate into Fre,nch

In October, General Motors introduced an app that lets owners of most zor r G.M.

models lock and unlock the doors and start the engine remotely. It allows car

owners to warm up the engine on a frigid day or start the air-conditioning on a hot

one.

z. Translate into English

Réservée à la classe privilégiée africaine il y a quelques dizaines d'années, le

téléphone mobile est devenu une véritable pacotille. I1 est devenu un compagnon

des jeunes qui ne peuvent plus s'en débarrasser un instant. Outil très utile, il a aussi

de nombreux inconvénients qu'ignorent laplupart des usagers.

48
Text 3:

With Facebook's membership approaching 600 million and more features and

applications continually being added to the site, it sometimes seems that it is the

only social network around. But it is not the only one, even if it is dominant.
Specialized networks are catching on, with users who say they prefer a more

focused way to share photos, videos or music or who simply do not want everyone

on Facebook looking at theirpictures. Some of these networks leverage the existing

huge audience of Facebook or Twitter to let their members reach the mlximum

number of friends. But if you are woried about Facebook's potential privacy holes

and want to steer clear of them, there is a network for that, too.

Instagram, a photo-sharing network built around a free application for the iPhone,

is the breakout hit of specialty social networks. The service says that more than one

million people have already signed up.

Instagram's secret weapon is its building photo filters, which modifÿ yourpictures

before you upload them. Some effects are comy, but some work wonders at

removing the often harsh lighting and jarring colors of cellphone photos. With the

help of the f-rlters, the images may look better than those uploaded to other social

sites, like Facebook.

To find friends to share your photos with, start the application and tap the profile

option at the bottom right of its screen. Instagram offers several \Mays to find

people: log in to Facebook or Twitter to see lists of yours friends who are already

signedup withlnstagram; searchyourphone's contact listwho have notyet signed

49
up; searchlnstagram'sdatabaseofusersandusernilres; browsealistofsuggested

users whom the company has deemed worth following for their photos.

) Comprehension questions

1. Say whether the following stateme,nts are True or False. STRICTLY \r,rit€

ONLY True orFalse

a- Facebook is more popular than Instagram.

b- Most people prefer Facebook to Instagram for its potential


privacy holes.

2. Answerthe following questions


'What
a- are Facebook and Instagramr

b- What do people use Facebook and Instagram forr

F Vocabulary

Find in the passage words or expressions that mean zls follows

a- apiece of software.
b- a number of computers and other devices that are connected together so that

equipment and information can be shared.

c- a program that stops certain types of electronic information being sent to a

computer.

d- to move data from a larger computer to a smaller one.

e- allow to begin to use a computer system.

f- an organized set of data that is stored in a computer


> Linguistic competence

50
A. Choose the suitable answer from the brackets. Don't copy the sentences. Ex.

o. About

l. "Please, switch (out, off, of; your computers and look on the board", The

teacher said.

2. The manager the car 1of which, of whom, who) was stolen came to work on

foot.

3. Many students in Togo are good 1in, at, about; computer science.

4. Our boss will accept any misconduct except (come, to come, coming; to

work late.

5. If the business (v/ere, was, had been; expanding they would recruit more

employees.

B. Put into passive voice


t. The manager gave us a present. 1 Begin with the word underlined;

z. Users always take care of computers.

C. Put into direct or reporüed qpeech

l. "The computers \Mere repaired yesterday", The technician said

z. Our boss announced that the ne\M computers would arrive the following day.

> TRA}TSLATION

t. Translate into French

Path is a network for sËaring photos and videos. But Path limits each user to sharing

with fifty friends at most, rather than with everyone they know. Your friends need

to check their Path applications or Path's Web site to see your images.

"'fhe dramatic rise in Chinese imporls into Europe iurd the IIS is actwrlly good
nerns ftrr our economic prospects".

5l
"\\"c rttust tn' t«r prevettt Clrirra lirrrn rlevelclllirrg its ecorronit' bt' ercctirrg trarlcr
lxulic:rs ;urrl br, blocliing'its exports".

z. Translate into English

La révolution des technologies de f infbrmation et de la communication a plus

d'ef}èts négatifs que d'effets positifs sur le mode de vie des jeunes. Plusieurs

chercheurs insistent sur cet aspect négatif de ces technologies. Les élèves et les

étudiants ne s'occupent plus de leurs études. Même en ciasse, des élèves souvent

sont surpris en train de manipuler leur téléphone mobil.

L .J'ai tnrvaillé l:\-bas perxl:r.rrt beaucoup <1';uurées.


2..|c trar.aillc l:\-bas rlepuis bearu'ou1r rl'années.
3. .T'ai travaillé l;'r-bas aul)arirvant.
,1,. Il habite :rvec n()us.

.i. Il lrabite ;rve('rror.ls <lellris «lerrr senuiincs.


(i. Il a ixrbité :rvcc rx)us 1;en«lant «lcux scnraines.

7. trllc nous ?r contactés réccnirrrcnt.

,3. l,llc ne r]olrs :r l)as conhctés rlcpuis lougtcnrlrs.


{). Llle ne l}ous a I)as contactés llen«l:urt krngtcr-n1ls.

I0. t',ile ne nous avait pas c<>ntactés lrett«l:utt lortgtenrps.

PART VII: ESSAY WRITING


1- Letter writing
A- Friendly letter.
,\ tiienrlh' letter usrralh' lras six I);rrts:

-l-lre
a- ur-iter-'s arlrlressi'letterlrearl.

Ixanrple: IAt'.C/ll.( ). lX)X:/l.olr)é, /'l'(X;( ).


b- 'l'lre <late: 25" Novenrbor 2017.
c-'l-he greeting/§alutation.
l',xarnlllc: De;rr, tlciuest. nl' rlelrrest...

52
Computer Training Erpert Solution Consults Computer Basics
and.time-consuming calculations, such as those usecl to create lveather
predictions. Large businesses, scientific
institutions, and the rnilitary use thetn. some supercomputers irave
manÿ sets of cpus. These computers break a
task into srnall piecet, each CPU processes a portion of the tasl< to increase overall speed
-1ng and ef,ficiency.
Such computers are called parallel p.o.*snorr. r\s computers have increasecl iu sophistication,
the boundaries
between the various types have become less rigid.

COMPUTBII VIRUSES AND SECURITY


COMPUTER VIRUSES

Vims is a :'e1Êdtrpiicatirlg computcr pro,qran] that interfl:rers rvith a computer's


hardrvare or operating
systcm' They ratlge fron"r being tncrel-r'ilritating (or tlislrirbing) to ilrc
very âestructive. Computer viruses
actirrate *'hen tlrc ittstructions (pa1'Ioacl olthc virus) or exccutable
code that nln prog.o*s are opened. Once a
virus is activc, it rnay replicate b,v vat'ious rneans and inlect the computer's
files or the operating system. For
e'xatttple, it may copy patls of itself to tloppy disks. to the computer's
hard drive, into legitirnate computer
programs' or it may attach itself to e-mail messages and spread
â".os computer netrvorks by i,fecting other
shared drives' Viruses attached to e-mail *"rrug". can infect
an entire làcal netr.vork in rninutes (this is
specifically called WORM).

Thousands of viruses and worms exist and can quickly contaminate


rnillions of computers. people who
irrtentionally create viruses are computer expefts callerl FIACKERS;
they also vioiate co,fide,tiàlity by
obseruing computer monitors and by impersônating authorised
user.s in other to gai' access to the user,s
colrlputer databases to steal the identities of other people by obtaining
privately iclentifiecl i*fomation about
them' They also engage in software piracy and defaôe rreusitl on the
lnt"in"t. They develop por.verful softr,vare
"crime tools" such as the follor,ving:

Intertret eavesdropping snuffers 'uvhich intercepts internet messages


1
b' Passr'vord gLlessers that tries rniilions of con,binations of
sent to other computers
characters irr an effect to guess a Çomputer,s
passworcl.
c. Vulnerability testers that lool< lbr soltlvare weaknesses
d. Computer services satLlrator
e. Ar"rtomatic computer virus generator.
Types of Viruscs

a' A boot scctor virus stores itself at the starl of a clisk and becomes activated by reading, startilg
J or restafting
tl'Lecomputer when that disk is in the boot drive.
b' A filc iufectorvirus attaches itself to program files i.e. flles that give instructions
to a computer. These files
usr:ally havc extensions like exc, coll, or bat. Whcn thc progran-,
À .,,,-,, the virus execlltes.
c' A macro virus affècts data files, especially worcl clocumcnts and Excel r,vorkbooks.
accottnts {br the vast rnajoriÿ of inlectecl files. when the inlèotecl
This vims type
clocument is opened a,cl the rnacro are
rttn' lhe virLrs is triggerecl and catt perlorm systern opcrations
such as creating or cleleting files or rvriting
into already existing files ancltlius have the pcitentialtl car-,se great
a
lvorrn or an email virus (for the purpose of this guide) is not really a of
deal clamage.
d' virus at all (in tlat it is not selÊ
replicating) but a chain letter phenoutenon sent through email.'fhe
rressage rvill, lor sorne reason or other,
tell yor-r to pâss this message oll to as many people ris possible. Iloax
viir-rs alefts are typical examples of
chain cntails"fhcsc are distinct 1i'otl vit'uscs iir that thcy clo not
have host file like 6ost othcrviruses but are
carried on the internet aud catl spreacl from ouc .or.,1rut"t. to another
by thernselves u,ithor:t the need for a
Ltscr to ltssist thc plocess by giving sorneor)e an irrlèctccl
Illc or clisk.i'hey are usually spreacl through the
16159, Nov - 2010 ...Learn to Know Why and IIow!
adebisij eleel@yahoo.com o r aclebisij eleel@gmail.com
Computer Trainir,g Expert Solution Consults Computer Basics
internet as an attachment,
e. Tro.ian horses are progralns that llilr,e sornr.l hiclilen, ireuerally nralicious functionali§, that
the computer
tiocs ltot r:>lpect. T'1ie1' 6;1.;t., to br, a i.liin1r (r:.a. nu arulir; Ibr r::;aurple). r.,,hen thev are actrrally
another (e.g.
coclcthrtivill overtvt'it.e ltpoiiit,'l-ioï'1'çrç,'irrirrliiirii).'lhcvrJonotiirii theirorurlikeavirusdôesbutrelyon

r,irirs anrl r "1'ro.ian.

I{o'u, \/irrrser; nr"c I}prearl

foI1os in 1t mq tirorl :;:

I'assing iloppi, iiisl,:l jl'cir-i PC to PC

IJou,nlcading (cop3'ing) inlbcle Ll lile:, 1l.onr thr: I11ts1;iç.1

Openine alt cniail allrrclunent

Booting a PC u,ith an infected bootable disl<.

computer viruses r,vork in trvo phases: infection phasc ancl the attaok phase.

Infection phase: in order to infect a computer, a virus has to possess the chance to get
execrrted before it can
infect the computer system and spread to others. Events that can trigger the execution
of virus are included
a Dove.

Attack phase: viruses do destructive things such as deleting files, erasing data on
a hard disk. sending random
emails or slowing down the processor by sending millions of looped instùctions.
Silce most users will try their
best to delete the virus once it launches the attack, most virus dâay revealing
their pïesence by launching their
attack only after they have had ample opportunity to spread. This rneans thJattacl<
may be clelayecl ibr a long
tirre alter the infèction.

Prevcntion oI Computcr Virus

Compr:ter users can prepare lbr a viral infection by creating backups of legitimate
original software and
clatafiles regr"rlarly so that tlle computer system can be restored if iecessary. Horvire., the
bestprcvention may
be the instzillation o['cttrrent and rvell-clesignecl antiviral softlvare. Such software
can prevent a viral infection
and thereby help stop its spread.

OI obtain a virus checlcer for your owtt machitre thcn register thc program rvith tl-re rnanufacturers. .I.hey
will
regLrlarly scnd you updated versiotts of tlic soltware r.vhile your agreement
is curent. New viruses keep
appearing, so ot'tt of date virus software will not protcct you ancl the cirecker
is essential. hrstall the available
secr"rrity patches, particr-rlarly for Microsolt products. I(eep your Iloppy
clisl< r,vrite-protected whenever possible.

lf'yoLr are really catttiotts, change the set-up option in your computer's BIOS so
that it rvill always boot from the
hard clisl<, not Ii'orn floppies.

Writc protcct MS Word's Norntal teuplatc to gct linritecl protection against nlacro viruses,
Ttris te,rplate will
bc a [j le callccl Norrrr al.clot. Se lect th c l{eacl On ly bod. Notc that th is will not
clisinlèct existi,g i,fectecl files.
Il159, Nov - 2010 ...Learn to I(norv Why rrncl I_Iorv!
a cl ebis i.j clcc l@,ya hoo.cr) nl o r a cl c bis i.j clcel@gmail.c om
Cor)rput(r't'r.aining Ilxpert l$*lution Consultg ComputerBasics
I, \\/o.tl' lrtrrl on litr-: l\4;1t''n \iinrs P.otcclio' option
in 'I'o.ols.,
N4acro liecLrrilr, button, trl,setting the level ol.securit,r,
1h-cn optiori:;. then secur.ity Tab a,d finally
1;or, .lesir,, ftr tlà r1o.ior. This u,ill walr you if files
mav lta*e cre'ate,i tj,o. ,rrr.ro^s f,ir so,re regitin:are purpose but they courd
:i,'|.iTliïîï,,,ï:1.:l:.'l "olt*{'rsrrc
,,r,,,,,rïi::lll:(Tii:iil;liïl"il:,T:,îii;il,,.îîî;,ilîï,;;;ff,X:.lll;:r11ï.,1:ïffi.o..d,..
*,iii.,i,,,,,o,,
1,-inis Ilrter liotr

5'ic'errll t;'1:rrs ot'ltt:til'it'it[ :;o11rt'lre carr


bc'rrscr] to c'letect ol.
r(lcÙSIlizc ljit: cltlt'actr:i'isticrl ol lr virLt:t's corrrl;ute. c.clr', ancl the presence r,ir.u:;. scl:'rrirrg softrvare can
look ior ttr"r* i^ t,e computer,s
"tr^rocteristils

col,lP uT iiit !lf,{-_ ij jt ['I 1,


'l'ltc:lc a|e
lcchuii1ucl3 (lc\Irllopcci to safcguard irlirnuation
a,cl infurm..,Jioir:jr,:11.rïrs:;1,rred o,
corlprters.
and sonrva,e anc rlir: ,oss. ,,oa;r.uiion,
rheft,
iüïlîl'ili*,':ii:1.*Jli:,1::::ï::',îil::;**f;,-lîl*l'-
I Simple Techniques: A variet), of sirnple tr:cliniques ,,r,, 1r.ip p.evenl
cot:rputer screens t'orn observatiott, keeping cripres, snc6 as protecting
printecl i,Ibrmàtion "",rrruteL
.;-;,,;;.s-in to"t"a racilities, backing
Ltp copies of data {iles a,c1 softrvat'e, ",rd
anclclearing a.rr.a1rr'.risensitive
irr".rrr"u", airci materials.
hcreasi*gly' however' more sophisticated ,rethàds
are neecled.to.prevent conrputer
using encryption techniques, esiablishing crimes. These inclucre
.oftrru." .oug" p",rrrrriàrr, ,,uoJuiiî.,g
firewalls and int'usio, detection systems. in por.ruo.,rr, and instarling
additio,, ;""i.;il;;jffi'uiiil",,",1
recovely plans are aiso necessary. systems and disasrer
_
II Bacl<up: stori,g bacl<up copies àf software a*d clata and havirrg
capabilities are important basic safeguards backup computer aud corlrnunicatio,
because the data can then uà ..rto..Jif
by a computer crime or acciclent' cJmputer it was artered or destroyed
data shouid be backed up n"qr"ï,rv
and shoulci be stored nearby
a't the prima,v site.-iransporting
ffiiJÏJ;îiï;:J|;i[îJo'mage s",isitiv" data ro storage rocations
III Ilncryption: Another techriiclr-rc to proteot
co,fidential inrbrrnatio, is encryption.
soramblc inlbrr,atio, to prcvent Lrrrauthorizecl computer Lrsers can
users n'or', u""".ring it. ALrtÉà.rr"a
itllbrmation when. neeciecl b1, using a sccrct
code callec.l a l<ey. Witholt ttre
rr.., can Llnscrambre the
would be i*possible or vety difficLrlt to key the scramblecl i,fo,nation
Lr,scra,rbl.. i rrrà.; comprex lbr-r,
called the pLrblic l<ey arrcl the private l<ey, of en"ryptio, uses two keys,
ancl a systenr of ci.uble àr.,yption.
secret, private r<ey a,d a pLrbric r<ey ru.n po.ti"ipa,t possessls a
thai i.; r.ruu*iro ,u*.,,ior ,""ilri;r'tJ.';;;,
matchi,g l<evs at'e ,sed to clccrypt the ,ressage. ,;
I-roujcvcr,,h;,,.1r;;;;;; ;:.ï,it,"i:Ï
#;f srngle-ke1'rnetlrod
the pri'ate l<cys, r,vhicr't u.. n.r,.,.
sharccr n,,crlo car,ot ù" r,ri.r".pr..r. ÏJri:îi,:r"îir,
lir
IV Approvcrl l]scrs: A.othc. tecltrliclr-rc
to holp prcvcut otr,o" u,r,t rnisusc
cornptltcrs and clatai filcs to approvccl or.computer clata is to lirnit the Lrse
pe'sons. socurirysoflware.ca, of
lirlit their privileges to use, uier", anj alte r files..ffr. veriÿthe identityof computerusers and
accottntability' Military organizatiorrs give
,ofi*.1.c also secur.cly recorcls their actions
access .igrrt, to classiliccl,
to establish
inlormatio, accordi,g to 1hc.on'"rpo,,îi,rg secret, ortop_secret
securiryîr;;;;." reverof "",rfiâ;;;i"1,
the.,r...-ô,n".types of or.ganizations
a lso c ass i ,.v in lb * ati
t
on a rr ci spcc i ÿ i frèrrert .r. g;.;; ;i
V P*ss*'ortls: Passr'v<lrcts arc cc'nilcl.niiol
c.r
;ïàt".tior.
,.qr.,ccs ol'char-actcrs that allor,v approved
speciliecl colt.tllttte rs' soltwarc, or inlbrmaiiorr. persons to make use of
J'o r',c ct'tcciivc, passlvorrls mi,st
shoLrld tt.1 bc lilrrrrcl in clictio,arics. be 6ifficLrlt to guess a,d
tlfli:ctivc llassworcrs contairi a varicty
oi"t-,rur"t.,.s a,cr syn-rbors that are
I ti/59, Nov - 20 l0

,rrcrrisi.icrccr(i.)r,ahor.cr)nl or acrcrrisi.jcre.ro**rïiLlïto Knorv why ancl Horv!


Computer Training Expert Solution Consults Computer Basics
pafl of the alphabet. Anothr-'r itclr'antagc of this passu,olrl is bccausr,:
1ot it is case sensitive (i.e. Advent is
different flt'om advent). '1-o 1hu'art irrposlers, *ourp,,t". svslems r-rsually
limit tle number of attempts and
restrict thc tirne it tal<es to enter the r:orrect
lllrssrvoid.
vIFireü'alls: Cotlputers connccterl lo thc conrnrLrnicalion net.,r,orks srrch
as internet are vulnerable to electronic
attack because lran\/ people ltat'c acce:;:l to tlie m.'i'hc1,can be protected
b1,fire'r,alls comprrter software
placed betrvccn 1he netrvorkecl contputr:rs itnri tilc rreiri'or{'ls. "l'he
Iir,:u,alls e:rarlines filter.s ancl reporls o, all
information pa.ssingthroulCr tlte netrvor.ll tcensnLr-: i1s;rp1..r.oi..i.ilrtc1e5s, Tiresi:
fi;qctions lel1t to prevent
saturation olinput capabilitit's llrlt might t:1hr:i"v,'irrr.: ,r"r,1; usag,: tc legitiriar()
r.l:rers.
VII Intrusion Detection S;'stems: J'hesr: iire soflrvirle lhat rletr:c1 unirsual and suspicious activities and i,
solre cases, stop a varietv of hannhrl aotions.

i),\ §trC C Ot{P IITIIR i\{z!i}t T}iNÂI.t[] n


MÀIF{TI]I{Ài.{CN]

vahte lrs :iLrc111 115,1'or-t briilc it hontc and il r,.:rlrrir-!::l lrrqrlial nuiintelanr:c tc li-ee1l ii runrti.g.*o""ttrtf.
To proll(ll'h'cleal ri'ith repairablc:tvstrrlls,
u'c reecl to iirst unclcrstantl how r:ompoleirts
aro restored (i.e . thc tnaiutenartce actions tirat the conrponents uridelgo).
these systems i,
In general, rlainte,a,ce is clefined as
an,v actiott that restores {àiled units to an operational condition or
retains non-failecl units
For repairable systems, maintenance plays a vital role in the life of a syskrm.
an operational state. i,
lt affects the system,s overall
re liabili§, availability, dorvntime, costof operation, etc. Generaily,
rnàintenance actions can be di'ided into
three types: corrective uaintenance, preventive rnaintenance ancl inspectiols.

Preventivc Maintenance

Preventive maintenauce is the practice of replacing components or subsystems


befbre they fail i, order to
promote continuous system operation. The schedule for preventive maintenance
is based on obseruation of past
system behaviour, component r'vear-out mechanisms and knolvledge of which components
are vital to continued
systenl operatiotr. Cost is always a factor in tlte scheduling of preventive rnaintenânce.
In many circurnstances,
it is flnar-rciallv more sensible to replace parls or componentJ that have not failed at predetermined
intervals
rather than to wait [or a system failurc that may result in a costly disrLrption in operzrtions.

I-lere are a {èlv basic gLriclelines reqLrirecl.


I Surge Protection: Power surges, sp il<cs, lightning and browr - outs are all things that can
literally bum up
yollr comptttcr and its peripherals. Save yourself lots of money in repairs by buying a clecent
surle protector
(a.li.zr. Porvcr strip) {trr yoLrr conlplrter ancl use it. A IIPS (uninterruptible
fower suppl)r, though-slightll,
lurore cxpcnsive, is even bctter.
Il Anti-Virus Protection: E,veryone sltoulcl l<nor,v about this by nor,v, btrt rve often see computers with either
"no virtls protectiotl at all, or anli-r,irus soltr,vare that is baclly out-oÊderte". Nothing can wreck
your
conlplltcr faste r than a virtts (cxcept Ibr Inay bc clcctricity), tLrt r,vith a small investment
in good anti-virus
solir,vare ancl making surc yoLl sct it to rrpdatc itscll'claily.
III Minimizc thc ntrtnllcr of Softrvârc yor: inslall: "l'his is another thirrg many people overlo.k.
Installing lots
of'progranrs oll vorlr cotrtl;rtte r is a [ot lil<c putling a bunch ol'rowcly iogËtn". on a playground.
Sortlc o1'tltotn tnay not play lvcll togethcr. A goocl rulc ol'thumb is "i1'you "nita..n
clon,Ineed, don,t insLll. This is
csllccially trlte rvhert yor.t surl'the rvcb. You rvill lil<cly get lroml:arciecl with pop-1p ads trying to getyon
to
install all hinc{s o1'1lee utilitie s tltcy clairn yorrr'0onrputcr can't live'uvithout môst àf tner. ur,irpyiuui.,
adlvarc and .junl<.
IVlStcl<up yottr inrpot'tant files: l'o mirrimize thc potcntial of loosing irnportant inforrnation, always
make a
I 9/59. Nor, - 20 1 0
..Learn to I(nory Why ancl Horv!
a d c b is ii cl ec I(1)1,a h oo.ct) nr o r- :rd cbis i j clccl@grnail.c
om
Computer Training Expert Solution Consults Computer Basics
backup ofyour crucial files' To clotliis. )/ou carl usc a cD-bur1er, a backup tape system,
drive (sr-rch as a Jazz, Zip, floppy or llash clrive). t<""p or a re[rovable disk
.opi"s of thcse bu;[rrp;;r, another iocation, just in
--
j.ur" you need to perform a disaster recovely.
v Fire'rvall Protection: symantec's Nofton personal Firervall keeps
personal clata in and hackers out. Right out
of the box, it makes your PC invisible on the hternet
hrtrusion prevention technology blocks s,spicious Internet
so rhat hackàrs can,r find t,. il";;;;."Liiiri.,rr**,
trlffic. arra pri,ra"y controls prevent
personal information from being sent out rvithout your "ury-io-rse
knorvledge.
vllnternalÆxternal componenf clcaning: Dust ii onc of the leidins
causes of hardr,r,are failure. All moving
components are thoroughl,rr cleancd ancl lubricaler-l dudng
seLl,ice visits. The case is ope,ed and dust is
remo'ed fi'om tl-re motherboard and all s1'stem boarcls. Tiie
cPlJ fan, poroer rrffry fan and any other board
fans are cleaned' lubricated and testerl. Ail data cablcs
are checkecl to'lr".,-o;;illy securelyheatedon
system boards' cD ancl lloppl'dri,es at'c.pe,erl. cli:anc:c "." External components
antl testecl l-r,:J.àtr""sfer.
such as keyboarcl, lnouse, motlitor and priniers are cleancrl
of clust and riebris and a1l cable co,nections are
checked. connections to surgc protecto's or LIps are crrccried.
vll scan ancl defi'agmcnt Your harrl dii"''c on arrivr':'llorrr lrarrl clrive stori:r;
yorrr hard clrjYe. Ai; rr0rr clcletr: data on vourdrirrc, (_rpe11
i,ibrmation i' open areas of
si)ace appt:al.s..lhe cornputer *,i11 utilize this
space to store ne§'infcrmation. sometimes infomation ope,
for a piriicular fi1e or ap1:lication is scparated on a
drive into sre\/erâl diflèreut locatious.'lhi.: lotalit.v olthr inforrnation
rlra-r, not lit iir the open space in one
area, so the computer r'r'il1 divide the inlomration into
r;r:r,cral p-reces. \\zire, 1,ou u."n and clcfi.agrnent your
hard drive. you are r-nir:rimizirig the risl< of having problems
and "slor.r,dor,,,nJ,,caused by separated data on
your hard drive' The delragmentation rvill locate, àelete open
spaces ancl place associatecl files back together
again, helping yollr compllter to nrn smoothly and faster.
io Ao this, Right-Click on the
driveàPropertiesàTools TabàDefragme,tation sectionàDefiag,rerit
now)select the driveà Analyze
OR Defragment

Disk Defragmenter

Dish Defragt.uenter is a system utiiity {br analyzing local volumes (an


area of storage on a hard disk. A voiume
is fonnatted by using a frle system, suclt as FAT oiNTFS, and has
a clrive letterassigned to it. you can viervthe
content o1'zr volutrre by clicl<ing its icon in windows Explorer or in
My cornputer. a si,gle hard disk can have
multiple volut.tres, ancl volumes can also span multiple âisks) and locating
ur,t fi.agmented files
and :ftrlders' "orrotidating
You can also del'ragment (De fi'ag.tnentation is the process- of r"crvriting parts of a file to contiguous
sectors on zr hard disl< to itrcreasc the spced o1'acccss ancl retrieval.
when tiles arJtipdatecl, the .orrpui..'t.na,
to save thcsc r-rpdates on the largcst continuous space on the hard clisl<, which
is often on a clifferent sectorthan
othcr parts of the file' When files are thus fi'agrnànted, the compLlterlnust
search the hard disk each time the file
is opclred to find all of the file's parts, rvhich slo\vs clown response
tirne) disks from a commald line using the
clcfrag cotttrnand. "fhe best practices 1'or liagrnenting avolLrnie are enumerated
below.
. Analyzing bcfbre clcfragrncnting
Analyzc volurnes bclbre clcfi'agmcnting thcm. Altcr analyzing ttvolnrne,
a dialog box tells you the
pcrccntâgc o1'fragmcntcd filcs ancl Iolclcrs on the volume ancl
recomurer"rdsu4reÀerto defi.agmentthe
volr'trlrc AnalyzcvoluttlcsrcgLrlallyartcl dcliasnrcutthcmonlylvhenoirl.oeÀ:agmenterrecommenclsit.A
uoocl gtt iclclinc is 1o analyzc volutles at lcast oncc a'uvccl<. If yoLr scldom
neecl to defi.agrne,tvolumes,
aualyzc volunrcs nronthly instcacl o[' lvecl<ly.
. Analyzing:rI'tcr Iargc uunrbcrs «rI'lilcs rrrc ircldcd
Volumcs rrlight beconre excessivcly li'agn.rentccl rvheu users aclcl a large number
of'files or folders, so be
stlre to i'tttalyze voltturcs allcr this happcns. Gcnerally, volurnes on bu.sy
file servers should be deûagmented
rnorc oltcrr thatr thosc otr single-uscr worl<stations,
20159. Nov - 20 10 ...Learn to Know Why and lfow!
a clebisij eleel@yahoo.com or acl ebisijeleel@gmail.co m
Comprrtcr Tliinin11 ilxpert Sohrtion Consutrts Computer Basics
* Ilnsrrre thrt 'r.û lrr tlii.:lc h:ir; rt ieast l5r% fi.ce sp:ri:c
A voltiinc lllil:rI l]il\ro at lcast 159'o iiee spacr: firrl)i:,;i< Di:ii'rigrrrcllter to cornpieicl), a1d adeqLrately
dcf itgiite nt ii. ilisli f)t-'fl'irQtrttnlcr Llse:i thi:; :;pacc es ;r sorting alcii ft-.r lLi.- lrlagments. lf a volume
has less
tltan 15910 û'et::jpACe, Di:;k Delingnonl.cru,ill o;ri), partially rlefi"agmegt it. l'o-i,tcrease thc lree
space on a
volutlte, rlcletr: rntneecled 1llr,:s or urove thr:nt to anothet.dirli.
e Defraglncntin{: during lrt*'-u.r:rJJr: 1:eriotls
l)":ft'eqnrcnt filr: :;'.:r',,er yo.lrr;ire:r tlin'in,r1 ior.,-1,n1ur',",,, lrsale per.iods lo nt jtirnize 1he eflect.
that the
chll'astt't,:tlt:llrort |rocctls lta:l r:,tt lilr- soi-\,(.r Ir.:rL]1urani:l:.'l'1ti: tiile thai Di:rli Deli.agrnenter
takes to

thc ntturkrr:r o1'1i'arrur.:ntec1 Jlles. ancl a.,,eilat;le s\,stcnr rL.!lourLrc:i.


l'c1LII1]t-:.
o r)cfi'r grncil ti ng aftei'
ins tallin g softvr'a re o r installipg \I/i ltl orvs
Dcfi'aqmr:ir1 .,,ôiulres ljtei' installillg -rsfly,;11s or.alIer
lterûtmring an trpgracle or.clean install of Windows.
the bcst file ::r,s{,:ln lter.forrlnnilr:.

Dcl)'rX

z\t titiles. it l;lir:ht lic diillcLrlt 1{i c\/tn :;cit:ct thc clrivc to be ci,.:liagrrir:nicrJ;hencr;
the use olcon-rrnand line.
Locates ancl consolidrtcs lragmcntecl boot files. ciatt 1iles, ancl lblders on local
volumes.

Syntax

defrag ttolttnrc|dcfrag volurne [/a]; clefrag volunrc


lla)llvl; detrag volunte [/v]; rlefrag wlume l/f)

Parameters clefi nitions


volunteThe drive letter or a mount point of the volume to be defragmented.
la Analyzes the volume and displays a sLlr.].rrraru of the analysis report.
lv Displays the cornplete analysis ancl defiagmentation repofis. Wùen used in cornbination
rvith /a, displays
only the analysis report. when used alone, displays both the analysis and defi"agmentation
."ponr'.
lf Forces defiagmentation of the volume regardlèss of whether it needs to
be deû.agmented.
l'! Displays help at the command prompt.
llcmarl<s

' A volutne mttst havc itt lcast l5% Ii'ee space lbr dcfrag to completely ancl adequateiy
defragment it. Dcfiag
uses this space as a sortittg aren fbr file [r"agurents. If a volume has less
than 1 Si/o fte'e.pu".] clefrag rvill
only partially del'ragrlcnt it. To inct'easc the free space on a volume, delete unneeded
files ormove them to
anollrcr cJisli.
' You cannot defi'agment volttures that thc Iile system has markecl as clirty, which indicates possible
corntption' You ntust rutt chkclsl< on a dirly volutle before yolr can ded.agpent yo,
it. can determine if a
volume is dirty by using the Ilsutil clirty qucry cominancl.
' whilc delrag is analyzirrg ancl cleli'agmenting a vohrrne, it clisplays a blinl<ing cursor. when clefrag has
lln ished analyzing ancl clcfi"agmcnting thc voiume it clisplays ihc-analysis
, ..pîrt, the defragr.entation reporl,
or both ropot'ts, and thctr cxits to thc cotnrrrand prornpt.
' Ily tls[trLIlt, dcli'ag clisplays a stlnunarv ol'both the analysis ancl cleli'agmentation reports if 1.ou clo.rot
spcci11, tlrc /1 or /v pat'ameters.
o Yotr catr scttcl tltc rcports to a tcxt lilc by typing >.filename.txt,wherefilenatne.txtis
a file name you specify.
For cxitrlple : clcl'r.ng t,olutne lv >.filaname.tx/
' '['o intcrrr-rpt thc deli'agrncntation proccss. at thc commerncl line, press CTRL+C.
21159, Nov - 20 10
..Learn to Knorv Why and Horv!
ru d cbis i j clcc I@1,a hoo.co m o r arl cbis
i.j cl ccl@gmail.com
Computer Training Expert Solution Consults Computer Basics
' Running the defrag command and Disl< I)cfi'ag,nrenlor
arc rnuhuLrly exclusive. If you are usi,g Disk
Defiagrlenter to defragment a Vtlltttnc ancl
1'cxr r,ru thc dcfreg comrnand at a cornmand-line, the clefrag
command fails' conversely. if you run the defrag cornrnancl
and open Disk Defi.agmenter. the
defragmentation options in Disk Defi'agrnenter are unavailabre.
Fo rmatting lcgcnd
Format Meaning
Italic hrfomation tltat the user must supply
Bold Elemenls that ihe user must trpe exactly as shor,vn
Ellipsis (...) Parar,etcr lirat can l;e repeatecr severar times iu a c.mmancr
ri,e
Betr,veen bracl<ets (fl) Optional itr:ms
B.etween brace s ({} ); choices separatecl bv
Exarlple:'ievenlodd)
pipe (l). Sct olcltcice:: f i-'m u'lticir ihe user rnust ciroose o1[y one
Courier font Code clr program orrlput

VIII checking Errors on the Htrd Driye: 1ltis is don.' tu rc'c1if],trari


sectors. To do this, Right-clicli on the
driveàPropertiesàTools TabàEror-cliecliing sector*checlr NouràAutornatically
OR Scan for and atternpt recovery of bacl sectoriùStart fix file system er.rors

Co rrective Maintenance

corrective maintenance consists of the actiotr(s) taken to restore


a failed system to operational status.
This usually i,volves replacing or repairi,g the component t5at15r.rdrrili"-à.
system' corrective maintenance is performed at unpredictable ^b""u.,.. the fail,re of the overall
intervals a component,s failure time is
uot k,or'vn at prior. The objective of corrective mai,tenance
is to. restore the systemtà ,;;i;;;;f op"rutio,,
rvithin the shorlest possible time. corrective maintenance is
ÿpically carried out ln three steps:
i' Diagnosis of the problem. The maintenance technician must take
time to locate the failed parts or
othenvise satisfactorily assess the cause of the system fàilure.
ii' Repair and/or replacement of faulty component(s). once the cause of
system failure has been
deterrnined, action must be taken to address thà caLrse, usually by replacing
or repairing the components
that car"rsed the systern to fail.
iii' veritîcationof therepairaction.olcethecomponentsincluestionhavebeenrepaireclorreplaced,the
maintenance technician must verifÿ that the system is again successfully
operating.
System Diagnosis

TlTe diagnosis practice is usually callecl troubleshooting. Mr:ch


of the troubleshooting guide treatecl here
caters for users of Windows oper.ating systcms.

Always keep detailed records o{'all crrors ancl steps tal<en to correct these
erors. Eror numbers and
oodes are irnportant to log. They tell tccluricians/netrvàrt aclrninistrators
specific information about the
problcms yoll are having' To clocument errors, press the "Details"
button o. simply rvrite down the first couple
o1'lines of information given in the error scrt:crl.

Chcck alI cablcs first' "l"he nlost fi'cqttent 1;r'oblcm rvith cornpr-rtors is a loose ordisconnected
cable. Do,,t
bc aliaid to mahe rnistakes. Don't let tho rnachinc intinticlate,),,r,,. Ilefbre calling
an expert for technical
supllol't, always shut your oolllputer clown totally aud reboot: wait untiItl,e
CpU is not making any souncls and
22159.Nov - 2010
...Learn to Know'Why and l{ow!
adebisijeleel@ya hoo.co m or adebisijeleel@gmail.com
Computer "l't'aining Expert §olutiorr Consults Computer Basics
then trrrn il on ag-.ain, by' pressing tlrt: pon er brrtton.
1. Booting Problcr;rs

instrttctiotl cfill:rÇr:l Le l'to stiirt giving its ou,n irrstlirç1is1i5


tlle i:otili:it ro internal pn.À. or" oftho
callecl illO:1 .'fhc I:liCS ittstrttction rrtarts chcckirrl "e1,ç;-r,[orir,,. ris1;ing,,Are.,611 OK?,,, ,,Are instructions,,What
is
âbottt 1'611r". lll ct:i'taiil part fhat i:; irnpoilant cioe.'sn't,'es1,,,,,,i 1,611 OI(?,,,
i{b,..,...n,r11" it'a c..:,tain irnporlant object such as
the ke1'hoa|d or nr0irsc ii; riot ccrrnected. §,hich nrcans ;t .,,,;tt
not rr:sr;nurl rvhen the BIos asks. ,,Are you oK?,,),
thenthr:IlloSnr;rf iil.tclutittc'crlthirrg,olitna.,,corr,;irrrrccirci:lling. Ifthi:gjCScomestoaconclusionthat

cau:teC l;1,thc r)i.escucL] ol.a l)op1lv rlisk in thc {1clp1t,v


ii iii,,: u,ttilr: tlte c,trlputer is booting up. Whenever
voii trtrn 1/oril'colllprltel'o11, retile rt.ibci'to c.icct a1l rlir;!is fi'onr
tlrc ,lloppl,Aiive
lLrntes;;;:,il,Jf";'noppy
rronrn L

rearolilir: cou.rpi-rter, Chç.cli [tr:liinri the conrpirtcito see il-r,grii-fte1,boarr1


is still firmlyattacheclto the
cottrl-iitlcr" Also cllt:clt to see i1'r:otrctiung, li;rs i;t-'er
i;le:;liiriÊ on 1op oi-1he: hei,boarcl d,riugbcoting. Remove
a1l itcrls tlrat rre 1-''t'es:iing kc:','s x1161 rc-plug llrt:lir:r,boani
into thc col-,ipute.. i{,,r,arayourcornputer.
c' I all-t ri:ce it'inq a "no signal" rlttor, or "thcic ar" rrà r,irrrals
otl l1i), rttotritor',: A .,t.ro signa1,, erroïrneans
that tli.r ltlolti'ror is 'ttot receit'jng a siirnal_1iorn [he computer.
c]rccli to see if the computer.is on and
rutrnitrg' The, checl< the connection (cord) bet*,ee,
the compute.r and the rnonitor. If e'eruhi,g
connccted, turned on, and running, then there rnight is
be an iniernal error this, errorto
Contact a technician for assistalce occur.
"".,rir,,g
d ' scar, d isk appears ol1 a blue screen,
stating that windor.r,s r,vas not properly shut down:
Lrtilitl' that windows rlrns automatically rvhen it thinl<s Sca, Disk is a
there migrri be a problem rvith your.system.
does uot mean that there is a problem, but windor,vs This
r'vill automatically take this step to ensllre that
pr"oblem is Let Scan Disl< run and wait, to see if your machine the
complete' lf'ectifled'
lvi11 boot pr.operl,v a{ter scan disk is
it does 11ot, tllrll the computer ofï, ancl reboot to see
if the problem clears up o, its orvn. If
rebooti,g the computer does not solve the problem, contaot
your technician.
2. Safe Mode Problems
If your computer boots to tl soreell giving you a choice to
boot hrto safè mode, or it automatically boots
safe mode' wi*dows has run into an error that it into
cannot bypass to run smootlriy. In rnost cases,
reboot and the problern will resolve itself automatically. you can
iiyou .ontinue to get the safe mocle screen, or it
goes away and comes back fi'equently, then
contact yo,r tech,ician.
3. The sysrem is ON but it Is not ,ôsponàing
My system is locked and nothing I press or click is r,vorl<ing.
what nor,v? Sornetimes your computer will
stop responding, or "fieeze", either c{uring operation
or afte", unr.rsecl for a period oftirne. If the
not been used recently, press a ferv l<eys a,d wait cornputer has
severai minutes. If tlrr.;;;;;er,,fi"eezes.,
operation' stop r'rsi,g the keyboarcl ancl the lrouse d,ring
for severalr,inutes. rry", i"rt.ue to use the
wher, it is "ftozerl", it rvill prolong yorrr waiting computer
periocl. If, after r,vaiting ior r"**rminutes,
yoLlr complltcr to respond by Lrsi.g thc kcyboarcl you cannot get
or the mouse, tullr thJcomputer offby pressing
button on the [r"o,t olthe machi,e. Let the co*p.rte*h,riJo*, the,,por.ver
(the cpu is no ionger making any
and then rcboot' If you still get no respoltse lio,, sou,ds)
thc r.r'rachinc, your nlo,se ancl l<eyboard may
dislodgcd [L'om the rearol'the,rachinc, chccli thosc have become
ccln,cctior-rs ancr reboot agai^. If the cornputerfieezes
aeain alicr plLrggirrg thc tltottsc ancl l<cyboi.rrc] into
thc bach o{.thc c.rnprt"r,,nî',=trooti.rg, contactyour
technician.
zl. I{ebooling Pr.oblcms
a' winclorvs rvotr't sltttt cltl't'tt, it stays at thc "plcasc r.vait" scrccl.I.
or lvon't power clown: Thjs is a problenr
23 159, Nov - 2010
.r,r^r_i-ii^r^__rr:\_,-r ...Learn to I(norvWhy ancl llorv!
. eIccl@)grrraiI.com
a tl c bis ii cIcc lfu)ya hoo.cr) rn o r nrl_c .bisii
Compriter'tnrining lixper.t Solution Clonsults ComputerBasics
*'ilh thc \1'fi1/ Yi/in(lorvs is tillliiriil tc
)'our conrr;uter. 'ihe computer',r,:mts to suspend activity,
is lctling ir r.:rrrrrr cr'*,r1,'r-rrir; is-ca,iring;contusio,, b,t windorvs
ri,r'it,.,'.;;i;;;,;,;,,'iT';:ir. cases, trris can be solved
r"'itlt I nnti:lt lrotli thr: À'[icios.{i r^'irb s;ù'
a pair:h ii; an rrpclatu io a sorl*,are procluct that fixes a k,orvn
a pt'oili-:nl -'i'i1ir sl;Lrttiiltl clo',t'tt, rtpecially u'hcn tùe c()iupLlteiis attache<J to anefivork"
it Ge,erally, this
is -iLrst a i'it oi'a-nri,,311çç. s,:cl''Booting rroblenJ,ln
!.];:i:,:lll,.ï].]iït r,vhat to do during
b' A x inrlrl\\I l-lop:l tlp u'ith "llncl l'ltrti<^" "shut Jlo*'11," ;Lncl "crincel.,
brrttons, rvhat do I cio? This message
ttsitaiii'aill)cars \','11s1 ','6'1 presl; ar:rl irolrl "C,'rrti..!". .'r\1i,,, anll ,,I)eictc',,"lril"
nrnning an application or

ciicl< "Ctncr:l,,anrl r.orr u,ili retirur to


thr: r,lrl ,r"_,-c_jç:;i rlsin;_1.
c. Att irttc.iral c'ir)r or "I(crnalliJ., ,,.rr_.r [:,rri:r.ogr,,nr
ri,i.,r,r,],' ,,r,gg.rrirg tlrlt i r.r-'start \Àiirtrlou,s:
J.ltis error,as
ItapPcns anil r,oit ar.e in the nritlcllç.
of your.n,n,Lr, 111, 1o'rur,"
t'otk causecl thr: errorlo occttr, -rro,,. ri,orli before you clicl< ,,OK,,. If your
an*rt;r" to,,i tinr" 1,ou sarrecl wo1k, rvill be lost. Restart
"r'rr,",,'il.,i,rgI,
)rour col.uprrter. Ilemember to alrviq,s clor:umetrt enors tltoroughl5,. 'oLrr
l,nisbenat,ing software often causes
thcse errors. If t'e error occ*rs r.epearedr1,, ca[i fur {i.onr 3,e1r1 technician.
"rriut,,,,,,r,
M5' ntonittlt'1tas no displal', the monitor
turnecl olf fcr no l'eason, or.my
mon itor and thc cottrpute r are tunted clisplay is faded:Ensure that the
on' Ne xt, check both tire pori,er corcr
the compLttet" Ill',ot-t are usi,g a power to tire rnonitor and the power cord to
strip, ensure that ii iu iu.n.a on. you
monitor (the br-rttons are locaiecl à, the urro check the settings on your
set correctly' Next' check the connection
1or'ver fi'ont of the monitor).
crreck trr""* ancl ti,tto see ifthey are
betrveen ,r,r" cornput".; "àr-,i.urt
the cord that connects tire rnonitor
to the comp*ter). The ',orlu'and ui it . ..ar of the computer (this is
click o, your desktopàProperli"' o, yo,, ,ext tlrins t-o v"* screen saver settings. Rigrrt
ca, click Starr)settingl+cont "ir""r.'t
dialog box wiil appear) àstr"ee,
saulr tab' Make ,,-,." yo*..reen saver "iï"r.1+nispray (dispray settings
of ti,re (Lrsually 10 minutes or rnore). is set to go off i, a reasonable
Also,,ra[<e .rr. your "e,rergy savi.gs,, amollnt
Yolr ca, locate the settlngs are mar*ecl corectly.
sétti,rgs button in ure sc.".n Saverbox,îrearttre
"settit-tgs"' you rvill":"'qy.savings
be abte to aàiLrst the-amourt of time bottom, \\henyou crickon
ttraiyou,. computer waits to turn
orf the mo.itor if the
:ffiii:l:rriilil,l:.:1î,,lln:#;lïïJïï;fï
6. Monitor flashes on ancl olï
f*[ï:jiliiii#i;ff]Ï"i..*v savermocle, c,roose

usLrally this is cartsecl by a Ioose or


bacl connection at the back ofyoLrr
tighten thc coullectiotr, aucl colrtinue computer. yor-r shourd be able
as II'that is ,ot the proù[",-,r, ttr", it to re-
profess iona L ^on,al, n""as to be drag*osed by a
7. Mouse problems
a' My mouse is sticky and/or the cursor lvon 't m ove ch ecl< to scc
yourcord docstt'tltave enough i| you r ,1ou se cord is pu,ed too
room to ntureuver, then you willriave tigrrtry. if
tltotlse's connectiott to the back i"r, overit. Next, checkthe
of the cPU ancl .,rrr,"-r'no, it is prLrggJ "ont.r
werc thc problem' you may need ir. ir,r"i,n"r ofthese possibilities
to clean the b.l1;;tll;';nsicrc
a,d lake thc balj out by trvisting thc rourrrJ or.thl-rro,,r".'v", can flip overtrre lrolrse
clisc that horcrs it i, prace (;;;,
vou have ial<e rt out the ball,
il; Àunci piece in the direction
ï:i; îJ:î?"1""" "t"un
Ptrt thc rnoLrs0
ir,. barr'orîwiti, u'.r.ï,
bacl< 1ogcth",'r;;i;,.'rr'îat
dry, and ri,t-fiee clotrr.

b'
,rigrrr bc rirnc rJ üillïTii:::jl*tl
Mynrouscrvott'trightclicl<,o'';;;'tclouble
doesn,t rettre probrern, it
clicrr: prcssctrr-Art-nsca,c1
usethearrowr<ey,ptogetto
24l59,Nov-20t0
r rrcbisi.i crc.r(r)va to Know \vhy and How!
hor.co,) o r a rr c bis i.icrccr@o;;;,ï.:,ïr
Computer Training Expert Solution Consults Computer Basics
and then choosc reboot. fhis shoulcl fix rhe problem, if not a technician should look at the
*Ïl,f,::'
B. I(eyboarcl probiems
a' I am recei'ing a ke1'§32rcl error i'hc'n bootirlg mv conrputer:
This is usually caused by a key being p,shed
dorvn *'hile the comottter st.r'rts. N4alle sirre ,ottrirrl3
is ân top oi'tirc kel,boar.d during boot time.
coulc1 be cattsed by thr: I<e,bo"t'cl beco*ti,g Also this
riisconllected fio,r thc baci< of the computer.
are the probl:rn. contact If ,either ofthese
.
b' lrour techirician.
À{1'Iic,i'bolrd 'rvon't responcl at all: If'1'ouI Colrpulçf
iriis "ll.ozen,, and the keyboard lvill not
the tr^t ttrri,g to cio is to cltcc'l< tltc l:e1'$6n1il con,cction respond at all,
to the conrputer and restarl the computer.
keyboarcl stilr rloes not .espon11, If your
,r,sv nray nee (r tcch,icrl a.ssista,ce.
9. Printcr. Pr.oirlclris
a' The pri,ier'\'"o11't Pt'int nl, tioctitrtr:,t: (.lic'cll {iie p'intcr lo nral..r-'r;ure it is pluggc4
Start-ÈsettinglsùPlintels. llthe in a,d turnecl on. click
i:rintr:r'r',,,,,..,"r,t,",,r" is not li:;tej,,;"., Jviirhave to instail thatprinter.
You can ti. tlrir; b1
''-Jicliiirl, "A,i,i l'r'irr1e r" rrnrl I'riicrr,inir_thr: i,staiintiou p,o.*r. tlrrough
to cor,pletion. If

select c.lirtr-: NJcxt, nllll<c :;ttrr': tltat f i,11 lta'c clrose, thc
cor.ccl pri*tel.. you can checl< this by going
intrl thc {ilÊ 1'si1r,t:re tt,in['1o back
ltrittl ani] clic[< on Fil*àprinr. Tlie uarn" ofthe printerrvill appearnearthe
1op' o{'lhat *'ittclot'next to "Nûnle".
I1'the correct pri,te. does 11ot appea.-ir-t6,
arl'o\l/ t, litc .ight o f the uamc ol the pri*ter box, click on the dowr
bci,g *serl. Fi,r,i;,;;; ;;i;;;; ;',r"me ancl
clichi*g tlrc 1el't 1lloLlse button o, it. ortcc highlight it by
)'o., hnî'" e,snr:ecl that the correct printer is chosen and
printer is not ofllinc or pausecl, eusure that the
r"gg",r o,to the ,.t .'ro do
look to sce il5,sul logon name is listecl.thairou aftei,.t_og "r*Ofii tf "ort
this. click start and
back onto the network' To starl this process, ),or,.logon ,n_".i. not there. you need to log
ensule that you have saved your
start)Log off' This rvill bring up u aiutog i"". ôli"r. ;Ve.s,'. 'vork.
Then, click
and password to log back o,to the ,etrvorÈ. fou__rvilib" ;;o,rpted to enter yorrl. name
,,oËi
once you finish this, àr .,Enter.,, open your file
,b' Sgain and try to print it. If you stilr cannot print, "ti"t
prease cail a technician.
Documents come out fadeà or stripecl: rhis
is ,;;"1ry1;" crjfty or crogged print rreads, or the
being out of inl<' Try running a pri,t-heacl lo printer
.l.ur'ri,rg ,.,tiritv to clea, the hJàs. Most printors come
to help rvith dirty or clogged I'r"àdr. Do this with this
by g;;r;-;itartàsetting-r§pîirters,
on the printer in qr-restiot-t' Tryz clea,ing and ttre, right cticking
the heais, n,io irr.,", print a. pui".
it once more' If after tu'o tir,Ls your pages ryo, still get fades or.stripes, try
are stillcoming out faded or str-ipecr,
rcplace thc inlç' [], however, the ink lt,r-ot then you mayneed to
o, irrr", you ,hould contact a professio,al.
c l anr recciving an "ottt of t.netrrory" crror or a spoote'error:
printer is connectecl to runs oltt of mctrroty, This is .u.r..à wlien ttre machine
that the
or hzis nn internal error. This,sually
p.i,t jobs' Il'you get this error I'requcntly you happens because of large
,rrignlruori to.consider upgradi,g the
corÏpLrter with the pri,ter attachecl to it. memory on trre
It can ats"o u" cu,-,re.i by lack oiÀ...
you Itavc enough li'ee spacc. 'fo clo this, Jirk ,pu... check to see if
clouble cli"k on üy computer)Right-click,,c.,
Drivc)Propcrties''I'he liee space sl",o,lcl t",c
listecl or,",lro, ,".""n. ttyo, oniy
or le ss' that cott lcl bc yotr t hur. a couple of,regabÿes
1"oi,1"'",-,. You will neecl to eitrrer clean ,p yo.r. à,"iï. u...plu."
drivc' call a tcch,ician to llelp rvith either it rvith u bigg".
o{'these 1r,o".rr".. If yon irave adequate
trrrinstalling and tltcn rcinstalli,g the pri,rcr. disk space, try
r'o cro'ir,iiôi"r. ià;;Ïffiffin.urrers)Right_click
the prirlter in questiotl anci sclecl "Deiete." you o,
*n,ri tà',.ir-,or" it cornpletely ûom the
"Adcl Printer" allcJ rcirrstall the sat,e s1.stern. Then crick
printer. II'it was,-o"à o..o.r r,.,"*o.t-Luk.
"sharc" with the sarre nârne' This can
be clone uy .igrri"ri"r<ing on tlr" prl;tr;^;nd
rrr. you reestablish the
Prin te r". choosing ,,share This
10. CD-Rorn Issues
a' I havc no ar'tdio artcl/or my cD playcr rvon't cor.Ire on rvhen playing
an audio cD: First, check to
yclt"tl'spcal<crs arc tttrncd on ancl
the volttnrc leve Is arc aclequate. see if
At the Tasr< bar tray is a Iittre spear<er,
25159, Nov - 2010
,crcbisi.ierccr@ynrroo.corn I(no'rv why ancl Horv!
or,.dcbisi.icrec,e;lrrt#t.

You might also like