SlideShare a Scribd company logo
1 of 14
B Y G E O R G E S M I T H - M O O R E
P8- PC Maintenance
1st: Backup data
 This should be done daily. All key/new/ updated work
should be kept on a second storage medium.
 By doing this you minimise the risk of losing pictures,
videos and documents considerably.
 The different storage options are numerous, yet the best
ones are the USB drive (or portable HDD), or using a
cloud based storage.
 Both of these are fantastic for keeping data safe, yet do not use this as
the only place to store data.
 They both have one major downside, they have a limited amount of
storage. Unless you want to pay money for the cloud backup. Also
although a cloud backup will never get lost, it takes time to upload to
the internet.
USB backup
The USB stick can get lost, and can get very expensive for a high ‘GB’ version.
Yet it allows you to backup lots of files.
A major downside to it is that they can become lost and damaged.
With the addition of USB 3.0, USB sticks have become much faster, it can
transfer 640MBps per second.
Cloud backup
 Using a service such as OneDrive or drop box allocates you a
certain amount of ‘GB’s’ for free.
 This may not store all of your files as time goes on, but files
can never get lost or damaged while on the system.
 Cloud servers also mean that you can access the files
anywhere, as long as you have an internet connection.
2nd: Scan for Viruses
 Nowadays this should be done daily at the least.
 This requires an antivirus program such as Norton.
They allow for scans to be initiated at a time that
suits you, or when the computer is idle.
 Windows PC’s are most at risk due to the large
consumer base, so windows users MUST have an
anti-virus program. It MUST update regularly and
scan regularly.
Virus scans
3rd: Disk clean-up
 In order to maintain the performance of the PC,
using either the Disk clean-up tool, or a program
such as ‘CCleaner’. This searches through the PC to
find all unnecessary and unwanted files.
 Unnecessary files would be files like the internet
cache, this takes up storage space for valuable files,
as shown by the picture on the next slide, there is a
possible 3,000 MB that can be removed.
Disk cleaners
4th: Disk defragging
 Over time the hard-drive would become fragmented
and slow the PC down as files are spread apart from
one another. Defragging ‘squeezes’ these files
together.
 This is needed on Windows due to the way in which
the files are stored, the file architecture.
 This should be done monthly, yet with systems with
windows 7 or later, this has become automatic and so
is no longer a problem for computers.
Disk defragging
5th: Scanning for HDD errors
 To access this, go to drive properties, you can
schedule the task with windows Vista or later. It
takes a considerable amount of time, and so is not
done regularly.
 This is used to find Hard-Disk errors, and amend
them, this will improve the speed of the HDD, but it
would also minimise the risk of corrupted files.
Checking for Hard-Disk errors (first option)
6th: Hard-Drive Backup
 This is different from just protecting the files on the Hard-Disk.
 First make sure there are no viruses on the PC (or you would be copying
them), it is used for when either the HDD crashes or Windows becomes far
too corrupted.
 It should only be done every 6 months or so as it is a lengthy process.
This picture was taken
from google as I could
not take a picture from
my pc-
OS imaging
 It copies the entire OS, the benefit of this is that it
prevents the need to completely re-install windows
from scratch.
 The only thing that would have to be done is to copy
the most recent files over, this saves lots of time as
all of the correct files and applications would be
already there, you would not need to re-install them
all.

More Related Content

What's hot

ICT BTEC UNIT 2 P1
ICT BTEC UNIT 2 P1ICT BTEC UNIT 2 P1
ICT BTEC UNIT 2 P1OriginalGSM
 
Rohit rshb2
Rohit  rshb2Rohit  rshb2
Rohit rshb2kirty87
 
Lesson 5 What Is Inside The Computer
Lesson 5   What Is Inside The ComputerLesson 5   What Is Inside The Computer
Lesson 5 What Is Inside The Computerguevarra_2000
 
How to build a computer
How to build a computerHow to build a computer
How to build a computerjwongster
 
How to Build a Computer from Scratch.
How to Build a Computer from Scratch.How to Build a Computer from Scratch.
How to Build a Computer from Scratch.Ron Edrote
 
P1 computer components
P1 computer componentsP1 computer components
P1 computer componentshar139
 
Computerhardwarecomponent ppt-121104135329-phpapp02
Computerhardwarecomponent ppt-121104135329-phpapp02Computerhardwarecomponent ppt-121104135329-phpapp02
Computerhardwarecomponent ppt-121104135329-phpapp02Palesa Mokoena
 
Computer hardware component. ppt
Computer hardware component. pptComputer hardware component. ppt
Computer hardware component. pptNaveen Sihag
 
Common Components of a Computer System
Common Components of a Computer SystemCommon Components of a Computer System
Common Components of a Computer Systemtommy2909
 
Computer System Specification - 4th Generation
Computer System Specification - 4th GenerationComputer System Specification - 4th Generation
Computer System Specification - 4th GenerationNikhil Kumar
 
HP Storage Backup (RDX) presentation
HP Storage Backup (RDX) presentation HP Storage Backup (RDX) presentation
HP Storage Backup (RDX) presentation Jaideep Kumar
 
Internal computer components benn kelly
Internal computer components benn kellyInternal computer components benn kelly
Internal computer components benn kellybennkelly
 
Insides Of A Computer Workstation
Insides Of A Computer WorkstationInsides Of A Computer Workstation
Insides Of A Computer Workstationlockyerj
 
Computer Memory
Computer MemoryComputer Memory
Computer Memorybabaradhe
 

What's hot (20)

ICT BTEC UNIT 2 P1
ICT BTEC UNIT 2 P1ICT BTEC UNIT 2 P1
ICT BTEC UNIT 2 P1
 
Rohit rshb2
Rohit  rshb2Rohit  rshb2
Rohit rshb2
 
Computer parts
Computer partsComputer parts
Computer parts
 
Computer parts
Computer partsComputer parts
Computer parts
 
Lesson 5 What Is Inside The Computer
Lesson 5   What Is Inside The ComputerLesson 5   What Is Inside The Computer
Lesson 5 What Is Inside The Computer
 
How to build a computer
How to build a computerHow to build a computer
How to build a computer
 
How to Build a Computer from Scratch.
How to Build a Computer from Scratch.How to Build a Computer from Scratch.
How to Build a Computer from Scratch.
 
P1 computer components
P1 computer componentsP1 computer components
P1 computer components
 
P3
P3P3
P3
 
IMD 203 - Ch10
IMD 203 - Ch10IMD 203 - Ch10
IMD 203 - Ch10
 
Computer specifications
Computer specificationsComputer specifications
Computer specifications
 
Computerhardwarecomponent ppt-121104135329-phpapp02
Computerhardwarecomponent ppt-121104135329-phpapp02Computerhardwarecomponent ppt-121104135329-phpapp02
Computerhardwarecomponent ppt-121104135329-phpapp02
 
Computer hardware component. ppt
Computer hardware component. pptComputer hardware component. ppt
Computer hardware component. ppt
 
Common Components of a Computer System
Common Components of a Computer SystemCommon Components of a Computer System
Common Components of a Computer System
 
Computer System Specification - 4th Generation
Computer System Specification - 4th GenerationComputer System Specification - 4th Generation
Computer System Specification - 4th Generation
 
HP Storage Backup (RDX) presentation
HP Storage Backup (RDX) presentation HP Storage Backup (RDX) presentation
HP Storage Backup (RDX) presentation
 
Defragmentation
DefragmentationDefragmentation
Defragmentation
 
Internal computer components benn kelly
Internal computer components benn kellyInternal computer components benn kelly
Internal computer components benn kelly
 
Insides Of A Computer Workstation
Insides Of A Computer WorkstationInsides Of A Computer Workstation
Insides Of A Computer Workstation
 
Computer Memory
Computer MemoryComputer Memory
Computer Memory
 

Similar to UNIT 2 P8

Tech comm presentation 2014 01-16
Tech comm presentation 2014 01-16Tech comm presentation 2014 01-16
Tech comm presentation 2014 01-16Ken Tucker
 
Backing up your digital life - PC, Mac or Android
Backing up your digital life - PC, Mac or AndroidBacking up your digital life - PC, Mac or Android
Backing up your digital life - PC, Mac or Androidclcewing
 
Why doing regular backup is a matter of life and death for your files
Why doing regular backup is a matter of life and death for your filesWhy doing regular backup is a matter of life and death for your files
Why doing regular backup is a matter of life and death for your filesSean Maverick
 
Find Duplicate Files on Flash Drive
Find Duplicate Files on Flash DriveFind Duplicate Files on Flash Drive
Find Duplicate Files on Flash DriveUmerMohsin2
 
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docxChapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docxchristinemaritza
 
The Importance Of Computer System Backup Today
The Importance Of Computer System Backup TodayThe Importance Of Computer System Backup Today
The Importance Of Computer System Backup TodayDaniel Nilles
 
Stcc tech comm handout 2014 01-16
Stcc tech comm handout 2014 01-16Stcc tech comm handout 2014 01-16
Stcc tech comm handout 2014 01-16Ken Tucker
 
Find Duplicate Files On Flash Drive
Find Duplicate Files On Flash DriveFind Duplicate Files On Flash Drive
Find Duplicate Files On Flash Drivejohnset
 
parallels desktop for mac os 10.9.5
parallels desktop for mac os 10.9.5parallels desktop for mac os 10.9.5
parallels desktop for mac os 10.9.5MangumMcBride0
 
Stellar phoenix dvd data recovery
Stellar phoenix dvd data recoveryStellar phoenix dvd data recovery
Stellar phoenix dvd data recoverysmith bush
 
How to remove files safely from an HDD or SSD in Windows 10
How to remove files safely from an HDD or SSD in Windows 10How to remove files safely from an HDD or SSD in Windows 10
How to remove files safely from an HDD or SSD in Windows 10Hetman Software
 
Mastering your hard drive
Mastering your hard driveMastering your hard drive
Mastering your hard driveJoel May
 

Similar to UNIT 2 P8 (20)

Tech comm presentation 2014 01-16
Tech comm presentation 2014 01-16Tech comm presentation 2014 01-16
Tech comm presentation 2014 01-16
 
Backing up your digital life - PC, Mac or Android
Backing up your digital life - PC, Mac or AndroidBacking up your digital life - PC, Mac or Android
Backing up your digital life - PC, Mac or Android
 
Backup data
Backup data Backup data
Backup data
 
Ten Myths About Recovery Deleted Files
Ten Myths About Recovery Deleted FilesTen Myths About Recovery Deleted Files
Ten Myths About Recovery Deleted Files
 
Ten Myths About Deleted Files
Ten Myths About Deleted FilesTen Myths About Deleted Files
Ten Myths About Deleted Files
 
Linux Recovery
Linux RecoveryLinux Recovery
Linux Recovery
 
Backup for photographers
Backup for photographersBackup for photographers
Backup for photographers
 
Why doing regular backup is a matter of life and death for your files
Why doing regular backup is a matter of life and death for your filesWhy doing regular backup is a matter of life and death for your files
Why doing regular backup is a matter of life and death for your files
 
Find Duplicate Files on Flash Drive
Find Duplicate Files on Flash DriveFind Duplicate Files on Flash Drive
Find Duplicate Files on Flash Drive
 
Preventive Maintenance
Preventive MaintenancePreventive Maintenance
Preventive Maintenance
 
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docxChapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
 
The Importance Of Computer System Backup Today
The Importance Of Computer System Backup TodayThe Importance Of Computer System Backup Today
The Importance Of Computer System Backup Today
 
Stcc tech comm handout 2014 01-16
Stcc tech comm handout 2014 01-16Stcc tech comm handout 2014 01-16
Stcc tech comm handout 2014 01-16
 
Find Duplicate Files On Flash Drive
Find Duplicate Files On Flash DriveFind Duplicate Files On Flash Drive
Find Duplicate Files On Flash Drive
 
parallels desktop for mac os 10.9.5
parallels desktop for mac os 10.9.5parallels desktop for mac os 10.9.5
parallels desktop for mac os 10.9.5
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
Stellar phoenix dvd data recovery
Stellar phoenix dvd data recoveryStellar phoenix dvd data recovery
Stellar phoenix dvd data recovery
 
Windows 7 project final
Windows 7 project finalWindows 7 project final
Windows 7 project final
 
How to remove files safely from an HDD or SSD in Windows 10
How to remove files safely from an HDD or SSD in Windows 10How to remove files safely from an HDD or SSD in Windows 10
How to remove files safely from an HDD or SSD in Windows 10
 
Mastering your hard drive
Mastering your hard driveMastering your hard drive
Mastering your hard drive
 

More from OriginalGSM

UNIT 2 P6 part 2
UNIT 2 P6 part 2UNIT 2 P6 part 2
UNIT 2 P6 part 2OriginalGSM
 
UNIT 2 P5 part 2
UNIT 2 P5 part 2UNIT 2 P5 part 2
UNIT 2 P5 part 2OriginalGSM
 
UNIT 2 P4 and m2
UNIT 2 P4 and m2UNIT 2 P4 and m2
UNIT 2 P4 and m2OriginalGSM
 
UNIT 2 P3 and d1
UNIT 2 P3 and d1UNIT 2 P3 and d1
UNIT 2 P3 and d1OriginalGSM
 
ICT BTEC UNIT 2 P2
ICT BTEC UNIT 2 P2ICT BTEC UNIT 2 P2
ICT BTEC UNIT 2 P2OriginalGSM
 
ICT BTEC UNIT 2 M1
ICT BTEC UNIT 2 M1ICT BTEC UNIT 2 M1
ICT BTEC UNIT 2 M1OriginalGSM
 
Managing i.t security
Managing i.t securityManaging i.t security
Managing i.t securityOriginalGSM
 
Impact of i.t system breaches
Impact of i.t system breachesImpact of i.t system breaches
Impact of i.t system breachesOriginalGSM
 
Software preparation
Software preparationSoftware preparation
Software preparationOriginalGSM
 
Personalising desktop
Personalising desktopPersonalising desktop
Personalising desktopOriginalGSM
 
Software licences
Software licencesSoftware licences
Software licencesOriginalGSM
 
Preperation for the installation of computer hardware
Preperation for the installation of computer hardwarePreperation for the installation of computer hardware
Preperation for the installation of computer hardwareOriginalGSM
 
Installation of a selected piece of hardware
Installation of a selected piece of hardwareInstallation of a selected piece of hardware
Installation of a selected piece of hardwareOriginalGSM
 
Problems of installation of hardware
Problems of installation of hardwareProblems of installation of hardware
Problems of installation of hardwareOriginalGSM
 

More from OriginalGSM (20)

UNTI 2 P7
UNTI 2 P7UNTI 2 P7
UNTI 2 P7
 
UNIT 2 P6
UNIT 2 P6UNIT 2 P6
UNIT 2 P6
 
UNIT 2 P6 part 2
UNIT 2 P6 part 2UNIT 2 P6 part 2
UNIT 2 P6 part 2
 
UNIT 2 P5 part 2
UNIT 2 P5 part 2UNIT 2 P5 part 2
UNIT 2 P5 part 2
 
UNIT 2 P4 and m2
UNIT 2 P4 and m2UNIT 2 P4 and m2
UNIT 2 P4 and m2
 
UNIT 2 P3 and d1
UNIT 2 P3 and d1UNIT 2 P3 and d1
UNIT 2 P3 and d1
 
UNIT 2 P2
UNIT 2 P2UNIT 2 P2
UNIT 2 P2
 
UNIT 2 P1
UNIT 2 P1UNIT 2 P1
UNIT 2 P1
 
UNIT 2 M1
UNIT 2 M1UNIT 2 M1
UNIT 2 M1
 
ICT BTEC UNIT 2 P2
ICT BTEC UNIT 2 P2ICT BTEC UNIT 2 P2
ICT BTEC UNIT 2 P2
 
ICT BTEC UNIT 2 M1
ICT BTEC UNIT 2 M1ICT BTEC UNIT 2 M1
ICT BTEC UNIT 2 M1
 
Security plan
Security planSecurity plan
Security plan
 
Managing i.t security
Managing i.t securityManaging i.t security
Managing i.t security
 
Impact of i.t system breaches
Impact of i.t system breachesImpact of i.t system breaches
Impact of i.t system breaches
 
Software preparation
Software preparationSoftware preparation
Software preparation
 
Personalising desktop
Personalising desktopPersonalising desktop
Personalising desktop
 
Software licences
Software licencesSoftware licences
Software licences
 
Preperation for the installation of computer hardware
Preperation for the installation of computer hardwarePreperation for the installation of computer hardware
Preperation for the installation of computer hardware
 
Installation of a selected piece of hardware
Installation of a selected piece of hardwareInstallation of a selected piece of hardware
Installation of a selected piece of hardware
 
Problems of installation of hardware
Problems of installation of hardwareProblems of installation of hardware
Problems of installation of hardware
 

Recently uploaded

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 

Recently uploaded (20)

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 

UNIT 2 P8

  • 1. B Y G E O R G E S M I T H - M O O R E P8- PC Maintenance
  • 2. 1st: Backup data  This should be done daily. All key/new/ updated work should be kept on a second storage medium.  By doing this you minimise the risk of losing pictures, videos and documents considerably.  The different storage options are numerous, yet the best ones are the USB drive (or portable HDD), or using a cloud based storage.  Both of these are fantastic for keeping data safe, yet do not use this as the only place to store data.  They both have one major downside, they have a limited amount of storage. Unless you want to pay money for the cloud backup. Also although a cloud backup will never get lost, it takes time to upload to the internet.
  • 3. USB backup The USB stick can get lost, and can get very expensive for a high ‘GB’ version. Yet it allows you to backup lots of files. A major downside to it is that they can become lost and damaged. With the addition of USB 3.0, USB sticks have become much faster, it can transfer 640MBps per second.
  • 4. Cloud backup  Using a service such as OneDrive or drop box allocates you a certain amount of ‘GB’s’ for free.  This may not store all of your files as time goes on, but files can never get lost or damaged while on the system.  Cloud servers also mean that you can access the files anywhere, as long as you have an internet connection.
  • 5. 2nd: Scan for Viruses  Nowadays this should be done daily at the least.  This requires an antivirus program such as Norton. They allow for scans to be initiated at a time that suits you, or when the computer is idle.  Windows PC’s are most at risk due to the large consumer base, so windows users MUST have an anti-virus program. It MUST update regularly and scan regularly.
  • 7. 3rd: Disk clean-up  In order to maintain the performance of the PC, using either the Disk clean-up tool, or a program such as ‘CCleaner’. This searches through the PC to find all unnecessary and unwanted files.  Unnecessary files would be files like the internet cache, this takes up storage space for valuable files, as shown by the picture on the next slide, there is a possible 3,000 MB that can be removed.
  • 9. 4th: Disk defragging  Over time the hard-drive would become fragmented and slow the PC down as files are spread apart from one another. Defragging ‘squeezes’ these files together.  This is needed on Windows due to the way in which the files are stored, the file architecture.  This should be done monthly, yet with systems with windows 7 or later, this has become automatic and so is no longer a problem for computers.
  • 11. 5th: Scanning for HDD errors  To access this, go to drive properties, you can schedule the task with windows Vista or later. It takes a considerable amount of time, and so is not done regularly.  This is used to find Hard-Disk errors, and amend them, this will improve the speed of the HDD, but it would also minimise the risk of corrupted files.
  • 12. Checking for Hard-Disk errors (first option)
  • 13. 6th: Hard-Drive Backup  This is different from just protecting the files on the Hard-Disk.  First make sure there are no viruses on the PC (or you would be copying them), it is used for when either the HDD crashes or Windows becomes far too corrupted.  It should only be done every 6 months or so as it is a lengthy process. This picture was taken from google as I could not take a picture from my pc-
  • 14. OS imaging  It copies the entire OS, the benefit of this is that it prevents the need to completely re-install windows from scratch.  The only thing that would have to be done is to copy the most recent files over, this saves lots of time as all of the correct files and applications would be already there, you would not need to re-install them all.