SlideShare uma empresa Scribd logo
1 de 2
Surname 1


Name:


Task:


Tutor:


Date:


                                     The Personal Computer


                                            First issue


         It is quite amusing that the computer has to be protected currently. In any case, all that

advanced hardware and technical endowment should enable it to offer self-protection. The

first step to protecting a computer is protecting it from itself. Computers tend to log on to the

Internet anonymously so that they may update their software. It is quite intriguing that the

Internet is the source of viruses that harm the machines. Pursuant to this, the second step is to

disable automatic updates. This arises from the fact that the computer, advanced as it is,

cannot figure out for itself that the Internet is dangerous. It is quite appalling that computers

need protection, considering the advancements named in computer technology. Finally, one

should set the crucial updates that are crucial to be started manually and failure to this result

to the computer contracting some lethal viruses in its adventurous escapades on the Internet.

Computers are able to identify malware. One would expect that, during the programming of

the malware identifiers, someone would have identified the need for an embedded antivirus.


         Second problem


         That brings us to the sickening issue of the antivirus. The computer needs to have the

antivirus updated every so often. The fascinating bit is that the computer needs no prompting

to update the operating system. Interesting then, that the computer cannot update a light
Surname 2


program, automatically, but it can update an operating system. The first step is to log on to

the Internet and secure updates for the antivirus. The lunatic bit is that the computer can

contract viruses during this procedure. That is akin to paying the hospital a visit t get a shot

for common cold, and contract typhoid at the facility. The Internet is a highly unhygienic

hospital. The second step is to ensure that the antivirus runs a full scan of the computer. This

is done to weed out the malware it contracted while updating the antivirus a classic case of

necessity and invention right there. Finally, one needs to ensure that the computers browser is

linked with the antivirus so hat malware from the Internet does not infiltrate it. It is

interesting that the browser and antivirus combination can do all things except updating the

antivirus, which one has to do. Failure to update the antivirus allows all manner of malware

to infiltrate the computer. These viruses seem to have an innate detector of unprotected

computers.


        Dusting the issues


        One would tend to wonder where a computer in an office up on the twenty-third

storeys collects dust. First, in the interest of aesthetic credentials, it is good practice to blow

the dust off the machine lest it accumulates. After this blowing, it is advisable to frappe the

machine in a cloth to avoid dust accumulating again. This is omitted from the official

brochure because it would conceal the manufacturer’s manual and consequently defeat free

adverts. It is palpable that the practice, Failure to protect the computer from dust converts it

into a dust trap; an ugly, unsightly dust trap. That would harm processes and things in the

chips section, and one would not want that. The technical mandarins at Dell, Hewlett

Packard, and their cronies say that this practise is crucial for some reason that they are yet to

translate into common language. Meanwhile, it is wise to heed their behest, even if just for

the aesthetics.

Mais conteúdo relacionado

Mais de OrderCustomEssay

Mais de OrderCustomEssay (8)

Custom essay mal style formay sample
Custom essay mal style formay sampleCustom essay mal style formay sample
Custom essay mal style formay sample
 
Faith integration
Faith integrationFaith integration
Faith integration
 
How does law enforcement to overcome racism
How does law enforcement to overcome racismHow does law enforcement to overcome racism
How does law enforcement to overcome racism
 
Polycystic kidney disease
Polycystic kidney diseasePolycystic kidney disease
Polycystic kidney disease
 
Eng 101
Eng 101Eng 101
Eng 101
 
Organizational behavior & leadership
Organizational behavior & leadershipOrganizational behavior & leadership
Organizational behavior & leadership
 
The pigman, by paul zindel
The pigman, by paul zindelThe pigman, by paul zindel
The pigman, by paul zindel
 
Asdcasdc
AsdcasdcAsdcasdc
Asdcasdc
 

Último

Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 

Último (20)

Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 

Steps to cleaning and protecting a desktop computer

  • 1. Surname 1 Name: Task: Tutor: Date: The Personal Computer First issue It is quite amusing that the computer has to be protected currently. In any case, all that advanced hardware and technical endowment should enable it to offer self-protection. The first step to protecting a computer is protecting it from itself. Computers tend to log on to the Internet anonymously so that they may update their software. It is quite intriguing that the Internet is the source of viruses that harm the machines. Pursuant to this, the second step is to disable automatic updates. This arises from the fact that the computer, advanced as it is, cannot figure out for itself that the Internet is dangerous. It is quite appalling that computers need protection, considering the advancements named in computer technology. Finally, one should set the crucial updates that are crucial to be started manually and failure to this result to the computer contracting some lethal viruses in its adventurous escapades on the Internet. Computers are able to identify malware. One would expect that, during the programming of the malware identifiers, someone would have identified the need for an embedded antivirus. Second problem That brings us to the sickening issue of the antivirus. The computer needs to have the antivirus updated every so often. The fascinating bit is that the computer needs no prompting to update the operating system. Interesting then, that the computer cannot update a light
  • 2. Surname 2 program, automatically, but it can update an operating system. The first step is to log on to the Internet and secure updates for the antivirus. The lunatic bit is that the computer can contract viruses during this procedure. That is akin to paying the hospital a visit t get a shot for common cold, and contract typhoid at the facility. The Internet is a highly unhygienic hospital. The second step is to ensure that the antivirus runs a full scan of the computer. This is done to weed out the malware it contracted while updating the antivirus a classic case of necessity and invention right there. Finally, one needs to ensure that the computers browser is linked with the antivirus so hat malware from the Internet does not infiltrate it. It is interesting that the browser and antivirus combination can do all things except updating the antivirus, which one has to do. Failure to update the antivirus allows all manner of malware to infiltrate the computer. These viruses seem to have an innate detector of unprotected computers. Dusting the issues One would tend to wonder where a computer in an office up on the twenty-third storeys collects dust. First, in the interest of aesthetic credentials, it is good practice to blow the dust off the machine lest it accumulates. After this blowing, it is advisable to frappe the machine in a cloth to avoid dust accumulating again. This is omitted from the official brochure because it would conceal the manufacturer’s manual and consequently defeat free adverts. It is palpable that the practice, Failure to protect the computer from dust converts it into a dust trap; an ugly, unsightly dust trap. That would harm processes and things in the chips section, and one would not want that. The technical mandarins at Dell, Hewlett Packard, and their cronies say that this practise is crucial for some reason that they are yet to translate into common language. Meanwhile, it is wise to heed their behest, even if just for the aesthetics.