0% found this document useful (0 votes)
38 views11 pages

vt59.2708-21351022369 5431157530320773 2623221117561284497 n.pdfTLE-Q4-NOTES - PDF NC Cat 108&ccb 1-7& N

This document provides instructions for installing a new operating system and maintaining computer hardware and software. It outlines 11 steps for installing an operating system, including checking system requirements, backing up data, installing from disc, entering a product key, and completing setup. It also describes preventative maintenance procedures like cleaning the computer surface, applying anti-static solutions, and removing dust. Finally, it defines types of viruses like file infectors and boot sector viruses, and lists potential signs of infection like slow performance, long startup times, and browser crashing.

Uploaded by

jaem3450
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views11 pages

vt59.2708-21351022369 5431157530320773 2623221117561284497 n.pdfTLE-Q4-NOTES - PDF NC Cat 108&ccb 1-7& N

This document provides instructions for installing a new operating system and maintaining computer hardware and software. It outlines 11 steps for installing an operating system, including checking system requirements, backing up data, installing from disc, entering a product key, and completing setup. It also describes preventative maintenance procedures like cleaning the computer surface, applying anti-static solutions, and removing dust. Finally, it defines types of viruses like file infectors and boot sector viruses, and lists potential signs of infection like slow performance, long startup times, and browser crashing.

Uploaded by

jaem3450
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Operating system 6.

Read the EULA or End User License Agreement


and check the “I accept the license terms”
Operating System option and click the Accept button.
7. In the next window click Custom to perform a
An operating system or OS is a software program that clean installation and remove everything on the
enables the computer hardware to communicate and computer. (if upgrading an existing installation,
operate with the computer software, All computers and click Upgrade)
computer-like devices have operating systems, 8. Next highlight or choose the disk partition
including your laptop, tablet, desktop, smartphone, and where to install the copy of Windows 10 then
smartwatch click the Next Button.
9. After selecting a partition for windows, the
Things to remember in Installing your New Operating Installing Windows dialog box will appear. This
System: process takes approximately 10 minutes until
the system reboot. While installing the
1. Check the system requirements.
windows, do not press any keys during the boot
2. Decide whether to purchase or download up process or else installation will be
interrupted.
3. Backup your data. 10. Once the installation is completed, a blue color
4. Determine your installation order. screen will appear. Here click on the Use
Custom Setting button to go with default
5. Boot from your installation disc settings or click on Customize button to
6. Wait for the Setup program to load. customize the settings.
11. Now, type a name and password to create the
7. Enter the product key account then click Next.
12. Keep following the instruction as mentioned on
8. Choose your installation type the screen and few seconds Windows 10 home
9. Format your partitions screen will appear.

10. Wait for installation to complete HARDWARE MAINTENANCE AND


11. Install your drivers and programs PROTECTION
STEPS
Preventive Maintenance and Procedures
1. Start the installation by inserting a bootable
Computer problems can cause unnecessary headaches
device or media on the computer.
2. On the Windows Setup screen, select a and downtime for the user. Maintaining the computer
language, time and currency format, and properly is the simplest way to increase its lifespan and
keyboard layout then click the Next to continue decrease downtime hassles. To maintain a computer,
3. Click the install now button and wait for a few students can do the following:
seconds for the setup to start
1. Clean the outer surface with a simple cloth and
4. When the Activate Windows screen appears,
enter a genuine product key then click Next. water solution. A damp cloth is the best
However, if reinstalling Windows 10, click the “I cleaning tool for computer hardware. A small,
don’t have the product key” link to continue. handy paint brush can be used to remove dust
Windows will automatically activate operating inside the system unit.
system with digital license associated with the 2. Apply an anti-static spray or solution to
computer’s hardware on Microsoft servers once
prevent a build-up of static charges on
it is installed
5. After entering a valid product key, select the computer parts.an economical and effective
edition of Windows 10 (if applicable). This anti-static solution can be created by
selection must match with the edition of the combining 10 parts of water 1 part of fabric
product key then click Next. conditioner.
3. Observe the correct handling procedures for 4. Web applet virus is a newer type of virus that
printed circuit boards and cables to prevent can exist using the three most popular web
oxidation build ups or corrosion on electrical scripting languages - ActiveX, JavaScript and
Java. The virus infects the computer when a
connectors, which can reduce the flow of
user installs an infected file.
electricity. 5. Spyware is technically not a virus since it cannot
4. Rub off the oxidation build ups using an emery replicate itself, but it can spy a user when he
board, a common pencil eraser, a special serves or does business on the internet. If there
solvent white or an electrical contact cleaner is a pop up add on the computer or in the
spray. browser, there is a possibility that the spyware
5. Use a lint-free foam swab and isopropyl might be installed on the computer.
alcohol or methanol for cleaning other internal Signs of computer infection
components such as a disk drive head. Below is a list of possible signs to look for when the user
suspects that his computer is infected with a virus.
Protecting Computers from Infections 1. The computer is starting to run slower than
A computer virus is an executable program that can usual. If the computer seems slower than, then
copy or replicate without the owner knowing it. virus might be lurking in the system. However,
it does not necessarily mean that all slow
Depending on the type of virus, it can damage the
computers have a virus.
hardest or barricade normal operation of the computer,
2. The computer takes longer than the usual to
corrupt or change data and degrade the performance of start up. If the user did not install anything new
the system by utilizing the resources such as memory or on the computer but it takes a long time to start
disk space. Viruses increase their chances of spreading up, it is a symptom that something is wrong. A
to other computers by infecting files on a network file virus might also be initializing, so make it a habit
system that is accessed by another computer. to scan the computer regularly.
3. The web browser keeps crashing or there is a
Types of Viruses new homepage. If the browser is crashing
constantly and the home page is being
A computer virus that displays more than one
modified, then there is a possibility that the
characteristic of a regular computer virus is known as browser has been hijacked.
multi-part computer virus. A computer virus may be 4. When the preferences in the folder options are
categorized with one or more of the following set to Read-Only. The folder option gives the
designations. user a lot of control on how the files in the
computer will function. One of them is to show
1. A file infector works by running together with
or hide the accepted file extension on the
the executable file that is attached with. It
computer. if the user changes the setting of the
reproduces as its own code by attaching itself
file and it reverts or returns to the previous
on to an executable program such as .COM and
setting right away, then there is a possibility
.EXE files. On the other hand, a boot sector virus
that the virus was able to infiltrate the
infects the computer when it reads an infected
computer.
drive or floppy disk.
5. When the user cannot access the windows
2. Macro virus is one of the most widespread
registry editor. Windows registry editor is
types of viruses. Macro virus is written in a
where most of the operating system and
macro language and associated with
application process are stored. Viruses that
documents, word processing and spreadsheet.
penetrate the registry usually disables it so that
It uses an email attachment to spread and can
the system administrators cannot change the
infect the computer when a user opens an
setting manually.
email attachment with a macro virus.
3. A worm replicates itself even without human Anti-Virus Software
intervention. It uses a computer network to Computers have become an integral part of people’s life
spread itself. Worms can also be used to gain
and it is important to protect computers from threat of
access to a computer remotely.
viruses. Viruses come in many forms and sometimes, it
is difficult to detect them. Here is a list of different anti- 7. After scanning, the control panel of Avira appears.
virus software that are available in the market. This indicates that the program is ready use.

Bit Defender Anti-Virus Plus- uses a secure browser


PC Securities
that the user can use if he wants to do online banking or Computer Security are techniques for ensuring that the
shopping. data stored in a computer cannot be read or
compromised by any stranger without the owner’s
F-Secure Anti-virus - offers excellent protection against authorization. It is protecting computer systems and
viruses, spyware worms and trojans. It can also information from harm, theft, and unauthorized use.
eliminate and locate rootkits. It also provides protection Most computer security measures involve data
against infected e-mail attachments. encryption and password. Data encryption is the
translation of data into a form that is meaningless
G-Data Anti-virus - It is an anti-virus that offers strong
without a deciphering mechanism.
web protection and is easy to use. G Data also protects
users from phishing, scams, adware and more. G Data 1. Data encryption is the translation of data into a
AV 2012 is considered on of the best antivirus PC form that is unintelligible without a deciphering
solutions in the market. mechanism.
2. A password is a secret word or phrase that
Norton Anti-virus not only protects the computer gives the user access to a particular program or
against spyware and viruses but also scans instant system.
messages and email to check if there are infected 3. A firewall blocks unauthorized access to a
attachments, links or viruses. It was manufactured by system, while permitting authorized
Symantec Corporation. communications. There are two typical actions
on data.
Kaspersky Anti-virus - It is an antivirus that is easy to • Permit allows traffic that matches the rules to
use and customize. It has a browser plug-in that can be pass and implicitly denies everything else.
integrated to Internet Explorer and Firefox which will • Deny explicitly blocks traffic that matches the
not allow the users to access infected websites. rule.

A hardware firewall typically performs better than a


Anti-Virus Installation software firewall. However, a software firewall is more
There is a lot software available in the market configurable than a hardware firewall. It is essential for
mobile computers. There are several software firewalls
nowadays. Avira Antivirus is just one of software that is
available in the market today such as:
commonly used. The instructions given below are the
steps on how to install the Avira Antivirus software. • Windows Firewall (Free)
• Zone Alarm Free (free)
1. Open the folder where the installer is saved
• Norton 360
then double-click the icon and click Accept and
• McAfee I.S.
Install button to proceed.
2. When the User Account Control dialog appears, click Windows has a default firewall installed in a computer.
the YES button to continue. To enable the Windows Firewall, do the following:
3. Avira will prepare the installation.
1. Open the Control Panel and select System and
4. The next screen shows the progress of the
Security.
installation. The install button is just a promotion of
2. Choose Windows Firewall
Avira. Do not click the Install button, unless
3. On the left side of the window, click Turn
interested in the product. The blue progress bar
Windows Firewall on or off.
above indicates that the Avira is installing.
4. Click the radio button to Turn on Windows
5. Then wait until the installation is done and click Start
Avira. If the program did not run, click the Avira icon Firewall, then select OK.
in the taskbar. Protecting Hardware
6. The Avira Antivirus automatically scans the
computer for a minute or two.
The problem that a computer may encounter depend Are small software program that help operating system
on its environment and the manner it is used. Below are use or “Drive” the Devices.
some examples.
• Computer hardware is a collective term used to
1. Avoid heat buildup. describe any of the physical components of an
Excessive heat can cause premature aging and failure of analog or digital computer.
the electronic components of the computer. Make sure
that the area is uncluttered so air flows freely around
• Without Drivers, the computer could not send
the computer. Check also if the power supply’s fan is and receive data correctly to hardware devices.
working and operational. Monitor Installing Drivers
2. Use proper cleaning materials.
Avoid using aerosol spray, solvent and commercial 1. Right-click on windows buttons and select
cleaners because these can damage the screen and control panel.
system unit. Use a simple cleaning solution instead then 2. choose system and security option
dry it with a soft cloth. Ensure that the monitor’s power 3. When the system and security window appear,
cord is disconnected from the power source before click system.
cleaning. 4. On the left side of the window, click on the
3. Protect input devices. device manager option to view the full list of
Dust and clean the input devices occasionally. Use a soft hardware in the pc.
cloth or lint-free swab to clean between the keys of the 5. Click monitor to see a list of generic monitors.
keyboard. Windows can recognize if it is a plug and play
monitor, but it does not list the exact model.
Troubleshooting Methodology 6. Right-click the monitor item, and in the popup
A good computer technicians will follow some sort of
menu, select update driver.
formalized troubleshooting methodology. Below are the
basic troubleshooting practices one must know before 7. In the update drivers window, select the option
performing an actual PC troubleshooting. browse my computer for drivers
8. Next, click the browse button and navigate to
1. Information Gathering the location of the monitor driver files.
a. Identify what the user wants to 9. Click the ok button to confirm the location of
accomplish Maintenance, upgrade, the monitor driver files.
Repair. 10. Windows 10 will now install the monitor drivers
b. For repair, identify any symptoms,
for your monitor and show a message that it
determine if anything has changed and
has successfully updated your drivers. And click
establish probable cause.
2. Create an action plan close button to finish
a. For maintenance and upgrades: tool 11. The device manager should now list the
gathering, backup, parts identification monitor(s) with the correct brand/model
and action. indication.
b. For repairs, there is a step at the
beginning – try a quick fix. DEALING WITH DRIVER PROBLEM
3. Implement and test the solution Problem arises when the hardware does not have the
Again, if performing a repair, try a quick fix and then
correct driver installed on the computer. If a problem
try the most likely solution first.
occurs, see if there is a CD or disk that come along with
4. Identify the results and effects of the solution the device or look for the manufacturer’s website and
Did the upgrade work? Did the maintenance work download the drivers. Most manufacturers have free
as expect? Did the repair fix the problem? drivers for their products online.
5. Document the solution and process MISSING DEVICE DRIVERS

DEVICE DRIVERS User will know if the device is working properly when
the message “this device is working properly” appear on
the device status otherwise the device is more likely to A computer virus that displays more than one
have of these situations. characteristic of a regular computer virus is known as
multi-part computer virus. A computer virus may be
1. The device doesn’t appear on the list. It means
categorized with one or more of the following
that the device is not properly installed,
designations.
defective, or it is not a PnP compatible, or the
BIOS is not PnP compatible. 1. A file infector works by running together with
2. The device appears in the unknown category the executable file that is attached with. It
with a question mark on its icon. It means that reproduces as its own code by attaching itself
the user needs to run setup that comes along on to an executable program such as .COM and
with the device to have a complete installation .EXE files. On the other hand, a boot sector virus
of the driver. infects the computer when it reads an infected
3. The device has an X on its icon - it means that drive or floppy disk.
the device has been disabled and the user need 2. Macro virus is one of the most widespread
to re-enable it. types of viruses. Macro virus is written in a
4. The device has an exclamation point in its icon – macro language and associated with
it means that the device has a problem or documents, word processing and spreadsheet.
conflict with other devices. It uses an email attachment to spread and can
infect the computer when a user opens an
COMPUTER VIRUS email attachment with a macro virus.
3. A worm replicates itself even without human
A computer virus is a piece of code embedded in a
intervention. It uses a computer network to
legitimate program and is created with the ability to
spread itself. Worms can also be used to gain
self-replicate infecting other programs on a computer.
access to a computer remotely.
Just like how humans catch a cold or flu, it can remain
4. Web applet virus is a newer type of virus that
dormant inside the system and gets activated when you
can exist using the three most popular web
least expect it.
scripting languages - ActiveX, JavaScript and
• A computer virus is developed to spread from Java. The virus infects the computer when a
one host to another and there are numerous user installs an infected file.
ways on how your computer catches it. 5. Spyware is technically not a virus since it cannot
• It can be through email attachments, file replicate itself, but it can spy a user when he
downloads, software installations, or unsecured serves or does business on the internet. If there
links. is a pop up add on the computer or in the
• These viruses can steal your data such as browser, there is a possibility that the spyware
passwords, hacked into your social media might be installed on the computer.
accounts or online banking accounts, and even
HOW CAN IT INFECT A COMPUTER SYSTEM?
wiped out all your data.
• A computer virus is developed to spread from As mentioned above, viruses require human interaction,
one host to another and there are numerous such as you executing an infected program, to spread.
ways on how your computer catches it. Virus can spread automatically, without you doing
• It can be through email attachments, file anything. But how do devices first contract a virus?
downloads, software installations, or unsecured Here are the most common ways:
links.
• Email: The most popular delivery method for
• These viruses can steal your data such as
malware, email can include infected
passwords, hacked into your social media
attachments and malicious links containing
accounts or online banking accounts, and even
viruses or worms.
wiped out all your data.
• Example: I LOVE YOU virus
TYPES OF VIRUSES • Security vulnerabilities: Developers sometimes
accidentally leave vulnerabilities in their code,
which hackers exploit to insert malware into file and it reverts or returns to the previous
your system. A worm can scan a network, find setting right away, then there is a possibility
all devices with the vulnerability, and exploit that the virus was able to infiltrate the
them to gain access. computer.
• P2P file-sharing: The basic premise of peer-to- • When the user cannot access the windows
peer filesharing networks is to allow people registry editor. Windows registry editor is
who want to share files on their computer to where most of the operating system and
freely connect with other persons of like mind application process are stored. Viruses that
without having to know anything about how the penetrate the registry usually disables it so that
network operates or anything about other the system administrators cannot change the
computers on the network. setting manually.
If you download music, movies, or apps from PROTECTION AGAINTS THESE TYPES OF
unauthorized sources, you might get more than you COMPUTER VIRUSES
bargained for in the download.
A virus left untreated can wreak havoc on your
• Malvertising: Websites, even legitimate ones, device but if detected early, and appropriate
can contain infected ads in the form of banners measures are done, then the recovery would be
or pop-ups. If you click on them, you can quick. Just like how we protect ourselves from
unwittingly download a virus or worm. Even if catching a virus, here are a few notes to remember
you don’t click, some of these ads can execute a to help keep your devices safe.
drive-by-download that infects you anyway.
1. Avoid clicking on suspicious links.
SIGNS OF COMPUTER INFECTION 2. 2.Scan email attachments before opening it.
3. 3.Avoid clicking on pop-up advertisements and
Below is a list of possible signs to look for when the user
get a pop-up blocker for your web browser.
suspects that his computer is infected with a virus.
4. 4.When routed to another website, don’t do
• The computer is starting to run slower than anything, and immediately leave the site.
usual. If the computer seems slower than, then 5. 5.Install a reliable anti-virus program and
virus might be lurking in the system. However, it always keep it up to date.
does not necessarily mean that all slow
computers have a virus. HARDWARE MAINTENANCE AND
• The computer takes longer than the usual to PROTECTION
start up. If the user did not install anything new
on the computer but it takes a long time to start Hardware
up, it is a symptom that something is wrong. A Is the collection of all the parts you can physically touch.
virus might also be initializing, so make it a habit
to scan the computer regularly. Maintenance
• The computer takes longer than the usual to Is a way of taking care, repairing and replacing broken
start up. If the user did not install anything new and failing computer hardware.
on the computer but it takes a long time to start
up, it is a symptom that something is wrong. A Why is it necessary?
virus might also be initializing, so make it a habit
Maintenance is necessary on computer to avoid
to scan the computer regularly.
hardware failure or loosing valuable information and
• When the preferences in the folder options are
most times, hardware breaks without notice.
set to Read-Only. The folder option gives the
user a lot of control on how the files in the Protection
computer will function. One of them is to show
Is the process of protecting your computer against
or hide the accepted file extension on the
unauthorized intrusions.
computer. if the user changes the setting of the
Preventive Maintenance and Procedures Today we use internet-connected devices in all aspects
of our lives. We go online to search for information,
Computer problems can cause unnecessary headaches shop, bank, do homework, play games, and stay in
and downtime for the user. Maintaining the computer touch with family and friends through social
properly is the simplest way to increase its lifespan and networking. As a result, our devices contain a wealth of
decrease downtime hassles. To maintain a computer, personal information about us. This may include
students can do the following: banking and other financial records, and medical
1. Clean the outer surface with a simple cloth and information.
water solution. A damp cloth is the best If your devices are not protected, what will
cleaning tool for computer hardware. A small, happen?
handy paint brush can be used to remove dust
inside the system unit. 1. 1.identity thieves and other fraudsters may be
2. Apply an anti-static spray or solution to prevent able to get access and steal your personal
a build-up of static charges on computer information.
parts.an economical and effective anti-static 2. 2.Spammers could use your computer as a
solution can be created by combining 10 parts "zombie drone" to send spam that looks like it
of water 1 part of fabric conditioner came from you.
3. Observe the correct handling procedures for 3. 3.Malicious viruses or spyware could be
printed circuit boards and cables to prevent deposited on your computer, slowing it down or
oxidation build ups or corrosion on electrical destroying files
connectors, which can reduce the flow of
electricity. DIAGNOSTIC SOFTWARE TOOL
4. Rub off the oxidation build ups using an emery
A diagnostic software tool, also known as diagnostic
board, a common pencil eraser, a special
software or diagnostics tool, is a computer program
solvent white or an electrical contact cleaner
designed to identify and troubleshoot problems in
spray.
hardware, software, or systems. It is used to diagnose
5. Use a lint-free foam swab and isopropyl alcohol
and analyze issues, errors, or malfunctions in various
or methanol for cleaning other internal
devices, such as computers, servers, networks, and
components such as a disk drive head.
electronic equipment.
Computer Maintenance is necessary…. Diagnostic software tools perform a range of functions,
including:
• Check harmful materials e.g., dust, viruses,
outdated software, faulty electrical Power/ System testing: They conduct comprehensive tests on
gadget e.g., cables, sockets, extensions etc. computer hardware components, such as memory, hard
• Check any malfunctions of peripherals. drives, processors, and input/output devices, to identify
• Proper maintenance helps to keep the any faulty or malfunctioning parts.
computer running smoothly for a year.
Error detection and logging: These tools monitor
Protecting Computers from Infections system logs and generate error reports, alerting users
or administrators to any errors, warnings, or anomalies
A computer virus is an executable program that can detected in the system.
copy or replicate without the owner knowing it.
Depending on the type of virus, it can damage the Performance monitoring: They measure system
hardest or barricade normal operation of the computer, performance metrics, such as CPU usage, memory
corrupt or change data and degrade the performance of usage, network latency, and disk activity, to identify
the system by utilizing the resources such as memory or bottlenecks or inefficiencies that may be causing
disk space. Viruses increase their chances of spreading performance issues.
to other computers by infecting files on a network file Software troubleshooting: Diagnostic software tools can
system that is accessed by another computer. help identify software-related problems, such as
compatibility issues, driver conflicts, or corrupted files, • Scandisk or Chkdsk - checks for physical errors
by scanning and analyzing software configurations and on the disk surface.
settings. • Defrag - optimizes use of space on a disk.
• Disk Cleanup - removes unused files.
Network analysis: Some diagnostic tools specialize in
• Disk Management interface). - creates
analyzing network traffic, identifying network
partitions and formats disks (GUI
connectivity issues, packet loss, latency problems, or
security vulnerabilities. • System File Checker (SFC) - scans the operating
system critical files.
Diagnostic reports and recommendations: These tools
often provide detailed reports and recommendations DIAGNOSIS AND IDENTIFICATION OF
based on the analysis performed, suggesting potential FAULTY SYSTEM
solutions or actions to resolve identified issues.
Computer diagnostics is the process of identifying and
TYPES OF DIAGNOSTIC SOFTWARE resolving problems that may be affecting the
performance or functionality of a computer system. This
These hard-coded diagnostic tools usually monitor one
involves analyzing the hardware and software
specific part of a larger piece of equipment and typically
components of a computer system to detect issues and
are always operating. While these types of diagnostic
determine the cause of the problem.
programs are the most common, they are usually the
least versatile. When people think of true diagnostic Computer diagnostics can be performed through
software, they usually think of the types used on various methods including:
computers.
1. 1.Built-in diagnostic tools
2. 2.Third-party software
3. 3.Physical inspection of the hardware
Some Downloadable Diagnostic Tools: components.
• Yet Another Cleaner Protects your PC from Typically, computer diagnostics involve running a series
browser hijacker, malicious plug-ins, malwares, of tests to evaluate the system's components, including
adware, various viruses. the processor, memory, hard drive, and other hardware
• ARO 2013 Repairs registry errors, remove components. The results of these tests can help identify
"junk" files, and ensure your PC is fully problems such as hardware failure, software conflicts,
protected. and malware infections.
• RegDoctor Improves your system performance
and stability by repairing and cleaning the Once the problem has been identified, computer
Windows Registry. diagnostics can also be used to fix the issue through
• Wise Registry Cleaner Cleans the registry various means, including software updates, driver
portion of the hard drive. installations, system restores, and hardware repairs or
• Advanced System Care Tunes up and maintains replacements.
your PC, with anti-spyware, privacy protection, TROUBLESHOOTING.
and system cleaning functions.
• CPUZ Accesses various information's about your There are many different things that could cause a
computer. problem with your computer. No matter what's causing
• Advanced System Care Pro Tunes up and the issue, troubleshooting will always be a process of
maintains your PC automatically trial and error—in some cases, you may need to use
• Free Window Registry Repair Scans, repairs, several different approaches before you can find a
and optimizes your Windows registry solution; other problems may be easy to fix. We
recommend starting by using the following tips.
Disk management tools:
A. Trial and error when you find a faulty
• Fdisk - creates and deletes disk partitions. component in your computer, check it with the
• Format - prepares a hard drive prior to use.
other computers so that you can make sure A Contingency plan is a course of action designed to
whether the fault is in the component or not. help an organization respond effectively to a significant
B. Check cables in case of any device failure, check future event or situation that may or may not happen.
all the cables of your computer such as data
A contingency plan is sometimes referred to as "Plan B,"
cables, power cable, internal circuitry cables
because it can be also used as an alternative for action
and make sure that all these are plugged in and
if expected results fail to materialize.
working fine.
C. Hardware settings Check the hardware settings Contingency planning is a component of business
in the CMOS and in the device manager of the continuity, disaster recovery and risk management.
system and make all the device drivers are up to
date and all the cards are plugged in properly. What is a business continuity plan?
D. Notice changes When you notice a software or A business continuity plan is a document that explains
hardware error in your computer, determine the actions you should take before, during and after
what was changed before the problem occurred unexpected events and situations.
E. Event viewer in the event viewer, you will find
the error or warning messages associated with • Business continuity planning helps your
any faulty hardware or software. business respond to unexpected events and
F. Make notes Troubleshooting is a big learning situations which can interrupt your operations.
option and we can learn a lot when we face any Developing a business continuity plan will help
kind of troubleshooting in our computer. Make your business minimize the impacts of these
notes including the error messages and their events and continue trading.
solutions, so that you have a record on how a
All businesses deal with risk and business may
certain problem occurred and how did you
experience:
solve it.
• ·Natural Disasters (Floods, Storms, Cyclones)
COMMON TROUBLE FOR COMPUTER UNITS
• ·Fire
1. Double check the power connections. • ·Power Outages
2. Voltage Regulator and power supply could • ·It Outages
cause power failure in the computer unit. • ·Supply Chain Failures
3. Check the power cords and cable connectors in • ·Staff Shortages
your computer unit. • ·Pandemics.
4. Unseated card. Loose cards could cause it to
malfunction. What is a disaster recovery plan (DRP)?
5. Do you have ink or toners in your printer? A Disaster recovery plan (DRP) is a documented,
Check the ink toners/cartridges in your printers. structured approach that describes how an organization
6. Check the boot sequence configuration in the can quickly resume work after an unplanned incident.
advance BIOS (Basic Input/output Unit) setup.
• A DRP aims to help an organization resolve data
THESE ARE THE THINGS TO LOOK FOR IF A PC WILL loss and recover system functionality so that it
NOT CONNECT TO THE INTERNET OR NETWORK. can perform in the aftermath of an incident,
even if it Operates at A Minimal Level.
1. First check the cable connecting to the network
card into the network hub. What is a risk management plan?
2. Check the back of the computer to see if the
network card light is on A risk management plan enables project managers to
3. Check the network cable see ahead to potential risks and reduce their negative
4. Check the network HUB impact

• The purpose of a risk management plan is to


CONTINGENCY PLAN help you identify, evaluate and plan for possible
risks that may arise within the project 1. Develop the contingency planning policy
management process. statement. A formal policy provides the
authority and guidance necessary to develop an
Some common examples of projects an organization
effective contingency plan.
may take on include:
2. Conduct the business impact analysis (BIA). The
• Building or closing a facility BIA helps identify and prioritize information
systems and components critical to supporting
• Re-branding the organization’s mission/business functions.
• Developing or discontinuing a product or 3. Identify preventive controls. Measures taken to
service reduce the effects of system disruptions can
increase system availability and reduce
• Migrating to a new software contingency life cycle costs.
4. Create contingency strategies. Thorough
• Expanding or reducing service to a particular
recovery strategies ensure that the system may
industry
be recovered quickly and effectively following a
• Training a new group of employees disruption.
5. Develop an information system contingency
The Recommended Approach plan. The contingency plan should contain
The best data recovery technique is to have data detailed guidance and procedures for restoring
already backed up on another storage device either on a damaged system unique to the system’s
the same computer, a network server or the Internet. security impact level and recovery
Data recovery becomes a simple copy procedure after requirements.
the failed peripheral is replaced. At worst, applications 6. Ensure plan testing, training and exercises.
may have to be re-installed if only user data was backed Testing validates recovery capabilities, whereas
up, but unless the applications are vintage programs training prepares recovery personnel for plan
that are no longer available, the data are far more activation and exercising the plan identifies
valuable than the software. planning gaps; combined, the activities improve
plan effectiveness and overall organization
Several Techniques for Damaged Media preparedness.
7. Ensure plan maintenance. The plan should be a
If there is no backup and data must be recovered, there
living document that is updated regularly to
are organizations that specialize in retrieving data from
remain current with system enhancements and
damaged computers. They may be able to move the
organizational changes.
drive to a working computer, or they may have to open
the drive and replace parts such as read/write heads,
TYPES OF SOFTWARE
actuator arms and chips. Sometimes, the platters are
removed and placed into another drive. What is software?

Getting More Difficult Software is a set of instructions, data, or programs used


to operate a computer and execute specific tasks.
Newer disk drives are tested at the time of
manufacture, and parameters unique to that drive are The two major types of computer software are:
stored in the drive's firmware. As the drive is used, data
System software and Application software
about bad sectors is added. If the drive is badly
damaged in the areas that contain this drive System software
information, replacing parts may not be enough to
recover the data. Such drives require in-depth analysis System software helps the user, hardware, and
for recovery. application software interact and function with each
other. the most well-known example of system
The seven-steps outlined for an IT contingency software is the OS, which manages all other programs in
plan. a computer.
Is a type of software that is designed to communicate System software handles essential functions directly
with the hardware or even application software. It acts related to computer systems, including device drivers
as an interface between the hardware and the and utility programs.
computer programs whereby it coordinates the tasks
As technology advances, new types of software
between these two components of a computer system.
continually emerge, expanding the possibilities and
Types of System Software capabilities of the digital realm.

Operating System - The most important program that


runs on a computer. It is a software that helps
communicate the software and hardware.

Utility Software – A program that performs


maintenance tasks for the computer resources.

Device Driver – A program that allows a particular


hardware device to work and communicate with the
computer system.

Application software
Application software is software that helps an end user
complete task such as doing research, taking notes,
setting an alarm, designing graphics, or keeping an
account log.

Is the type of software that is designed to accomplish


specific tasks within the operating system. Some of
these tasks include handling documents, handling
calculations, image editing, and video editing among
others.

Types of Application Software

Basic Application Software - Basic application software


also known as general purpose applications and
productivity applications.

Multimedia software: Tools that are able play, create,


or record images, audio, or video files. It’s used for
video editing, animation, graphics, and image editing.

Software Specialized Application Software - performs a


single very specific type of task

GENERALIZATION

Software encompasses a wide range of types, each


serving a distinct purpose in the digital world.

Operating systems provide the foundation for computer


hardware and software to interact seamlessly.

Application software caters to specific tasks and user


needs, such as word processing, web browsing, and
multimedia playback.

You might also like