SlideShare uma empresa Scribd logo
1 de 2
Surname 1


Name:


Task:


Tutor:


Date:


                                     The Personal Computer


                                            First issue


         It is quite amusing that the computer has to be protected currently. In any case, all that

advanced hardware and technical endowment should enable it to offer self-protection. The

first step to protecting a computer is protecting it from itself. Computers tend to log on to the

Internet anonymously so that they may update their software. It is quite intriguing that the

Internet is the source of viruses that harm the machines. Pursuant to this, the second step is to

disable automatic updates. This arises from the fact that the computer, advanced as it is,

cannot figure out for itself that the Internet is dangerous. It is quite appalling that computers

need protection, considering the advancements named in computer technology. Finally, one

should set the crucial updates that are crucial to be started manually and failure to this result

to the computer contracting some lethal viruses in its adventurous escapades on the Internet.

Computers are able to identify malware. One would expect that, during the programming of

the malware identifiers, someone would have identified the need for an embedded antivirus.


         Second problem


         That brings us to the sickening issue of the antivirus. The computer needs to have the

antivirus updated every so often. The fascinating bit is that the computer needs no prompting

to update the operating system. Interesting then, that the computer cannot update a light
Surname 2


program, automatically, but it can update an operating system. The first step is to log on to

the Internet and secure updates for the antivirus. The lunatic bit is that the computer can

contract viruses during this procedure. That is akin to paying the hospital a visit t get a shot

for common cold, and contract typhoid at the facility. The Internet is a highly unhygienic

hospital. The second step is to ensure that the antivirus runs a full scan of the computer. This

is done to weed out the malware it contracted while updating the antivirus a classic case of

necessity and invention right there. Finally, one needs to ensure that the computers browser is

linked with the antivirus so hat malware from the Internet does not infiltrate it. It is

interesting that the browser and antivirus combination can do all things except updating the

antivirus, which one has to do. Failure to update the antivirus allows all manner of malware

to infiltrate the computer. These viruses seem to have an innate detector of unprotected

computers.


        Dusting the issues


        One would tend to wonder where a computer in an office up on the twenty-third

storeys collects dust. First, in the interest of aesthetic credentials, it is good practice to blow

the dust off the machine lest it accumulates. After this blowing, it is advisable to frappe the

machine in a cloth to avoid dust accumulating again. This is omitted from the official

brochure because it would conceal the manufacturer’s manual and consequently defeat free

adverts. It is palpable that the practice, Failure to protect the computer from dust converts it

into a dust trap; an ugly, unsightly dust trap. That would harm processes and things in the

chips section, and one would not want that. The technical mandarins at Dell, Hewlett

Packard, and their cronies say that this practise is crucial for some reason that they are yet to

translate into common language. Meanwhile, it is wise to heed their behest, even if just for

the aesthetics.

Mais conteúdo relacionado

Mais de OrderCustomEssay (8)

Custom essay mal style formay sample
Custom essay mal style formay sampleCustom essay mal style formay sample
Custom essay mal style formay sample
 
Faith integration
Faith integrationFaith integration
Faith integration
 
How does law enforcement to overcome racism
How does law enforcement to overcome racismHow does law enforcement to overcome racism
How does law enforcement to overcome racism
 
Polycystic kidney disease
Polycystic kidney diseasePolycystic kidney disease
Polycystic kidney disease
 
Eng 101
Eng 101Eng 101
Eng 101
 
Organizational behavior & leadership
Organizational behavior & leadershipOrganizational behavior & leadership
Organizational behavior & leadership
 
The pigman, by paul zindel
The pigman, by paul zindelThe pigman, by paul zindel
The pigman, by paul zindel
 
Asdcasdc
AsdcasdcAsdcasdc
Asdcasdc
 

Último

The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptx
heathfieldcps1
 
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
Krashi Coaching
 

Último (20)

II BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING II
II BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING IIII BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING II
II BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING II
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).
 
Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptx
 
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
 
demyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptxdemyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptx
 
Word Stress rules esl .pptx
Word Stress rules esl               .pptxWord Stress rules esl               .pptx
Word Stress rules esl .pptx
 
Software testing for project report .pdf
Software testing for project report .pdfSoftware testing for project report .pdf
Software testing for project report .pdf
 
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
Operations Management - Book1.p  - Dr. Abdulfatah A. SalemOperations Management - Book1.p  - Dr. Abdulfatah A. Salem
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
An Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxAn Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptx
 
Championnat de France de Tennis de table/
Championnat de France de Tennis de table/Championnat de France de Tennis de table/
Championnat de France de Tennis de table/
 
REPRODUCTIVE TOXICITY STUDIE OF MALE AND FEMALEpptx
REPRODUCTIVE TOXICITY  STUDIE OF MALE AND FEMALEpptxREPRODUCTIVE TOXICITY  STUDIE OF MALE AND FEMALEpptx
REPRODUCTIVE TOXICITY STUDIE OF MALE AND FEMALEpptx
 
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
 
....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf
 
The Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptxThe Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptx
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceutics
 
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
 

Steps to cleaning and protecting a desktop computer

  • 1. Surname 1 Name: Task: Tutor: Date: The Personal Computer First issue It is quite amusing that the computer has to be protected currently. In any case, all that advanced hardware and technical endowment should enable it to offer self-protection. The first step to protecting a computer is protecting it from itself. Computers tend to log on to the Internet anonymously so that they may update their software. It is quite intriguing that the Internet is the source of viruses that harm the machines. Pursuant to this, the second step is to disable automatic updates. This arises from the fact that the computer, advanced as it is, cannot figure out for itself that the Internet is dangerous. It is quite appalling that computers need protection, considering the advancements named in computer technology. Finally, one should set the crucial updates that are crucial to be started manually and failure to this result to the computer contracting some lethal viruses in its adventurous escapades on the Internet. Computers are able to identify malware. One would expect that, during the programming of the malware identifiers, someone would have identified the need for an embedded antivirus. Second problem That brings us to the sickening issue of the antivirus. The computer needs to have the antivirus updated every so often. The fascinating bit is that the computer needs no prompting to update the operating system. Interesting then, that the computer cannot update a light
  • 2. Surname 2 program, automatically, but it can update an operating system. The first step is to log on to the Internet and secure updates for the antivirus. The lunatic bit is that the computer can contract viruses during this procedure. That is akin to paying the hospital a visit t get a shot for common cold, and contract typhoid at the facility. The Internet is a highly unhygienic hospital. The second step is to ensure that the antivirus runs a full scan of the computer. This is done to weed out the malware it contracted while updating the antivirus a classic case of necessity and invention right there. Finally, one needs to ensure that the computers browser is linked with the antivirus so hat malware from the Internet does not infiltrate it. It is interesting that the browser and antivirus combination can do all things except updating the antivirus, which one has to do. Failure to update the antivirus allows all manner of malware to infiltrate the computer. These viruses seem to have an innate detector of unprotected computers. Dusting the issues One would tend to wonder where a computer in an office up on the twenty-third storeys collects dust. First, in the interest of aesthetic credentials, it is good practice to blow the dust off the machine lest it accumulates. After this blowing, it is advisable to frappe the machine in a cloth to avoid dust accumulating again. This is omitted from the official brochure because it would conceal the manufacturer’s manual and consequently defeat free adverts. It is palpable that the practice, Failure to protect the computer from dust converts it into a dust trap; an ugly, unsightly dust trap. That would harm processes and things in the chips section, and one would not want that. The technical mandarins at Dell, Hewlett Packard, and their cronies say that this practise is crucial for some reason that they are yet to translate into common language. Meanwhile, it is wise to heed their behest, even if just for the aesthetics.