vt59.2708-21351022369 5431157530320773 2623221117561284497 n.pdfTLE-Q4-NOTES - PDF NC Cat 108&ccb 1-7& N
vt59.2708-21351022369 5431157530320773 2623221117561284497 n.pdfTLE-Q4-NOTES - PDF NC Cat 108&ccb 1-7& N
DEVICE DRIVERS User will know if the device is working properly when
the message “this device is working properly” appear on
the device status otherwise the device is more likely to A computer virus that displays more than one
have of these situations. characteristic of a regular computer virus is known as
multi-part computer virus. A computer virus may be
1. The device doesn’t appear on the list. It means
categorized with one or more of the following
that the device is not properly installed,
designations.
defective, or it is not a PnP compatible, or the
BIOS is not PnP compatible. 1. A file infector works by running together with
2. The device appears in the unknown category the executable file that is attached with. It
with a question mark on its icon. It means that reproduces as its own code by attaching itself
the user needs to run setup that comes along on to an executable program such as .COM and
with the device to have a complete installation .EXE files. On the other hand, a boot sector virus
of the driver. infects the computer when it reads an infected
3. The device has an X on its icon - it means that drive or floppy disk.
the device has been disabled and the user need 2. Macro virus is one of the most widespread
to re-enable it. types of viruses. Macro virus is written in a
4. The device has an exclamation point in its icon – macro language and associated with
it means that the device has a problem or documents, word processing and spreadsheet.
conflict with other devices. It uses an email attachment to spread and can
infect the computer when a user opens an
COMPUTER VIRUS email attachment with a macro virus.
3. A worm replicates itself even without human
A computer virus is a piece of code embedded in a
intervention. It uses a computer network to
legitimate program and is created with the ability to
spread itself. Worms can also be used to gain
self-replicate infecting other programs on a computer.
access to a computer remotely.
Just like how humans catch a cold or flu, it can remain
4. Web applet virus is a newer type of virus that
dormant inside the system and gets activated when you
can exist using the three most popular web
least expect it.
scripting languages - ActiveX, JavaScript and
• A computer virus is developed to spread from Java. The virus infects the computer when a
one host to another and there are numerous user installs an infected file.
ways on how your computer catches it. 5. Spyware is technically not a virus since it cannot
• It can be through email attachments, file replicate itself, but it can spy a user when he
downloads, software installations, or unsecured serves or does business on the internet. If there
links. is a pop up add on the computer or in the
• These viruses can steal your data such as browser, there is a possibility that the spyware
passwords, hacked into your social media might be installed on the computer.
accounts or online banking accounts, and even
HOW CAN IT INFECT A COMPUTER SYSTEM?
wiped out all your data.
• A computer virus is developed to spread from As mentioned above, viruses require human interaction,
one host to another and there are numerous such as you executing an infected program, to spread.
ways on how your computer catches it. Virus can spread automatically, without you doing
• It can be through email attachments, file anything. But how do devices first contract a virus?
downloads, software installations, or unsecured Here are the most common ways:
links.
• Email: The most popular delivery method for
• These viruses can steal your data such as
malware, email can include infected
passwords, hacked into your social media
attachments and malicious links containing
accounts or online banking accounts, and even
viruses or worms.
wiped out all your data.
• Example: I LOVE YOU virus
TYPES OF VIRUSES • Security vulnerabilities: Developers sometimes
accidentally leave vulnerabilities in their code,
which hackers exploit to insert malware into file and it reverts or returns to the previous
your system. A worm can scan a network, find setting right away, then there is a possibility
all devices with the vulnerability, and exploit that the virus was able to infiltrate the
them to gain access. computer.
• P2P file-sharing: The basic premise of peer-to- • When the user cannot access the windows
peer filesharing networks is to allow people registry editor. Windows registry editor is
who want to share files on their computer to where most of the operating system and
freely connect with other persons of like mind application process are stored. Viruses that
without having to know anything about how the penetrate the registry usually disables it so that
network operates or anything about other the system administrators cannot change the
computers on the network. setting manually.
If you download music, movies, or apps from PROTECTION AGAINTS THESE TYPES OF
unauthorized sources, you might get more than you COMPUTER VIRUSES
bargained for in the download.
A virus left untreated can wreak havoc on your
• Malvertising: Websites, even legitimate ones, device but if detected early, and appropriate
can contain infected ads in the form of banners measures are done, then the recovery would be
or pop-ups. If you click on them, you can quick. Just like how we protect ourselves from
unwittingly download a virus or worm. Even if catching a virus, here are a few notes to remember
you don’t click, some of these ads can execute a to help keep your devices safe.
drive-by-download that infects you anyway.
1. Avoid clicking on suspicious links.
SIGNS OF COMPUTER INFECTION 2. 2.Scan email attachments before opening it.
3. 3.Avoid clicking on pop-up advertisements and
Below is a list of possible signs to look for when the user
get a pop-up blocker for your web browser.
suspects that his computer is infected with a virus.
4. 4.When routed to another website, don’t do
• The computer is starting to run slower than anything, and immediately leave the site.
usual. If the computer seems slower than, then 5. 5.Install a reliable anti-virus program and
virus might be lurking in the system. However, it always keep it up to date.
does not necessarily mean that all slow
computers have a virus. HARDWARE MAINTENANCE AND
• The computer takes longer than the usual to PROTECTION
start up. If the user did not install anything new
on the computer but it takes a long time to start Hardware
up, it is a symptom that something is wrong. A Is the collection of all the parts you can physically touch.
virus might also be initializing, so make it a habit
to scan the computer regularly. Maintenance
• The computer takes longer than the usual to Is a way of taking care, repairing and replacing broken
start up. If the user did not install anything new and failing computer hardware.
on the computer but it takes a long time to start
up, it is a symptom that something is wrong. A Why is it necessary?
virus might also be initializing, so make it a habit
Maintenance is necessary on computer to avoid
to scan the computer regularly.
hardware failure or loosing valuable information and
• When the preferences in the folder options are
most times, hardware breaks without notice.
set to Read-Only. The folder option gives the
user a lot of control on how the files in the Protection
computer will function. One of them is to show
Is the process of protecting your computer against
or hide the accepted file extension on the
unauthorized intrusions.
computer. if the user changes the setting of the
Preventive Maintenance and Procedures Today we use internet-connected devices in all aspects
of our lives. We go online to search for information,
Computer problems can cause unnecessary headaches shop, bank, do homework, play games, and stay in
and downtime for the user. Maintaining the computer touch with family and friends through social
properly is the simplest way to increase its lifespan and networking. As a result, our devices contain a wealth of
decrease downtime hassles. To maintain a computer, personal information about us. This may include
students can do the following: banking and other financial records, and medical
1. Clean the outer surface with a simple cloth and information.
water solution. A damp cloth is the best If your devices are not protected, what will
cleaning tool for computer hardware. A small, happen?
handy paint brush can be used to remove dust
inside the system unit. 1. 1.identity thieves and other fraudsters may be
2. Apply an anti-static spray or solution to prevent able to get access and steal your personal
a build-up of static charges on computer information.
parts.an economical and effective anti-static 2. 2.Spammers could use your computer as a
solution can be created by combining 10 parts "zombie drone" to send spam that looks like it
of water 1 part of fabric conditioner came from you.
3. Observe the correct handling procedures for 3. 3.Malicious viruses or spyware could be
printed circuit boards and cables to prevent deposited on your computer, slowing it down or
oxidation build ups or corrosion on electrical destroying files
connectors, which can reduce the flow of
electricity. DIAGNOSTIC SOFTWARE TOOL
4. Rub off the oxidation build ups using an emery
A diagnostic software tool, also known as diagnostic
board, a common pencil eraser, a special
software or diagnostics tool, is a computer program
solvent white or an electrical contact cleaner
designed to identify and troubleshoot problems in
spray.
hardware, software, or systems. It is used to diagnose
5. Use a lint-free foam swab and isopropyl alcohol
and analyze issues, errors, or malfunctions in various
or methanol for cleaning other internal
devices, such as computers, servers, networks, and
components such as a disk drive head.
electronic equipment.
Computer Maintenance is necessary…. Diagnostic software tools perform a range of functions,
including:
• Check harmful materials e.g., dust, viruses,
outdated software, faulty electrical Power/ System testing: They conduct comprehensive tests on
gadget e.g., cables, sockets, extensions etc. computer hardware components, such as memory, hard
• Check any malfunctions of peripherals. drives, processors, and input/output devices, to identify
• Proper maintenance helps to keep the any faulty or malfunctioning parts.
computer running smoothly for a year.
Error detection and logging: These tools monitor
Protecting Computers from Infections system logs and generate error reports, alerting users
or administrators to any errors, warnings, or anomalies
A computer virus is an executable program that can detected in the system.
copy or replicate without the owner knowing it.
Depending on the type of virus, it can damage the Performance monitoring: They measure system
hardest or barricade normal operation of the computer, performance metrics, such as CPU usage, memory
corrupt or change data and degrade the performance of usage, network latency, and disk activity, to identify
the system by utilizing the resources such as memory or bottlenecks or inefficiencies that may be causing
disk space. Viruses increase their chances of spreading performance issues.
to other computers by infecting files on a network file Software troubleshooting: Diagnostic software tools can
system that is accessed by another computer. help identify software-related problems, such as
compatibility issues, driver conflicts, or corrupted files, • Scandisk or Chkdsk - checks for physical errors
by scanning and analyzing software configurations and on the disk surface.
settings. • Defrag - optimizes use of space on a disk.
• Disk Cleanup - removes unused files.
Network analysis: Some diagnostic tools specialize in
• Disk Management interface). - creates
analyzing network traffic, identifying network
partitions and formats disks (GUI
connectivity issues, packet loss, latency problems, or
security vulnerabilities. • System File Checker (SFC) - scans the operating
system critical files.
Diagnostic reports and recommendations: These tools
often provide detailed reports and recommendations DIAGNOSIS AND IDENTIFICATION OF
based on the analysis performed, suggesting potential FAULTY SYSTEM
solutions or actions to resolve identified issues.
Computer diagnostics is the process of identifying and
TYPES OF DIAGNOSTIC SOFTWARE resolving problems that may be affecting the
performance or functionality of a computer system. This
These hard-coded diagnostic tools usually monitor one
involves analyzing the hardware and software
specific part of a larger piece of equipment and typically
components of a computer system to detect issues and
are always operating. While these types of diagnostic
determine the cause of the problem.
programs are the most common, they are usually the
least versatile. When people think of true diagnostic Computer diagnostics can be performed through
software, they usually think of the types used on various methods including:
computers.
1. 1.Built-in diagnostic tools
2. 2.Third-party software
3. 3.Physical inspection of the hardware
Some Downloadable Diagnostic Tools: components.
• Yet Another Cleaner Protects your PC from Typically, computer diagnostics involve running a series
browser hijacker, malicious plug-ins, malwares, of tests to evaluate the system's components, including
adware, various viruses. the processor, memory, hard drive, and other hardware
• ARO 2013 Repairs registry errors, remove components. The results of these tests can help identify
"junk" files, and ensure your PC is fully problems such as hardware failure, software conflicts,
protected. and malware infections.
• RegDoctor Improves your system performance
and stability by repairing and cleaning the Once the problem has been identified, computer
Windows Registry. diagnostics can also be used to fix the issue through
• Wise Registry Cleaner Cleans the registry various means, including software updates, driver
portion of the hard drive. installations, system restores, and hardware repairs or
• Advanced System Care Tunes up and maintains replacements.
your PC, with anti-spyware, privacy protection, TROUBLESHOOTING.
and system cleaning functions.
• CPUZ Accesses various information's about your There are many different things that could cause a
computer. problem with your computer. No matter what's causing
• Advanced System Care Pro Tunes up and the issue, troubleshooting will always be a process of
maintains your PC automatically trial and error—in some cases, you may need to use
• Free Window Registry Repair Scans, repairs, several different approaches before you can find a
and optimizes your Windows registry solution; other problems may be easy to fix. We
recommend starting by using the following tips.
Disk management tools:
A. Trial and error when you find a faulty
• Fdisk - creates and deletes disk partitions. component in your computer, check it with the
• Format - prepares a hard drive prior to use.
other computers so that you can make sure A Contingency plan is a course of action designed to
whether the fault is in the component or not. help an organization respond effectively to a significant
B. Check cables in case of any device failure, check future event or situation that may or may not happen.
all the cables of your computer such as data
A contingency plan is sometimes referred to as "Plan B,"
cables, power cable, internal circuitry cables
because it can be also used as an alternative for action
and make sure that all these are plugged in and
if expected results fail to materialize.
working fine.
C. Hardware settings Check the hardware settings Contingency planning is a component of business
in the CMOS and in the device manager of the continuity, disaster recovery and risk management.
system and make all the device drivers are up to
date and all the cards are plugged in properly. What is a business continuity plan?
D. Notice changes When you notice a software or A business continuity plan is a document that explains
hardware error in your computer, determine the actions you should take before, during and after
what was changed before the problem occurred unexpected events and situations.
E. Event viewer in the event viewer, you will find
the error or warning messages associated with • Business continuity planning helps your
any faulty hardware or software. business respond to unexpected events and
F. Make notes Troubleshooting is a big learning situations which can interrupt your operations.
option and we can learn a lot when we face any Developing a business continuity plan will help
kind of troubleshooting in our computer. Make your business minimize the impacts of these
notes including the error messages and their events and continue trading.
solutions, so that you have a record on how a
All businesses deal with risk and business may
certain problem occurred and how did you
experience:
solve it.
• ·Natural Disasters (Floods, Storms, Cyclones)
COMMON TROUBLE FOR COMPUTER UNITS
• ·Fire
1. Double check the power connections. • ·Power Outages
2. Voltage Regulator and power supply could • ·It Outages
cause power failure in the computer unit. • ·Supply Chain Failures
3. Check the power cords and cable connectors in • ·Staff Shortages
your computer unit. • ·Pandemics.
4. Unseated card. Loose cards could cause it to
malfunction. What is a disaster recovery plan (DRP)?
5. Do you have ink or toners in your printer? A Disaster recovery plan (DRP) is a documented,
Check the ink toners/cartridges in your printers. structured approach that describes how an organization
6. Check the boot sequence configuration in the can quickly resume work after an unplanned incident.
advance BIOS (Basic Input/output Unit) setup.
• A DRP aims to help an organization resolve data
THESE ARE THE THINGS TO LOOK FOR IF A PC WILL loss and recover system functionality so that it
NOT CONNECT TO THE INTERNET OR NETWORK. can perform in the aftermath of an incident,
even if it Operates at A Minimal Level.
1. First check the cable connecting to the network
card into the network hub. What is a risk management plan?
2. Check the back of the computer to see if the
network card light is on A risk management plan enables project managers to
3. Check the network cable see ahead to potential risks and reduce their negative
4. Check the network HUB impact
Application software
Application software is software that helps an end user
complete task such as doing research, taking notes,
setting an alarm, designing graphics, or keeping an
account log.
GENERALIZATION