[go: up one dir, main page]

0% found this document useful (0 votes)
24 views54 pages

Maintain Your Computer and System

Uploaded by

onicgz420
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views54 pages

Maintain Your Computer and System

Uploaded by

onicgz420
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 54

Maintain your

Computer and System


PRE TEST
•Pre
1. ItTest
involves the process of taking care of
the computer's physical components.
• A. Device Utility Maintenance
• B.Hardware Maintenance.
• C. Software Maintenance
• D. System Maintenance

• 2. Which tool should be used in cleaning


different computer components without
• scratching?
• A. lint-free cloth C. soft brush
• B. paper towel D. soft cloth
• 3. Which material is used to blow away dust
and debris from different computer parts
without touching the components?
• A. Air Spray C. Compressed Air
• B. Blower D. Vacuum Cleaner
• 4. It is the modification of a system to
correct faults, improve performance, or to
adapt the system to a changed requirement.
• A. Device Utility Maintenance
• B. Hardware Maintenance
• C. Software Maintenance
• D. System Maintenance
5. It is a computer maintenance utility
included in Microsoft Windows designed to
free up disk space on a computer's hard
drive.
A. Back up C. Defragmentation
B. Check disk D. Disk Clean up

6. It is a Windows utility that can check the


integrity of your hard disk and can fix
various file system errors.
A. Back up C. Defragmentation
B. Check disk D. Disk Clean up
7. It is an event or action that could cause a
loss or damage of data, hardware,
software and processing capability of the
computer.
A. computer security access
B. computer security process
C.computer Security risk
D. computer logic programs

8. It is a software program that infect,


damage and disrupts the whole computer
system.
A. Malware C. Virus
B. Trojan horse D. Worms
9. It is a software utility used for scanning
and removing viruses from the computer.
A. Anti-virus C. Defragmentation
B. Check disk D. Disk clean up

10. It is the most important things to do to


avoid losing valuable data to your computer.
A. always save files on the desktop
B. regularly back-up your files
C. always used permanent storage devices
in saving files
D. regularly save your files into temporary
devices
LOOKING BACK
TO YOUR LESSON
1. Aubrey’s computer is connected across
the global network which share
different resources online. Which of the
following is being described?
A. Internet B. Network C. Server D. Web
2. Anna wants to access the web to search
for an answer to her assignment.
Which software program will she used to
access the web?
A. ISP B. HTML C. Web Browser D. Web
Server
3.To carry out the web search in a
systematic way for particular information,
Anna needs to choose ____ to open.
A. Browser B. Hyperlink C. Search engine D.
Web page

4. The following are the samples of search


engine except one. A. AltaVista B. Google
C. Myntra D. Yahoo

5. Gemma opens the icon of Google


Chrome, as she open, the first web
page appears. Which of the following page
is being described?
A. Home Page B. Web Browser C. Web Page
D. Web Site
• 6. In knowing the name of the company,
university or organization that owns the site,
which of these is specifically needed to take
a look?
• A. Domain Name C. Web Browser
• B. Web Address D. World Wide web

• 7. Joseph wants to save the web page he
visited, what should be the method of
saving will he used?
• A. use Bookmark n C. save the address
• B. use the Link D. save the browser

• 8. The unique address of the web is known


as _______. A. html B. http:// C. url D. www
9. It is a set of rules that defines how web
pages transfer on the webs.
A. html B. http:// C. url D. www

10. It is collection of electronics documents


that are linked together like a
spider web.
A. html B. http:// C. url D. www
Computer Maintenance is a process of
taking care of the
computer physically (hardware) and
systematically (system) to keep
it functioning well in an optimal performance
level
• Computer Hardware Maintenance

• Computer hardware maintenance involves
taking care of the computer's
• physical components, such as its keyboard,
hard drive and internal CD or DVD drives.
• Cleaning the computer, keeping its fans free
from dust, and defragmenting its hard
• drives regularly are all parts of a computer
hardware maintenance program.
Physical Maintenance
Keeping computer clean and avoiding
extreme temperature can help to maintain
hardware.
Desktops are designed usually with cooling
systems (cooling fans) for power
supply and CPU (cooling through ventilation).
It is recommended for the desktop to have a
big case (tower) in order for the
components to have as much space as
possible for a proper cooling. In addition,
you
can change your standard CPU fan with a
more advanced one. This will create a better
airflow and it will efficiently cool the CPU
heat.
🖥 Computer components like RAM, hard
drives, and video cards need cooling for
efficient functioning. RAM can use heat
spreaders (aluminum/copper) or RAM fans.
Hard drives might use fans depending on type
Video cards typically use a heat-conductive
metal with a fan for cooling - even "silent"
fans might be swapped for better ones. Case
airflow is managed by power supply fans
exhausting air, and adding a case fan to bring
in cool air can help ensure proper airflow.
Computer Transportation
There are some easy steps to follow if you
are thinking to move your computer
from one location to another:
1. Pack your computer using the original kit
2. Secure the box with padding and fill in
any empty spaces with bubble wrap.
3. If you own a laptop just put in your laptop
case. Nowadays laptop cases/bags have a
good cushioning which protects laptop
against all sort of harmful interventions or
accidents.
4. If you feel that your computer wasn't
transported properly and water got into the
case
or laptop, take out the battery; for
computer's, open the case and
position the case or
laptop in a position to evacuate water and
keep it at rooms temperature at least for 12
hours to dry out . Don't turn on the
computer during that time. Avoid speeding
the dry
out process by using your hairdryer as this
will cause static problems.
5. Even if the computer was transported
correctly, leave at least 30 minutes at
room's temperature before you turn it on
in the new location.
Prevention and Maintaining Methods
1. Use lightning protective electrical outlet in
combination with Uninterruptable Power Supply
(UPS). The UPS will assure the quality of
electrical power and will prevent loss of data
during a power outage. It will also provide you
enough time to save any files you were working
on. Another advantage of the UPS is that it
protects your computer from shutting down
improperly and it will take in any electrical socks.
Electrical socks usually damage your system
components, mainly those with electrical motors
like Hard Drive and CD-ROM.
For laptops, data lost can be avoided during a
blackout if the battery is in.

2. Keep your monitor clean by using lint-free


cloth with special cleaning solution.
Managing your Hard Drive Space

Hard disks can be divided in multiple storage


units also called partitions. This process is
required to separate operating system and
programs files from work files. During windows
installation, you will need to determine the size
of the hard disk partition on which the operating
system will be installed. The amount dedicated
to the system drive should be at least the
doubled amount of your operating system
space requirements. If you plan to add more
applications and features, estimate an average
of needed space and added it to the above
amount. You need also to add a few more GB
as a precaution for additional components,
future service packs and virtual memory. The
basic principle is to allow considerably more
disk space than the minimum.
• Benefits of Managing Hard Drive
• 1. Data Safety - by saving your work files or
other important files to other partitions
makes the recovery from a system.
• 2. Best System Performance - by saving your
files to other partitions the system has a
constant free space amount at its disposal.
• 3. Increased Speed Accessing Files - by
creating multiple partitions the speed of
• accessing files is considerably increased (it
takes longer to read from 1 MFT (master
• file table) of one hard disk partition than from
smaller MFTs of smaller partitions)
• 4. Recoverable Data – if one drive gets
corrupted the other drives remain intact. It
is also related to disk space is the
maintenance of your desktop files All files
that are stored on desktop are really saved
in your account profile which is located on
your system drive. Most people save their
data on desktop from convenience reasons.
However, this causes your system partition
to fill up and eventually to slow down your
computer. Lack of free space affects your
virtual memory and your data safety.
• 5. Keep your computer protected and up to
date - computer's health is very important.
Various steps must be taken prior to use to
assure best protection and functionality
and to prevent malicious software to put
the computer at risk:
• a. Start Installing All Offered Windows
Updates Windows update is a service
provided by Microsoft which facilitates
patching your system with latest security
and error fixes. Security updates or critical
updates keep your computer safe by
eliminating any known system
vulnerabilities
• Windows service pack – it incorporates a
collection of updates, fixes and
enhancements in one single package.
Security update - system updates and
service packs are being issued constantly
and you'll be notice when they are ready for
your system. Windows update against any
security threats.
• b. Protect your computer against malicious
software by installing a Security.Software
Before going online protect your computer
with security software (firewall and
antivirus). You can choose a free software
or a 30 day free trial version. After various
• tests you can decide which software you
would like to keep protecting your system.
• C. Check if all installed drivers are
functioning properly-
properly Usually when you buy a
computer, desktop or laptop, you receive also
a couple
• of CD’s containing your system's drivers and
your windows installation disk. Some
• laptops come with recovery CD’s which
already have the drivers incorporated and you
• don't have to install them one by one, the
setup is doing that for you.
• In case you lose these CD’s or you want to
install a different operating system then
• the one preinstalled.
• Periodic Computer Maintenance

• The operating system's purpose is to
interact with the user. One of his
functionality is to anticipate user’s needs
and use various methods to recover in case
of system failure. To achieve this, the
operating system during his daily
functioning,collects and stores important
data. He uses different methods for
different actions. For Browsing it saves all
visited web pages. The purpose is, if you
want to access them again, they will load
faster. If major changes take place, like a
driver installation, the system creates a
system restore point.
Increase System's Performance
The pc tune-up procedure is intended to
increase system's performance. All
presented methods are easy to follow and
prevent your system to run slow, freeze or
crash. To improve your system
performance you can stop services you
usually don't use.
Disk Clean-up - is a computer maintenance
utility included in Microsoft Windows
designed to free up disk space on a
computer's hard drive. The utility first
searches and analyzes the hard drive for
files that are no longer of any use, and then
removes the unnecessary files. ... Temporary
Internet files.
Check Disk (CHKDSK) - is a
Windows utility that can check the
integrity of your
hard disk and can fix various file
system errors.
CHECKING YOUR
UNDERSTANDING
1. It is the component of the computer that
uses disk clean-up tool for a better
performance.
A. Compact Disc B. Hard Disk C. RAM D.
Flash Disk
2. It is used to protect both hardware and
system components.
A. Security Software C. Windows Service
Pack
B. Security Update D. Windows update
3. Hard disk can be divided in multiple
storage units called ________.
A. division B. partition C. segregation D.
separation
4. It assures the quality of electrical power
and will prevent loss of data during a power
outage.
A. Automatic Voltage Regulator (AVR)
B. Uninterruptable PowerSupplyUnit(UPS )
C. Power Supply Unit (PSU)
D. Central Processing Unit (CPU)
5. To check the integrity of hard disk and fix
various file system errors, we used the
_______ command.
A. chkdsk c: /f /r C. cleanmgr
B. cmd c: /f /r D. clean-up
LESSON 2- FILE MAINTENANCE

EXPECTATIONS:

A.Explain how to back up files;


B.Perform the steps of deleting
unwanted files ; and
C.Recognize the value of anti-virus
software.
FILE MAINTENANCE
It is pertaining to the routine changes,
updates, copying, moving, or deleting of files
on a computer. It is performed on
computers or servers that are serving a vast
amount of files.
BACKING UP FILES
It is the process of duplicating files and
programs into computer. The Importance of
Backing Up Files It is very important to do
regular backups to prevent the lost of data.
Software can be reinstalled but your data
could quite possibly be lost. There are
various causes for data loss such as
machine breakdown, virus, power outage,
software upgrades, fire, flood and human
error.
Backup – a duplicate copy of a file, program, folder
or disk used if the original is damaged, corrupt or
lost.
Restore – to copy the backed up version of
information back to its original location.
Backup Media – can be another computer, CD(s),
DVD(s) or any other recordable media for
computers.
CDs can hold 650-800mb
DVDs can hold 4.7gb
External hard drive can hold various amounts of
information. How much will depend on the size of
drive you have.
Full Backup – backing up everything on your
computer. It includes data, software and
operating system. Incremental Backup – it is a
backup of only what has changed since the last
backup.
• Incremental Backup – it is a backup of only
what has changed since the last backup.
• DELETING UNWANTED/JUNK FILES
• Too much clutter on your hard drive not only
consumes space – it means your
• PC has to work harder to find the files you
do need. Files you no longer use can be
• archived to an external drive, while
downloads, duplicates and temporary files
can be
• deleted altogether.
• Classes of Malicious Software
• Ransomware
• it is a type of malicious software that
threatens to publish the victim's data or
perpetually block access to it unless a
ransom is paid while some simple
ransomware may lock the system in a way
that is not difficult for a knowledgeable
person to reverse,more advanced malware
uses a technique called cryptoviral extortion,
which encrypts the victim's files, making
them inaccessible, and demands a ransom
payment to decrypt them.
Viruses
- computer virus is a type of malware that
propagates by inserting a copy of itself into
and becoming part of another program. It
spreads from one computer to another,
leaving infections as it travels. Viruses can
range in severity from causing mildly
annoying effects to damaging data or
software and causing denial-of-service
(DoS) conditions.
• Worms
• - Computer worms are similar to viruses in
that they replicate functional copies of
themselves and can cause the same type
of damage. In contrast to viruses, which
require the spreading of an infected host
file, worms are standalone software and do
not require a host program or human help
to propagate. To spread, worms either
exploit vulnerability on the target system or
use some kind of social engineering to trick
users into executing them
Trojans
- it is another type of malware named after
the wooden horse that the Greeks used to
infiltrate Troy. It is a harmful piece of
software that looks legitimate. Users are
typically tricked into loading and executing
it on their systems. After it is activated, it
can achieve any number of attacks on the
host, from irritating the user (popping up
windows or changing desktops) to
damaging the host (deleting files, stealing
data, or activating and spreading other
malware, such as viruses).
Bots - "Bot" is derived from the word "robot"
and is an automated process that interacts
with other network services. Bots often
automate tasks and provide information or
services that would otherwise be conducted
by a human being. A typical use of bots is to
gather information, such as web crawlers, or
interact automatically with Instant
Messaging (IM), Internet Relay Chat (IRC), or
other web interfaces. They may also be used
to interact dynamically with websites.
UPDATING ANTI-VIRUS
Antivirus software is a type of program
designed and developed to protect
computers from malware like viruses,
computer worms, Trojan horse, spyware,
botnets, rootkits, keyloggers and such.
Antivirus programs function to scan, detect
and remove viruses from your computer.
The prime objective of any antivirus
program is to protect computers and
remove viruses once detected.
• CHECKING YOUR UNDERSTANDING

• Direction: Answer the following questions correctly.
• 1. How important is the backing up of files?

• ___________________________________________________________
• ___________________________________________________________
• ___________________________________________________________
• __________________________________________________________.

• 2. Why do you need to update the anti-virus program?

• ___________________________________________________________
• ___________________________________________________________
• ___________________________________________________________
• __________________________________________________________.
POST-TEST
1. If you keep your computer clean and you
avoided the extreme temperature of it,
which process of maintenance is being
followed? A. Device Utility Maintenance
B. Hardware Maintenance
C. Software Maintenance
D. System Maintenance
2. In cleaning different computer
components without scratching, which tool
should be used?
A. lint-free cloth C. soft brush
B. paper towel D. soft cloth
3. To blow away dust and debris from
different computer parts without touching the
components, which material will be used?
A. Air Spray C. Compressed Air
B. Blower D. Vacuum Cleaner
4. If there is a modification to a system
requirement, which maintenance is best
needed?
A. Device Utility Maintenance
B. Hardware Maintenance
C.Software Maintenance
D. System Maintenance
5. To free up the disk space on a computer's
hard drive, which utility maintenance in
Microsoft Windows should be used?
A. Back up C. Defragmentation
B. Check disk D. Disk Clean up
6. To check the integrity of your hard disk
and fix various file system errors, which
Windows utility should be implemented?
A. Back up C. Defragmentation
B. Check disk D. Disk Clean up
7. An event or action took place and it
caused damage to data, hardware, software
and processing capability of the computer.
From the statement given, which of the
following is being described?
A. logic programs C. security process
B. security access D. security risks
8. This software program infect, damage
and disrupts the whole computer system.
Which of the following is being described?
A. Malware C. Virus
B. Trojan horse D. Worms
9. To protect the whole computer system,
which software utility is needed?
A. Anti-virus C. Defragmentation
B. Check disk D. Disk clean up
10. To avoid losing valuable data to your
computer, which is the most important thing
to do?
A. always save files on the desktop
B. regularly back-up your files
C. always used permanent storage devices in
saving files
D. regularly save your files into temporary
devices
11. Which of the following is the component
of computer that uses disk clean-up tool for
a better performance?
A. Compact Disc B. Hard Disk C. RAM
D. Flash Disk
12. To protect both hardware and system
components, which of the following utility is
needed?
A. Security Software
B. Security Update
C. Windows service pack
D. Windows update
• 13. If the hard disk is divided in multiple
storage units, which process is being
implemented?
• A. divisioning B. partitioning C. segregating
• D. separating
• 14. To ensure the quality of electrical power
and prevent the loss of data during a
• power outage, which equipment will be used?
• A. Automatic Voltage Regulator (AVR)
• B. Uninterruptable Power Supply Unit (UPS )
C. Power Supply Unit (PSU)
• D. Central Processing Unit (CPU)
15. In checking the integrity of hard
disk and to fix various file system
errors, what
command will be used?
A. chkdsk c: /f /r C. cleanmgr
B. cmd c: /f /r D. clean-up
THANK YOU
FOR LISTENING

You might also like