SlideShare a Scribd company logo
PC – PERSONAL COMPUTER
JAVA - PROGRAMMERINGSSPRÅK




 ITL, Nettlesere, Sikkerhet, Spill osv. osv.
What is Java technology and why do I need it?
Java is a programming language and computing platform first released by Sun
   Microsystems in 1995. It is the underlying technology that powers state-of-the-art
   programs including utilities, games, and business applications. Java runs on more
   than 850 million personal computers worldwide, and on billions of devices
   worldwide, including mobile and TV devices.
Why do I need Java?
There are lots of applications and websites that won't work unless you have Java
   installed, and more are created every day. Java is fast, secure, and reliable. From
   laptops to datacenters, game consoles to scientific supercomputers, cell phones to
   the Internet, Java is everywhere!
Why should I upgrade to the latest Java version?
The latest Java version contains important enhancements to improve performance,
   stability and security of the Java applications that run on your machine. Installing
   this free update will ensure that your Java applications continue to run safely and
   efficiently.
ADOBE FLASH – DYNAMISK WEB-INNHOLD




INNSTALLER og OPPDATER !!
VIRUSPROGRAMMER OG SIKKERHET
•   Microsoft security essentials – gratis, lite resursskrevene og bra
•   AVG – gratis og bra.
•   CCleaner is a freeware system optimization, privacy and cleaning tool. It
    removes unused files from your system - allowing Windows to run faster and
    freeing up valuable hard disk space. It also cleans traces of your online
    activities such as your Internet history. Additionally it contains a fully featured
    registry cleaner. But the best part is that it's fast (normally taking less than a
    second to run) and contains NO Spyware or Adware! :)
•   Windows brannmuren – slås på i: start - kontrollpanelet – system og
    sikkerhet – windows brannmur.
•   Dropbox. Lagring i skyen. Gratis. Tilgang overalt. Sømløst.
•   Lagre alt på en annen stasjon enn C:

More Related Content

What's hot

Mac vs PC
Mac vs PCMac vs PC
Mac vs PC
OodleTech
 
Nokia X
Nokia XNokia X
Apps to increase efficiency
Apps to increase efficiencyApps to increase efficiency
Apps to increase efficiency
Trending Us
 
OSB120 Beat Ransomware
OSB120 Beat RansomwareOSB120 Beat Ransomware
OSB120 Beat Ransomware
Ivanti
 
Senior Technology Education
Senior Technology EducationSenior Technology Education
Senior Technology Education
Summerpair77
 
Shawn's Top 5 Favorite Utilites
Shawn's Top 5 Favorite UtilitesShawn's Top 5 Favorite Utilites
Shawn's Top 5 Favorite Utilites
Shawn Keller
 
Sec285 final presentation_joshua_brown
Sec285 final presentation_joshua_brownSec285 final presentation_joshua_brown
Sec285 final presentation_joshua_brown
JoshuaBrown233
 
Operating system
Operating systemOperating system
Operating system
Aarohi Tiwari
 
nessus
nessusnessus
Features of LINUX - R.D.Sivakumar
Features of LINUX - R.D.SivakumarFeatures of LINUX - R.D.Sivakumar
Features of LINUX - R.D.Sivakumar
Sivakumar R D .
 
Tizen os
Tizen osTizen os
Tizen os
Venkata Sreeram
 
Optimizing Surface deployment and connected standby (NICCONF 2015)
Optimizing Surface deployment and connected standby (NICCONF 2015)Optimizing Surface deployment and connected standby (NICCONF 2015)
Optimizing Surface deployment and connected standby (NICCONF 2015)
Olav Tvedt
 

What's hot (12)

Mac vs PC
Mac vs PCMac vs PC
Mac vs PC
 
Nokia X
Nokia XNokia X
Nokia X
 
Apps to increase efficiency
Apps to increase efficiencyApps to increase efficiency
Apps to increase efficiency
 
OSB120 Beat Ransomware
OSB120 Beat RansomwareOSB120 Beat Ransomware
OSB120 Beat Ransomware
 
Senior Technology Education
Senior Technology EducationSenior Technology Education
Senior Technology Education
 
Shawn's Top 5 Favorite Utilites
Shawn's Top 5 Favorite UtilitesShawn's Top 5 Favorite Utilites
Shawn's Top 5 Favorite Utilites
 
Sec285 final presentation_joshua_brown
Sec285 final presentation_joshua_brownSec285 final presentation_joshua_brown
Sec285 final presentation_joshua_brown
 
Operating system
Operating systemOperating system
Operating system
 
nessus
nessusnessus
nessus
 
Features of LINUX - R.D.Sivakumar
Features of LINUX - R.D.SivakumarFeatures of LINUX - R.D.Sivakumar
Features of LINUX - R.D.Sivakumar
 
Tizen os
Tizen osTizen os
Tizen os
 
Optimizing Surface deployment and connected standby (NICCONF 2015)
Optimizing Surface deployment and connected standby (NICCONF 2015)Optimizing Surface deployment and connected standby (NICCONF 2015)
Optimizing Surface deployment and connected standby (NICCONF 2015)
 

Similar to Vedlikehold av pc og pc sikkerhet

Top 10 antiviruses
Top 10 antivirusesTop 10 antiviruses
Top 10 antiviruses
university of education,Lahore
 
Comparison of windows linux and mac os
Comparison of windows linux and mac osComparison of windows linux and mac os
Comparison of windows linux and mac os
Ali Zar
 
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...
PranavPatil822557
 
Android architechture
Android architechtureAndroid architechture
Android architechture
Yojana Nanaware
 
Os
OsOs
Internship msc cs
Internship msc csInternship msc cs
Internship msc cs
Pooja Bhojwani
 
Summer project- Jack Fletcher
Summer project- Jack Fletcher Summer project- Jack Fletcher
Summer project- Jack Fletcher
Jack Fletcher
 
BKK16-406 Ubuntu Core - a snappy platform for Embedded, IoT and 96boards!
BKK16-406 Ubuntu Core - a snappy platform for Embedded, IoT and 96boards!BKK16-406 Ubuntu Core - a snappy platform for Embedded, IoT and 96boards!
BKK16-406 Ubuntu Core - a snappy platform for Embedded, IoT and 96boards!
Linaro
 
Types of software
Types of software Types of software
Types of software
mayank4689833
 
9 Real Life Applications of Java
9 Real Life Applications of Java9 Real Life Applications of Java
9 Real Life Applications of Java
PrachiVarshney7
 
Digital literacy 1 b operating systems
Digital literacy 1 b operating systemsDigital literacy 1 b operating systems
Digital literacy 1 b operating systems
mrspetty19
 
Venkasure Antivirus + Internet Security
Venkasure Antivirus + Internet SecurityVenkasure Antivirus + Internet Security
Venkasure Antivirus + Internet Security
venkasureantivirus
 
IoT - Innovating without compromising security
IoT - Innovating without compromising securityIoT - Innovating without compromising security
IoT - Innovating without compromising security
Victor Tuson Palau
 
what is Operating system
what is Operating systemwhat is Operating system
what is Operating system
kunwer brijendra shanker
 
Endpoint Security
Endpoint Security Endpoint Security
Endpoint Security
Zack Fabro
 
As a system administrator who is responsible for your company-'s netwo.docx
As a system administrator who is responsible for your company-'s netwo.docxAs a system administrator who is responsible for your company-'s netwo.docx
As a system administrator who is responsible for your company-'s netwo.docx
bickerstaffinell
 
Computer system
Computer systemComputer system
Computer system
hannahmaganan
 

Similar to Vedlikehold av pc og pc sikkerhet (20)

Top 10 antiviruses
Top 10 antivirusesTop 10 antiviruses
Top 10 antiviruses
 
Comparison of windows linux and mac os
Comparison of windows linux and mac osComparison of windows linux and mac os
Comparison of windows linux and mac os
 
1061 (m2)
1061 (m2)1061 (m2)
1061 (m2)
 
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...
 
Android architechture
Android architechtureAndroid architechture
Android architechture
 
eduhub360
eduhub360eduhub360
eduhub360
 
Os
OsOs
Os
 
Lecture 2.6 software
Lecture 2.6 softwareLecture 2.6 software
Lecture 2.6 software
 
Internship msc cs
Internship msc csInternship msc cs
Internship msc cs
 
Summer project- Jack Fletcher
Summer project- Jack Fletcher Summer project- Jack Fletcher
Summer project- Jack Fletcher
 
BKK16-406 Ubuntu Core - a snappy platform for Embedded, IoT and 96boards!
BKK16-406 Ubuntu Core - a snappy platform for Embedded, IoT and 96boards!BKK16-406 Ubuntu Core - a snappy platform for Embedded, IoT and 96boards!
BKK16-406 Ubuntu Core - a snappy platform for Embedded, IoT and 96boards!
 
Types of software
Types of software Types of software
Types of software
 
9 Real Life Applications of Java
9 Real Life Applications of Java9 Real Life Applications of Java
9 Real Life Applications of Java
 
Digital literacy 1 b operating systems
Digital literacy 1 b operating systemsDigital literacy 1 b operating systems
Digital literacy 1 b operating systems
 
Venkasure Antivirus + Internet Security
Venkasure Antivirus + Internet SecurityVenkasure Antivirus + Internet Security
Venkasure Antivirus + Internet Security
 
IoT - Innovating without compromising security
IoT - Innovating without compromising securityIoT - Innovating without compromising security
IoT - Innovating without compromising security
 
what is Operating system
what is Operating systemwhat is Operating system
what is Operating system
 
Endpoint Security
Endpoint Security Endpoint Security
Endpoint Security
 
As a system administrator who is responsible for your company-'s netwo.docx
As a system administrator who is responsible for your company-'s netwo.docxAs a system administrator who is responsible for your company-'s netwo.docx
As a system administrator who is responsible for your company-'s netwo.docx
 
Computer system
Computer systemComputer system
Computer system
 

Recently uploaded

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 

Recently uploaded (20)

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 

Vedlikehold av pc og pc sikkerhet

  • 1.
  • 2. PC – PERSONAL COMPUTER
  • 3. JAVA - PROGRAMMERINGSSPRÅK ITL, Nettlesere, Sikkerhet, Spill osv. osv.
  • 4. What is Java technology and why do I need it? Java is a programming language and computing platform first released by Sun Microsystems in 1995. It is the underlying technology that powers state-of-the-art programs including utilities, games, and business applications. Java runs on more than 850 million personal computers worldwide, and on billions of devices worldwide, including mobile and TV devices. Why do I need Java? There are lots of applications and websites that won't work unless you have Java installed, and more are created every day. Java is fast, secure, and reliable. From laptops to datacenters, game consoles to scientific supercomputers, cell phones to the Internet, Java is everywhere! Why should I upgrade to the latest Java version? The latest Java version contains important enhancements to improve performance, stability and security of the Java applications that run on your machine. Installing this free update will ensure that your Java applications continue to run safely and efficiently.
  • 5. ADOBE FLASH – DYNAMISK WEB-INNHOLD INNSTALLER og OPPDATER !!
  • 6. VIRUSPROGRAMMER OG SIKKERHET • Microsoft security essentials – gratis, lite resursskrevene og bra • AVG – gratis og bra. • CCleaner is a freeware system optimization, privacy and cleaning tool. It removes unused files from your system - allowing Windows to run faster and freeing up valuable hard disk space. It also cleans traces of your online activities such as your Internet history. Additionally it contains a fully featured registry cleaner. But the best part is that it's fast (normally taking less than a second to run) and contains NO Spyware or Adware! :) • Windows brannmuren – slås på i: start - kontrollpanelet – system og sikkerhet – windows brannmur. • Dropbox. Lagring i skyen. Gratis. Tilgang overalt. Sømløst. • Lagre alt på en annen stasjon enn C: