A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 9 Optimizing and Protecting Hard Drives.

Slides:



Advertisements
Similar presentations
®® Microsoft Windows 7 for Power Users Tutorial 6 Optimizing Your Hard Disk.
Advertisements

Backing Up Your Computer Hard Drive Lou Koch June 27, 2006.
Putting It All Together 1.  Maintaining a Hard Drive Ch 4 Lab  Hardware cleaning tips ▪ Microsoft Tips Microsoft Tips ▪ Computer Hope Tips Computer.
Chapter 3 Understanding the Boot Process and Command Line.
A+ Guide to Software, 4e Chapter 4 Supporting Windows 2000/XP Users and Their Data.
Format Scandisk Defragmentation Antivirus Compression Software
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Software utilities Gladys Nzita-Mak. Disk defragmentation Disk defragmentation makes computers run efficiently. When you save, change or delete files.
Basic Computer Maintenance Basic Computer Maintenance Clean and Cool Deleting Temporary Files Scandisk Backup Your Data How to.
Chapter 4: Operating Systems and File Management 1 Operating Systems and File Management Chapter 4.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
COMPUTER FUNDAMENTALS David Samuel Bhatti
Utility Programs  A type of system software that is used to solve a particular problem is called utility program. Many operating system provides different.
Chapter 7 Installing and Using Windows XP Professional.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 9 Optimizing and Protecting Hard Drives.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
Security for Seniors SeniorNet Help Desk
Chapter Three OPERATING SYSTEMS.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Operating Systems Review. 5 Purposes of an Operating System Provide User Interface Communicate with Hardware Create and Manage a File System Network Support.
BUSINESS COMPUTER APPLICATION University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
A+ Guide to Managing and Maintaining your PC, 6e Chapter 13 Supporting Windows 2000/XP Users and Their Data.
Lecture 8: Files and Viruses Tonga Institute of Higher Education IT 141: Information Systems.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 5 1 Control Panel Applets.
Computers Are Your Future Eleventh Edition Chapter 4: System Software Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Understanding the Boot Process and Command Line
Operating Systems Concepts 1/e Ruth Watson Chapter 4 Chapter 4 Windows Utilities Ruth Watson.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
A+ Guide to Software Managing, Maintaining and Troubleshooting THIRD EDITION Chapter 10 Supporting Hard Drives.
ITE 1 Chapter 5. Chapter 5 is a Large Chapter It has a great deal of useful information about operating systems. You will find this VERY helpful when.
Chapter Fourteen Windows XP Professional Fault Tolerance.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 14 Managing and Troubleshooting Windows 2000.
1 Chapter Overview Floppy Disk Drives Hard Disk Drives.
Understanding and Troubleshooting Your PC. Chapter 5: Understanding, Installing, and Troubleshooting Disk Drives2 Chapter Objectives  In this chapter,
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Backup Procedure  To prevent against data loss, computer users should have backup procedures  A backup is a copy of information stored on a computer.
Chapter 3 Managing Disk and File Systems. File Storage Basics Windows XP supports two types of storage Basic Dynamic Basic storage system Centers on partitioning.
Your Interactive Guide to the Digital World Discovering Computers 2012.
C HAPTER 7 Managing Disk and File System. I NTRODUCING DISK MANAGEMENT 2 types of hard disk storage supported by Windows XP are: basic hard disk & dynamic.
For more notes and topics visit: eITnotes.com.
14 Step-by-Step Instructions for an Upgrade Installation n Prepare for the installation Verify that all devices and applications are Windows 2000 compatible.
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
Implementing Hard Drives. Partitioning and Formatting Process.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 13 Understanding and Installing Windows 2000 and Windows NT.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
VIRUS.
I T Essentials I Chapter 5 JEOPARDY Installing & UpgradingComputerBasicsErrorsServicePotpourri
W elcome to our Presentation. Presentation Topic Virus.
Your Interactive Guide to the Digital World Discovering Computers 2012.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
1 Maintaining the Windows O/S. 2 Introduction Virus protection Remove old and unused files Scan hard disk Defragment hard drive Back up and updated recovery.
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
© ExplorNet’s Centers for Quality Teaching and Learning 1 Explain the importance of routine backup and maintenance. Objective Course Weight 4%
PC Support & Repair Chapter 5 Operating Systems Part 2.
Chapter 6 Protecting Your Files
Chapter Objectives In this chapter, you will learn:
Discovering Computers 2012: Chapter 8
Computer virus Topic: Prepared For Salmeen Rahman Prepared By
Unit 10 NT1330 Client-Server Networking II Date: 8/16/2016
Chap 10 Malicious Software.
BASIC SOFTWARE MAINTENANCE
Chap 10 Malicious Software.
Presentation transcript:

A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 9 Optimizing and Protecting Hard Drives

2 A+ Guide to Managing and Maintaining Your PC, Fifth Edition You Will Learn… About supporting hard drives and making backups About viruses and other computer infestations, and how to protect against them How to troubleshoot hard drives

3 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Managing Hard Drives Use Windows utilities to protect, optimize, and maintain hard drives  Defrag and Windows Disk Defragmenter  ScanDisk  Disk Cleanup  Disk compression  Disk caching  Making backups Access utilities from command prompt or Windows desktop

4 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Defrag Command and Windows Disk Defragmenter Detects and repairs fragmentation, which can slow down access time and complicate recovery of a corrupted file Defragment hard drive once a month

5 A+ Guide to Managing and Maintaining Your PC, Fifth Edition ScanDisk Designed to replace Chkdsk command Repairs cross-linked and lost clusters Checks FAT for problems with long filenames and the directory tree Scans the disk for bad sectors Repairs problems with structure of a hard drive that has been compressed using Windows DriveSpace or DoubleSpace

6 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Cross-Lined and Lost Clusters

7 A+ Guide to Managing and Maintaining Your PC, Fifth Edition ScanDisk Results

8 A+ Guide to Managing and Maintaining Your PC, Fifth Edition ScanDisk in MS-DOS Mode

9 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Disk Cleanup

10 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Disk Compression Methods Store data on hard drive in one big file  Manage writing of data and programs to that file Rewrite data in files in mathematically coded format that uses less space

11 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Disk Compression Disk compression in Windows XP and Windows 2000  Use the NTFS file system Disk compression in Windows 9x  Use DriveSpace utility on a FAT 16 file system

12 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Disk Cache Temporary storage area in RAM for data being read from or written to a hard drive Speeds up access time to the drive

13 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Disk Caching

14 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Disk Caching ( continued ) Hardware cache versus software cache How disk caching methods have changed  DOS  DOS with Windows 3.x  Windows 9x  Windows NT/2000/XP

15 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Making Backups Child, parent, grandparent method Full, incremental, and differential backups Scheduling backups Backup software Disk cloning software Planning for disaster recovery

16 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Child, Parent, Grandparent Method

17 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Full, Incremental, and Differential Backups Full  Backs up all data from hard drive Incremental  Backs up only files that have changed or been created since last backup Differential  Backs up files that have changed or been created since the last full backup

18 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Scheduling Backups

19 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Scheduling Backups ( continued )

20 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Scheduling Backups ( continued )

21 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Backup Software Comes with most tape drives Third-party software also available Backup utilities are provided with Windows NT/2000/XP and Windows 9x

22 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Windows 2000/XP Backup Utility Can perform immediate backup from Backup tab Can schedule repeated backups

23 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Disk Cloning Software Replicates hard drive to a different computer or to another drive on the same computer Examples  Drive Image by PowerQuest  ImageCast by Innovative Software  Norton Ghost by Symantec Corp

24 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Planning for Disaster Recovery Verify your recovery plan Keep a record of regular backups  Folders or drives backed up  Date of the backup  Type of backup  Label identifying the tape, disk, or other media

25 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Viruses and Other Computer Infestations Virus Has an incubation period Is contagious; replicates by attaching to other programs; infected program must be executed for a virus to run Is destructive Worm Spreads copies of itself without a host program, overloading the network as it replicates Does damage by its presence Best defense is a firewall Trojan horse Does not need a host program to work Substitutes itself for a legitimate program Most cannot replicate Logic bomb Dormant code added to software; triggered at a predetermined time or by a predetermined event

26 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Understanding Computer Infestations Where viruses hide  Boot sector viruses  File viruses  Multipartite viruses Cloaking techniques  Polymorphic viruses  Encrypting viruses  Stealth viruses Potential damage ranges from minor to major

27 A+ Guide to Managing and Maintaining Your PC, Fifth Edition How Infestations Spread User activities can increase susceptibility Virus replicates A Trojan horse gets into your computer A worm gets into your computer

28 A+ Guide to Managing and Maintaining Your PC, Fifth Edition How a Virus Replicates

29 A+ Guide to Managing and Maintaining Your PC, Fifth Edition How a Worm Gets into Your Computer

30 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Virus Hoaxes warnings about a nonexistent virus Overload network traffic Check Web sites that specialize in debunking virus hoaxes

31 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Protecting Against Computer Infestations Make backups Use antivirus software regularly Keep Windows current with updates and patches Implement a firewall

32 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Protecting Against Computer Infestations ( continued ) Be aware of virus symptoms Know what to do when you suspect a virus infestation  Run antivirus software  Check Web site of AV software manufacturer Use antivirus software

33 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Capabilities to Look for When Selecting Antivirus Software Download software upgrades and virus definitions from the Internet Automatically execute at startup Detect macros in word-processing documents Automatically monitor files being downloaded from the Internet Send virus alerts to your address Scan both automatically and manually

34 A+ Guide to Managing and Maintaining Your PC, Fifth Edition General Troubleshooting Guidelines Make backups and keep them current Run antivirus software regularly Defragment files and scan the hard drive occasionally Don’t smoke around your hard drive Don’t leave the PC turned off for weeks or months at at time

35 A+ Guide to Managing and Maintaining Your PC, Fifth Edition General Troubleshooting Guidelines ( continued ) High humidity can be dangerous for hard drives Be gentle with a hard drive Take precautions when moving a hard drive or changing CMOS setup

36 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Resolving Common Hard Drive Problems Categories of problems  Caused by hardware or software?  Prevent hard drive from booting or prevent data from being accessed? Gather basic information from user; diagnose and address the problems Focus on the main priority Use available resources (documentation, manufacturer’s Web site, technical support)

37 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Troubleshooting Hard Drives with Third-Party Software Norton Utilities SpinRite PartitionMagic

38 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Hardware Problems Hard drive not found Invalid drive or drive specification Damaged boot record Damaged FAT or root directory or bad sectors Cannot boot from the hard drive Drive retrieves and saves data slowly

39 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Software Problems with Hard Drives Corrupted OS files Corrupted partition table, boot record, or root directory, making all data on the hard drive inaccessible Corrupted area of the FAT that points to the data, data’s directory table, or sector markings where data is located Corrupted data

40 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Resolving Hard Drive and Data Access Problems Partition table Boot record FAT and root directory System files Data and program files

41 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Data and Program File Corruption Options for restoring a data file that is not backed up  OS system tools and commands  Third-party software  Professional data recovery service

42 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Data and Program File Corruption ( continued ) Recovering data when portions of a damaged file are still intact  Create a new file on another disk  Use Copy command  Edit new file to replace missing data

43 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Data and Program File Corruption ( continued ) Potential problems with files and file system  Corrupted file header  Lost clusters  Erased file

44 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Getting Technical Support Before you call, have available:  Drive model and description  Manufacturer and model of computer  Exact wording of error message  Description of the problem  Hardware and software configuration for the system

45 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Summary How to optimize hard drive performance through disk compression and caching of hard drives Types of viruses that can infect your hard drive; how to remove and prevent them What to do when a hard drive fails or produces errors The importance of keeping reliable backups of the file system and data