Your SlideShare is downloading. ×
Steps to cleaning and protecting a desktop computer
Steps to cleaning and protecting a desktop computer
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Steps to cleaning and protecting a desktop computer

107

Published on

http://ordercustomessay.com/samples.php

http://ordercustomessay.com/samples.php

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
107
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Surname 1Name:Task:Tutor:Date: The Personal Computer First issue It is quite amusing that the computer has to be protected currently. In any case, all thatadvanced hardware and technical endowment should enable it to offer self-protection. Thefirst step to protecting a computer is protecting it from itself. Computers tend to log on to theInternet anonymously so that they may update their software. It is quite intriguing that theInternet is the source of viruses that harm the machines. Pursuant to this, the second step is todisable automatic updates. This arises from the fact that the computer, advanced as it is,cannot figure out for itself that the Internet is dangerous. It is quite appalling that computersneed protection, considering the advancements named in computer technology. Finally, oneshould set the crucial updates that are crucial to be started manually and failure to this resultto the computer contracting some lethal viruses in its adventurous escapades on the Internet.Computers are able to identify malware. One would expect that, during the programming ofthe malware identifiers, someone would have identified the need for an embedded antivirus. Second problem That brings us to the sickening issue of the antivirus. The computer needs to have theantivirus updated every so often. The fascinating bit is that the computer needs no promptingto update the operating system. Interesting then, that the computer cannot update a light
  • 2. Surname 2program, automatically, but it can update an operating system. The first step is to log on tothe Internet and secure updates for the antivirus. The lunatic bit is that the computer cancontract viruses during this procedure. That is akin to paying the hospital a visit t get a shotfor common cold, and contract typhoid at the facility. The Internet is a highly unhygienichospital. The second step is to ensure that the antivirus runs a full scan of the computer. Thisis done to weed out the malware it contracted while updating the antivirus a classic case ofnecessity and invention right there. Finally, one needs to ensure that the computers browser islinked with the antivirus so hat malware from the Internet does not infiltrate it. It isinteresting that the browser and antivirus combination can do all things except updating theantivirus, which one has to do. Failure to update the antivirus allows all manner of malwareto infiltrate the computer. These viruses seem to have an innate detector of unprotectedcomputers. Dusting the issues One would tend to wonder where a computer in an office up on the twenty-thirdstoreys collects dust. First, in the interest of aesthetic credentials, it is good practice to blowthe dust off the machine lest it accumulates. After this blowing, it is advisable to frappe themachine in a cloth to avoid dust accumulating again. This is omitted from the officialbrochure because it would conceal the manufacturer’s manual and consequently defeat freeadverts. It is palpable that the practice, Failure to protect the computer from dust converts itinto a dust trap; an ugly, unsightly dust trap. That would harm processes and things in thechips section, and one would not want that. The technical mandarins at Dell, HewlettPackard, and their cronies say that this practise is crucial for some reason that they are yet totranslate into common language. Meanwhile, it is wise to heed their behest, even if just forthe aesthetics.

×