SlideShare a Scribd company logo
PC Maintenance

PC Repair and Troubleshooting
Maintenance
• Maintenance - activities done to conserve the
  original condition of an asset or resource
  while compensating for normal wear and tear
• Computer maintenance - practice of keeping
  computers in a good state of repair.
  – Corrective Maintenance - performed to correct an
    already existing problem
  – Preventive Maintenance - performed to avoid
    problems from occurring
Preventive Maintenance
• Importance:
  – Saves money – maintain rather than repair
  – Saves time – prevent rather than troubleshoot
  – Safeguard your data
  – Improves performance
• When to perform:
  – The frequency of the maintenance will depend on
    how often the computer is used and what is it
    used .
Computer Maintenance
• Computer Cleaning - practice of physically
  cleaning the interior, and exterior, of a computer
  by removing dust and debris
• Back Up - Important data stored on computers
  may be copied and archived securely so that, in
  the event, of failure, the data and systems may be
  reconstructed
• Disk Maintenance - Disk storage, such as your
  hard drive, fills up with unwanted files over time.
  Files may become fragmented and slows the
  computer down
Computer Maintenance
• Registry - Operating systems files such as the
  Windows registry may require maintenance.
• Computer security - protection of information
  and property from theft, corruption, or natural
  disaster, while allowing the information and
  property to remain accessible and productive to
  its intended users.
• Updates - Software packages and operating
  systems may require regular updates to correct
  software bugs and address security weaknesses
Maintenance Checklist
                     Activity                       Frequency   Auto?
      Scan hard disk file systems for errors          Daily      Yes
                 Scan for viruses                     Daily      Yes
                  Back up data                        Daily      No
              Clean monitor screen                   Weekly      No
             Defragment hard disks                   Weekly      Yes
          Scan for hard disk read errors             Weekly      Yes
           Clean mouse and keyboard                 Monthly      No
   Check for full hard disk volumes and remove      Monthly      No
                  unnecessary files
                                                    Monthly     Someti
           Update virus definition files
                                                                 mes
Check power protection devices to ensure they are   Quarterly    No
          still protecting the system
Maintenance Checklist
                   Activity                            Frequency          Auto?
Check power supply fan for ventilation and dirt         Quarterly          No
       build-up and clean if necessary
         Back up CMOS information                       Quarterly          No
Check processor temperature, inspect heat sink    Annually or Whenever     No
     and fan to ensure they are working               case is open
                                                  Annually (or whenever    No
Check hard disk for temperature and vibration
                                                     case is opened)
            Clean exterior of case                      Annually           No
          Clean exterior of monitor                     Annually           No
  Check and clean interior, motherboard and             Annually           No
         expansion cards if necessary
    Check internal connections and cables               Annually           No
Computer Virus
• Run without the user wanting it to and/or
  create effects that the programmer wants but
  that the user did not want or request
• Have the ability to "infect" or modify other
  files or disk structures
• Replicate itself so it can spread to other files
  or systems.
Types of Virus
• Boot Sector Infectors - attacks the boot program
  and is executed by the system when the PC starts
  up
• File Infectors - attack and modify program files by
  loading itself into memory and waits for a trigger
  to find and infect other program files
• Macro Virus – these programs use the built-in
  programming languages and when opened they
  duplicate themselves into other documents and
  spread
Virus Prevention
• PC
  – Connections is equal to risk
  – Software Installation
  – Use Backups
  – Control Access
• Networks
  – Control your connection
  – Scan shared files
• Removable Media
  – Scan before use
  – Remove before Reboot
  – Disable Booting from Removable Media
  – Boot Password
  – Abstinence
• Internet
  – Obtain software from reputable sources
  – Scan new downloaded files
  – Beware of automatic downloads
Backup
• Risk to your data
  – Hardware Failure
  – Software Failure
  – File System Corruption
  – Accidental Deletion
  – Virus Infection
  – Theft
  – Sabotage
  – Natural Disaster

More Related Content

What's hot

Common Computer Faults and Problems
Common Computer Faults and ProblemsCommon Computer Faults and Problems
Common Computer Faults and Problems
Sef Cambaliza
 
Advanced PC Maintenance and Troubleshooting
Advanced PC Maintenance and TroubleshootingAdvanced PC Maintenance and Troubleshooting
Advanced PC Maintenance and Troubleshooting
Natan Mesfin
 
Ch 2 computer assembly disassembly
Ch 2 computer  assembly disassemblyCh 2 computer  assembly disassembly
Ch 2 computer assembly disassemblymekashaw tizazu
 
COMPUTER HARDWARE ASSEMBLING
COMPUTER HARDWARE ASSEMBLING COMPUTER HARDWARE ASSEMBLING
COMPUTER HARDWARE ASSEMBLING
Nikhil Sasikumar
 
Diagnostic software tools
Diagnostic software toolsDiagnostic software tools
Diagnostic software tools
Celeste Dela Cruz
 
INSTALL APLLICATION SOFTWARE.pptx
INSTALL APLLICATION SOFTWARE.pptxINSTALL APLLICATION SOFTWARE.pptx
INSTALL APLLICATION SOFTWARE.pptx
karmaYonten5
 
Grade 7 elements of computer system
Grade 7  elements of computer systemGrade 7  elements of computer system
Grade 7 elements of computer system
Rafael Balderosa
 
Troubleshooting And Maintenance Fundamentals
Troubleshooting And Maintenance FundamentalsTroubleshooting And Maintenance Fundamentals
Troubleshooting And Maintenance Fundamentalsricsanmae
 
Install network cable module CSS NC2
Install network cable module CSS NC2Install network cable module CSS NC2
Install network cable module CSS NC2
wilfredo dela cerna
 
Lesson 3 performing mensuration and calculation
Lesson 3 performing mensuration and calculationLesson 3 performing mensuration and calculation
Lesson 3 performing mensuration and calculation
Joel Tiemsin
 
Procedures in Planning and Conducting Maintenance
Procedures in Planning and Conducting MaintenanceProcedures in Planning and Conducting Maintenance
Procedures in Planning and Conducting Maintenance
Alvin Gabejan
 
Computer repair and maintenance
Computer repair and maintenanceComputer repair and maintenance
Computer repair and maintenance
Cornelius Micah
 
CSS L05 - Computer System Assembly
CSS L05 -  Computer System AssemblyCSS L05 -  Computer System Assembly
CSS L05 - Computer System Assembly
Marvin Bronoso
 
Computer Troubleshooting
Computer TroubleshootingComputer Troubleshooting
Computer Troubleshooting
Lisa Hartman
 
Computer maintenance-and-repair
Computer maintenance-and-repairComputer maintenance-and-repair
Computer maintenance-and-repair
MBARUSHIMANA anaclet
 
Types of components and objects to be measured_Presentation
Types of components and objects to be measured_PresentationTypes of components and objects to be measured_Presentation
Types of components and objects to be measured_Presentation
Bryan Corpuz
 
Rubric
RubricRubric
detailed-lesson-plan-for-senior-high-demo
detailed-lesson-plan-for-senior-high-demodetailed-lesson-plan-for-senior-high-demo
detailed-lesson-plan-for-senior-high-demo
giareysie
 
Computer operation
Computer operationComputer operation
Computer operation
Munim Chaudhry
 
CSS L04 - Integral Parts of the Computer System
CSS L04 - Integral Parts of the Computer SystemCSS L04 - Integral Parts of the Computer System
CSS L04 - Integral Parts of the Computer System
Marvin Bronoso
 

What's hot (20)

Common Computer Faults and Problems
Common Computer Faults and ProblemsCommon Computer Faults and Problems
Common Computer Faults and Problems
 
Advanced PC Maintenance and Troubleshooting
Advanced PC Maintenance and TroubleshootingAdvanced PC Maintenance and Troubleshooting
Advanced PC Maintenance and Troubleshooting
 
Ch 2 computer assembly disassembly
Ch 2 computer  assembly disassemblyCh 2 computer  assembly disassembly
Ch 2 computer assembly disassembly
 
COMPUTER HARDWARE ASSEMBLING
COMPUTER HARDWARE ASSEMBLING COMPUTER HARDWARE ASSEMBLING
COMPUTER HARDWARE ASSEMBLING
 
Diagnostic software tools
Diagnostic software toolsDiagnostic software tools
Diagnostic software tools
 
INSTALL APLLICATION SOFTWARE.pptx
INSTALL APLLICATION SOFTWARE.pptxINSTALL APLLICATION SOFTWARE.pptx
INSTALL APLLICATION SOFTWARE.pptx
 
Grade 7 elements of computer system
Grade 7  elements of computer systemGrade 7  elements of computer system
Grade 7 elements of computer system
 
Troubleshooting And Maintenance Fundamentals
Troubleshooting And Maintenance FundamentalsTroubleshooting And Maintenance Fundamentals
Troubleshooting And Maintenance Fundamentals
 
Install network cable module CSS NC2
Install network cable module CSS NC2Install network cable module CSS NC2
Install network cable module CSS NC2
 
Lesson 3 performing mensuration and calculation
Lesson 3 performing mensuration and calculationLesson 3 performing mensuration and calculation
Lesson 3 performing mensuration and calculation
 
Procedures in Planning and Conducting Maintenance
Procedures in Planning and Conducting MaintenanceProcedures in Planning and Conducting Maintenance
Procedures in Planning and Conducting Maintenance
 
Computer repair and maintenance
Computer repair and maintenanceComputer repair and maintenance
Computer repair and maintenance
 
CSS L05 - Computer System Assembly
CSS L05 -  Computer System AssemblyCSS L05 -  Computer System Assembly
CSS L05 - Computer System Assembly
 
Computer Troubleshooting
Computer TroubleshootingComputer Troubleshooting
Computer Troubleshooting
 
Computer maintenance-and-repair
Computer maintenance-and-repairComputer maintenance-and-repair
Computer maintenance-and-repair
 
Types of components and objects to be measured_Presentation
Types of components and objects to be measured_PresentationTypes of components and objects to be measured_Presentation
Types of components and objects to be measured_Presentation
 
Rubric
RubricRubric
Rubric
 
detailed-lesson-plan-for-senior-high-demo
detailed-lesson-plan-for-senior-high-demodetailed-lesson-plan-for-senior-high-demo
detailed-lesson-plan-for-senior-high-demo
 
Computer operation
Computer operationComputer operation
Computer operation
 
CSS L04 - Integral Parts of the Computer System
CSS L04 - Integral Parts of the Computer SystemCSS L04 - Integral Parts of the Computer System
CSS L04 - Integral Parts of the Computer System
 

Similar to 5 pc maintenance

ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1
OriginalGSM
 
UNIT 2 P3 and d1
UNIT 2 P3 and d1UNIT 2 P3 and d1
UNIT 2 P3 and d1
OriginalGSM
 
Programs you need!
Programs you need!Programs you need!
Programs you need!dshinkfield
 
1 5 system software and computer management
1 5 system software and computer management1 5 system software and computer management
1 5 system software and computer management
QondileRamokgadi
 
Programs you need!
Programs you need!Programs you need!
Programs you need!
clcewing
 
Information Computer Technology Handouts (Part I)
Information Computer Technology Handouts (Part I)Information Computer Technology Handouts (Part I)
Information Computer Technology Handouts (Part I)
ella dimaiwat
 
Rick's assignment software utilities
Rick's assignment software utilitiesRick's assignment software utilities
Rick's assignment software utilitiesJames London
 
Operating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptxOperating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptx
DondonGoles
 
system software
system softwaresystem software
system software
fatinsmile
 
System software 3
System software 3System software 3
System software 3
fatinsmile
 
System Software AS Past paper question solution.pptx
System Software AS Past paper question solution.pptxSystem Software AS Past paper question solution.pptx
System Software AS Past paper question solution.pptx
SabeehShahid71321TCH
 
Introduction to Computer Software
Introduction to Computer SoftwareIntroduction to Computer Software
System software
System softwareSystem software
System software
Bushra M
 
Seven steps to great PC health (Windows)
Seven steps to great PC health (Windows)Seven steps to great PC health (Windows)
Seven steps to great PC health (Windows)
Ralf Schwoebel
 
Diagnostic Software Tools.pptx
Diagnostic Software Tools.pptxDiagnostic Software Tools.pptx
Diagnostic Software Tools.pptx
marlonfelizardo3
 
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxMAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
RichardSugbo
 
ICT Skills.pdf
ICT Skills.pdfICT Skills.pdf
ICT Skills.pdf
TENZING LHADON
 
Linux.pptx
Linux.pptxLinux.pptx
Linux.pptx
Nitz18
 
Pc maintenance security backup and troubleshooting
Pc maintenance security backup and troubleshootingPc maintenance security backup and troubleshooting
Pc maintenance security backup and troubleshooting
Tech Day Camp
 

Similar to 5 pc maintenance (20)

ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1
 
UNIT 2 P3 and d1
UNIT 2 P3 and d1UNIT 2 P3 and d1
UNIT 2 P3 and d1
 
Programs you need!
Programs you need!Programs you need!
Programs you need!
 
1 5 system software and computer management
1 5 system software and computer management1 5 system software and computer management
1 5 system software and computer management
 
Programs you need!
Programs you need!Programs you need!
Programs you need!
 
Information Computer Technology Handouts (Part I)
Information Computer Technology Handouts (Part I)Information Computer Technology Handouts (Part I)
Information Computer Technology Handouts (Part I)
 
Rick's assignment software utilities
Rick's assignment software utilitiesRick's assignment software utilities
Rick's assignment software utilities
 
Operating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptxOperating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptx
 
system software
system softwaresystem software
system software
 
System software 3
System software 3System software 3
System software 3
 
System Software AS Past paper question solution.pptx
System Software AS Past paper question solution.pptxSystem Software AS Past paper question solution.pptx
System Software AS Past paper question solution.pptx
 
Introduction to Computer Software
Introduction to Computer SoftwareIntroduction to Computer Software
Introduction to Computer Software
 
System software
System softwareSystem software
System software
 
Comp maint
Comp maintComp maint
Comp maint
 
Seven steps to great PC health (Windows)
Seven steps to great PC health (Windows)Seven steps to great PC health (Windows)
Seven steps to great PC health (Windows)
 
Diagnostic Software Tools.pptx
Diagnostic Software Tools.pptxDiagnostic Software Tools.pptx
Diagnostic Software Tools.pptx
 
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxMAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
 
ICT Skills.pdf
ICT Skills.pdfICT Skills.pdf
ICT Skills.pdf
 
Linux.pptx
Linux.pptxLinux.pptx
Linux.pptx
 
Pc maintenance security backup and troubleshooting
Pc maintenance security backup and troubleshootingPc maintenance security backup and troubleshooting
Pc maintenance security backup and troubleshooting
 

More from Rheigh Henley Calderon

8 problem solving with the case logic structure
8 problem solving with the case logic structure8 problem solving with the case logic structure
8 problem solving with the case logic structureRheigh Henley Calderon
 
5 problem solving with the sequential logic structure
5 problem solving with the sequential logic structure5 problem solving with the sequential logic structure
5 problem solving with the sequential logic structureRheigh Henley Calderon
 
4 introduction to programming structure
4 introduction to programming structure4 introduction to programming structure
4 introduction to programming structureRheigh Henley Calderon
 
2 beginning problem solving concepts for the computer
2 beginning problem solving concepts for the computer2 beginning problem solving concepts for the computer
2 beginning problem solving concepts for the computerRheigh Henley Calderon
 
1 introduction to problem solving and programming
1 introduction to problem solving and programming1 introduction to problem solving and programming
1 introduction to problem solving and programmingRheigh Henley Calderon
 

More from Rheigh Henley Calderon (20)

10 data structures
10 data structures10 data structures
10 data structures
 
9 processing arrays
9 processing arrays9 processing arrays
9 processing arrays
 
8 problem solving with the case logic structure
8 problem solving with the case logic structure8 problem solving with the case logic structure
8 problem solving with the case logic structure
 
7 problem solving with loops
7 problem solving with loops7 problem solving with loops
7 problem solving with loops
 
6 problem solving with decisions
6 problem solving with decisions6 problem solving with decisions
6 problem solving with decisions
 
5 problem solving with the sequential logic structure
5 problem solving with the sequential logic structure5 problem solving with the sequential logic structure
5 problem solving with the sequential logic structure
 
4 introduction to programming structure
4 introduction to programming structure4 introduction to programming structure
4 introduction to programming structure
 
3 programming concepts
3 programming concepts3 programming concepts
3 programming concepts
 
2 beginning problem solving concepts for the computer
2 beginning problem solving concepts for the computer2 beginning problem solving concepts for the computer
2 beginning problem solving concepts for the computer
 
1 introduction to problem solving and programming
1 introduction to problem solving and programming1 introduction to problem solving and programming
1 introduction to problem solving and programming
 
9 technical support
9 technical support9 technical support
9 technical support
 
8 customer service
8 customer service8 customer service
8 customer service
 
7 laptop repair
7 laptop repair7 laptop repair
7 laptop repair
 
6 laptop basics
6 laptop basics6 laptop basics
6 laptop basics
 
4 pc repair
4 pc repair4 pc repair
4 pc repair
 
3 pc upgrade
3 pc upgrade3 pc upgrade
3 pc upgrade
 
2 pc assembly
2 pc assembly2 pc assembly
2 pc assembly
 
1 hardware fundamentals
1 hardware fundamentals1 hardware fundamentals
1 hardware fundamentals
 
8 cyber crimes
8 cyber crimes8 cyber crimes
8 cyber crimes
 
7 computer ethics
7 computer ethics7 computer ethics
7 computer ethics
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 

5 pc maintenance

  • 1. PC Maintenance PC Repair and Troubleshooting
  • 2. Maintenance • Maintenance - activities done to conserve the original condition of an asset or resource while compensating for normal wear and tear • Computer maintenance - practice of keeping computers in a good state of repair. – Corrective Maintenance - performed to correct an already existing problem – Preventive Maintenance - performed to avoid problems from occurring
  • 3. Preventive Maintenance • Importance: – Saves money – maintain rather than repair – Saves time – prevent rather than troubleshoot – Safeguard your data – Improves performance • When to perform: – The frequency of the maintenance will depend on how often the computer is used and what is it used .
  • 4. Computer Maintenance • Computer Cleaning - practice of physically cleaning the interior, and exterior, of a computer by removing dust and debris • Back Up - Important data stored on computers may be copied and archived securely so that, in the event, of failure, the data and systems may be reconstructed • Disk Maintenance - Disk storage, such as your hard drive, fills up with unwanted files over time. Files may become fragmented and slows the computer down
  • 5. Computer Maintenance • Registry - Operating systems files such as the Windows registry may require maintenance. • Computer security - protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. • Updates - Software packages and operating systems may require regular updates to correct software bugs and address security weaknesses
  • 6. Maintenance Checklist Activity Frequency Auto? Scan hard disk file systems for errors Daily Yes Scan for viruses Daily Yes Back up data Daily No Clean monitor screen Weekly No Defragment hard disks Weekly Yes Scan for hard disk read errors Weekly Yes Clean mouse and keyboard Monthly No Check for full hard disk volumes and remove Monthly No unnecessary files Monthly Someti Update virus definition files mes Check power protection devices to ensure they are Quarterly No still protecting the system
  • 7. Maintenance Checklist Activity Frequency Auto? Check power supply fan for ventilation and dirt Quarterly No build-up and clean if necessary Back up CMOS information Quarterly No Check processor temperature, inspect heat sink Annually or Whenever No and fan to ensure they are working case is open Annually (or whenever No Check hard disk for temperature and vibration case is opened) Clean exterior of case Annually No Clean exterior of monitor Annually No Check and clean interior, motherboard and Annually No expansion cards if necessary Check internal connections and cables Annually No
  • 8. Computer Virus • Run without the user wanting it to and/or create effects that the programmer wants but that the user did not want or request • Have the ability to "infect" or modify other files or disk structures • Replicate itself so it can spread to other files or systems.
  • 9. Types of Virus • Boot Sector Infectors - attacks the boot program and is executed by the system when the PC starts up • File Infectors - attack and modify program files by loading itself into memory and waits for a trigger to find and infect other program files • Macro Virus – these programs use the built-in programming languages and when opened they duplicate themselves into other documents and spread
  • 10. Virus Prevention • PC – Connections is equal to risk – Software Installation – Use Backups – Control Access • Networks – Control your connection – Scan shared files
  • 11. • Removable Media – Scan before use – Remove before Reboot – Disable Booting from Removable Media – Boot Password – Abstinence
  • 12. • Internet – Obtain software from reputable sources – Scan new downloaded files – Beware of automatic downloads
  • 13. Backup • Risk to your data – Hardware Failure – Software Failure – File System Corruption – Accidental Deletion – Virus Infection – Theft – Sabotage – Natural Disaster