20
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3 , 3 rd Edition Morrison / Wells

Computer Literacy Lesson Three

  • Upload
    cpashke

  • View
    193

  • Download
    2

Embed Size (px)

DESCRIPTION

Computer Literacy

Citation preview

Page 1: Computer Literacy Lesson Three

1

Lesson 3Computer Protection

Computer Literacy BASICS: A Comprehensive Guide to IC3, 3rd Edition

Morrison / Wells

Page 2: Computer Literacy Lesson Three

Le

sso

n 3

Morrison / Wells CLB: A Comp Guide to IC3 3E222

Objectives

Identify the importance of protecting computer hardware from theft and damage.

Explain how to protect data. Identify environmental factors that can cause

damage to computer hardware and media. Identify how to protect computer hardware from

power loss and fluctuation. Identify common problems associated with computer

hardware.

Page 3: Computer Literacy Lesson Three

Le

sso

n 3

Morrison / Wells CLB: A Comp Guide to IC3 3E333

Vocabulary

backup data theft driver encryption humidity

ping power spikes surge suppressor uninterruptible power supply (UPS)

Page 4: Computer Literacy Lesson Three

Le

sso

n 3

Morrison / Wells CLB: A Comp Guide to IC3 3E444

Introduction

As the use of computers has grown in volume and importance, protecting computer systems and the information they hold has become increasingly important.

There are many issues of computer maintenance, the risks of computing, and the measures that can be taken to minimize those risks.

Page 5: Computer Literacy Lesson Three

Le

sso

n 3

Morrison / Wells CLB: A Comp Guide to IC3 3E555

Protecting Computer Hardware from Theft and Damage

Theft of and damage to computer equipment is a serious problem. Safeguards include:– Physically secure equipment– Use security locks– Mark equipment with identification mark– Insure the equipment– Back up data to a separate system

Employees using company computers for personal use can be a type of theft.

Page 6: Computer Literacy Lesson Three

Le

sso

n 3

Morrison / Wells CLB: A Comp Guide to IC3 3E

Data Protection

Data is a critical component of businesses. The risk and severity of data theft is due to:

– The value of data stored on computers– Confidential and private data being stored– Increased use of laptops outside a secure network– Increased proficiency of data hackers and thieves

Encryption is a secure process for keeping confidential information private.

666

Page 7: Computer Literacy Lesson Three

Le

sso

n 3

Morrison / Wells CLB: A Comp Guide to IC3 3E

Data Protection (continued)

Data Backup: Because data is so valuable, you must back up

important files regularly. Backup procedures should place a priority on files

that would be difficult or impossible to replace or reconstruct if they were lost.

Have secure backup procedures that include a regular schedule for backing up designated files and storing the backup files off site.

777

Page 8: Computer Literacy Lesson Three

Le

sso

n 3

Morrison / Wells CLB: A Comp Guide to IC3 3E88

Environmental Conditions

Computers require the right balance of physical and environmental conditions to properly operate.

8

Temperature: A temperature range of 68 to

75 degrees is optimal for system reliability. A separate thermostat can monitor temperature and humidity levels in a computer room.

Page 9: Computer Literacy Lesson Three

Le

sso

n 3

Morrison / Wells CLB: A Comp Guide to IC3 3E99

Environmental Conditions (continued)

Humidity: A high level of humidity can cause computers

to short circuit, resulting in the loss of data and damage to hardware.

For optimal performance, the relative humidity of the computer room should be above 20 percent and below the dew point.

9

Page 10: Computer Literacy Lesson Three

Le

sso

n 3

Morrison / Wells CLB: A Comp Guide to IC3 3E1010

Environmental Conditions (continued)

Water Damage: If a computer suffers water damage, make

sure it is completely dried out before you restore the power.

Magnetic Fields and Static Electricity: A single spark from static electricity can

damage the internal electronics of a computer. Have grounding protection.

10

Page 11: Computer Literacy Lesson Three

Le

sso

n 3

Morrison / Wells CLB: A Comp Guide to IC3 3E1111

Environmental Conditions (continued)

Maintaining Equipment: Cut down on computer repair through

preventive maintenance. Create a monthly maintenance schedule and follow it regularly.

Physical Damage: Prevent damage to portable computers due

to physical shock by transporting devices with care, such as in padded cases.

11

Page 12: Computer Literacy Lesson Three

Le

sso

n 3

Morrison / Wells CLB: A Comp Guide to IC3 3E1212

Power Loss and Power Fluctuation Issues

An unexpected power outage can wipe out any data that has not been properly saved.

Protect electronic devices from power spikes, which are short, fast transfers of electrical voltage, current, or energy.

12

Surge suppressors can protect against power spikes.

Surge suppressor

Page 13: Computer Literacy Lesson Three

Le

sso

n 3

Morrison / Wells CLB: A Comp Guide to IC3 3E1313

Power Loss and Power Fluctuation Issues (continued)

One option for preventing data loss due to power outages is to install an uninterruptible power supply (UPS).

13

A UPS contains a battery that temporarily provides power if the normal current is interrupted.

Page 14: Computer Literacy Lesson Three

Le

sso

n 3

Morrison / Wells CLB: A Comp Guide to IC3 3E1414

Hardware Issues

You can resolve or prevent many hardware issues by proper planning and training.

Crashed Hard Drive: To evaluate the condition of the drive:

– Verify the cable is not damaged and is plugged in– Use a boot disk to determine if drive is readable– Use diagnostic and data recovery programs– Use a data and recovery service

14

Page 15: Computer Literacy Lesson Three

Le

sso

n 3

Morrison / Wells CLB: A Comp Guide to IC3 3E1515

Hardware Issues (continued)

Damaged Media: Hard disks and other media eventually fail,

but often you can recover the data. First, move it to a secure environment, then

inspect or test it to evaluate the damage. The type of damage determines the type of

recovery method to use.

15

Page 16: Computer Literacy Lesson Three

Le

sso

n 3

Morrison / Wells CLB: A Comp Guide to IC3 3E1616

Hardware Issues (continued)

Printer Problems: Paper jams are one of

the more common problems.

16

Display Problems: The majority of display problems are caused

by incorrect, corrupted or missing video drivers.

Page 17: Computer Literacy Lesson Three

Le

sso

n 3

Morrison / Wells CLB: A Comp Guide to IC3 3E1717

Hardware Issues (continued)

Inoperable Hardware Devices: Could be a software, electrical, or mechanical

problem. A small program called a driver instructs the

operating system on how to operate specific hardware.

Loss of Network or Internet Connectivity: Means people cannot communicate or work

effectively.17

Page 18: Computer Literacy Lesson Three

Le

sso

n 3

Morrison / Wells CLB: A Comp Guide to IC3 3E1818

Summary

In this lesson, you learned: Computer equipment needs to be protected

from theft and damage Back up data frequently and consistently to

avoid losing important information. The right balance of physical and

environmental conditions are required for computers to operate properly.

18

Page 19: Computer Literacy Lesson Three

Le

sso

n 3

Morrison / Wells CLB: A Comp Guide to IC3 3E1919

Summary (continued)

High humidity, water, and electric/magnetic fields can damage computer equipment.

Preventive maintenance reduces equipment repair needs.

Electrical power failure can destroy data and equipment.

Surge suppressors can protect against power spikes.

19

Page 20: Computer Literacy Lesson Three

Le

sso

n 3

Morrison / Wells CLB: A Comp Guide to IC3 3E2020

Summary (continued)

Computer centers are vulnerable to problems such as a crashed hard disk, damaged media, printer and display problems, inoperable hardware devices, and loss of network and Internet connectivity.

20