SlideShare a Scribd company logo
Routine Maintenance of Computer
Systems and Basic Internet Search
Skills
Presented at the training programme for Library
Assistants/Library Officers, Elizade University Library,
Ilara-Mokin
By Idowu Adegbilero-Iwari
On July 24, 2019
Outline
Routine computer maintenance
About computer
Definition of Computer
maintenance
Procedures for computer
maintenance
Basic Internet search skills
Definition of terms
Using EU Library Databases
Computer System
A computer system is a basic,
complete and functional
computer, including all the
hardware and software
required to make it functional
for a user.
It should have the ability to
receive user input, process
data, and with the processed
data, create information for
storage and/or output.
Routine Maintenance of Computer
Systems
Definition
Routine Computer maintenance has to do
with regular steps taken to make your
computer work faster, more secure and less
untidy.
Benefits
• prevent future problems like viruses or
data loss,
• free up space
• fix software bugs
• save money
• Save time (improved performance means
less time spent waiting)
Computer Maintenance
Symptoms to Watch
• computer seems slow,
• displays an error message about low disk
space
• takes a long time to boot up
Things to Do
• install updates,
• check for viruses,
• maintain your hard drive,
• backup files and
• perform other simple tasks like hardware
maintenance to keep your computer in
good shape
Some Common Routine Computer
Maintenance Practices
Category Sub-category Activities
1 Security Anti-virus Update your anti-virus software and
run a scan
Anti-spyware/anti-
malware
Many antivisuses perform is tasks too
2 Windows Update Software and
installed
programmes update
Install recommended updates from
time-time, you can set automatic
update
Always allow computer to perform
update when it’s suggested
Restart Restart Restart your computer at least once a
week or whenever you experience
system slowdowns or bugs
3 Empty your
recycle bin
Empty your recycle
bin
Don’t just delete and fold your arms,
visit your recycle bin time-to-time to
free up memory space.
Permanent deletion may as well be
Some Common Routine Computer
Maintenance Practices
Category Sub-category Activities
4 File Management Create and organise
folders and files
Create folders based on the subject of
the files you intend to keep in them.
Don’t clutter the system with files
5 Data backup Backup Regularly copy computer data to
external hardware or save to cloud
which is more secured
6 Hardware
cleanup
Dust, clean Clean and dust internal computer
parts and fan. Use canned air and soft
cloth
7 Disk and
Application/Soft
ware Cleanup
Disk cleanup Go to Start>All
Programs>Accessories>System Tools.
Pick the drive you want to scan (your
main hard drive(s)
Defragmentation program comes with Windows, it’s in
the same place as the Disk Cleanup
tool. It’s a straightforward process;
Maintain yourself
• You are a major component of the computer
system that needs to be maintained otherwise
the computer will suffer
• Be in the right frame of mind when using the
computer
• Don’t overstay on the computer, take occasional
break
• Begin shutdown 30 minutes before closing- use
the time to properly shutdown and allow for
updates to be installed and then freshen up your
look and smell nice
Basic things to note
• Internet
• World Wide Web
• Search engine
The Internet
• The Internet is a collection of vast information
sources of interlinked computer networks
• A network is a computer system that uses
communication equipment to connect two or
more computers and their resources
• The Internet is the largest network
• The Internet is the worldwide, publicly accessible
network of interconnected computer networks
that transmit data by packet switching, using the
standard Internet Protocol suite (IP) to link
devices.
Resources and services of the Internet
• Almost everything of interest:
• E-mail,
• World Wide Web,
• Remote access (the Internet allows computer users connect to and use other
computers easily from anywhere in the world),
• voice telephony,
• media streaming, file sharing,
• social networking,
• Webinar (Online seminar),
• Chatting,
• e-commerce,
• e-health,
• e-learning,
• internet banking
• And lots more
The World Wide Web
• usually called the Web is the most important service of the
Internet
• The Web consists of a series of various computer
documents, images and other resources logically
interrelated by hyperlinks and referenced with Uniform
Resource Identifiers (URIs).
• The Hypertext Transfer Protocol (HTTP) is the main access
protocol of the Web.
• Browser (e.g. Internet Explorer, Mozilla Firefox, Chrome,
Safari, Opera, etc.) are web software used to navigate the
Web
• Websites are created on the web and each website has its
Uniform Resource Locator (URL) otherwise known as the
website address.
Parts of the URL
Uniform Resource Locator (URL) is a specific character string that
constitutes a reference to a resource on the Web. It is the web address of
an online resource, i.e. a web site or document
Three (3) major parts of url:
• (1) Protocol: it declares how your web browser should communicate
with a web server when sending or fetching a web page or document
e.g. http, https, ftp, pop, etc.
• (2) Domain name: a unique reference that identifies a web site on the
internet which always include a TLD or SLD (.edu.ng)
• (3) Path: refers to a file or directory on the web server
Example:
http://www.elizadeuniversity.edu.ng/registry/admissionlist2014.html
In the above example, “http://” is the protocol,
“www.elizadeuniversity.edu.ng” is the domain name, “registry” is the
folder, and “admissionlist2014.html” is the file name which are both path.
Internet Search Engines and
Search Strategies
 There are three categories of search tools, namely:
 Search engines
 Directory search
 Meta engine
 Search engines – they are specialized programmes
that assist users to locate information on the web.
 Popular search engines include; Google, Infoseek,
Lycos, Ask.com, Yahoo, Bing, Answers.com,
 Directory search – also known as index search,
Web or Search directory, is the search programme
that produces a directory or list of categories of topics
such as finance, health, news, universities. E.g
DMOZ, The Best of the Web, Yahoo! Directory and
Jasmine Directory
Understanding Search Strategy
• Search strategy is a combination of series of
activities that help a researcher find
information from sources
Search strategy involves:
• possible search terms
• keywords and phrases
• truncated and wildcard variations of search terms
• subject headings (where applicable)
https://library.leeds.ac.uk/info/1404/literature_sea
rching/14/literature_searching_explained/4
Developing search strategy
• Start developing a search strategy by identifying the
key words and concepts within your research question.
For example: What strategies can healthcare
workers use to communicate effectively with
clients with a hearing disability?
• Treat each component as a separate concept (there are
usually between 2-4 concepts).
• For each concept list the key words derived from your
research question
• consider singular and plural forms of words, variant
spellings, acronyms and relevant index terms (subject
headings)
Example
Search concept
1
Search concept
2
Search concept
3
Search concept
4
strategies healthcare
workers
communication hearing
disability
methods healthcare
professionals
communicating hearing
impairment
health
personnel
interpersonal
communication
hearing
impaired
health
professional
communication
skills
deaf
hard-of-hearing
What strategies can healthcare workers use
to communicate effectively with clients with a hearing disability?
Search strategy techniques
• Choosing search terms- analyse your research
into concepts
• Searching with keywords- Keywords are free text
words and phrases
• Searching for exact phrases- use quotation marks
• Using truncated and wildcard searches
• Searching with subject headings
• Using Boolean logic (AND, OR, NOT)
• Citation searching
Refine your search
Search tips to refine your results
Use a minus sign – in front of a word to require
its exclusion (no space between the sign and the
word).
• Example: –infant
Using Truncation and Wildcards to
search for variations (spelling and
form) in words• Truncation
Typing the stem, or root of a word, plus a *, ? or $ symbol at the end of
the word will retrieve all forms of the word
• Example: allerg$ will yield allergy, allergic, allergen
• Example: gastro* will yield gastroenteritis, gastrointestinal,
gastroenterologistWildcard symbols such as a ?
• Wildcard
• May be inserted in place of a letter(s) in a keyword
• Useful when you are not sure of a spelling or when there are
different forms of the root word
• Example: wom?n will yield both woman and women
• Note: symbols used may vary depending on the database or search
engine you are using.
Evaluating Your Search Results
• Not every result of search is authentic – therefore,
always check for the following:
• Authority – who writes the article or owns the
material?
• Currency – when last was the page updated? E.g search
Google for “internet penetration in Nigeria” and watch
out for (Nigeria Leads Internet Usage In Africa -
Ventures Africa) http://venturesafrica.com/nigeria-
leads-internet-usage-in-africa/
• Accuracy – is the information reliable and error –free?
• Objectivity – is it free of bias and sentiments?
• Coverage – what is the scope of the resources?
Sporting Fake News
Source: IFLA
Using the library
The OPAC
• The library OPAC is
available at:
http://library.elizadeuniv
ersity.edu.ng/
Using the Library
• You can “basic search”
any book or information
item in the OPAC
Using the library
• You can do an advanced search and set limits
to specify result
Example of a search result
Some of our online Databases
References
• http://www.sheridancomputers.co.uk/computer-
maintenance
• Donhoe, A. (2018). What Is Routine Computer
Maintenance?
https://www.techwalla.com/articles/what-is-
routine-computer-maintenance
• https://computertutors.net/our-
services/computer-maintenance-checklist/
• https://guides.lib.monash.edu/researching-for-
your-literature-review/4
Have
• A
• Nice Day!
• Adegbilero-Iwari, Idowu

More Related Content

What's hot

Peer to-peer networks
Peer to-peer networksPeer to-peer networks
Peer to-peer networks
Nkosinathi Lungu
 
windows vs Linux
windows vs Linuxwindows vs Linux
System security
System securitySystem security
System security
invertis university
 
Build internet infrastructure LO1
Build internet infrastructure LO1Build internet infrastructure LO1
Build internet infrastructure LO1
Abenezer Abiti
 
Peer to-peer network
Peer to-peer networkPeer to-peer network
Peer to-peer network
EILLEN IVY PORTUGUEZ
 
PC Maintenance Security and Troubleshooting
PC Maintenance Security and TroubleshootingPC Maintenance Security and Troubleshooting
PC Maintenance Security and Troubleshooting
The Toolbox, Inc.
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
Fabiha Shahzad
 
HELP DESK interview questions and answers
HELP DESK interview questions and answersHELP DESK interview questions and answers
HELP DESK interview questions and answers
Vignesh kumar
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentationelihuwalker
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
Faith Zeller
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
Adeel Khurram
 
Network management ppt
Network management pptNetwork management ppt
Network management ppt
DheerajPachauri
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
Shafaan Khaliq Bhatti
 
Desktop Security
Desktop SecurityDesktop Security
Desktop Security
HardikBhandari7
 
WEP/WPA attacks
WEP/WPA attacksWEP/WPA attacks
WEP/WPA attacks
Huda Seyam
 
Online Netiquette
Online NetiquetteOnline Netiquette
Online Netiquette
Zoro18
 
Configuring and administrate server
Configuring and administrate serverConfiguring and administrate server
Configuring and administrate server
Gera Paulos
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11
Anna Stirling
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurations
Student
 
Firewalls
FirewallsFirewalls

What's hot (20)

Peer to-peer networks
Peer to-peer networksPeer to-peer networks
Peer to-peer networks
 
windows vs Linux
windows vs Linuxwindows vs Linux
windows vs Linux
 
System security
System securitySystem security
System security
 
Build internet infrastructure LO1
Build internet infrastructure LO1Build internet infrastructure LO1
Build internet infrastructure LO1
 
Peer to-peer network
Peer to-peer networkPeer to-peer network
Peer to-peer network
 
PC Maintenance Security and Troubleshooting
PC Maintenance Security and TroubleshootingPC Maintenance Security and Troubleshooting
PC Maintenance Security and Troubleshooting
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
HELP DESK interview questions and answers
HELP DESK interview questions and answersHELP DESK interview questions and answers
HELP DESK interview questions and answers
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentation
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Network management ppt
Network management pptNetwork management ppt
Network management ppt
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
 
Desktop Security
Desktop SecurityDesktop Security
Desktop Security
 
WEP/WPA attacks
WEP/WPA attacksWEP/WPA attacks
WEP/WPA attacks
 
Online Netiquette
Online NetiquetteOnline Netiquette
Online Netiquette
 
Configuring and administrate server
Configuring and administrate serverConfiguring and administrate server
Configuring and administrate server
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurations
 
Firewalls
FirewallsFirewalls
Firewalls
 

Similar to Routine Maintenance of Computer Systems and Basic Internet Search Skills

Technical skills in multimedia for odl learners
Technical skills in multimedia for odl learnersTechnical skills in multimedia for odl learners
Technical skills in multimedia for odl learnersDaniel Koloseni
 
Unit 1
Unit 1Unit 1
APPLICATION OF COMPUTER IN PHARMACY.pdf
APPLICATION OF COMPUTER IN PHARMACY.pdfAPPLICATION OF COMPUTER IN PHARMACY.pdf
APPLICATION OF COMPUTER IN PHARMACY.pdf
Neelamparwar
 
Getting started with computers & the internet
Getting started with computers & the internetGetting started with computers & the internet
Getting started with computers & the internetMartha Bogart
 
Module 1 content EN.pptx
Module 1 content EN.pptxModule 1 content EN.pptx
Module 1 content EN.pptx
ITStudy Ltd.
 
Chapter Five Slide(0).pptx
Chapter Five Slide(0).pptxChapter Five Slide(0).pptx
Chapter Five Slide(0).pptx
wendifrawtadesse1
 
10 Differences Between eDiscovery & Information Governance
10 Differences Between eDiscovery & Information Governance10 Differences Between eDiscovery & Information Governance
10 Differences Between eDiscovery & Information Governance
EliseT2015
 
Computer Basics Tutorial By Stud Mentor
Computer Basics Tutorial By Stud MentorComputer Basics Tutorial By Stud Mentor
Computer Basics Tutorial By Stud Mentor
Stud Mentor
 
EDUC 611_SYSTEM SOFTWARE, TECHNOLOGY INTEGRATION
EDUC 611_SYSTEM SOFTWARE, TECHNOLOGY INTEGRATIONEDUC 611_SYSTEM SOFTWARE, TECHNOLOGY INTEGRATION
EDUC 611_SYSTEM SOFTWARE, TECHNOLOGY INTEGRATION
catherineCerteza
 
ICT in teacher education, fundamentals of computer
ICT in teacher education, fundamentals of computerICT in teacher education, fundamentals of computer
ICT in teacher education, fundamentals of computer
SHARMA EDUCATION
 
IT 150 Agenda for 11-14-16.pptx
IT 150 Agenda for 11-14-16.pptxIT 150 Agenda for 11-14-16.pptx
IT 150 Agenda for 11-14-16.pptx
MattMarino13
 
Hinari basic course_module_2_workbook_2014_07
Hinari basic course_module_2_workbook_2014_07Hinari basic course_module_2_workbook_2014_07
Hinari basic course_module_2_workbook_2014_07
Aslam Mehdi
 
freelancing
freelancingfreelancing
freelancing
MazharShah21
 
Information Storage and Retrieval system (ISRS)
Information Storage and Retrieval system (ISRS)Information Storage and Retrieval system (ISRS)
Information Storage and Retrieval system (ISRS)
Sumit Kumar Gupta
 
11. introduction to internet
11. introduction to internet11. introduction to internet
11. introduction to internet
TimesRide
 
Best Practice in Data Management and Sharing
Best Practice in Data Management and Sharing Best Practice in Data Management and Sharing
Best Practice in Data Management and Sharing
Mojtaba Lotfaliany
 
FAIRDOM data management support for ERACoBioTech Proposals
FAIRDOM data management support for ERACoBioTech ProposalsFAIRDOM data management support for ERACoBioTech Proposals
FAIRDOM data management support for ERACoBioTech Proposals
FAIRDOM
 
Introduction to Information Retrieval
Introduction to Information RetrievalIntroduction to Information Retrieval
Introduction to Information Retrieval
Carsten Eickhoff
 

Similar to Routine Maintenance of Computer Systems and Basic Internet Search Skills (20)

Technical skills in multimedia for odl learners
Technical skills in multimedia for odl learnersTechnical skills in multimedia for odl learners
Technical skills in multimedia for odl learners
 
Unit 1
Unit 1Unit 1
Unit 1
 
File000162
File000162File000162
File000162
 
APPLICATION OF COMPUTER IN PHARMACY.pdf
APPLICATION OF COMPUTER IN PHARMACY.pdfAPPLICATION OF COMPUTER IN PHARMACY.pdf
APPLICATION OF COMPUTER IN PHARMACY.pdf
 
Getting started with computers & the internet
Getting started with computers & the internetGetting started with computers & the internet
Getting started with computers & the internet
 
Module 1 content EN.pptx
Module 1 content EN.pptxModule 1 content EN.pptx
Module 1 content EN.pptx
 
Chapter Five Slide(0).pptx
Chapter Five Slide(0).pptxChapter Five Slide(0).pptx
Chapter Five Slide(0).pptx
 
10 Differences Between eDiscovery & Information Governance
10 Differences Between eDiscovery & Information Governance10 Differences Between eDiscovery & Information Governance
10 Differences Between eDiscovery & Information Governance
 
Computer Basics Tutorial By Stud Mentor
Computer Basics Tutorial By Stud MentorComputer Basics Tutorial By Stud Mentor
Computer Basics Tutorial By Stud Mentor
 
RPE.pptx
RPE.pptxRPE.pptx
RPE.pptx
 
EDUC 611_SYSTEM SOFTWARE, TECHNOLOGY INTEGRATION
EDUC 611_SYSTEM SOFTWARE, TECHNOLOGY INTEGRATIONEDUC 611_SYSTEM SOFTWARE, TECHNOLOGY INTEGRATION
EDUC 611_SYSTEM SOFTWARE, TECHNOLOGY INTEGRATION
 
ICT in teacher education, fundamentals of computer
ICT in teacher education, fundamentals of computerICT in teacher education, fundamentals of computer
ICT in teacher education, fundamentals of computer
 
IT 150 Agenda for 11-14-16.pptx
IT 150 Agenda for 11-14-16.pptxIT 150 Agenda for 11-14-16.pptx
IT 150 Agenda for 11-14-16.pptx
 
Hinari basic course_module_2_workbook_2014_07
Hinari basic course_module_2_workbook_2014_07Hinari basic course_module_2_workbook_2014_07
Hinari basic course_module_2_workbook_2014_07
 
freelancing
freelancingfreelancing
freelancing
 
Information Storage and Retrieval system (ISRS)
Information Storage and Retrieval system (ISRS)Information Storage and Retrieval system (ISRS)
Information Storage and Retrieval system (ISRS)
 
11. introduction to internet
11. introduction to internet11. introduction to internet
11. introduction to internet
 
Best Practice in Data Management and Sharing
Best Practice in Data Management and Sharing Best Practice in Data Management and Sharing
Best Practice in Data Management and Sharing
 
FAIRDOM data management support for ERACoBioTech Proposals
FAIRDOM data management support for ERACoBioTech ProposalsFAIRDOM data management support for ERACoBioTech Proposals
FAIRDOM data management support for ERACoBioTech Proposals
 
Introduction to Information Retrieval
Introduction to Information RetrievalIntroduction to Information Retrieval
Introduction to Information Retrieval
 

More from Idowu Adegbilero-Iwari

DOIs for Research Publication
DOIs for Research PublicationDOIs for Research Publication
DOIs for Research Publication
Idowu Adegbilero-Iwari
 
Now that I'm a graduate: My degree and the World
Now that I'm a graduate: My degree and the WorldNow that I'm a graduate: My degree and the World
Now that I'm a graduate: My degree and the World
Idowu Adegbilero-Iwari
 
Reference Management Systems for Research Support
Reference Management Systems for Research SupportReference Management Systems for Research Support
Reference Management Systems for Research Support
Idowu Adegbilero-Iwari
 
Information and library services for 21st century university staff
Information and library services for 21st century university staffInformation and library services for 21st century university staff
Information and library services for 21st century university staff
Idowu Adegbilero-Iwari
 
Libraries and Librarians: Nexus of Trends in Librarianship and Social Media
Libraries and Librarians: Nexus of Trends in Librarianship and Social MediaLibraries and Librarians: Nexus of Trends in Librarianship and Social Media
Libraries and Librarians: Nexus of Trends in Librarianship and Social Media
Idowu Adegbilero-Iwari
 
Implementing Social Media for Service Delivery in Nigerian Libraries
Implementing Social Media for Service Delivery in Nigerian LibrariesImplementing Social Media for Service Delivery in Nigerian Libraries
Implementing Social Media for Service Delivery in Nigerian Libraries
Idowu Adegbilero-Iwari
 
Virtual Research Environments and the Open Era: Open Science Framework for R...
Virtual Research Environments and the Open Era: Open Science Framework  for R...Virtual Research Environments and the Open Era: Open Science Framework  for R...
Virtual Research Environments and the Open Era: Open Science Framework for R...
Idowu Adegbilero-Iwari
 
Career Path: Career choice and subject combination for a prospective profession
Career Path: Career choice and subject combination for a prospective professionCareer Path: Career choice and subject combination for a prospective profession
Career Path: Career choice and subject combination for a prospective profession
Idowu Adegbilero-Iwari
 
Understanding the Depth of Google Scholar and its Implication for Webometrics...
Understanding the Depth of Google Scholar and its Implication for Webometrics...Understanding the Depth of Google Scholar and its Implication for Webometrics...
Understanding the Depth of Google Scholar and its Implication for Webometrics...
Idowu Adegbilero-Iwari
 

More from Idowu Adegbilero-Iwari (9)

DOIs for Research Publication
DOIs for Research PublicationDOIs for Research Publication
DOIs for Research Publication
 
Now that I'm a graduate: My degree and the World
Now that I'm a graduate: My degree and the WorldNow that I'm a graduate: My degree and the World
Now that I'm a graduate: My degree and the World
 
Reference Management Systems for Research Support
Reference Management Systems for Research SupportReference Management Systems for Research Support
Reference Management Systems for Research Support
 
Information and library services for 21st century university staff
Information and library services for 21st century university staffInformation and library services for 21st century university staff
Information and library services for 21st century university staff
 
Libraries and Librarians: Nexus of Trends in Librarianship and Social Media
Libraries and Librarians: Nexus of Trends in Librarianship and Social MediaLibraries and Librarians: Nexus of Trends in Librarianship and Social Media
Libraries and Librarians: Nexus of Trends in Librarianship and Social Media
 
Implementing Social Media for Service Delivery in Nigerian Libraries
Implementing Social Media for Service Delivery in Nigerian LibrariesImplementing Social Media for Service Delivery in Nigerian Libraries
Implementing Social Media for Service Delivery in Nigerian Libraries
 
Virtual Research Environments and the Open Era: Open Science Framework for R...
Virtual Research Environments and the Open Era: Open Science Framework  for R...Virtual Research Environments and the Open Era: Open Science Framework  for R...
Virtual Research Environments and the Open Era: Open Science Framework for R...
 
Career Path: Career choice and subject combination for a prospective profession
Career Path: Career choice and subject combination for a prospective professionCareer Path: Career choice and subject combination for a prospective profession
Career Path: Career choice and subject combination for a prospective profession
 
Understanding the Depth of Google Scholar and its Implication for Webometrics...
Understanding the Depth of Google Scholar and its Implication for Webometrics...Understanding the Depth of Google Scholar and its Implication for Webometrics...
Understanding the Depth of Google Scholar and its Implication for Webometrics...
 

Recently uploaded

The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 

Recently uploaded (20)

The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 

Routine Maintenance of Computer Systems and Basic Internet Search Skills

  • 1. Routine Maintenance of Computer Systems and Basic Internet Search Skills Presented at the training programme for Library Assistants/Library Officers, Elizade University Library, Ilara-Mokin By Idowu Adegbilero-Iwari On July 24, 2019
  • 2. Outline Routine computer maintenance About computer Definition of Computer maintenance Procedures for computer maintenance Basic Internet search skills Definition of terms Using EU Library Databases
  • 3. Computer System A computer system is a basic, complete and functional computer, including all the hardware and software required to make it functional for a user. It should have the ability to receive user input, process data, and with the processed data, create information for storage and/or output.
  • 4. Routine Maintenance of Computer Systems Definition Routine Computer maintenance has to do with regular steps taken to make your computer work faster, more secure and less untidy. Benefits • prevent future problems like viruses or data loss, • free up space • fix software bugs • save money • Save time (improved performance means less time spent waiting)
  • 5. Computer Maintenance Symptoms to Watch • computer seems slow, • displays an error message about low disk space • takes a long time to boot up Things to Do • install updates, • check for viruses, • maintain your hard drive, • backup files and • perform other simple tasks like hardware maintenance to keep your computer in good shape
  • 6. Some Common Routine Computer Maintenance Practices Category Sub-category Activities 1 Security Anti-virus Update your anti-virus software and run a scan Anti-spyware/anti- malware Many antivisuses perform is tasks too 2 Windows Update Software and installed programmes update Install recommended updates from time-time, you can set automatic update Always allow computer to perform update when it’s suggested Restart Restart Restart your computer at least once a week or whenever you experience system slowdowns or bugs 3 Empty your recycle bin Empty your recycle bin Don’t just delete and fold your arms, visit your recycle bin time-to-time to free up memory space. Permanent deletion may as well be
  • 7. Some Common Routine Computer Maintenance Practices Category Sub-category Activities 4 File Management Create and organise folders and files Create folders based on the subject of the files you intend to keep in them. Don’t clutter the system with files 5 Data backup Backup Regularly copy computer data to external hardware or save to cloud which is more secured 6 Hardware cleanup Dust, clean Clean and dust internal computer parts and fan. Use canned air and soft cloth 7 Disk and Application/Soft ware Cleanup Disk cleanup Go to Start>All Programs>Accessories>System Tools. Pick the drive you want to scan (your main hard drive(s) Defragmentation program comes with Windows, it’s in the same place as the Disk Cleanup tool. It’s a straightforward process;
  • 8. Maintain yourself • You are a major component of the computer system that needs to be maintained otherwise the computer will suffer • Be in the right frame of mind when using the computer • Don’t overstay on the computer, take occasional break • Begin shutdown 30 minutes before closing- use the time to properly shutdown and allow for updates to be installed and then freshen up your look and smell nice
  • 9. Basic things to note • Internet • World Wide Web • Search engine
  • 10. The Internet • The Internet is a collection of vast information sources of interlinked computer networks • A network is a computer system that uses communication equipment to connect two or more computers and their resources • The Internet is the largest network • The Internet is the worldwide, publicly accessible network of interconnected computer networks that transmit data by packet switching, using the standard Internet Protocol suite (IP) to link devices.
  • 11. Resources and services of the Internet • Almost everything of interest: • E-mail, • World Wide Web, • Remote access (the Internet allows computer users connect to and use other computers easily from anywhere in the world), • voice telephony, • media streaming, file sharing, • social networking, • Webinar (Online seminar), • Chatting, • e-commerce, • e-health, • e-learning, • internet banking • And lots more
  • 12. The World Wide Web • usually called the Web is the most important service of the Internet • The Web consists of a series of various computer documents, images and other resources logically interrelated by hyperlinks and referenced with Uniform Resource Identifiers (URIs). • The Hypertext Transfer Protocol (HTTP) is the main access protocol of the Web. • Browser (e.g. Internet Explorer, Mozilla Firefox, Chrome, Safari, Opera, etc.) are web software used to navigate the Web • Websites are created on the web and each website has its Uniform Resource Locator (URL) otherwise known as the website address.
  • 13. Parts of the URL Uniform Resource Locator (URL) is a specific character string that constitutes a reference to a resource on the Web. It is the web address of an online resource, i.e. a web site or document Three (3) major parts of url: • (1) Protocol: it declares how your web browser should communicate with a web server when sending or fetching a web page or document e.g. http, https, ftp, pop, etc. • (2) Domain name: a unique reference that identifies a web site on the internet which always include a TLD or SLD (.edu.ng) • (3) Path: refers to a file or directory on the web server Example: http://www.elizadeuniversity.edu.ng/registry/admissionlist2014.html In the above example, “http://” is the protocol, “www.elizadeuniversity.edu.ng” is the domain name, “registry” is the folder, and “admissionlist2014.html” is the file name which are both path.
  • 14. Internet Search Engines and Search Strategies  There are three categories of search tools, namely:  Search engines  Directory search  Meta engine  Search engines – they are specialized programmes that assist users to locate information on the web.  Popular search engines include; Google, Infoseek, Lycos, Ask.com, Yahoo, Bing, Answers.com,  Directory search – also known as index search, Web or Search directory, is the search programme that produces a directory or list of categories of topics such as finance, health, news, universities. E.g DMOZ, The Best of the Web, Yahoo! Directory and Jasmine Directory
  • 15. Understanding Search Strategy • Search strategy is a combination of series of activities that help a researcher find information from sources
  • 16. Search strategy involves: • possible search terms • keywords and phrases • truncated and wildcard variations of search terms • subject headings (where applicable) https://library.leeds.ac.uk/info/1404/literature_sea rching/14/literature_searching_explained/4
  • 17. Developing search strategy • Start developing a search strategy by identifying the key words and concepts within your research question. For example: What strategies can healthcare workers use to communicate effectively with clients with a hearing disability? • Treat each component as a separate concept (there are usually between 2-4 concepts). • For each concept list the key words derived from your research question • consider singular and plural forms of words, variant spellings, acronyms and relevant index terms (subject headings)
  • 18. Example Search concept 1 Search concept 2 Search concept 3 Search concept 4 strategies healthcare workers communication hearing disability methods healthcare professionals communicating hearing impairment health personnel interpersonal communication hearing impaired health professional communication skills deaf hard-of-hearing What strategies can healthcare workers use to communicate effectively with clients with a hearing disability?
  • 19. Search strategy techniques • Choosing search terms- analyse your research into concepts • Searching with keywords- Keywords are free text words and phrases • Searching for exact phrases- use quotation marks • Using truncated and wildcard searches • Searching with subject headings • Using Boolean logic (AND, OR, NOT) • Citation searching
  • 20. Refine your search Search tips to refine your results Use a minus sign – in front of a word to require its exclusion (no space between the sign and the word). • Example: –infant
  • 21. Using Truncation and Wildcards to search for variations (spelling and form) in words• Truncation Typing the stem, or root of a word, plus a *, ? or $ symbol at the end of the word will retrieve all forms of the word • Example: allerg$ will yield allergy, allergic, allergen • Example: gastro* will yield gastroenteritis, gastrointestinal, gastroenterologistWildcard symbols such as a ? • Wildcard • May be inserted in place of a letter(s) in a keyword • Useful when you are not sure of a spelling or when there are different forms of the root word • Example: wom?n will yield both woman and women • Note: symbols used may vary depending on the database or search engine you are using.
  • 22. Evaluating Your Search Results • Not every result of search is authentic – therefore, always check for the following: • Authority – who writes the article or owns the material? • Currency – when last was the page updated? E.g search Google for “internet penetration in Nigeria” and watch out for (Nigeria Leads Internet Usage In Africa - Ventures Africa) http://venturesafrica.com/nigeria- leads-internet-usage-in-africa/ • Accuracy – is the information reliable and error –free? • Objectivity – is it free of bias and sentiments? • Coverage – what is the scope of the resources?
  • 24. Using the library The OPAC • The library OPAC is available at: http://library.elizadeuniv ersity.edu.ng/
  • 25. Using the Library • You can “basic search” any book or information item in the OPAC
  • 26. Using the library • You can do an advanced search and set limits to specify result
  • 27. Example of a search result
  • 28. Some of our online Databases
  • 29. References • http://www.sheridancomputers.co.uk/computer- maintenance • Donhoe, A. (2018). What Is Routine Computer Maintenance? https://www.techwalla.com/articles/what-is- routine-computer-maintenance • https://computertutors.net/our- services/computer-maintenance-checklist/ • https://guides.lib.monash.edu/researching-for- your-literature-review/4
  • 30. Have • A • Nice Day! • Adegbilero-Iwari, Idowu

Editor's Notes

  1. https://www.techopedia.com/definition/593/computer-system
  2. https://guides.lib.monash.edu/researching-for-your-literature-review/4