Form 1 Week 10.1


Published on

Published in: Technology, Health & Medicine
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Form 1 Week 10.1

  1. 1. 10.1
  2. 2. <ul><li>There are many factors that affect the smooth operation of a computer system. </li></ul><ul><li>In some extreme cases, the computer can cease to function. </li></ul><ul><li>All these factors serve as threats to the personal computer we all use today. </li></ul>THREAT TO COMPUTERS
  3. 3. THREATS INCLUDE <ul><li>Computer Virus </li></ul><ul><li>Power Fluctuation </li></ul><ul><li>Dust </li></ul><ul><li>Rodents (small animals)‏ </li></ul>
  4. 4. VIRUS <ul><li>A virus in the world of personal computers is no different then that virus which makes us sick. </li></ul><ul><li>Some virus we can recover from like the common cold, other virus will kill in time such as HIV/AIDS. </li></ul><ul><li>A computer virus is a type of software that is intended to cause the hardware and/or software harm. </li></ul>
  5. 5. VIRUS <ul><li>Just like you have thee ABC's of HIV/AIDs protection there is a similar practice for a computer </li></ul><ul><li>A = Abstain </li></ul><ul><li>B = Be Faithful </li></ul><ul><li>C = Use a Condom </li></ul><ul><li>To help protect the computer you have similar steps. </li></ul><ul><li>A = Do not share information </li></ul><ul><li>B = Know that the persons information is clean. </li></ul><ul><li>C = Use an anti virus program. </li></ul>
  6. 6. ANTI-VIRUS SOFTWARE <ul><li>To be able to disinfect the virus on your machine, you must have an antivirus program installed and kept up to date. </li></ul><ul><li>Some common Anti-Virus Software includes: </li></ul><ul><ul><li>AVG </li></ul></ul><ul><ul><li>Norton </li></ul></ul><ul><ul><li>Avast </li></ul></ul><ul><ul><li>OPEN SOURCE SOLUTION </li></ul></ul>
  7. 7. POWER FLUCTUATION <ul><li>Just like eating poorly cooked food can give you a runny stomach or kill you, bad power or electricity can damage or destroy the computer. </li></ul><ul><li>It is advisable to connect your computer to an uninterrupted power supply (UPS) instead of directly connecting to the electricity socket. This is because electricity from a standard outlet can be of a poor quality and if not careful it can fry your motherboard. </li></ul>
  8. 8. DUST <ul><li>Since electricity used by the machine generates a lot of heat, a fan is provided to help cool the components and prevent them from getting to hot. The situation can arise where dirt enters the machine and prevents the fan from functioning well, and this will cause the system unit to fail. </li></ul><ul><li>Therefore, it is important that an owner of a machine has a trained technician properly clean it annually or more frequently in dustier environments. </li></ul>
  9. 9. RODENTS <ul><li>When a mouse (rodent) enters the system unit, it can cause severe damage to the circuit in the motherboard non-functional. </li></ul>
  10. 10. THREATS TO COMPUTER USERS <ul><li>Users of computers are faced with a lot of problems. These includes:- </li></ul><ul><li>Posture </li></ul><ul><li>Vision </li></ul><ul><li>Waist pain </li></ul>
  11. 11. POSTURE <ul><li>The way most users of computer sit down while using the computer is not the best (bad posture). Bad posture could affect the shape and health of the user. </li></ul><ul><li>ADD A PICTURE OF GOOD AND BAD POSTURE </li></ul>
  12. 12. VISION <ul><li>Some monitors use cathode Ray Tube (CRT) technology. CRT generates x-rays during operation and would affect the eyes of the user and monitors with low refreshing rate could strain the eyes of the user. </li></ul>
  13. 13. RESPONSIBLE USE OF COMPUTERS <ul><li>Users of computer are expected to use the computers in such a way that it would not affect other people financially, socially etc. These constitute the acceptable or responsible use of computers (computer ethics). </li></ul><ul><li>This is one of the motivations behind the APSEC ICT Laboratory Rules. </li></ul>
  14. 14. THESE INCLUDE: <ul><li>Copyright </li></ul><ul><li>Personal and Corporate Privacy </li></ul><ul><li>Pornography </li></ul>
  15. 15. COPYRIGHT <ul><li>Users of computers are advised not to do copyright or reproduce what somebody had already produced or produce a copy of it in another form. </li></ul>
  16. 16. PRIVACY CONCERN <ul><li>Users of computers are advised not to use the computer in a manner that could affect the peace or privacy of other people. </li></ul><ul><li>Such things include illegal duplication or music, movie and other material where a person or company expects money for that material. </li></ul>