SlideShare a Scribd company logo
1 of 10
Download to read offline
1
Nazrul Islam, ID:161-15-7255
2
Nazrul Islam, ID:161-15-7255
Errors, Failures, and Risks
Errors in computer systems:
Error is a software fault that causes the operating system to no lengthier work correctly.
System errors are normally serious and may require a hardware device to be repaired or
replaced.
Causes of computer errors:
Computers are complicated machines that comprise hardware from several companies, run
software having thousands of lines of code, and use dozens of different drivers. Truly, it's
astonishing that they are as stable as they are today. Most problems are related to a software
programming error that can be rigged by acquiring an updated version of the software code.
There are a number of things which can cause computer errors, and to cover them all would
take several thousand pages. However, here are some of the most common things that cause
computer errors, along with what you can do to restrain them from happening.
Viruses and malware: One of the most common causes of computer errors is viruses and
malware, each of which tries to hijack your computer for malicious purposes. Spyware,
keyloggers, and hijackers are some of the more risky examples that come to mind.
Malware comes in all shapes and sizes and should be immediately removed from your PC if
detected. Anti-Virus software helps you to get rid of malicious threats.
Noise: On the computer, noise can come in many forms. For example, noise/clutter in the
Windows registry can obstruct applications from running accurately. Or, if the hard drive is
filled with needless browser cookies and cache information, it could likewise be causing
errors. Fortunately, there are many cost-effective programs that will help you to eliminate
noise/clutter on your PC. Or, if you’d rather to eliminate clutter yourself, consider
uninstalling old, unused programs or deleting your browser’s cache information.
Poor internet browsing: The internet can be a frightening, dangerous place if your browser
isn’t configured appropriately. Put simply, an unsafe/leaky browser could be a direct cause of
errors on your PC. To stop this from happening in the future, use the internet optimization
features on a program like PC Cleaner, which will independently tackle any browser problem
you throw at it, radically improving your security in the future.
3
Nazrul Islam, ID:161-15-7255
Hardware failure: If an element of your PC steadily starts to fall into disrepair, it could be
causing errors across the rest of your computer. And if the heatsink of your CPU begins to
overheat, for example, then the resulting lag in performance will negatively impact
everything you do on your PC. Update your drivers regularly, and consider cleaning out the
inside of your PC case with a good air duster.
How to prevent errors: We will able to stop errors by following the below steps.
▪ Update software regularly
▪ Use anti-virus software to get rid of malicious threats
▪ Delete unnecessary files or browser cookies or cache information.
▪ Use the safe or configured browser.
▪ To prevent hardware failure update hard drive regularly.
▪ Use advanced registry detection
Types of computer errors:
1.Billing Error: Any mistake on a bill resulting from the seller's mistake. For example, a
company may add what is owed incorrectly or accidentally omit a credit it should have
included. The buyer does not have to pay billing errors, though the dispute may take some
time to resolve.
Example: A woman received a $6.3 million bill for electricity. The correct amount was $63.
The cause was an input error made by someone using a new computer system.
2. Inaccurate and misinterpreted data in databases: If there are inaccurate and
misinterpreted data exist in the databases then the error may occur. It is challenging to get
accurate and meaningful error rates for major databases with information
about millions of people.
Numerous causes contribute to the frequency and severity of the problems people suffer
because of errors in databases and misinterpretation of their contents:
▪ Large population where people may share names
▪ Automated processing may not be able to recognize special cases
▪ Errors in data entry
▪ Lack of accountability for errors
▪ Overconfidence in the accuracy of data
4
Nazrul Islam, ID:161-15-7255
▪ Poor database design
▪ Failure to update and correct data.
The first cause is unlikely to replace. It is the context in which we live. The second is
partly a side effect of the speed and processing ability of computer technology, but we can
reduce its negative impacts with better system specifications and training of users. The
remaining factors in the list above are all within our control as individuals, professionals,
and policy makers.
3. System errors: These are quite critical types of errors among those that can pop up on
your computer.System errors are caused by malfunctioning hardware components, corrupted
operating system modules, etc.
4. Runtime errors: This errors are caused by corrupted or malfunctioning system files or
software executables. Most runtime errors cause the application that caused it to shut down.
However, more serious runtime errors may cause the system to become unstable or
unresponsive, suggesting that you should restart your computer.
5. Stop errors: Stop errors are caused by corrupted hardware, especially malfunctioning
RAM modules and bad sectors on hard disks. Stop errors can be difficult to resolve at times.
6. Device Manager Errors: These are usually caused by corrupted driver files or
malfunctioning hardware components. In case of the former cause, the problem is often
solved by reinstalling or updating the drivers. However, the latter cause can often be solved
only by replacing hardware components.
7. POST code errors: POST code errors are caused by malfunctioning hardware
components, and are characterized by short beep sounds from the tiny internal speaker of
your motherboard. POST code errors occur when you press the power button to turn on your
PC or computer.
8. No Video Output: When you open your PC or computer, nothing shows up in your
monitor and the LED indicator of your monitor is flashing in yellow color.
5
Nazrul Islam, ID:161-15-7255
9. Never Ending Loading of Operating system: The computer opens up then boots but
when the operating system loads it, doesn't continue and it will take a longtime if you're
going to wait for it to load.
10. Application causes system to restart: Just like the mouse problem, when you open a
program that will take the whole screen like for example a game and/or a program
application, when you close it, it will cause your system to restart.
Failures in computer systems:
The inability of a system or component to perform its required functions within specified
performance requirements. A system failure can occur because of a hardware failure or a
severe software issue, causing the system to freeze, reboot, or stop functioning altogether. A
system failure may or may not result in an error being displayed on the screen. The computer
may shut off without warning and without any error message. If an error message is
displayed, it often is displayed as a Blue Screen of Death error.
Computer systems fail general reasons:
▪ The task they are intended for is inherently difficult
-Errors and ambiguity in program specifications
▪ The job is done poorly
- Not considering how the system interacts with real users or real world problems
- Dishonest reliability or safety estimates to cover up flaws and avoiding expenses
▪ System failures may result from a hard drive with bad sectors, causing the operating
system to not be able to read data from the hard drive. A failing motherboard can
cause a system failure because the computer is not able to process requests or operate
in general.
▪ A bad processor can and usually causes a system failure because the computer cannot
operate if the processor is not working properly or at all.
▪ A bad RAM chip can also cause system failures because the operating system is not
able to access data stored on the RAM chip.
6
Nazrul Islam, ID:161-15-7255
▪ System failures due to software issues can occur if the issue in the software, such as a
bad line of code, is severe enough. The system failure and subsequent computer shut
down occurs as an attempt to prevent damage to other software or the operating
system.
▪ Computer software often comes with various bugs or vulnerabilities. These are simply
programming mistakes, but they can make the software susceptible to viruses and
glitches. When an error is discovered, the software designer sends out a “patch” that
requires downloading and rebooting. Failing to upgrade the software by running the
patch can lead to the corruption of data.
▪ There are several malware protection packages available for computer rooms or data
centers. Once installed, the subscription must be maintained. One telltale sign of a
malware-infected computer is slow data processing.
▪ Overheating can cause severe damage to your system
▪ Checking the performance of the CPU is another way to identify why your computer
is failing.
How to prevent failures: We will able to stop failures by following the below steps.
1. Know that your computer is going to fail: Although this may not happen to you,
especially if you follow the steps in this article, you need to treat your computer as if
it were a doomed failure. Your failure to do so could possibly result in your computer
failing you sooner. Always assume that failure is imminent.
2. Learn to recognize the signs of imminent failure: Failure is not simply an error – it
is a fatal error that results in data loss, damage to your computer and/or its ability to
function, hardware failure, or other serious issues. Signs of imminent failure might
include regular poor performance, frequent errors and/or popups, unknown programs
being installed, frequent power loss, frequent crashes, or certain parts not working.
3. Dust issues: Preventing failure means making sure your computer is clean, physically
and in its operations. Make sure that there isn't too much dust inside, especially on the
fans. Dust can reduce performance and cause overheating. Also, make sure that there
are no unnecessary programs or files on your computer, and that the registry is well
maintained. Be sure to run frequent virus scans.
7
Nazrul Islam, ID:161-15-7255
4. RAM issues: Know your computer's specifications and the limits of those
specifications. Remember that running idly, your computer takes up at least some of
your computer's RAM, as well as its processing power, for the operating system is
running, as well as background programs (e.g.: antivirus software). So, that means
that if a program requires at least 256 megabytes of RAM, and you only have 256
megabytes of RAM on your computer, you won't have success running the program.
5. Don't do anything unusual: If a popup shows up asking you to do something that
you don't feel comfortable with, don't click on it. Use the task manager to kill it, or
reboot your computer. Don't install programs you don't fully trust. When installing
freeware or shareware, read everything, and uncheck any additional "new product
notifier" programs, toolbars, or other things you don't want.
6. Deal with hardware issues: When something isn't working properly, either diagnose
the problem yourself and fix it, or contact a professional and have them look at it for
you. Take advantage of warranties on parts if they fail.
7. Malware issues: Make sure that your anti-virus software is updated to be able to scan
necessary files. Don’t install an unknown program.
Types of System Failures: There are various types of failures in the computer system.
1. Voting system:
▪ Technical failures: The voting machines are not well designed. So, there is a
high risk.
▪ Programmers or hackers rigging software to produce inaccurate results: A
hacker could reprogram an electronic voting machine directly, if it’s left
unguarded, or remotely if it’s connected to the internet and can produce an
inaccurate result. They can change the voting result by editing databases.
▪ Vulnerability to viruses: voting machines are not secure enough to guarantee a
trustworthy election, and an attacker with access to a single machine could
disrupt or change the outcome of an election using viruses.
▪ Many of the failures that occurred result from causes we will see over and
over: Lack of sufficient planning and thought about security issues,
insufficient testing, and insufficient training.
8
Nazrul Islam, ID:161-15-7255
2. Stalled airport:
▪ Real-world problems: Some scanners got dirty or knocked out of alignment
and could not detect carts going by. Faulty latches on the carts caused luggage
to fall onto the tracks between stops.
▪ Problems in other systems: The airport’s electrical system could not handle the
power surges associated with the baggage system. The first full-scale test blew
so many circuits that the test had to be halted.
▪ Software errors: A software error caused the routing of carts to waiting for
pens when they were actually needed.
3. Abandoned system:
▪ Some flaws in systems are so extreme that the systems are discarded after
wasting millions, or even billions, of dollars.
▪ Example:
➢ Ford Motor purchasing system
➢ Hotel and rental car businesses
➢ IRS tax modernization plan
4. Legacy system: A legacy system is a computer system, programming language,
software application, process or other technology that is outdated or that can no longer
receive support and maintenance but is essential for organizations or companies and
cannot be replaced or updated easily for different reasons:
▪ Legacy systems are reliable but inflexible.
▪ Expensive to replace
▪ Little or no documentation
▪ There is rarely, if ever, a complete specification of the legacy systems which
makes it impossible to specify a new one that is functionally identical.
▪ The operational risk of some updates may be too high, especially if key data
can be lost or corrupted.
▪ The software may contain some important business rules not mentioned or
noted in any other document.
9
Nazrul Islam, ID:161-15-7255
Risk in computer system:
A computer risk is really anything on a computer that may damage or steal your data or allow
someone else to access a computer, without your knowledge or consent. There are a lot of
different things that can create a computer risk, including malware, a general term used to
describe many types of bad software. We commonly think of computer viruses, but, there are
several types of bad software that can create a computer security risk, including viruses,
worms, ransomware, spyware, and Trojan horses.
Types of risk:
▪ Physical risks: resulting from physical access or damage to IT resources such as the
servers. These could include theft, damage from fire or flood, or unauthorized access
to confidential data by an employee or outsider.
▪ Electronic risks - aiming to compromise your business information - eg a hacker
could get access to your website, your IT system could become infected by a
computer virus, or you could fall victim to a fraudulent email or website. These are
commonly of a criminal nature.
▪ Technical failures - such as software bugs, a computer crash or the complete failure
of a computer component. A technical failure can be catastrophic if, for example, you
cannot retrieve data on a failed hard drive and no backup copy is available.
▪ Infrastructure failures - such as the loss of your internet connection can interrupt
your business - eg you could miss an important purchase order.
▪ Human error - is a major threat - eg someone might accidentally delete important
data, or fail to follow security procedures properly.
How to manage risks:
Managing various types of risks begins with identifying exactly-
▪ the type of threats/risks affecting your business or computer systems
▪ the assets that may be at risks
▪ the ways of securing your IT/computer systems
▪ Control Recommendations
10
Nazrul Islam, ID:161-15-7255
▪ Impact Analysis
▪ Risk Determination
▪ Vulnerability Identification

More Related Content

What's hot

Lesson 1 - Introducing, Installing, and Upgrading Windows 7
Lesson 1 - Introducing, Installing, and Upgrading Windows 7Lesson 1 - Introducing, Installing, and Upgrading Windows 7
Lesson 1 - Introducing, Installing, and Upgrading Windows 7
Gene Carboni
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
hazirma
 

What's hot (20)

Hardware Problems
Hardware ProblemsHardware Problems
Hardware Problems
 
Computer ethics and crime
Computer ethics and crimeComputer ethics and crime
Computer ethics and crime
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Lesson 1 - Introducing, Installing, and Upgrading Windows 7
Lesson 1 - Introducing, Installing, and Upgrading Windows 7Lesson 1 - Introducing, Installing, and Upgrading Windows 7
Lesson 1 - Introducing, Installing, and Upgrading Windows 7
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Common Computer Faults and Problems
Common Computer Faults and ProblemsCommon Computer Faults and Problems
Common Computer Faults and Problems
 
Computer Troubleshooting - T.L.E.
Computer Troubleshooting - T.L.E.Computer Troubleshooting - T.L.E.
Computer Troubleshooting - T.L.E.
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Computer hardware and maintenance
Computer hardware and   maintenanceComputer hardware and   maintenance
Computer hardware and maintenance
 
Malware
MalwareMalware
Malware
 
Ethical Hacking - Hackers and crackers
Ethical Hacking  - Hackers and crackersEthical Hacking  - Hackers and crackers
Ethical Hacking - Hackers and crackers
 
Web application
Web applicationWeb application
Web application
 
Trouble shooting a computer
Trouble shooting a computerTrouble shooting a computer
Trouble shooting a computer
 
Computer hardware troubleshooting
Computer hardware troubleshootingComputer hardware troubleshooting
Computer hardware troubleshooting
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Future
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best Practices
 
Introduction to Server
Introduction to ServerIntroduction to Server
Introduction to Server
 

Similar to Error,Failure and Risk

MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxMAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
RichardSugbo
 
DIAGNOSE AND and Troubleshoot.pptx
DIAGNOSE AND and Troubleshoot.pptxDIAGNOSE AND and Troubleshoot.pptx
DIAGNOSE AND and Troubleshoot.pptx
VincentAcapen
 
10 reasons why p cs crash u must know
10 reasons why p cs crash u must know10 reasons why p cs crash u must know
10 reasons why p cs crash u must know
Vishal Gurujuwada
 

Similar to Error,Failure and Risk (20)

Types of Computer System Errors.pptx
Types of Computer System Errors.pptxTypes of Computer System Errors.pptx
Types of Computer System Errors.pptx
 
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxMAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
 
Types of computer system error
Types of computer system errorTypes of computer system error
Types of computer system error
 
Types of Computer System Errors.pptx
Types of Computer System Errors.pptxTypes of Computer System Errors.pptx
Types of Computer System Errors.pptx
 
Lesson 3.1
Lesson 3.1Lesson 3.1
Lesson 3.1
 
Chapter 12.0
Chapter 12.0Chapter 12.0
Chapter 12.0
 
Top 10 PC Maintenance Tasks That You Need To Remember
Top 10 PC Maintenance Tasks That You Need To RememberTop 10 PC Maintenance Tasks That You Need To Remember
Top 10 PC Maintenance Tasks That You Need To Remember
 
DIAGNOSE AND and Troubleshoot.pptx
DIAGNOSE AND and Troubleshoot.pptxDIAGNOSE AND and Troubleshoot.pptx
DIAGNOSE AND and Troubleshoot.pptx
 
10 reasons why p cs crash u must know
10 reasons why p cs crash u must know10 reasons why p cs crash u must know
10 reasons why p cs crash u must know
 
types-of-computer-errors.pptxpowerpointp
types-of-computer-errors.pptxpowerpointptypes-of-computer-errors.pptxpowerpointp
types-of-computer-errors.pptxpowerpointp
 
10 reasons Why PCs crash U must Know
10 reasons Why PCs crash U must Know10 reasons Why PCs crash U must Know
10 reasons Why PCs crash U must Know
 
Grade 8 COMPUTER
Grade 8 COMPUTERGrade 8 COMPUTER
Grade 8 COMPUTER
 
Computer Problems
Computer ProblemsComputer Problems
Computer Problems
 
5 stepmainttut
5 stepmainttut5 stepmainttut
5 stepmainttut
 
Types of Computer System Errors.pdf
Types of Computer System Errors.pdfTypes of Computer System Errors.pdf
Types of Computer System Errors.pdf
 
Network Administrator Career
Network Administrator CareerNetwork Administrator Career
Network Administrator Career
 
3_Lesson-1_MAINTENANCE_maintaining .pptx
3_Lesson-1_MAINTENANCE_maintaining .pptx3_Lesson-1_MAINTENANCE_maintaining .pptx
3_Lesson-1_MAINTENANCE_maintaining .pptx
 
Lo1.2 types of computer system error
Lo1.2 types of computer system errorLo1.2 types of computer system error
Lo1.2 types of computer system error
 
apply problem solve.pdf
apply problem solve.pdfapply problem solve.pdf
apply problem solve.pdf
 
Basic computer and RAM troubleshooting
Basic computer and RAM troubleshootingBasic computer and RAM troubleshooting
Basic computer and RAM troubleshooting
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 

Recently uploaded (20)

UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Our Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdfOur Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdf
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 

Error,Failure and Risk

  • 2. 2 Nazrul Islam, ID:161-15-7255 Errors, Failures, and Risks Errors in computer systems: Error is a software fault that causes the operating system to no lengthier work correctly. System errors are normally serious and may require a hardware device to be repaired or replaced. Causes of computer errors: Computers are complicated machines that comprise hardware from several companies, run software having thousands of lines of code, and use dozens of different drivers. Truly, it's astonishing that they are as stable as they are today. Most problems are related to a software programming error that can be rigged by acquiring an updated version of the software code. There are a number of things which can cause computer errors, and to cover them all would take several thousand pages. However, here are some of the most common things that cause computer errors, along with what you can do to restrain them from happening. Viruses and malware: One of the most common causes of computer errors is viruses and malware, each of which tries to hijack your computer for malicious purposes. Spyware, keyloggers, and hijackers are some of the more risky examples that come to mind. Malware comes in all shapes and sizes and should be immediately removed from your PC if detected. Anti-Virus software helps you to get rid of malicious threats. Noise: On the computer, noise can come in many forms. For example, noise/clutter in the Windows registry can obstruct applications from running accurately. Or, if the hard drive is filled with needless browser cookies and cache information, it could likewise be causing errors. Fortunately, there are many cost-effective programs that will help you to eliminate noise/clutter on your PC. Or, if you’d rather to eliminate clutter yourself, consider uninstalling old, unused programs or deleting your browser’s cache information. Poor internet browsing: The internet can be a frightening, dangerous place if your browser isn’t configured appropriately. Put simply, an unsafe/leaky browser could be a direct cause of errors on your PC. To stop this from happening in the future, use the internet optimization features on a program like PC Cleaner, which will independently tackle any browser problem you throw at it, radically improving your security in the future.
  • 3. 3 Nazrul Islam, ID:161-15-7255 Hardware failure: If an element of your PC steadily starts to fall into disrepair, it could be causing errors across the rest of your computer. And if the heatsink of your CPU begins to overheat, for example, then the resulting lag in performance will negatively impact everything you do on your PC. Update your drivers regularly, and consider cleaning out the inside of your PC case with a good air duster. How to prevent errors: We will able to stop errors by following the below steps. ▪ Update software regularly ▪ Use anti-virus software to get rid of malicious threats ▪ Delete unnecessary files or browser cookies or cache information. ▪ Use the safe or configured browser. ▪ To prevent hardware failure update hard drive regularly. ▪ Use advanced registry detection Types of computer errors: 1.Billing Error: Any mistake on a bill resulting from the seller's mistake. For example, a company may add what is owed incorrectly or accidentally omit a credit it should have included. The buyer does not have to pay billing errors, though the dispute may take some time to resolve. Example: A woman received a $6.3 million bill for electricity. The correct amount was $63. The cause was an input error made by someone using a new computer system. 2. Inaccurate and misinterpreted data in databases: If there are inaccurate and misinterpreted data exist in the databases then the error may occur. It is challenging to get accurate and meaningful error rates for major databases with information about millions of people. Numerous causes contribute to the frequency and severity of the problems people suffer because of errors in databases and misinterpretation of their contents: ▪ Large population where people may share names ▪ Automated processing may not be able to recognize special cases ▪ Errors in data entry ▪ Lack of accountability for errors ▪ Overconfidence in the accuracy of data
  • 4. 4 Nazrul Islam, ID:161-15-7255 ▪ Poor database design ▪ Failure to update and correct data. The first cause is unlikely to replace. It is the context in which we live. The second is partly a side effect of the speed and processing ability of computer technology, but we can reduce its negative impacts with better system specifications and training of users. The remaining factors in the list above are all within our control as individuals, professionals, and policy makers. 3. System errors: These are quite critical types of errors among those that can pop up on your computer.System errors are caused by malfunctioning hardware components, corrupted operating system modules, etc. 4. Runtime errors: This errors are caused by corrupted or malfunctioning system files or software executables. Most runtime errors cause the application that caused it to shut down. However, more serious runtime errors may cause the system to become unstable or unresponsive, suggesting that you should restart your computer. 5. Stop errors: Stop errors are caused by corrupted hardware, especially malfunctioning RAM modules and bad sectors on hard disks. Stop errors can be difficult to resolve at times. 6. Device Manager Errors: These are usually caused by corrupted driver files or malfunctioning hardware components. In case of the former cause, the problem is often solved by reinstalling or updating the drivers. However, the latter cause can often be solved only by replacing hardware components. 7. POST code errors: POST code errors are caused by malfunctioning hardware components, and are characterized by short beep sounds from the tiny internal speaker of your motherboard. POST code errors occur when you press the power button to turn on your PC or computer. 8. No Video Output: When you open your PC or computer, nothing shows up in your monitor and the LED indicator of your monitor is flashing in yellow color.
  • 5. 5 Nazrul Islam, ID:161-15-7255 9. Never Ending Loading of Operating system: The computer opens up then boots but when the operating system loads it, doesn't continue and it will take a longtime if you're going to wait for it to load. 10. Application causes system to restart: Just like the mouse problem, when you open a program that will take the whole screen like for example a game and/or a program application, when you close it, it will cause your system to restart. Failures in computer systems: The inability of a system or component to perform its required functions within specified performance requirements. A system failure can occur because of a hardware failure or a severe software issue, causing the system to freeze, reboot, or stop functioning altogether. A system failure may or may not result in an error being displayed on the screen. The computer may shut off without warning and without any error message. If an error message is displayed, it often is displayed as a Blue Screen of Death error. Computer systems fail general reasons: ▪ The task they are intended for is inherently difficult -Errors and ambiguity in program specifications ▪ The job is done poorly - Not considering how the system interacts with real users or real world problems - Dishonest reliability or safety estimates to cover up flaws and avoiding expenses ▪ System failures may result from a hard drive with bad sectors, causing the operating system to not be able to read data from the hard drive. A failing motherboard can cause a system failure because the computer is not able to process requests or operate in general. ▪ A bad processor can and usually causes a system failure because the computer cannot operate if the processor is not working properly or at all. ▪ A bad RAM chip can also cause system failures because the operating system is not able to access data stored on the RAM chip.
  • 6. 6 Nazrul Islam, ID:161-15-7255 ▪ System failures due to software issues can occur if the issue in the software, such as a bad line of code, is severe enough. The system failure and subsequent computer shut down occurs as an attempt to prevent damage to other software or the operating system. ▪ Computer software often comes with various bugs or vulnerabilities. These are simply programming mistakes, but they can make the software susceptible to viruses and glitches. When an error is discovered, the software designer sends out a “patch” that requires downloading and rebooting. Failing to upgrade the software by running the patch can lead to the corruption of data. ▪ There are several malware protection packages available for computer rooms or data centers. Once installed, the subscription must be maintained. One telltale sign of a malware-infected computer is slow data processing. ▪ Overheating can cause severe damage to your system ▪ Checking the performance of the CPU is another way to identify why your computer is failing. How to prevent failures: We will able to stop failures by following the below steps. 1. Know that your computer is going to fail: Although this may not happen to you, especially if you follow the steps in this article, you need to treat your computer as if it were a doomed failure. Your failure to do so could possibly result in your computer failing you sooner. Always assume that failure is imminent. 2. Learn to recognize the signs of imminent failure: Failure is not simply an error – it is a fatal error that results in data loss, damage to your computer and/or its ability to function, hardware failure, or other serious issues. Signs of imminent failure might include regular poor performance, frequent errors and/or popups, unknown programs being installed, frequent power loss, frequent crashes, or certain parts not working. 3. Dust issues: Preventing failure means making sure your computer is clean, physically and in its operations. Make sure that there isn't too much dust inside, especially on the fans. Dust can reduce performance and cause overheating. Also, make sure that there are no unnecessary programs or files on your computer, and that the registry is well maintained. Be sure to run frequent virus scans.
  • 7. 7 Nazrul Islam, ID:161-15-7255 4. RAM issues: Know your computer's specifications and the limits of those specifications. Remember that running idly, your computer takes up at least some of your computer's RAM, as well as its processing power, for the operating system is running, as well as background programs (e.g.: antivirus software). So, that means that if a program requires at least 256 megabytes of RAM, and you only have 256 megabytes of RAM on your computer, you won't have success running the program. 5. Don't do anything unusual: If a popup shows up asking you to do something that you don't feel comfortable with, don't click on it. Use the task manager to kill it, or reboot your computer. Don't install programs you don't fully trust. When installing freeware or shareware, read everything, and uncheck any additional "new product notifier" programs, toolbars, or other things you don't want. 6. Deal with hardware issues: When something isn't working properly, either diagnose the problem yourself and fix it, or contact a professional and have them look at it for you. Take advantage of warranties on parts if they fail. 7. Malware issues: Make sure that your anti-virus software is updated to be able to scan necessary files. Don’t install an unknown program. Types of System Failures: There are various types of failures in the computer system. 1. Voting system: ▪ Technical failures: The voting machines are not well designed. So, there is a high risk. ▪ Programmers or hackers rigging software to produce inaccurate results: A hacker could reprogram an electronic voting machine directly, if it’s left unguarded, or remotely if it’s connected to the internet and can produce an inaccurate result. They can change the voting result by editing databases. ▪ Vulnerability to viruses: voting machines are not secure enough to guarantee a trustworthy election, and an attacker with access to a single machine could disrupt or change the outcome of an election using viruses. ▪ Many of the failures that occurred result from causes we will see over and over: Lack of sufficient planning and thought about security issues, insufficient testing, and insufficient training.
  • 8. 8 Nazrul Islam, ID:161-15-7255 2. Stalled airport: ▪ Real-world problems: Some scanners got dirty or knocked out of alignment and could not detect carts going by. Faulty latches on the carts caused luggage to fall onto the tracks between stops. ▪ Problems in other systems: The airport’s electrical system could not handle the power surges associated with the baggage system. The first full-scale test blew so many circuits that the test had to be halted. ▪ Software errors: A software error caused the routing of carts to waiting for pens when they were actually needed. 3. Abandoned system: ▪ Some flaws in systems are so extreme that the systems are discarded after wasting millions, or even billions, of dollars. ▪ Example: ➢ Ford Motor purchasing system ➢ Hotel and rental car businesses ➢ IRS tax modernization plan 4. Legacy system: A legacy system is a computer system, programming language, software application, process or other technology that is outdated or that can no longer receive support and maintenance but is essential for organizations or companies and cannot be replaced or updated easily for different reasons: ▪ Legacy systems are reliable but inflexible. ▪ Expensive to replace ▪ Little or no documentation ▪ There is rarely, if ever, a complete specification of the legacy systems which makes it impossible to specify a new one that is functionally identical. ▪ The operational risk of some updates may be too high, especially if key data can be lost or corrupted. ▪ The software may contain some important business rules not mentioned or noted in any other document.
  • 9. 9 Nazrul Islam, ID:161-15-7255 Risk in computer system: A computer risk is really anything on a computer that may damage or steal your data or allow someone else to access a computer, without your knowledge or consent. There are a lot of different things that can create a computer risk, including malware, a general term used to describe many types of bad software. We commonly think of computer viruses, but, there are several types of bad software that can create a computer security risk, including viruses, worms, ransomware, spyware, and Trojan horses. Types of risk: ▪ Physical risks: resulting from physical access or damage to IT resources such as the servers. These could include theft, damage from fire or flood, or unauthorized access to confidential data by an employee or outsider. ▪ Electronic risks - aiming to compromise your business information - eg a hacker could get access to your website, your IT system could become infected by a computer virus, or you could fall victim to a fraudulent email or website. These are commonly of a criminal nature. ▪ Technical failures - such as software bugs, a computer crash or the complete failure of a computer component. A technical failure can be catastrophic if, for example, you cannot retrieve data on a failed hard drive and no backup copy is available. ▪ Infrastructure failures - such as the loss of your internet connection can interrupt your business - eg you could miss an important purchase order. ▪ Human error - is a major threat - eg someone might accidentally delete important data, or fail to follow security procedures properly. How to manage risks: Managing various types of risks begins with identifying exactly- ▪ the type of threats/risks affecting your business or computer systems ▪ the assets that may be at risks ▪ the ways of securing your IT/computer systems ▪ Control Recommendations
  • 10. 10 Nazrul Islam, ID:161-15-7255 ▪ Impact Analysis ▪ Risk Determination ▪ Vulnerability Identification