View
193
Download
2
Category
Tags:
Preview:
DESCRIPTION
Computer Literacy
Citation preview
1
Lesson 3Computer Protection
Computer Literacy BASICS: A Comprehensive Guide to IC3, 3rd Edition
Morrison / Wells
Le
sso
n 3
Morrison / Wells CLB: A Comp Guide to IC3 3E222
Objectives
Identify the importance of protecting computer hardware from theft and damage.
Explain how to protect data. Identify environmental factors that can cause
damage to computer hardware and media. Identify how to protect computer hardware from
power loss and fluctuation. Identify common problems associated with computer
hardware.
Le
sso
n 3
Morrison / Wells CLB: A Comp Guide to IC3 3E333
Vocabulary
backup data theft driver encryption humidity
ping power spikes surge suppressor uninterruptible power supply (UPS)
Le
sso
n 3
Morrison / Wells CLB: A Comp Guide to IC3 3E444
Introduction
As the use of computers has grown in volume and importance, protecting computer systems and the information they hold has become increasingly important.
There are many issues of computer maintenance, the risks of computing, and the measures that can be taken to minimize those risks.
Le
sso
n 3
Morrison / Wells CLB: A Comp Guide to IC3 3E555
Protecting Computer Hardware from Theft and Damage
Theft of and damage to computer equipment is a serious problem. Safeguards include:– Physically secure equipment– Use security locks– Mark equipment with identification mark– Insure the equipment– Back up data to a separate system
Employees using company computers for personal use can be a type of theft.
Le
sso
n 3
Morrison / Wells CLB: A Comp Guide to IC3 3E
Data Protection
Data is a critical component of businesses. The risk and severity of data theft is due to:
– The value of data stored on computers– Confidential and private data being stored– Increased use of laptops outside a secure network– Increased proficiency of data hackers and thieves
Encryption is a secure process for keeping confidential information private.
666
Le
sso
n 3
Morrison / Wells CLB: A Comp Guide to IC3 3E
Data Protection (continued)
Data Backup: Because data is so valuable, you must back up
important files regularly. Backup procedures should place a priority on files
that would be difficult or impossible to replace or reconstruct if they were lost.
Have secure backup procedures that include a regular schedule for backing up designated files and storing the backup files off site.
777
Le
sso
n 3
Morrison / Wells CLB: A Comp Guide to IC3 3E88
Environmental Conditions
Computers require the right balance of physical and environmental conditions to properly operate.
8
Temperature: A temperature range of 68 to
75 degrees is optimal for system reliability. A separate thermostat can monitor temperature and humidity levels in a computer room.
Le
sso
n 3
Morrison / Wells CLB: A Comp Guide to IC3 3E99
Environmental Conditions (continued)
Humidity: A high level of humidity can cause computers
to short circuit, resulting in the loss of data and damage to hardware.
For optimal performance, the relative humidity of the computer room should be above 20 percent and below the dew point.
9
Le
sso
n 3
Morrison / Wells CLB: A Comp Guide to IC3 3E1010
Environmental Conditions (continued)
Water Damage: If a computer suffers water damage, make
sure it is completely dried out before you restore the power.
Magnetic Fields and Static Electricity: A single spark from static electricity can
damage the internal electronics of a computer. Have grounding protection.
10
Le
sso
n 3
Morrison / Wells CLB: A Comp Guide to IC3 3E1111
Environmental Conditions (continued)
Maintaining Equipment: Cut down on computer repair through
preventive maintenance. Create a monthly maintenance schedule and follow it regularly.
Physical Damage: Prevent damage to portable computers due
to physical shock by transporting devices with care, such as in padded cases.
11
Le
sso
n 3
Morrison / Wells CLB: A Comp Guide to IC3 3E1212
Power Loss and Power Fluctuation Issues
An unexpected power outage can wipe out any data that has not been properly saved.
Protect electronic devices from power spikes, which are short, fast transfers of electrical voltage, current, or energy.
12
Surge suppressors can protect against power spikes.
Surge suppressor
Le
sso
n 3
Morrison / Wells CLB: A Comp Guide to IC3 3E1313
Power Loss and Power Fluctuation Issues (continued)
One option for preventing data loss due to power outages is to install an uninterruptible power supply (UPS).
13
A UPS contains a battery that temporarily provides power if the normal current is interrupted.
Le
sso
n 3
Morrison / Wells CLB: A Comp Guide to IC3 3E1414
Hardware Issues
You can resolve or prevent many hardware issues by proper planning and training.
Crashed Hard Drive: To evaluate the condition of the drive:
– Verify the cable is not damaged and is plugged in– Use a boot disk to determine if drive is readable– Use diagnostic and data recovery programs– Use a data and recovery service
14
Le
sso
n 3
Morrison / Wells CLB: A Comp Guide to IC3 3E1515
Hardware Issues (continued)
Damaged Media: Hard disks and other media eventually fail,
but often you can recover the data. First, move it to a secure environment, then
inspect or test it to evaluate the damage. The type of damage determines the type of
recovery method to use.
15
Le
sso
n 3
Morrison / Wells CLB: A Comp Guide to IC3 3E1616
Hardware Issues (continued)
Printer Problems: Paper jams are one of
the more common problems.
16
Display Problems: The majority of display problems are caused
by incorrect, corrupted or missing video drivers.
Le
sso
n 3
Morrison / Wells CLB: A Comp Guide to IC3 3E1717
Hardware Issues (continued)
Inoperable Hardware Devices: Could be a software, electrical, or mechanical
problem. A small program called a driver instructs the
operating system on how to operate specific hardware.
Loss of Network or Internet Connectivity: Means people cannot communicate or work
effectively.17
Le
sso
n 3
Morrison / Wells CLB: A Comp Guide to IC3 3E1818
Summary
In this lesson, you learned: Computer equipment needs to be protected
from theft and damage Back up data frequently and consistently to
avoid losing important information. The right balance of physical and
environmental conditions are required for computers to operate properly.
18
Le
sso
n 3
Morrison / Wells CLB: A Comp Guide to IC3 3E1919
Summary (continued)
High humidity, water, and electric/magnetic fields can damage computer equipment.
Preventive maintenance reduces equipment repair needs.
Electrical power failure can destroy data and equipment.
Surge suppressors can protect against power spikes.
19
Le
sso
n 3
Morrison / Wells CLB: A Comp Guide to IC3 3E2020
Summary (continued)
Computer centers are vulnerable to problems such as a crashed hard disk, damaged media, printer and display problems, inoperable hardware devices, and loss of network and Internet connectivity.
20
Recommended