Using a PC Correctly and Safely

Authors Avatar

Using a PC Correctly and Safely

Online Help

  • The internet can be used for a numerous amount facilities. The online dictionary and thesaurus can help you by explaining certain words and giving examples of words related to them so that you understand what a word means. It can also help you find a word which is related to or means the same as that word. This can help you vary your text.

  • If an error message appears whilst you are working, the internet can help you understand what it means or tell you which option to choose. This is beneficial as there is less chance your work/document will be corrupted.

  • The help tool can assist you to choose certain procedures, help you understand ways in which to use the software and sometimes even correct your errors. This will help the whole task not seem overwhelming.

  • An online grammar and spelling checker is also available. This will check that all of the words are spelled correctly and most of the time gives you suggestions to spell your word differently.

Viruses

A virus is a program that corrupts data; it can spread from file to file or computer to computer.

E-mails:

As well as text, it is also possible to send other files via e-mail – these are called attachments. For example, you could e-mail a picture or a music file to a friend. Unless you are expecting to receive an attachment, treat any you receive with suspicion as it is easy to get a virus from an infected attachment. It is also possible to view an attachment without fully downloading it or you can use virus-checking software, such as McAfee or Norton, to scan the attachment before downloading. Both methods help to reduce the risk of getting a virus.

Join now!

Internet:

A virus is often deliberately written to infect a computer, and make copies of itself. They often corrupt other files – and even operating systems. They move between computer systems by attaching themselves to harmless computer files and e-mails.

Hacking means accessing a computer system and its files without permission. It is illegal, and once inside a system, the hacker might be able to view, edit, copy or delete important files, or plant a virus. Organisations can protect themselves by using passwords, encrypting files and using hacking-detection software. The main way to reduce the ...

This is a preview of the whole essay

Here's what a star student thought of this essay

The presentation of the report is quite good, as the report clearly shows headings and sub-headings which make the report clear and easily read.

The section 'Memory Stick' is quite good, as this gives an detailed view of this and describes how this should be in another location (which a number of students miss out). Similarly the section Health Issues' is equally quite good, as this gives a brief understanding. For high marks, some of the points could be more developed.

In summary, the report is OK as it states a number of issues that can occur which relate to the safety of using a digital device. However some area's don't require the detail that high marks would require. The section 'Viruses' could list a number of named viruses and explain how each virus could be used by a person to effect the victim's computer. There are over ten main types of viruses, and if the student were to undertake further background research, this would be shown in the report. The student mentions how RAM is used within a computer. This section is quite good, as this gives a in-depth view. However for high marks, the student could make a slight adjustment by placing the sentence 'All data stored by RAM is deleted after the computer is powered down, and the next time a user turns on the computer, the RAM will be empty until the user starts using the computer again'.