SlideShare ist ein Scribd-Unternehmen logo
1 von 20
1 
Lesson 3 
Computer Protection 
Computer Literacy 
BASICS: A 
Comprehensive Guide 
to IC3, 3rd Edition 
Morrison / Wells
Lesson 3 
Objectives 
 Identify the importance of protecting computer 
hardware from theft and damage. 
 Explain how to protect data. 
 Identify environmental factors that can cause 
damage to computer hardware and media. 
 Identify how to protect computer hardware from 
power loss and fluctuation. 
 Identify common problems associated with computer 
hardware. 
2 Morrison / Wells CLB: A Comp Guide to IC3 3E
Lesson 3 
Vocabulary 
 backup 
 data theft 
 driver 
 encryption 
 humidity 
 ping 
 power spikes 
 surge suppressor 
 uninterruptible 
power supply (UPS) 
3 Morrison / Wells CLB: A Comp Guide to IC3 3E
Lesson 3 
Introduction 
 As the use of computers has grown in 
volume and importance, protecting computer 
systems and the information they hold has 
become increasingly important. 
 There are many issues of computer 
maintenance, the risks of computing, and the 
measures that can be taken to minimize 
those risks. 
4 Morrison / Wells CLB: A Comp Guide to IC3 3E
Lesson 3 
Protecting Computer Hardware 
from Theft and Damage 
 Theft of and damage to computer equipment 
is a serious problem. Safeguards include: 
– Physically secure equipment 
– Use security locks 
– Mark equipment with identification mark 
– Insure the equipment 
– Back up data to a separate system 
 Employees using company computers for 
personal use can be a type of theft. 
5 Morrison / Wells CLB: A Comp Guide to IC3 3E
Lesson 3 
Data Protection 
 Data is a critical component of businesses. 
 The risk and severity of data theft is due to: 
– The value of data stored on computers 
– Confidential and private data being stored 
– Increased use of laptops outside a secure network 
– Increased proficiency of data hackers and thieves 
 Encryption is a secure process for keeping 
confidential information private. 
Morrison / Wells CLB: A Comp Guide to IC3 3E 
6
Lesson 3 
Data Protection (continued) 
 Data Backup: 
 Because data is so valuable, you must back up 
important files regularly. 
 Backup procedures should place a priority on files 
that would be difficult or impossible to replace or 
reconstruct if they were lost. 
 Have secure backup procedures that include a 
regular schedule for backing up designated files and 
storing the backup files off site. 
Morrison / Wells CLB: A Comp Guide to IC3 3E 
7
Lesson 3 
Environmental Conditions 
 Computers require the right balance of physical 
and environmental conditions to properly operate. 
 Temperature: 
 A temperature range of 68 to 
75 degrees is optimal for 
system reliability. A separate 
thermostat can monitor 
temperature and humidity 
levels in a computer room. 
8 
Morrison / Wells CLB: A Comp Guide to IC3 3E
Lesson 3 
Environmental Conditions 
(continued) 
 Humidity: 
 A high level of humidity can cause computers 
to short circuit, resulting in the loss of data 
and damage to hardware. 
 For optimal performance, the relative 
humidity of the computer room should be 
above 20 percent and below the dew point. 
9 
Morrison / Wells CLB: A Comp Guide to IC3 3E
Lesson 3 
Environmental Conditions 
(continued) 
 Water Damage: 
 If a computer suffers water damage, make 
sure it is completely dried out before you 
restore the power. 
 Magnetic Fields and Static Electricity: 
 A single spark from static electricity can 
damage the internal electronics of a 
computer. Have grounding protection. 
10 
Morrison / Wells CLB: A Comp Guide to IC3 3E
Lesson 3 
Environmental Conditions 
(continued) 
 Maintaining Equipment: 
 Cut down on computer repair through 
preventive maintenance. Create a monthly 
maintenance schedule and follow it regularly. 
 Physical Damage: 
 Prevent damage to portable computers due 
to physical shock by transporting devices 
with care, such as in padded cases. 
11 
Morrison / Wells CLB: A Comp Guide to IC3 3E
Lesson 3 
Power Loss and Power Fluctuation 
Issues 
 An unexpected power outage can wipe out 
any data that has not been properly saved. 
 Protect electronic devices from power spikes, 
which are short, fast transfers of electrical 
voltage, current, or energy. 
 Surge suppressors can 
protect against power 
spikes. 
Surge suppressor 
12 
Morrison / Wells CLB: A Comp Guide to IC3 3E
Lesson 3 
Power Loss and Power Fluctuation 
Issues (continued) 
 One option for preventing data loss due to 
power outages is to install an uninterruptible 
power supply (UPS). 
 A UPS contains a 
battery that 
temporarily provides 
power if the normal 
current is interrupted. 
13 
Morrison / Wells CLB: A Comp Guide to IC3 3E
Lesson 3 
Hardware Issues 
 You can resolve or prevent many hardware 
issues by proper planning and training. 
 Crashed Hard Drive: 
 To evaluate the condition of the drive: 
– Verify the cable is not damaged and is plugged in 
– Use a boot disk to determine if drive is readable 
– Use diagnostic and data recovery programs 
– Use a data and recovery service 
14 
Morrison / Wells CLB: A Comp Guide to IC3 3E
Lesson 3 
Hardware Issues (continued) 
 Damaged Media: 
 Hard disks and other media eventually fail, 
but often you can recover the data. 
 First, move it to a secure environment, then 
inspect or test it to evaluate the damage. 
 The type of damage determines the type of 
recovery method to use. 
15 
Morrison / Wells CLB: A Comp Guide to IC3 3E
Lesson 3 
Hardware Issues (continued) 
 Printer Problems: 
 Paper jams are one of 
the more common 
problems. 
 Display Problems: 
 The majority of display problems are caused 
by incorrect, corrupted or missing video 
drivers. 
16 
Morrison / Wells CLB: A Comp Guide to IC3 3E
Lesson 3 
Hardware Issues (continued) 
 Inoperable Hardware Devices: 
 Could be a software, electrical, or mechanical 
problem. 
 A small program called a driver instructs the 
operating system on how to operate specific 
hardware. 
 Loss of Network or Internet Connectivity: 
 Means people cannot communicate or work 
effectively. 
17 
Morrison / Wells CLB: A Comp Guide to IC3 3E
Lesson 3 
Summary 
In this lesson, you learned: 
 Computer equipment needs to be protected 
from theft and damage 
 Back up data frequently and consistently to 
avoid losing important information. 
 The right balance of physical and 
environmental conditions are required for 
computers to operate properly. 
18 
Morrison / Wells CLB: A Comp Guide to IC3 3E
Lesson 3 
Summary (continued) 
 High humidity, water, and electric/magnetic 
fields can damage computer equipment. 
 Preventive maintenance reduces equipment 
repair needs. 
 Electrical power failure can destroy data and 
equipment. 
 Surge suppressors can protect against 
power spikes. 
19 
Morrison / Wells CLB: A Comp Guide to IC3 3E
Lesson 3 
Summary (continued) 
 Computer centers are vulnerable to problems 
such as a crashed hard disk, damaged 
media, printer and display problems, 
inoperable hardware devices, and loss of 
network and Internet connectivity. 
20 
Morrison / Wells CLB: A Comp Guide to IC3 3E

Weitere ähnliche Inhalte

Was ist angesagt?

lesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handoutslesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handouts
lorbz
 
Module5 input output storage devices
Module5 input output storage devicesModule5 input output storage devices
Module5 input output storage devices
Shaharizan Hassan
 
Ic3 gs5-computing-fundamentals-021016
Ic3 gs5-computing-fundamentals-021016Ic3 gs5-computing-fundamentals-021016
Ic3 gs5-computing-fundamentals-021016
My Dung Pham
 
5 assessment instrument evidence_ tos_ written t_est_etc
5  assessment instrument  evidence_ tos_ written t_est_etc5  assessment instrument  evidence_ tos_ written t_est_etc
5 assessment instrument evidence_ tos_ written t_est_etc
MCabz1
 

Was ist angesagt? (20)

Lesson 01
Lesson 01Lesson 01
Lesson 01
 
Lesson 04
Lesson 04Lesson 04
Lesson 04
 
Lesson 02
Lesson 02Lesson 02
Lesson 02
 
Computer Literacy Lesson 6
Computer Literacy Lesson 6Computer Literacy Lesson 6
Computer Literacy Lesson 6
 
Lesson 05
Lesson 05Lesson 05
Lesson 05
 
The Computer System
The Computer SystemThe Computer System
The Computer System
 
lesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handoutslesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handouts
 
Module5 input output storage devices
Module5 input output storage devicesModule5 input output storage devices
Module5 input output storage devices
 
Performing Computer Operations (PCO)
Performing Computer Operations (PCO)Performing Computer Operations (PCO)
Performing Computer Operations (PCO)
 
Ic3 gs5-computing-fundamentals-021016
Ic3 gs5-computing-fundamentals-021016Ic3 gs5-computing-fundamentals-021016
Ic3 gs5-computing-fundamentals-021016
 
Data recovery
Data recoveryData recovery
Data recovery
 
5 assessment instrument evidence_ tos_ written t_est_etc
5  assessment instrument  evidence_ tos_ written t_est_etc5  assessment instrument  evidence_ tos_ written t_est_etc
5 assessment instrument evidence_ tos_ written t_est_etc
 
Lesson 07
Lesson 07Lesson 07
Lesson 07
 
understanding the computer system
understanding the computer systemunderstanding the computer system
understanding the computer system
 
Advanced PC Maintenance and Troubleshooting
Advanced PC Maintenance and TroubleshootingAdvanced PC Maintenance and Troubleshooting
Advanced PC Maintenance and Troubleshooting
 
Lesson 09
Lesson 09Lesson 09
Lesson 09
 
Lesson 06
Lesson 06Lesson 06
Lesson 06
 
Computer Hardware Servicing
Computer Hardware ServicingComputer Hardware Servicing
Computer Hardware Servicing
 
Data recovery report
Data recovery reportData recovery report
Data recovery report
 
C with lab
C with labC with lab
C with lab
 

Andere mochten auch (6)

Lesson 03
Lesson 03Lesson 03
Lesson 03
 
Lesson 11
Lesson 11Lesson 11
Lesson 11
 
Computer Literacy Lesson 30
Computer Literacy Lesson 30Computer Literacy Lesson 30
Computer Literacy Lesson 30
 
Computer Literacy For Teacher
Computer Literacy For TeacherComputer Literacy For Teacher
Computer Literacy For Teacher
 
Importance of computer literacy
Importance of computer literacyImportance of computer literacy
Importance of computer literacy
 
Computer Basics 101 Slide Show Presentation
Computer Basics 101 Slide Show PresentationComputer Basics 101 Slide Show Presentation
Computer Basics 101 Slide Show Presentation
 

Ähnlich wie Computer Literacy Lesson Three

Coding, Information Theory (and Advanced Modulation
Coding, Information Theory (and Advanced ModulationCoding, Information Theory (and Advanced Modulation
Coding, Information Theory (and Advanced Modulation
jeronimored
 
Computer Literacy Lesson 24
Computer Literacy Lesson 24Computer Literacy Lesson 24
Computer Literacy Lesson 24
cpashke
 
Menerapkan keselamatan, kesehatan kerja dan lingkungan hidup
Menerapkan keselamatan, kesehatan kerja dan lingkungan hidupMenerapkan keselamatan, kesehatan kerja dan lingkungan hidup
Menerapkan keselamatan, kesehatan kerja dan lingkungan hidup
Eko Supriyadi
 
Pace it environmental-impact_and_control_sw_nm
Pace it environmental-impact_and_control_sw_nmPace it environmental-impact_and_control_sw_nm
Pace it environmental-impact_and_control_sw_nm
Edward Sargent
 
F032031036
F032031036F032031036
F032031036
inventy
 

Ähnlich wie Computer Literacy Lesson Three (20)

Lesson 31
Lesson 31Lesson 31
Lesson 31
 
Coding, Information Theory (and Advanced Modulation
Coding, Information Theory (and Advanced ModulationCoding, Information Theory (and Advanced Modulation
Coding, Information Theory (and Advanced Modulation
 
Computer Literacy Lesson 24
Computer Literacy Lesson 24Computer Literacy Lesson 24
Computer Literacy Lesson 24
 
14 - Computer Security.pdf
14 - Computer Security.pdf14 - Computer Security.pdf
14 - Computer Security.pdf
 
The benefits of Electrical Installation and Maintenance.pdf
The benefits of Electrical Installation and Maintenance.pdfThe benefits of Electrical Installation and Maintenance.pdf
The benefits of Electrical Installation and Maintenance.pdf
 
IT Security and Risk Management
IT Security and Risk ManagementIT Security and Risk Management
IT Security and Risk Management
 
Menerapkan keselamatan, kesehatan kerja dan lingkungan hidup
Menerapkan keselamatan, kesehatan kerja dan lingkungan hidupMenerapkan keselamatan, kesehatan kerja dan lingkungan hidup
Menerapkan keselamatan, kesehatan kerja dan lingkungan hidup
 
Uc13.chapter.15
Uc13.chapter.15Uc13.chapter.15
Uc13.chapter.15
 
Pace it environmental-impact_and_control_sw_nm
Pace it environmental-impact_and_control_sw_nmPace it environmental-impact_and_control_sw_nm
Pace it environmental-impact_and_control_sw_nm
 
Pace IT - Environmental Impact and Control
Pace IT - Environmental Impact and ControlPace IT - Environmental Impact and Control
Pace IT - Environmental Impact and Control
 
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
 
1 (1).pptx
1 (1).pptx1 (1).pptx
1 (1).pptx
 
Switchgear and Protection Engineering Lecture 01.pptx
Switchgear and Protection Engineering Lecture 01.pptxSwitchgear and Protection Engineering Lecture 01.pptx
Switchgear and Protection Engineering Lecture 01.pptx
 
F032031036
F032031036F032031036
F032031036
 
TAKO SINCE 1979 STOP RM250 MILLION LOSSES WITH MS IEC 62305 LIGHTNING PROTECT...
TAKO SINCE 1979 STOP RM250 MILLION LOSSES WITH MS IEC 62305 LIGHTNING PROTECT...TAKO SINCE 1979 STOP RM250 MILLION LOSSES WITH MS IEC 62305 LIGHTNING PROTECT...
TAKO SINCE 1979 STOP RM250 MILLION LOSSES WITH MS IEC 62305 LIGHTNING PROTECT...
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
Introduction safety
Introduction safetyIntroduction safety
Introduction safety
 
Ch13 Business Continuity Planning and Procedures
Ch13 Business Continuity Planning and ProceduresCh13 Business Continuity Planning and Procedures
Ch13 Business Continuity Planning and Procedures
 
ITE_50_Chapter2.ppt
ITE_50_Chapter2.pptITE_50_Chapter2.ppt
ITE_50_Chapter2.ppt
 
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental ControlsPACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
 

Mehr von cpashke (20)

Chapter4
Chapter4Chapter4
Chapter4
 
Chapter3
Chapter3Chapter3
Chapter3
 
Web Design Chapter3
Web Design Chapter3Web Design Chapter3
Web Design Chapter3
 
Pscs6 ch09 ppt
Pscs6 ch09 pptPscs6 ch09 ppt
Pscs6 ch09 ppt
 
Pscs6 ch08 ppt
Pscs6 ch08 pptPscs6 ch08 ppt
Pscs6 ch08 ppt
 
Pscs6 ch07 ppt
Pscs6 ch07 pptPscs6 ch07 ppt
Pscs6 ch07 ppt
 
Pscs6 ch06 ppt
Pscs6 ch06 pptPscs6 ch06 ppt
Pscs6 ch06 ppt
 
Photo ch05 ppt
Photo ch05 pptPhoto ch05 ppt
Photo ch05 ppt
 
PS cs6 ch04 ppt
PS cs6 ch04 pptPS cs6 ch04 ppt
PS cs6 ch04 ppt
 
Lesson 2 Importing media
Lesson 2 Importing mediaLesson 2 Importing media
Lesson 2 Importing media
 
Exploring Movie Maker
Exploring Movie MakerExploring Movie Maker
Exploring Movie Maker
 
Computer Literacy Lesson 30
Computer Literacy Lesson 30Computer Literacy Lesson 30
Computer Literacy Lesson 30
 
Computer Literacy Lesson 29
Computer Literacy Lesson 29Computer Literacy Lesson 29
Computer Literacy Lesson 29
 
Computer Literacy Lesson 28
Computer Literacy Lesson 28Computer Literacy Lesson 28
Computer Literacy Lesson 28
 
Computer Literacy Lesson 27
Computer Literacy Lesson 27Computer Literacy Lesson 27
Computer Literacy Lesson 27
 
Computer Literacy Lesson 26
Computer Literacy Lesson 26Computer Literacy Lesson 26
Computer Literacy Lesson 26
 
Computer Literacy Lesson 25
Computer Literacy Lesson 25Computer Literacy Lesson 25
Computer Literacy Lesson 25
 
Computer Literacy Lesson 24
Computer Literacy Lesson 24Computer Literacy Lesson 24
Computer Literacy Lesson 24
 
Computer Literacy Lesson 23
Computer Literacy Lesson 23Computer Literacy Lesson 23
Computer Literacy Lesson 23
 
Computer Literacy Lesson 22
Computer Literacy Lesson 22Computer Literacy Lesson 22
Computer Literacy Lesson 22
 

Kürzlich hochgeladen

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Kürzlich hochgeladen (20)

TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 

Computer Literacy Lesson Three

  • 1. 1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC3, 3rd Edition Morrison / Wells
  • 2. Lesson 3 Objectives  Identify the importance of protecting computer hardware from theft and damage.  Explain how to protect data.  Identify environmental factors that can cause damage to computer hardware and media.  Identify how to protect computer hardware from power loss and fluctuation.  Identify common problems associated with computer hardware. 2 Morrison / Wells CLB: A Comp Guide to IC3 3E
  • 3. Lesson 3 Vocabulary  backup  data theft  driver  encryption  humidity  ping  power spikes  surge suppressor  uninterruptible power supply (UPS) 3 Morrison / Wells CLB: A Comp Guide to IC3 3E
  • 4. Lesson 3 Introduction  As the use of computers has grown in volume and importance, protecting computer systems and the information they hold has become increasingly important.  There are many issues of computer maintenance, the risks of computing, and the measures that can be taken to minimize those risks. 4 Morrison / Wells CLB: A Comp Guide to IC3 3E
  • 5. Lesson 3 Protecting Computer Hardware from Theft and Damage  Theft of and damage to computer equipment is a serious problem. Safeguards include: – Physically secure equipment – Use security locks – Mark equipment with identification mark – Insure the equipment – Back up data to a separate system  Employees using company computers for personal use can be a type of theft. 5 Morrison / Wells CLB: A Comp Guide to IC3 3E
  • 6. Lesson 3 Data Protection  Data is a critical component of businesses.  The risk and severity of data theft is due to: – The value of data stored on computers – Confidential and private data being stored – Increased use of laptops outside a secure network – Increased proficiency of data hackers and thieves  Encryption is a secure process for keeping confidential information private. Morrison / Wells CLB: A Comp Guide to IC3 3E 6
  • 7. Lesson 3 Data Protection (continued)  Data Backup:  Because data is so valuable, you must back up important files regularly.  Backup procedures should place a priority on files that would be difficult or impossible to replace or reconstruct if they were lost.  Have secure backup procedures that include a regular schedule for backing up designated files and storing the backup files off site. Morrison / Wells CLB: A Comp Guide to IC3 3E 7
  • 8. Lesson 3 Environmental Conditions  Computers require the right balance of physical and environmental conditions to properly operate.  Temperature:  A temperature range of 68 to 75 degrees is optimal for system reliability. A separate thermostat can monitor temperature and humidity levels in a computer room. 8 Morrison / Wells CLB: A Comp Guide to IC3 3E
  • 9. Lesson 3 Environmental Conditions (continued)  Humidity:  A high level of humidity can cause computers to short circuit, resulting in the loss of data and damage to hardware.  For optimal performance, the relative humidity of the computer room should be above 20 percent and below the dew point. 9 Morrison / Wells CLB: A Comp Guide to IC3 3E
  • 10. Lesson 3 Environmental Conditions (continued)  Water Damage:  If a computer suffers water damage, make sure it is completely dried out before you restore the power.  Magnetic Fields and Static Electricity:  A single spark from static electricity can damage the internal electronics of a computer. Have grounding protection. 10 Morrison / Wells CLB: A Comp Guide to IC3 3E
  • 11. Lesson 3 Environmental Conditions (continued)  Maintaining Equipment:  Cut down on computer repair through preventive maintenance. Create a monthly maintenance schedule and follow it regularly.  Physical Damage:  Prevent damage to portable computers due to physical shock by transporting devices with care, such as in padded cases. 11 Morrison / Wells CLB: A Comp Guide to IC3 3E
  • 12. Lesson 3 Power Loss and Power Fluctuation Issues  An unexpected power outage can wipe out any data that has not been properly saved.  Protect electronic devices from power spikes, which are short, fast transfers of electrical voltage, current, or energy.  Surge suppressors can protect against power spikes. Surge suppressor 12 Morrison / Wells CLB: A Comp Guide to IC3 3E
  • 13. Lesson 3 Power Loss and Power Fluctuation Issues (continued)  One option for preventing data loss due to power outages is to install an uninterruptible power supply (UPS).  A UPS contains a battery that temporarily provides power if the normal current is interrupted. 13 Morrison / Wells CLB: A Comp Guide to IC3 3E
  • 14. Lesson 3 Hardware Issues  You can resolve or prevent many hardware issues by proper planning and training.  Crashed Hard Drive:  To evaluate the condition of the drive: – Verify the cable is not damaged and is plugged in – Use a boot disk to determine if drive is readable – Use diagnostic and data recovery programs – Use a data and recovery service 14 Morrison / Wells CLB: A Comp Guide to IC3 3E
  • 15. Lesson 3 Hardware Issues (continued)  Damaged Media:  Hard disks and other media eventually fail, but often you can recover the data.  First, move it to a secure environment, then inspect or test it to evaluate the damage.  The type of damage determines the type of recovery method to use. 15 Morrison / Wells CLB: A Comp Guide to IC3 3E
  • 16. Lesson 3 Hardware Issues (continued)  Printer Problems:  Paper jams are one of the more common problems.  Display Problems:  The majority of display problems are caused by incorrect, corrupted or missing video drivers. 16 Morrison / Wells CLB: A Comp Guide to IC3 3E
  • 17. Lesson 3 Hardware Issues (continued)  Inoperable Hardware Devices:  Could be a software, electrical, or mechanical problem.  A small program called a driver instructs the operating system on how to operate specific hardware.  Loss of Network or Internet Connectivity:  Means people cannot communicate or work effectively. 17 Morrison / Wells CLB: A Comp Guide to IC3 3E
  • 18. Lesson 3 Summary In this lesson, you learned:  Computer equipment needs to be protected from theft and damage  Back up data frequently and consistently to avoid losing important information.  The right balance of physical and environmental conditions are required for computers to operate properly. 18 Morrison / Wells CLB: A Comp Guide to IC3 3E
  • 19. Lesson 3 Summary (continued)  High humidity, water, and electric/magnetic fields can damage computer equipment.  Preventive maintenance reduces equipment repair needs.  Electrical power failure can destroy data and equipment.  Surge suppressors can protect against power spikes. 19 Morrison / Wells CLB: A Comp Guide to IC3 3E
  • 20. Lesson 3 Summary (continued)  Computer centers are vulnerable to problems such as a crashed hard disk, damaged media, printer and display problems, inoperable hardware devices, and loss of network and Internet connectivity. 20 Morrison / Wells CLB: A Comp Guide to IC3 3E