• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer Maintainance - anti-virus, cookie deletion, drive scanning

Extracts from this document...


Assignment 3: Computer Maintenance * Security: 1. Virus protection: PCs can be attacked by viruses, worms and Trojans arriving with emails and access to the internet. Antivirus software checks for intruders. It attempts to trace viruses by spotting the virus signature. Hackers try and adopt cloaking techniques such as polymorphing. As soon as hackers write new viruses, so do anti-virus companies produce updates for their software. The anti-virus software companies maintain a database of information about viruses, their profiles and signatures. Users can subscribe to an annual subscription which can be downloaded from the internet or a CD can also be brought from local stores. This subscription offers new updates automatically each time the computer starts. Having the most up to date virus information file, scanning your system frequently and avoiding opening emails that may contain viruses is the best advice. The main defence against viruses is to subscribe to a reliable anti-virus software company. If the software detects a virus it may automatically stop the corrupt file and quarantine it and ask the user what steps to take. The user can then decide if they would like to delete it or send it to the company for further analysis. 2. Firewall: Firewall builds a protective barrier around computers that are connected to internet network, so that only authorised programs can access data on a particular computer. ...read more.


This selectivity is an essential part of any information management program, and involves not only protecting private information assets, but also knowing who has access to what. Privileges can be granted or declined. Firewall utilities can be found in most antivirus software and are easy to use, the software should prompt you if you would like to allow access to internet? 3. Ant spyware: Document how and why we do the following: 1. The safe cleaning of hardware e.g. keyboard, mouse, displays and ventilation grills. Keyboard cleaning: The computer keyboard is often the most germ infected items in your home. Cleaning it can help remove any dangerous bacteria. Dirt, dust and hair can also build up causing the keyboard to not function properly. * The steps below show how to clean a keyboard. - Before cleaning the keyboard first turn off the computer. - If you're using a USB keyboard unplug it. - An effective method is to use compressed air. - Compressed air is pressurized air contained in a can with a very long nozzle. - Aim the air between the keys and this should blow away all of the dust and debris that has gathered. - A vacuum cleaner can also be used. * The steps below show how to clean a monitor. ...read more.


While cookie files are quite small, they can still build up and slow down your system performance. When too many cookies are allowed to accumulate, those unneeded files can bog down the system and cause it to run more slowly than it should. By taking the time to delete the cookies and temporary Internet files from your computer, you can increase the speed and performance of your web browsing software. Sufficient hard drive space is an important consideration for computer users, and deleting cookies on a regular basis will free space on your hard drive. When you start to run low on hard drive space, you may notice a decrease in performance and an increase in the number of system crashes. That is because the operating system will use hard drive space to mimic physical memory, and if sufficient space is not available, the performance of the computer will suffer. Clearing that hard drive space by deleting your cookies can increase the performance of your computer. While many cookies are harmless, others can be used to track your every move on the Internet. Businesses often use these tracking cookies to study consumer behaviour, but many computer users consider them an invasion of privacy. By setting your web browser to delete cookies each time you close your browser, you can thwart these tracking attempts and reduce the risk of a security breach. ?? ?? ?? ?? ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    HCI shortened for Human Computer Interaction is the study of the human and computer ...

    3 star(s)

    reaction is now needed and it's either to wait or be impatient. o Buxton's three state model; The Buxton's three state model is mainly focused and concerned about the pressure which users make movement with using mouse or touchpad's. For example an 'iPad', this interface will be responsive by just a hand.

  2. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    This all relates to FDDI standard which stands for Fibre Distributed Data Interface. It is a backbone of a wide area network. It uses fibre optic cable to transmit data up to supported rate of 100 Mbps. An advantage of a WAN it allows secure and fast transmission between two computers.

  1. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    Barcodes are used where the data does not change, and so can be printed on original packaging. d) MICR (magnetic ink character reader). This is a device that reads characters that are printed on an original document at the time of it being created.

  2. Hardware and Software

    Mobile Phones: A mobile phone can be used to take photographs like a digital camera. The image is stored in the phone memory. The user can see the picture by connecting the phone to a computer to view or manipulate.

  1. Review of the article "Supply Chain Analysis at Volkswagen of America".

    The system described by authors consists of customer-flow and vehicle-flow cycles. In the customer-flow cycle, customers arrive at dealers and ask for a vehicle with specific features. If such a vehicle is available within dealer's inventory, it is a strong benefit from the customer- service perspective.

  2. Programming Techniques

    to a string value, it expects a numerical value and returns a string value Ctod converts a character to date, it expects character value and returns a date value Program Translation When a human being writes a computer program it is important for them that they can use a language which is easy to understand.

  1. I have been given the task to design a database for a company called ...

    To test this firstly I tried to enter the weight as 35Kg (in test data given) 35 is greater than 30 by 5 Kg, therefore the database should not allow this value to be entered in. When I tested this validation rule by entering in 35 Kg the computer gave

  2. Free essay

    Setting up and E-Commerce Site

    If we choose to do it ourselves will we ensure that it we do it efficiently or professionally Location Is one of the most important things to consider, do we wish to operate solely from home, do we wish to have a warehouse, small garage or what?

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work