Viruses and Disasters: Data Protection

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which type of virus is known for altering its code each time it infects a new file, making it harder for antivirus software to detect?

  • Polymorphic Virus (correct)
  • Macro Virus
  • Boot Sector Virus
  • File Infector Virus

Which of the following is NOT a typical symptom of a PC virus infection?

  • Slower system performance
  • Unexpected crashes or restarts
  • Corrupted or lost data
  • Increased network bandwidth (correct)

Which type of PC disaster involves events that damage physical equipment?

  • Natural Disasters (correct)
  • Data Loss
  • Software Failures
  • Hardware Failures

Which disaster recovery strategy involves using multiple devices or cloud-based storage for critical data?

<p>Redundancy (A)</p> Signup and view all the answers

Which backup solution involves storing data off-site using services like Google Drive or Dropbox?

<p>Cloud Backups (C)</p> Signup and view all the answers

Which type of encryption protects the entire disk, securing data from unauthorized access?

<p>Full Disk Encryption (FDE) (B)</p> Signup and view all the answers

Which strategy ensures that there is a clear, step-by-step procedure for restoring critical data and services in case of loss?

<p>Documented Strategy (D)</p> Signup and view all the answers

Which of the following is a potential risk associated with a computer virus?

<p>Data Corruption or Deletion (A)</p> Signup and view all the answers

What is the purpose of regularly updating antivirus programs?

<p>To detect and block viruses in real-time (B)</p> Signup and view all the answers

What is the main purpose of configuring firewalls for network protection?

<p>To block unauthorized traffic (D)</p> Signup and view all the answers

What is the 3-2-1 backup rule?

<p>3 copies of data, 2 different media, 1 copy offsite (D)</p> Signup and view all the answers

In the context of disaster recovery, which procedure involves using recent backups to restore lost or damaged files after a virus infection?

<p>Use Backup Data (A)</p> Signup and view all the answers

What is the purpose of maintaining different versions of important files in a data protection strategy?

<p>To prevent overwriting of clean data by malware-infected versions (A)</p> Signup and view all the answers

In an incident response plan, what is the objective of 'identification and containment'?

<p>To detect and isolate infected systems to prevent the virus from spreading (A)</p> Signup and view all the answers

What is the purpose of performing regular audits and testing of backup and disaster recovery plans?

<p>To ensure they work effectively when needed (C)</p> Signup and view all the answers

Which action is advised against when dealing with a ransomware attack?

<p>Paying the ransom (B)</p> Signup and view all the answers

In the context of an operating system (OS), what is the primary role of process management?

<p>Controlling and scheduling execution of processes (A)</p> Signup and view all the answers

What is the function of 'virtual memory' in an operating system?

<p>To simulate additional RAM using disk space. (B)</p> Signup and view all the answers

Which component of an operating system controls access to files and directories, ensuring that only authorized users can access sensitive information?

<p>File Permissions (B)</p> Signup and view all the answers

Which type of operating system is designed to manage multiple computers working together as a unified system?

<p>Distributed Operating System (B)</p> Signup and view all the answers

What is the purpose of Standard Operating Procedures (SOPs) for personal computers (PCs)?

<p>To ensure PCs are operated efficiently and securely (A)</p> Signup and view all the answers

Which activity is part of the 'Daily Operation Procedures' in PC maintenance?

<p>Defining proper login/logout procedures (D)</p> Signup and view all the answers

Which of the following actions falls under 'Maintenance & Support' procedures for PCs?

<p>Defining the process for regularly updating operating systems (D)</p> Signup and view all the answers

In the context of PC troubleshooting, what does 'Error Logs' refer to?

<p>Records that help users access and take action on error messages (C)</p> Signup and view all the answers

What is a key element of security maintenance for a modern computer?

<p>Using strong, unique passwords for all accounts (C)</p> Signup and view all the answers

Regarding system cleanup, what might affect HDD but not SSD performance?

<p>Defragmentation (C)</p> Signup and view all the answers

In the context of maintaining a modern computer, what is the purpose of the 'Resource Management' process?

<p>To keep an eye on system resources and stop resource-hogging processes (C)</p> Signup and view all the answers

Which of the following tools can help manage projects, tasks, and deadlines in a more organized way, fostering collaboration and efficiency across teams?

<p>Trello (D)</p> Signup and view all the answers

Which type of tool is useful for vulnerability scanning, threat detection, and security monitoring?

<p>Tenable (C)</p> Signup and view all the answers

Which safety policy involves ensuring that computer equipment is placed in a well-ventilated area?

<p>Ventilation (A)</p> Signup and view all the answers

What is the purpose of using surge protectors and uninterruptible power supplies (UPS)?

<p>Safeguard against electrical surges or power outages (C)</p> Signup and view all the answers

Why is it important to use antistatic wrist straps and mats when handling computer components?

<p>To prevent electrostatic discharge (ESD) (C)</p> Signup and view all the answers

What is the recommended action to prevent file corruption or hardware damage caused by improper shutdowns?

<p>Always use the operating system's shutdown procedure (D)</p> Signup and view all the answers

What is the purpose of setting up system restore points or using system imaging software?

<p>Allows you to quickly revert your system to a previous stable state if issues arise (A)</p> Signup and view all the answers

What is the first step in troubleshooting a computer problem?

<p>Identify the problem (A)</p> Signup and view all the answers

What should you consider when troubleshooting a network connection issue?

<p>Check if network devices are working (A)</p> Signup and view all the answers

Which solution is NOT suggested for slow performance in Windows?

<p>Update to newer Windows (C)</p> Signup and view all the answers

What is a potential solution for addressing Windows Update problems, like updates failing to install?

<p>Use the Windows Update Troubleshooter (A)</p> Signup and view all the answers

In resolving Windows operating system problems, which action is recommended after discovering a recent update might have caused the problem?

<p>Uninstall the update (C)</p> Signup and view all the answers

Which of the following is a driver update tool from the provided text?

<p>Driver Booster (A)</p> Signup and view all the answers

Flashcards

PC Virus

Malicious software that attaches to legitimate files, spreading to other programs and systems.

File Infector Viruses

Attach to executable files and spread when the files are executed.

Macro Viruses

Target macro scripts in applications like Microsoft Office, affecting documents and spreadsheets.

Boot Sector Viruses

Infect the master boot record (MBR) of a hard drive, making it difficult to boot the system.

Signup and view all the flashcards

Polymorphic Viruses

Change their code every time they infect a new file, making them harder to detect.

Signup and view all the flashcards

Resident Viruses

Embed themselves in the computer's memory and can operate without needing an executable file.

Signup and view all the flashcards

Non-Resident Viruses

Do not reside in the system memory and must be triggered by the user's actions.

Signup and view all the flashcards

PC Disaster

Any catastrophic event that causes significant damage to a computer or data system.

Signup and view all the flashcards

Hardware Failures

Hard drive crashes, motherboard damage, or power supply issues.

Signup and view all the flashcards

Software Failures

Corruption of the operating system, application crashes, or the impact of malware.

Signup and view all the flashcards

Data Loss

Accidental deletion, ransomware attacks, or system failures leading to the loss of important files.

Signup and view all the flashcards

Cyberattacks

Hacking, phishing, or Distributed Denial of Service (DDoS) attacks that disable or compromise a system.

Signup and view all the flashcards

Natural Disasters

Events like floods, fires, or earthquakes that damage physical equipment.

Signup and view all the flashcards

Regular Backups

Perform routine backups of important data to external drives or cloud services.

Signup and view all the flashcards

Redundancy

Use multiple devices or cloud-based storage for critical data.

Signup and view all the flashcards

Disaster Recovery Plan (DRP)

Implement a well-documented plan detailing the steps to take during a disaster.

Signup and view all the flashcards

Antivirus and Surge Protection

Protect systems from cyber threats and malicious attacks and use surge protectors to safeguard against electrical issues.

Signup and view all the flashcards

Cloud Backups

Services like Google Drive, OneDrive, and Dropbox store data off-site, ensuring it's safe in case of hardware failure.

Signup and view all the flashcards

External Hard Drives

Regularly backing up data to physical drives (e.g., HDDs or SSDs) offers local protection.

Signup and view all the flashcards

Automated Backup Software

Tools like Acronis, Macrium Reflect, and Windows File History can automate backups to external drives or cloud storage.

Signup and view all the flashcards

Full Disk Encryption (FDE)

Tools like BitLocker (Windows) or FileVault (Mac) encrypt the entire disk, protecting data from unauthorized access.

Signup and view all the flashcards

File-level Encryption

Encrypt individual sensitive files using tools like VeraCrypt or AxCrypt for added security.

Signup and view all the flashcards

Anti-malware / Antivirus

Protecting the system from viruses, ransomware, and malware ensures that data remains intact.

Signup and view all the flashcards

System Restore

Windows provides built-in system restore points, allowing you to revert the system to an earlier state in case of issues.

Signup and view all the flashcards

Disk Imaging

Tools like Clonezilla or Acronis True Image create complete system images, making it easy to restore the entire PC.

Signup and view all the flashcards

RAID

A RAID setup (e.g., RAID 1 for mirroring) can provide redundancy for critical data by duplicating it across multiple drives.

Signup and view all the flashcards

Network Attached Storage (NAS)

A NAS device can offer centralized storage with built-in redundancy, acting as a backup solution for multiple PCs.

Signup and view all the flashcards

Data Recovery Tools

Data recovery software can help retrieve deleted or corrupted files.

Signup and view all the flashcards

Documented Strategy

Having a clear and practiced recovery plan ensures that if data is lost, there is a step-by-step procedure.

Signup and view all the flashcards

Secure Data Disposal

Securely erase data using tools like DBAN to prevent unauthorized data recovery.

Signup and view all the flashcards

Data Corruption or Deletion

Viruses may alter or destroy data files, making them unusable or unrecoverable.

Signup and view all the flashcards

System Crashes

Viruses can corrupt operating systems or critical software, leading to crashes or unresponsiveness.

Signup and view all the flashcards

Ransomware

A type of malware that encrypts data and demands payment for its release.

Signup and view all the flashcards

Spyware/Keyloggers

These can steal sensitive information such as passwords, financial data, or intellectual property.

Signup and view all the flashcards

Spread Across Networks

Some viruses propagate through email, networks, or devices, compromising multiple systems.

Signup and view all the flashcards

Install and Regularly Update Antivirus Programs

Use reputable antivirus solutions to detect and block viruses in real-time.

Signup and view all the flashcards

Regular Scans

Schedule periodic scans to identify any potential malware that might have bypassed the initial defense.

Signup and view all the flashcards

Network Protection

Configure firewalls to block unauthorized inbound and outbound traffic to reduce malware risk

Signup and view all the flashcards

Study Notes

Topic 6 - Viruses and Disasters - Data Protection and Recovery

  • PC viruses and disasters pertain to damaging software and significant events impacting computer systems, networks, and data.

PC Viruses

  • It is a type of malicious software (malware) that links to a valid program or file and spreads to other files, programs, or systems.
  • System failures, data compromise, or unauthorized access can occur when the infected program is used, the virus is run.

Types of PC Viruses

  • File Infector Viruses: These attach to executable files. These can spread when these files run.
  • Macro Viruses: Affect documents and spreadsheets by targeting macro scripts. Targets applications like Microsoft Office.
  • Boot Sector Viruses: These infect Master Boot Record (MBR) of a hard disk. This can make it difficult when starting the system.
  • Polymorphic Viruses: Virus changes code each new file infection, so it is harder to detect with antivirus software.
  • Resident Viruses: These reside in the computer's memory, so they continue without needing an executable file.
  • Non-Resident Viruses: User actions trigger, they don't reside in system memory.

Virus Symptoms

  • System performs slower
  • Unexpected crashes or restarts
  • Unexplained disk space usage
  • Disruptive pop-ups or error messages
  • Corrupted files or lost data

Protection

  • Use updated antivirus software
  • Operating system and software must stay patched
  • Avoid suspicious downloads or opening unknown email attachments
  • Regularly back up important computer data.

PC Disasters

  • Any destructive event causing considerable damage to a computer or data system. Could be software issues, hardware failure, or external factors.

Types of PC Disasters

  • Hardware Failures: Motherboard damage, hard drive crashes, or power supply problems
  • Software Failures: Malware impact, application crashes, or OS corruption
  • Data Loss: System failures leading to lost files, ransomware corruption, or accidental deletion
  • Cyberattacks: DDoS attacks, hacking, or phishing that disable or compromise a system
  • Natural Disasters: Earthquakes, floods or fires that damage physical equipment

Disaster Recovery Strategies

  • Perform regular backups of data to cloud services or external drives
  • Use multiple devices or cloud-based storage for critical data for redundancy
  • Implement a Disaster Recovery Plan (DRP) that details the steps to take during a disaster.
  • Employ antivirus and a firewall to protect systems from cyber threats and malware
  • Utilize surge protectors to safeguard against electrical issues

Key Strategies

  • PC data protection and recovery involves protecting data stored on personal computers to ensure retrieval in possible data loss or corruption.

Backup Solutions

  • Cloud Backups: Services like Google Drive, OneDrive, and Dropbox offer off-site data storage to keep everything safe if hardware fails.
  • External Hard Drives: Use physical drives such as HDDs or SSDs to back up data regularly and have local protection.
  • Automated Backup Software: Tools like Acronis, Macrium Reflect, or Windows File History automate backups to external drives or the cloud.

Data Encryption

  • Full Disk Encryption (FDE): Encrypt the entire disk with BitLocker (Windows) or FileVault (Mac). Thus protecting all data from unauthorized access.
  • File-level Encryption: For added data security, encrypt individual files using tools like VeraCrypt or AxCrypt

Anti-malware and Antivirus Software

  • Ensure that system data remains intact by protecting against viruses, ransomware, and malware.
  • Popular options include Norton, Bitdefender, and Windows Defender.

System Restore and Backup Images

  • System Restore: Revert a system back to an earlier state in case of issues, through Windows' built-in system.
  • Disk Imaging: Restore the entire PC with files, apps, and OS via tools like Clonezilla or Acronis True Image

Redundancy and RAID

  • RAID (Redundant Array of Independent Disks): Back up data across multiple drives by duplicating it. Set up RAID (e.g., RAID 1), so ensure redundancy for critical data
  • Network Attached Storage (NAS): Act as a backup solution for numerous PCs and provide centralized storage with built-in redundancy

Data Recovery Tools

  • Recover deleted or corrupted files with data recovery software like EaseUS Data Recovery, Recuva, or Stellar Data Recovery.

Disaster Recovery Plan

  • Having a clear, practiced recovery plan to restore data and services in the event of data loss is essential.

Secure Data Disposal

  • Prevent unauthorized data recovery by securely erase data by using tools like DBAN (Darik's Boot and Nuke) when disposing of old PCs.

Understanding Virus Risks

  • Essential to proper data protection and recovery due to a variety of damages and system failures posed by malicious software.

Risks

  • Data Corruption or Deletion: Viruses cause data files to be altered or destroyed, making them unrecoverable and unusable.
  • System Crashes: Viruses cause operating systems or crucial software to crash, leading to unresponsiveness.
  • Ransomeware: Malware encrypts data and demands that a payment be made for its release

Virus Risks Continued

  • Spyware/Keyloggers: Passwords or intellectual property to be stolen
  • Spread Across Networks: Multiple systems to be compromised via email, devices, or networks

Data Protection Strategies

  • Use the following strategies for protection from disasters and the preventing of data loss.

Antivirus Software

  • Use reputable antivirus solutions to detect and block viruses as they happen
  • Schedule periodic scans to identify any malware that might have bypassed the initial defense

Firewalls

  • Protect networks by blocking unauthorized inbound and outbound traffic. Reduces malware infections from malicious websites and network attacks through settings

Patching and Updates

  • Operating System and Software: Many viruses take advantage of vulnerabilities. So ensure that all systems are updated with the latest updates.

Backup Solutions

  • Make regular backups of data to protect from malware or corrupting viruses.
  • Encrypted Backups: To cloud or external storage devices using the 3-2-1 backup rule (3 copies of data, 2 different media, 1 offsite)
  • Automated Backups: Set up automated backup systems to ensure that backups are regularly

Endpoint Protection

  • Using multi-factor authentication and strong device security is essential to protect all endpoint devices (laptops, PCs, or mobile devices)

Disaster Recovery Planning

  • Take certain steps including outline key elements in the event of a system failure, or a cyberattack.

Data Recovery Procedures

  • Leverage cloud storage and restore data from recent backups. Isolate backup data in a secure location in case of a virus infection or data corruption.

Additional Data Recovery Measures

  • To prevent overwriting clean data, keep different copies of important files via version control

Disaster Recovery Tools

  • System Restore Points: Revert to the system before an infection has started to use with Windows or features with other OS
  • Virtualized Recovery Environments: Use virtual machines (VMs) for critical applications for faster recovery after an attack

Incident Response Plan

  • Communication Plan: Have a clear one to inform clients, employess, or clients during a disaster event
  • Eradication: After containment, remove the virus using appropriate malware removal tools by restoring backups
  • Identification and Containment: Prevent further spread of a virus across a network by detecting and isolating infected systems

Long Term Data Protection - Best Practices

  • Test backup and disaster recovery plans regularly to make sure they work when needed.
  • Regularly check, test and listen to employees.
  • Employee Training: Security awareness towards secure passwords, avoiding suspicious downloads, reporting phishing emails and threats and how to avoid this happening again
  • Data Encryption: Protect private data from unauthorized access in the event of a breach by encrypting it

Ransomware Protection and Recovery

  • Data Segmentation: Decrease damage by segregating critical data from normal files
  • Network isolation is key to preventing the virus from spreading by isolating critical systems from the rest of the network
  • If attacked it's advised not to pay the ransom because it promotes attacks with no data restoration guarantee

Introduction to Operating Systems

  • Runs the computer hardware resources, enabling software apps to run properly

Core Functions and Components

  • Ensures processes are allocated Central Processing Unit time, handles execution, and handles processing.
  • Memory Management: Handles memory allocation to programs, managing both physical and virtual memory and tracks memory use.
  • System Performance and Resource Allocation: OS monitors system performance and adjusts to optimize resource utilization, making sure everything runs efficiently

File System Management

  • System protection (FAT, NTFS, ext4) to secure files and direct them in organized direction.

File Permissions

  • Controls file access making sure sensitive information is shared only to authorized users.

Device Management

  • Controlling devices such hardware in the computer such printer, display screens, etc.

Network and access Control

  • Data and resources are protected from malware and unauthorized access. OS ensures only authorized users can enter the system through verification.

User Interface

  • Graphical or Command-line interface allowing users to interact with software.

Encryption and Firewalls

  • Security features include encryption and firewalls.

Networking

  • Modern OS enable computers to communicate locally or from the internet through protocols like Transmission Control Protocol/Internet Protocol for communication.

Types of Operating Systems

  • Batch OS: processes tasks without user interaction
  • Time-sharing OS: shares resources so all users get access.
  • Real-Time OS Provides quick responses to outside events, which occurs in embedded systems
  • Distributed OS: Multiple computers working together as a unified system
  • Mobile Operationg System: ex., Android, iOS used for designed mobile devices
  • Windows (user-friendly for desktops and workstations)
  • macOS (proprietary for Apple laptops and desktops)
  • Linux (flexible and widely used open-source)
  • Android and iOS

Standard Operating and Maintenance Procedures

  • PC Standard SOPs help ensure personal PCs work safely, efficiently, and in good order.

System Setup & Configuration

  • Initial Setup: Document the software/hardware installation process
  • Network Configuration: Set up network settings, including connecting to Wi-Fi or VPN
  • Security Setup: Implement security policies, including device access controls, password policies, firewalls, and antivirus software.

Daily Operation Procedures

  • Login & User Access: Password management, multi-factor authentication
  • Application Usage: List and manage all software being used and the guidelines to install
  • Data Backup: Outline all procedures for daily backups
  • System Monitoring: Check system health indicators and set up logging systems

Maintenance and Support

  • Software Updates: Regularly update system software, drivers, and security patches
  • Hardware Maintenance: Clean hardware, check for wear/tear
  • Security Scans: Run vulnerability scans with malware and antivirus software
  • System Performance Optimization: Clear unnecessary files and defragment hard drives for HDDs.

Troubleshooting

  • Provide a list of system crashes and provide the steps to handle
  • Error Logs: Take action on error logs or contact support if support is required
  • System Restore: Restore to an earlier state with backup recovery

User Education and Best Practices

  • Power Management: Control power settings to increase battery span
  • File Management: Make sure data is secure with organized files
  • Security Best Practices: Avoid phishing, downloads or threats

End of Life and Device Disposal

  • Data Wiping: Erase data prior to transferring or disposing devices
  • Hardware Recycling: How recyclable hardware components work
  • Device Decommissioning: List the steps for retiring older devices.

Documentation and Reporting

  • Change Management: Provide procedures for software/hardware grades
  • Performance Reports: Guidelines for monitoring and reviewing system health.
  • Incident Reporting: How to report incidents.

Topic 7 - Maintaining the Modern Computer

  • Regular tasks to help ensure optimal performance, security, and longevity

Regular Updates

  • Operating system updates like the latest Mac or Linux security patches
  • Critical components like graphics cards or Storage Devices
  • Antivirus systems, productivity tools and browsers should all update together

Security Maintenance

  • Antivirus/Antimalware software: keep your software updated and do regular scans to detect remove threats
  • Firewall: ensure it is enabled to protect against network access
  • Password management: unique password manager for security
  • Encryption: use drive encryption to secure data

System Clean Up

  • Clean disk of unnecessary files and browser caches to maintain space on the hard drive.
  • Keep from using unnecessary applications to make the load faster
  • Avoid defragmentation

Backup and Recovery

  • Local external drives with a cloud platform for backup when failures occur
  • system restore readily available

Hardware Maintenance

  • Clean the computer from harmful dust buildup
  • consider cooling pads and monitor the heat to avoid damage

System Performance

  • Monitor battery health
  • Disable unnecessary programs
  • Resource management

Monitor system

  • For unusual activities that happen

Network Maintenance

  • Wi-Fi connections
  • Network security.

Collaboration tools

  • Slack helps improve communication and collaboration in remote workplaces

Cybersecurity

  • Well known framework used for managing cybersecurity risks

Business Intelligence and Analytics Tools

  • Power BI and Tableau are used for data analyzing and operational movements

Automation Tools

  • Helps time management

Safety considerations and basic policies when working with computer equipement

Physical Safety

  • Ergonomics helps maintain posture and monitors positioning at the right head level
  • Cable management secures and manages cables

Electrical Safety

  • Avoid overloading circuits
  • Use certified equipment with the right charger

Workplace policies

  • The use of personal devices with a secure network
  • Compliance with regulations

8- Troubleshooting a computer

  • Troubleshoot a computer which prevents the systems from working correctly

Identify the problem

  • Look for slow performance with errors or system crashes.
  • Get the correct detail on what issue happened and screen errors.

Isolate the cause

  • Determine if related to hardware or software
  • Consider environmental factors

Test Basic Solutions

  • Reboot the computer to get rid of glitches or ensure proper cable connection or high CPU

Performance Diagnostic Tests

  • Manufacturers provide their own code diagnostic tools

Disaster Recovery Plan

  • Back up and have a recovery method step by step

Install Windows

  • Power on and enter the BIOS Key to start up
  • Identify problems and understand its impacts and set measurable goals.

Steps to Resolve a computer

  • Gather requirements
  • Establish constraints
  • Understand the impacts in which its one of its systems effects
  • 5 Set Goals And Objectives

Troubleshooting techniques

  • Essential skill in IT through systematic approach helps identifying a website if widespread or not

2. Establish a Theory of Probable Cause

  • Hypothesis: Gather information Theory and Logical Steps:
  • Test the theory which helps with the right connection to determine the correct cause
  • Eliminate possibilities and see if it effects anything

Actioning the plan

  • Create a plan towards the cause

Common encountered problems while using Windows

  • performance is too slow or there are security issues or apps are crashing

Strategy for resolving Windows operating system problems

  • Symptom Checks
  • Error Messages Basic Troubleshooting Steps:
  • Reboot the computer
  • Check for updates

3. Check for MAware

  • Check Disk Health
  • Check System Resources
  • Install drivers

System tools to restore and optimize performance

  • Windows Built-in Disk
  • SFC Checks.

Memory and CPU Usage Monitoring

  • Monitor the usage

6. Startup optimization

  • Task manager
  • 7 Registry Cleaners

Tool to Store The System Registry

  • Restore Windows

8 Reccura- Store to get deleted registry from the backup that may of been a failure

  • General tips
  • Power connection issues or paper jams errors

8 Checks for Problems

Troubleshooting Problems

  • How to fix or identify

Check compatibility mode

Check system resources

  • Check autoexec.bat

#Ensure all new updates drivers

Basics of Electrical Energy

Power Supply Unit

1- Power the device

  • Ac-DC convertor 2- Transformer
  • Power management to save energy 3-Safety Concerns

TOC 9- OS Fundamentals

OperatingSystem:

  • Software that manages computer hardware and software Functions:
  • Process mgt
  • Memory mgmt
  • FileSystem mgmt
  • User Interface

Types of Os

  • Batch- no user interaction
  • Mobile used in phone's Common OS
  • macOS
  • Linux

Roles of OS played in Computer Operations

  • Process mgt handling execution & synchronization
  • Memory mgt prevent conflicts in storage
  • Device mgt provides hardware drivers & coordinates access Security and access control protects from unauthorized intrusions.

Primary Command Prompt Apps

  • System Info and Configuration
  • System info Netstat
  • File and Directory Operations List files Renames files System settings for different process.

7. Network and Connectivity Tools

  • Netsh Configures network interfaces firewalls etc
  • Path display

Functions of Config.sys to automate

  • It includes device configuration
  • Memory settings

Autoexec

  • What program to apply setting

Introducing and Installing Microsofts

  • Follow Installation process and prepare steps Check windows version Upgrade.

Run the application

  • Post BIOS/UEFI initializations.

Editing registry

  • Ensure to back up before changing

Windows Environment - Check OS

  • System Requirements
  • Processor: 1GHz or faster w/ 2 Cores
  • RAM: at least 4GB
  • Display: 99" HD Resolution

Functions of the control registry panel:

  • The Windows Registry is a hierarchical database used by the Windows operating system.

Key functions

  • Storage for System and Configuration:
  • Customization and Configuration:
  • Troubleshooting and Repair:

Adding New Hardware

-System and Security

  • Device Management in Safety
  • Connect USB

Repairing a Computer

Preparation and Safety

  • Preparation and Safety
  • Symptom Observation

Check Led Indicators

  • Check for lights from the motherboard which can help with codes depending on issues

4-Hardware Diagnostics

Isolate the Components

Performance Management

• Monitor performance - run system with proper cooling • Windows Firewall

Principles behind Updating a Computer

• Energy Efficiency

List to consider what your expectations are for upgrading a system

Performance improvements

  • Hardware upgrade limits
  • Cost

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

PC 832 Practice Quiz Flashcards
67 questions
PC Parts Diagram (Basic)
8 questions

PC Parts Diagram (Basic)

LionheartedBrazilNutTree avatar
LionheartedBrazilNutTree
Use Quizgecko on...
Browser
Browser