Professional Documents
Culture Documents
Physical Maintenance
Of course, every one of us doesn’t want our computer or laptops to
malfunction or get broken. In fact some of us are doing some extra efforts to
protect this machine, it is for a reason that this machine is a bit expensive and
also because this machine is somehow important in our studies or even in our
work.
If you want to sustain your machine, it requires a lot of work because you
need to keep it very clean as in physically clean. Dust at the office, school or
even at home is typically 2 to 10 µm (micro-meter) and even though its 20-
50times smaller than your hair. Once dust accumulates it can cause damage in
your motherboard because of short circuits.
That’s why you have to check the user’s manual if there are instruction
specific for your keyboard. Here are some of the tips you can follow to keep
your keyboard clean.
Of course, if you will be cleaning your keyboard. You need to first unplug it
from the PS/2 or USB port of your system Unit to avoid another trouble. After
that, gently shake the keyboard in an upside down position, so that the dust
and dirt will fall-out from the keys.
You may use compressed air to clean between the keys because if you will
just blow it by your mouth, water from your saliva might cause another
INTRODUCTION TO COMPUTING
CHAPTER 5: TROUBLESHOOTING, SECURITY, AND ETHICS
LESSON 1 – PHYSICAL, DATA, AND SOFTWARE MAINTENANCE
problem. Use a moist cloth to clean the top of the keys as much as possible
put rubbing alcohol in the cloth to make it more effective.
Lastly, reconnect the keyboard to your system unit and check if it is still
working properly.
Next thing, after cleaning your keyboard is your Mouse. If you are using
optical mouse, there is no need for in depth cleaning since it does not have any
mechanical parts inside that will accumulate dust. But if you are using
Mechanical Mouse, you need to do an in depth cleaning because it can
accumulate dust inside the mouse balls.
Aside from the mouse, there is another external parts of the computer that
needs to be clean which is the Monitor or the Display. Monitors are clean to
fully utilize its clarity and vibrance because most of the time dust, dirts and
fingerprints tends to make our monitor not clear and a bit darker. In order for
you to clean the Monitor what you just need is either a cloth moist with a bit
water or a cloth with a monitor cleaning solution.
INTRODUCTION TO COMPUTING
CHAPTER 5: TROUBLESHOOTING, SECURITY, AND ETHICS
LESSON 1 – PHYSICAL, DATA, AND SOFTWARE MAINTENANCE
Of course, if you will clean the external parts, you also need to clean the
system unit itself. In cleaning a computer surface here are some of the tips
which I get from a website GCFLearnFree.org. Dust is your computer’s main
enemy. Use an antisatic wipe to lightly dust your computer casing. Don’t use
furniture cleaners or strong solvents. Use a can of compressed air with a
narrow nozzle to blow out debris from the air intake slots. Spray cleaning
solutions like diluted ammonia cleaner or glass cleaner on a paper towel or
antistatic wipe. Clean the monitor housing and case not the monitor screen by
wiping in a downward motion. A safe cleaning solution for computer surfaces
not computer screens is ammonia diluted with water or glass cleaner
comprised mostly of ammonia and water (check the label). The milder the
solution, the better.
When it comes to the inside of the system units I suggest you need to use a
small vacuum cleaner to do the dusting. And also don’t forget to always use
the antistatic gloves in order to avoid the damage in the IC’s, Resistors,
Capacitors and etc. So I presume, next time you are now ready to do this
preventive maintenance on your computer in order to maintain its quality.
Data Maintenance
Aside from maintaining or keeping the physical components of your computer
clean. Now, we can discuss the maintenance of the data inside your computer.
There are three factors that will affect the data maintenance and that is Back-
ups, Privacy and Cyber Crime.
Most of the time, back-up is being neglected by home computer user and this
should be corrected in order to avoid future problem when data loss event
arrises. But for big institution, Backup is a must or it should be a routine since
they are processing a huge amount of data for their business transaction, that
should be accurate and real time.
There are two ways to do a backup, its either you backup locally or you use
internet also known as cloud to do the backup.
In doing a local backup, you can make use of different storage media and one
of the most inexpensive one is to use CD’s or DVD’s. This medium is
commonly used by user who wants to have a secure copy of their files, so that
when data loss events happen they have something to restore in their
computer. Another way to do the local backup is to use removable storage
such as flash drive or memory cards. This option is use if you are backing up
or copying a big amout of data from your computer.
Next is using the Internet or the Cloud backup. Cloud Backup is the process
of copying your local files into a cloud storage for future use. There are
several companies that offers cloud backup at a minimal amount of price.
backups, continuous backups, full disk backups, file sharing and folder
syncing.
CrashPlan offers online backup for $59.99 USD per year in each computer.
But the storage space of this company is unlimited compared to the 1Tb of
IDrive. It can do the same thing as IDrive can do except for the File Sharing,
Explorer Integration and Folder Syncing.
SOS Online Backup offers their service for only $59.99 USD per year in each
computer. Same as to CrashPlan it offers unlimited storage. It also has the
feature of IDrive except for Full Disk Backups and Explorer Integration.
SpiderOak is the company that offers online backup at a bit higher price.
SpiderOak offers 1Tb storage for unlimited computer at $129.00 USD per
year. It has the same feature as to the IDrive Company.
Those are the different companies that offers online or cloud backup services.
Let us now discuss the next topic of this lesson which is Computer Privacy.
Pharming, is a hacking activity that redirects the website visitor from their
legitimate website into a fraudulent website without them knowing it.
Malware, coming from its name Mal and Ware which means Malicious
Software. This malware is a software application that brings potential harm to
your computer because it disrupt your computer operation by installing
Trojan, viruses, worms, spyware, adware and other software that does
malicious intent.
3) Abuse
Software Maintenance
Your Computer systems won’t probably work without any software, programs
or applications inside it. And in order to maintain an efficient and good
running computer system we have to do some Software Maintenance. There
are several things we have to consider in order to do Software Maintenace like
maintaining the Operating System, doing some Software Updates and
knowing your BIOS.
According to OWU.edu “In order to keep your system running smoothly there
are few task you can perform. Regular maintenance will help your computer
up to speed and free of annoying problems.” Here are some of the routine that
you can follow:
First, go to All Programs under the Start Menu, click Accessories and look for
the System Tools. Find the Disk Cleanup button to proceed in the calculation
of how much space it can free up. After the calculation, Disk Cleanup will
give you a list of categories of files to delete. Make sure that the following
options are checked: 1) Downloaded Program Files 2) Temporary Internet
Files 3) Microsoft Office Temporary Files 4) Microsoft Error Reporting
Temporary Files 5) Recycle Bin 6) Setup Log Files 7) Temporary Files 8)
WebClient / Publisher Temporary Files 9) Temporary Offline Files 10)
Compress Old Files. Click OK and it will ask you to confirm you’d like to
delete the files. Usually it will take around 5 – 15 minutes depending on how
big the file is.
First, click the start menu and look for all programs. Under all programs
Figure 5.8 – Disk Cleanup choose accessories then system tools. From there you will see the Disk
and Defragmenter Defragmenter utilities. On the Disk Defragmenter options, it will ask you on
what disk to defragment and click the analyze button. After the analyzation
process it will recommend if you need to defragment or not. If it suggest to
defragment then click the defragment button otherwise cancel and close the
utility.
INTRODUCTION TO COMPUTING
CHAPTER 5: TROUBLESHOOTING, SECURITY, AND ETHICS
LESSON 1 – PHYSICAL, DATA, AND SOFTWARE MAINTENANCE
Trojan Horses – if you know the story of Troy and the Greeks in the early
years. This type of virus or malware uses the same technique that Troy uses to
win the battle. Typically, Trojan Horse Virus are malicious codes that is
attached to infected application programs or software which will execute a
different set of actions that will bring harm to your computer like for example
loss of data.
Rootkits - special type of software that are use to hide malware, bots and
worms. And in order for the attacker or hacker to attack a computer using this
type of technique, he needs to have a full access to the computer system to
install the said rootkits.
RansomWare – a special type of application that prevents its user to access the
computer system without paying its creator or subscribing/buying to its
creator’s products or services.
when you need to update a program, you don’t need to do anything other than
let the update do its thing.”
Next and last thing for the software maintenance is what we called the BIOS.
BIOS stands for Basic Input Output System, which is a type of firmware
used for the boot-up process of a computer system. According to
ComputerHope.com, BIOS has four main functions:
1) POST (Power-On Self Test) – Test the computer hardware and make sure
no errors exist before loading the operating system.
3) BIOS Drivers – Low level drivers that gives the compute basic operational
control over your computer’s hardware.