• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer Maintainance - anti-virus, cookie deletion, drive scanning

Extracts from this document...


Assignment 3: Computer Maintenance * Security: 1. Virus protection: PCs can be attacked by viruses, worms and Trojans arriving with emails and access to the internet. Antivirus software checks for intruders. It attempts to trace viruses by spotting the virus signature. Hackers try and adopt cloaking techniques such as polymorphing. As soon as hackers write new viruses, so do anti-virus companies produce updates for their software. The anti-virus software companies maintain a database of information about viruses, their profiles and signatures. Users can subscribe to an annual subscription which can be downloaded from the internet or a CD can also be brought from local stores. This subscription offers new updates automatically each time the computer starts. Having the most up to date virus information file, scanning your system frequently and avoiding opening emails that may contain viruses is the best advice. The main defence against viruses is to subscribe to a reliable anti-virus software company. If the software detects a virus it may automatically stop the corrupt file and quarantine it and ask the user what steps to take. The user can then decide if they would like to delete it or send it to the company for further analysis. 2. Firewall: Firewall builds a protective barrier around computers that are connected to internet network, so that only authorised programs can access data on a particular computer. ...read more.


This selectivity is an essential part of any information management program, and involves not only protecting private information assets, but also knowing who has access to what. Privileges can be granted or declined. Firewall utilities can be found in most antivirus software and are easy to use, the software should prompt you if you would like to allow access to internet? 3. Ant spyware: Document how and why we do the following: 1. The safe cleaning of hardware e.g. keyboard, mouse, displays and ventilation grills. Keyboard cleaning: The computer keyboard is often the most germ infected items in your home. Cleaning it can help remove any dangerous bacteria. Dirt, dust and hair can also build up causing the keyboard to not function properly. * The steps below show how to clean a keyboard. - Before cleaning the keyboard first turn off the computer. - If you're using a USB keyboard unplug it. - An effective method is to use compressed air. - Compressed air is pressurized air contained in a can with a very long nozzle. - Aim the air between the keys and this should blow away all of the dust and debris that has gathered. - A vacuum cleaner can also be used. * The steps below show how to clean a monitor. ...read more.


While cookie files are quite small, they can still build up and slow down your system performance. When too many cookies are allowed to accumulate, those unneeded files can bog down the system and cause it to run more slowly than it should. By taking the time to delete the cookies and temporary Internet files from your computer, you can increase the speed and performance of your web browsing software. Sufficient hard drive space is an important consideration for computer users, and deleting cookies on a regular basis will free space on your hard drive. When you start to run low on hard drive space, you may notice a decrease in performance and an increase in the number of system crashes. That is because the operating system will use hard drive space to mimic physical memory, and if sufficient space is not available, the performance of the computer will suffer. Clearing that hard drive space by deleting your cookies can increase the performance of your computer. While many cookies are harmless, others can be used to track your every move on the Internet. Businesses often use these tracking cookies to study consumer behaviour, but many computer users consider them an invasion of privacy. By setting your web browser to delete cookies each time you close your browser, you can thwart these tracking attempts and reduce the risk of a security breach. ?? ?? ?? ?? ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    This all relates to FDDI standard which stands for Fibre Distributed Data Interface. It is a backbone of a wide area network. It uses fibre optic cable to transmit data up to supported rate of 100 Mbps. An advantage of a WAN it allows secure and fast transmission between two computers.

  2. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    Barcodes are used where the data does not change, and so can be printed on original packaging. d) MICR (magnetic ink character reader). This is a device that reads characters that are printed on an original document at the time of it being created.

  1. Review of the article "Supply Chain Analysis at Volkswagen of America".

    customer's first-choice vehicle, and would reduce dealer's worry of carrying high inventory. The new system would also replace existing expensive truck routes by cheaper rail routes. All of these factors would lead to lower total system costs and greater customer responsiveness.

  2. Smart Card System

    1.1 4. Microsoft Office 2000 5. Microsoft Project 2000 6. Visio Professional 5.0 6.3 Overview of Feasibility Study Feasibility study is carried out to identify the functionality of a project and to determine whether the necessary resources are readily available. In this section, the feasibility study is conducted in aspect of economic, operational and technical feasibility.

  1. System I designed in order to produce a promotion package for her newly formed ...

    shown: - 9 BEGUM SHAHEENA F 25/02/85 WALSALL 69 Milton Street Cash 10 AZIZ ARZOO F 18/01/85 WALSALL 33 Caldmore Road Cash 11 QAMAR NAFISA F 19/07/85 WALSALL 44 Milton Street Cash 28 NAGVI ASADULLAH F 10/06/85 WALSALL 27 West Bromwich Road Cash The system would first search for females and then look for the number 85.

  2. Hardware and Software

    Both of these can be used by professionals. I have explained the software and features it has for each. Corel Paint Shop Pro Photo X2 Corel released the newest version of its image editing suite, Corel Paint Shop Pro Photo X2. The new "X2" gives enthusiast digital photographers an entirely new set of tools to unlock their creative potential.

  1. Explain the component parts of a computer system - Include both hardware, software and ...

    There are many different types of printer. * Laser Printers - A laser printer prints a whole page at a time therefore, they are usually expensive but high quality and fast. They work by feeding paper from the tray into the machine and feeding an electrostatic charge across the surface.

  2. Infernowear is a new company run by a self-employed creative designer aiming to producing ...

    Hull is a competent Access user who does not have the available free time to produce a fully functioning system. His competency with Access means that the system can be quite sophisticated and I wont have to spend as much time making the system user friendly as he will be able to navigate Access with ease.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work