Presentation is loading. Please wait.

Presentation is loading. Please wait.

Group 9 & 10.  Hardware maintenance-the testing and cleaning of equipment.  Information system maintenance-the routine updating of master files, such.

Similar presentations


Presentation on theme: "Group 9 & 10.  Hardware maintenance-the testing and cleaning of equipment.  Information system maintenance-the routine updating of master files, such."— Presentation transcript:

1 Group 9 & 10

2  Hardware maintenance-the testing and cleaning of equipment.  Information system maintenance-the routine updating of master files, such as adding and deleting employees and customers and changing credit limits and product prices.  Software-the updating of application programs in order to meet changing information requirements, such as adding new functions and changing data formats. It also includes fixing bugs and adapting the software to new hardware devices.

3 Malware–A code or software designed to damage, disrupt, steal, or inflict some other bad or illegitimate action on data, hosts, or networks Spamware–Software that sends unsolicited bulk messages indiscriminately Adware–Software package that plays, displays or downloads ads to a computer Spyware– Software that, when installed, collects information for operator without the users knowledge

4 Trojan Horse-Legitimate seeming software that allows a hacker remote access to a target computer Worm– Self-replicating computer program that does virus-like damage without need of a host program Virus– Infectious software that becomes part of a program to delete data or programs. Transferred over networks, file-sharing, etc. Bots– Processes that automate tasks done by humans. Gathers passwords and sends out spam. Courtesy of cisco.com

5  A firewall is a protective boundary that monitors and restricts information that travels between your computer and a network or the Internet. This provides a line of defense against someone who might try to access your computer from outside the Windows Firewall without your permission.

6  You see unexpected messages or images  Programs start unexpectedly  Your computer freezes frequently, or programs start running slowly  You get lots of system error messages  You notice that files or folders have been deleted  Your web browser behaves erratically

7  Your personal firewalls tells you that an application has tried to connect to the internet (and it’s not a program that you ran)  Your friends tell you that they have received s messages from your address and haven’t sent them anything  The operating system will not load when you start your computer  According to Kaspersky.com

8  More efficient use of system resources Run faster Fewer halts Less aggravation and waiting  Fewer crashes Repairs corrupt files Avoids Blue Screen of Death  Better security A lot of personal data stored Less viruses

9 Do It Yourself – You do not need to be highly skilled with computers in order to fix a problem –free advice is available online for a wide variety of computer problems –Time and cost efficient – example: Professional Assistance – When a problem arises that can not be fixed at home, bring it in to the professionals –Many computer maintenance companies to choose from –Effective –Example: Best Buy Geek Squad  Sources: 

10  Where to Find it ◦ Download.com  Hosts an array of software to download.  It has been around for a long time, it is trusted and tells you whether or not the download has been tested for viruses and spyware.  The downloads are rated and reviewed by editors as well as by users.

11  Antivirus software is used to prevent, detect, and remove malware, including computer viruses, worms, and trojan horses. Such programs may also prevent and remove adware, spyware, and other forms of malware.  Registry Cleaners are software utilities that attempt to remove configuration data from the Windows Registry that is no longer in use or that is unwanted on the system  A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications.

12  Don’t turn your computer off with the power switch until Windows has shut down  Purchase an UPS  Backup! Back up! Back up!  Run Scandisk and Defragment at least once a week  Don’t unplug peripherals from the computer when it is powered up  Keep at least 300MBs of your C: drive free  Use a virus checker regularly  Don’t let a lot of programs load up when you start your computer

13  Kaspersky Anti-virus: consistently strong ratings in malware protection & an extremely quick response time to new viruses. It has a solid antivirus engine, good anti-phishing protection, decent antispyware, good adware protection.  Trend Micro Antivirus: provides comprehensive and easy to use protection from viruses, intruders, and other Internet-based threats  Panda Antivirus Pro: features a ultraFast scan engine, Panda's exclusive SmartClean technology. It’s a good antivirus solution that keeps your computer protected from any internet threats.  McAfee Virus Scan Plus: ideal for those seeking an antivirus/firewall combination without all the bloat of traditional Internet security suites & it makes an easy job of removing adware and spyware  Norton Antivirus: features excellent detection and removal of malware, 'pulse updates' to deliver more frequent and thus smaller signature updates, whitelisting to streamline scan times, and a lighter footprint  ESET NOD32: best known for its small footprint, low performance hit, and fast scan speeds, providing focused virus protection  Avast Antivirus: slightly heavier on system resources, but its excellent protection more than makes up for the increased footprint  Avira AntiVir: low-impact, easy to use virus scanner that also the ability to make an antivirus rescue CD for your system & includes WebGuard to protect against malicious or compromised websites

14  In 2008, about 552,000 people were employed in computer support systems occupations  A college degree is required, as is additional training in the actual software and type of computer that is worked with.  Many jobs are hands on, but there are still customer service jobs, such as help desks.

15  With the growing technological market and complexity of computers, computer maintenance jobs are in demand.  Jobs are expected to keep growing in the years to come  Most companies cannot survive without upkeep for their computers.

16  What is Computer Maintenance?  Type of Computer Problems  Firewall  Symptoms of infected computers  Advantages of Computer maintenance  Solutions  Types of free downloadable software  Tips to keep computer running smoothly  Latest Technology  Future projections  Possible jobs  Future jobs

17  "Definition of Computer Maintenance." Web  "Computers and Networking." Geek Squad. Best Buy. Web. 8 Oct  Fisher, Tim. "Four Common PC Problems and How to Fix Them." PC Support. Web. 8 Oct  Fisher, Tim. "How to Describe Your Problem to a Computer Repair Professional." PC Support. Web. 8 Oct pc-repair-professional.htm.http://pcsupport.about.com/od/computerservice/qt/describe-computer-problem-to- pc-repair-professional.htm  Fisher, Tim. "Why You Should Always Try to Fix Your Computer Problem Yourself First." PC Support. Web. 8 Oct  Bureau of Labor Statistics. “Occupational Outlook Handbook.” Web. 8 Oct  “What Is the Difference: Viruses, Worms, Trojans, and Bots?” Web. 8 Oct


Download ppt "Group 9 & 10.  Hardware maintenance-the testing and cleaning of equipment.  Information system maintenance-the routine updating of master files, such."

Similar presentations


Ads by Google