Putting It All Together 1.  Maintaining a Hard Drive Ch 4 Lab  Hardware cleaning tips ▪ Microsoft Tips Microsoft Tips ▪ Computer Hope Tips Computer.

Slides:



Advertisements
Similar presentations
June 2008 Surf Safely with a Clean Computer Roger Thornburn.
Advertisements

Working with Disks and Devices
1 of 2 By observing the guidelines below and performing regular maintenance on your computer, you can help keep your computer safe and maintain optimum.
Module 1: Installing Windows XP Professional
5-1note. 2 BUSINESS TECHNOLOGY TODAY Chapter Five Killer Applications— Using Your Operating System and Word Processor.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Computer Maintenance & Safety Spring Internet Safety Keeping your computer safe What is a computer virus? A computer program that can copy itself.
Explanations Of Software Utilities By Tim Wong.
ITE PC v4.0 Chapter 1 1 Operating Systems Computer Networks– 2.
Computer Referbishment The Demonstration. To Do… Virus Protection Schedule A Full System Scan Install Service Pack 3 Clean Up Tools Drive Formatting Install.
Operating Systems and File Management
Living in a Digital World Discovering Computers 2010.
Format Scandisk Defragmentation Antivirus Compression Software
MS System Setup Securing A System. Use Automatic Updates For a workstation or server, schedule the updates to occur regularly. –Control panel click on.
Software utilities Gladys Nzita-Mak. Disk defragmentation Disk defragmentation makes computers run efficiently. When you save, change or delete files.
Computer Troubleshooting (and other interesting facts) Presented by: Kristi Manuel and Derwin Woodard.
Simple Computer Maintenance. Common Computer Clean up Tasks Disk Clean – up Anti-virus scan Deleting Cookies.
SIR Area 2 Computers & Technology Dean Steichen.  “A well maintained PC will run at peak performance for years” (IOLO Technologies).  You can easily.
Chapter 4: Operating Systems and File Management 1 Operating Systems and File Management Chapter 4.
With Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Windows 7.
Utility Programs  A type of system software that is used to solve a particular problem is called utility program. Many operating system provides different.
Chapter 5: System Software: Operating Systems and Utility Programs.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 9 Optimizing and Protecting Hard Drives.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Security for Seniors SeniorNet Help Desk
P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of.
Chapter Three OPERATING SYSTEMS.
BTEC IT Unit 02 Lesson 07 Utility Software Mr C Johnston ICT Teacher
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Spyware Sue Scott Technology Librarian. What is Spyware Malware – (Malicious Software) A general term to encompass unwanted software on a personal computer.
Introducing, Installing, and Upgrading Windows 7 Lesson 7.
Computers Are Your Future Eleventh Edition Chapter 4: System Software Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Operating Systems Concepts 1/e Ruth Watson Chapter 4 Chapter 4 Windows Utilities Ruth Watson.
IT Essentials 1 v4.0 Chapters 4 & 5 JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
PC Maintenance How to keep your computer healthy.
Utility Programs Lesson Objective: Understanding the functions of an operating system. Learning Outcome: Answer some basic questions on operating systems.
Software Utilities Pages 65 to 73 Looking After Your Computer Nick Sims.
To proceed onto the next stage of the install please Agree to the terms and conditions and select next.
Chapter 13 Maintaining Windows. O BJECTIVES FOR THE NEXT SEVERAL LESSONS Learn how to set up and perform scheduled preventive maintenance tasks to keep.
Component 4: Introduction to Information and Computer Science Unit 4: Application and System Software Lecture 3 This material was developed by Oregon Health.
Computer Maintenance. Clean up tools How I Defragmented the Hard Drive.
Your Interactive Guide to the Digital World Discovering Computers 2012.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
Module 1: Installing Microsoft Windows XP Professional.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 13 Understanding and Installing Windows 2000 and Windows NT.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
(and other interesting facts). My Computer is Slow Internet Active Directory Video Issues.
IST 222 Day 3. Homework for Today Take up homework and go over Go to Microsoft website and check out their hardware compatibility list.
Internet safety By Suman Nazir
I T Essentials I Chapter 5 JEOPARDY Installing & UpgradingComputerBasicsErrorsServicePotpourri
IT-IDT-5 Understand, communicate, and adapt to a digital world. File Management.
Computer Hope Copyright © Cannady ACOS. All rights reserved. (R1: July 2011)
FILE MANAGEMENT Computer Basics 1.3. FILE EXTENSIONS.txt.pdf.jpg.bmp.png.zip.wav.mp3.doc.docx.xls.xlsx.ppt.pptx.accdb.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Jake Horsfield (P3/D1) PURPOSE OF SOFTWARE UTILITIES.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Windows 10 Utilities  Windows Utilities:  Anti-Malware/Anti-Virus  Windows Update  Disk Cleanup  Defrag  Task Manager  Backup.
Running Windows Securely and Efficiently By Gary Esworthy.
Viruses A computer program that can replicate itself and is spread from one computer to another Can be spread by networks, the internet, or removable mediums.
Instructor: Syed Shuja Hussain Chapter 4: Operating System Basics.
Windows Vista Configuration MCTS : Maintenance and Optimization.
Windows Tutorial 5 Protecting Your Computer
Discovering Computers 2012: Chapter 8
Objectives Overview Define system software and identify the two types of system software Describe the functions of an operating system Summarize the startup.
Networking for Home and Small Businesses – Chapter 2
Networking for Home and Small Businesses – Chapter 2
Presentation transcript:

Putting It All Together 1

 Maintaining a Hard Drive Ch 4 Lab  Hardware cleaning tips ▪ Microsoft Tips Microsoft Tips ▪ Computer Hope Tips Computer Hope Tips  Managing Files and Folders Ch 4 Lab  Backing Up Your Computer Ch 4 Lab  Software installs/updates Ch 3 Disc/Lab Traditional – rooted in history – how it used to be – customary; where things were before constant connection all the time like we are now; rooted in time before Internet; however, including Internet and browser considerations in “traditional steps” (slides 3-8) presents change and evolution in what is traditional 2

1. Run Windows updates (and set to update automatically 2. Remove adware, malware, spyware 3. Install/run antivirus software 4. Run disk cleanup ▪ All Programs>Accessories>System Tools 5. Defrag hard drive 6. Clear Internet browsing history 7. Registry cleaner (controversy regarding whether necessary or not) 3

4

5

6

Clear Internet browsing history  In IE, Tools>Folder Options  In Firefox, Tools>Clear Recent History and >Options 7

 Controversy regarding necessity  CCleaner utility (if you determine you want to use one) CCleaner utility  Registry related error exampleexample  Windows Vista not loading user profile correctly  Error message: The User Profile Service failed the logon. User profile cannot be loaded.  Solution: edit the registry ▪ Be careful when editing the registry; possible to make a mistake that causes bigger problems 8

 Viruses, Trojan horses, worms, spyware  Antivirus/antispyware  Service packs  Software updates  Software patches  Security updates 9

 Naming conventions  Why certain names, characters not allowed  To space or not to space  Location  Root directory  Subdirectories  Path  File extensions vs. file formats  File Properties 10

 Save vs. Save As  Windows Explorer (Mac Finder)  File hierarchy: tree structure metaphor and file cabinet metaphor (files and folders)  File Management Tasks  File Management Tips  Formatting, tracks, sectors  File systems (FAT32, NTFS)  Deleting files  Fragmentation 11

 Have a plan  What needs backed up  Schedule for backups  Boot disk  Backup and restore procedures ▪ Backup and restore utility ▪ Copy/paste files to other storage device  Storage of backups 12

 Firewalls  Wireless connections and security ▪ How to hide and secure home wireless  File sharing  Antivirus/antispyware  Reliable (and safe) websites for downloads  Secure websites  Spam, cookies, phishing, pharming  Troubleshoot Internet speed issues, if problems  VPN (virtual private network) * * Will explore this in It’s All Business 13

Encryption and security Wireless connections and security P2P networks File sharing MAC addresses VPN (virtual private network) * * Will explore this in It’s All Business 14

 PIAT (consider all pieces) when taking care of your computer  “Traditional” maintenance today = all the pie  Networking and Internet security are part of pie today beyond just antivirus and firewall 15 Hard Drive Internet Security Networking File Management Backing Up Your Computer Software

16 Chapter 3 Discussion & Chapter 4 Lab in particular will help you develop a plan