Professional Documents
Culture Documents
Computer Application in Journalism: Computer Acquisition and Safety
Computer Application in Journalism: Computer Acquisition and Safety
COMPUTER APPLICATION IN
Computer Acquisition and Safety
JOURNALISM
LECTURER: MUKHWANA ERICK
(Bsc.Csc(MUK),PGD I.T(MUK)HCIA AI (Huawei) • Computers, like any other piece of electronic equipment, need special care
HCIA Datacom(Huawei)) and attention in order to perform properly and safely. There are many
tasks that should be done, and caution that should be taken to ensure
Email: eryque7@gmail.com / emukhwana@cis.mak.ac.ug proper working, and safety of all components of the computer system. In
this unit, we shall concentrate on some daily do's and don'ts and
CONTACT: 0702383384 precautions that any one in a computing environment should know.
CONTACT HOURS: Tuesday@5pm ,Friday@5pm, Saturday@1pm
Lecture 3
Computer Acquisition and Safety
1
4/17/23
• Fit strong locks, doors, windows • Electrical noise is commonly generated by devices like Fluorescent lights of
and roofing. Security should be high frequency, Motors, Battery Chargers, Inverters, Radios, television, and
good around computer room to Cell phones.
avoid thefts. • Dust control. When setting up the computer laboratory, consider a location
• Overcrowding of either machines or people should be avoided. away from excessive dust.
• Always install lightening conductors to the computer laboratory to protect • The room should have special curtains and computers should remain
the machines and the users of the computers. covered using dust covers when not in use.
• Ventilation should be good. Good aeration enables the computer to cool • Dump Control: Humidity must be regulated in the computer laboratory to
and hence avoids overheating remain at an optimum 50%.
• Minimize Electrical noise / interferences in the computer environment. • Low humidity may cause static electricity to build and damage sensitive
ELECTRICAL NOISE refers to externally radiated signals that cause components.
undesirable additions to the current voltage.
2
4/17/23
• Always use and regularly updated antivirus software. Viruses and worms are
• Carry out Disk Defragmentation when necessary.
horrible computer-unfriendly programs that can crash your system and
cause damage. • A computer is a storehouse for large amounts of data and so, Having a
• Avoid Installation Marathons -Sometimes, installing a new program can disorganized computer slows down the processing time.
cause conflicts within your system. • Disk Defragmentation organizes files in a way where the computer can
• It is therefore advisable to use the computer long enough to see how your easily access everything.
system responds to the installation before installing the next program. • Disk Defragmentation is the process in which scattered pieces of individual
files and free space are reorganized and stored in an adjacent manner (next
to each other) on the disk.
3
4/17/23
Tools used in servicing and maintenance of Ways of how computer hardware can be kept
computers safe in a laboratory
• Blower • Burglar proofing the room.
• Screw driver • Installing fire prevention and control equipment.
• Providing stable power supply.
• Needle nosed pliers
• Installing lightening arrestors on the computer room
• Wire cutters • The room should be well laid out with enough space for movement.
• Tweezers or part retrievers • Dust and dump proofing the computer room.
• Chip extractors • Cables and power sockets should be well insulated and of the correct power
rating to avoid short circuits that can damage computer components.
• Crimping tool • The users should not eat or drink in the computer laboratory.
• Flash light
• Defacing computers by use of sharp objects like a campus. • Placing a computer on a flat surface.
• Eating and drinking in the lab. • Avoid drinking and eating in a computer lab.
• Placing computers on non- flat surfaces. • By following strict rules in laboratory.
• Using un-grounded power sources. • Installing antivirus programs on the computers.
• Opening a computer when it is running. • Using of passwords.
• Moving the computer while it is running. • Instituting a user log.
• Working with a computer in a dusty environment. • Sensitizing computer users.
• Punishing / fining offenders.
• Activating a firewall facility in the computer laboratory.
4
4/17/23