HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
Steps to cleaning and protecting a desktop computer
1. Surname 1
Name:
Task:
Tutor:
Date:
The Personal Computer
First issue
It is quite amusing that the computer has to be protected currently. In any case, all that
advanced hardware and technical endowment should enable it to offer self-protection. The
first step to protecting a computer is protecting it from itself. Computers tend to log on to the
Internet anonymously so that they may update their software. It is quite intriguing that the
Internet is the source of viruses that harm the machines. Pursuant to this, the second step is to
disable automatic updates. This arises from the fact that the computer, advanced as it is,
cannot figure out for itself that the Internet is dangerous. It is quite appalling that computers
need protection, considering the advancements named in computer technology. Finally, one
should set the crucial updates that are crucial to be started manually and failure to this result
to the computer contracting some lethal viruses in its adventurous escapades on the Internet.
Computers are able to identify malware. One would expect that, during the programming of
the malware identifiers, someone would have identified the need for an embedded antivirus.
Second problem
That brings us to the sickening issue of the antivirus. The computer needs to have the
antivirus updated every so often. The fascinating bit is that the computer needs no prompting
to update the operating system. Interesting then, that the computer cannot update a light
2. Surname 2
program, automatically, but it can update an operating system. The first step is to log on to
the Internet and secure updates for the antivirus. The lunatic bit is that the computer can
contract viruses during this procedure. That is akin to paying the hospital a visit t get a shot
for common cold, and contract typhoid at the facility. The Internet is a highly unhygienic
hospital. The second step is to ensure that the antivirus runs a full scan of the computer. This
is done to weed out the malware it contracted while updating the antivirus a classic case of
necessity and invention right there. Finally, one needs to ensure that the computers browser is
linked with the antivirus so hat malware from the Internet does not infiltrate it. It is
interesting that the browser and antivirus combination can do all things except updating the
antivirus, which one has to do. Failure to update the antivirus allows all manner of malware
to infiltrate the computer. These viruses seem to have an innate detector of unprotected
computers.
Dusting the issues
One would tend to wonder where a computer in an office up on the twenty-third
storeys collects dust. First, in the interest of aesthetic credentials, it is good practice to blow
the dust off the machine lest it accumulates. After this blowing, it is advisable to frappe the
machine in a cloth to avoid dust accumulating again. This is omitted from the official
brochure because it would conceal the manufacturer’s manual and consequently defeat free
adverts. It is palpable that the practice, Failure to protect the computer from dust converts it
into a dust trap; an ugly, unsightly dust trap. That would harm processes and things in the
chips section, and one would not want that. The technical mandarins at Dell, Hewlett
Packard, and their cronies say that this practise is crucial for some reason that they are yet to
translate into common language. Meanwhile, it is wise to heed their behest, even if just for
the aesthetics.