Free Essay

How to Maintain Your Computer

In: Computers and Technology

Submitted By DOM1
Words 526
Pages 3
Properly Maintain Your Computer 1

How to Properly Maintain Your Computer

Properly Maintain Your Computer 2

With technology on the rise, computers have taken over and become a necessity in our daily lives. With high speed Internet we have many uses for our computers such as looking for the best shopping deals, gathering news from around the world, watching videos or exploring the web. For some people their careers depend on a computer. Graphic design artists use illustrator and Photoshop to come up with designs for a company logo or website. All these uses put wear and tear on a computer. Like a car, your computer needs to be properly cared for and looked after. There are a few simple steps one can follow to maintain a well functioning computer.

Before going above and beyond and taking your computer fully apart you might want to first make sure you have a good anti-virus software installed onto your computer. It is very important that you have this because malware can be very harmful. Also you don’t want to let your hard drive work to hard; your computer is an expensive tool. Clearing out unused files and programs will help take some load off. This is called disk clean up and should be done monthly. These files, like all the rest take up space, which overworks your computer. With constant usage it produces a lot wear and tear. Take a look at your Windows registry. Is it clogged with a lot of junk? Unclogging it can really help the performance of your computer.

Next you should go through all your files you have stored up. Over time, your files from downloading music, movies, and programs can become fragmented. When this happens it makes your computer work harder to start the file up, which slows your computer down. You can defragment your computer by running the disk defragmenter. This will locate all your files that have been shuffled around and will reorganize your files in an orderly manner. Since you’re in the process of deleting and removing, temporary files like caches and cookies from Internet browsers should be deleted. Over time these files become stored and will start to slow down your computer. Deleting files from time to time can be a great way to keep your computer maintained and in good working condition.

While keeping your computer in tiptop shape on the outside is a great idea to do, all the most important maintenance for a computer is mainly software oriented. It is nice to do an overhaul and clean every inch of your computer; but for a device like a home computer, you rarely have too. Updates and upgrades like adding more memory, video cards and even a surge cable can be installed or connected to your computer for better performance. Finally just simply turning off your computer every once in awhile is always a good thing. All these steps and suggestions can prolong the life of your computer. It’s like a human eating their veggies to keep healthy, but for a computer. It keeps it strong and happy with less stress or over exertion.

Similar Documents

Premium Essay

How to Properly Maintain a Computer

...Palmer AC1305985 EN130.1.1 English Comp II Assignment # 4 September 27, 2013 How to properly maintain a personal computer In order for a personal computer to stay fast and be reliable, it must be properly maintained. A computer can stay in good condition if it is well taken care of. Common sense and the knowhow can keep your computer running smoothly for many years. We know dust and bacteria are things we cannot avoid, for this reason we need to constantly dust our homes. Well it goes the same for a computer. Dusting the mouse, keyboard, and the screen keeps your computer running faster. Every few months it’s also good to open the casing of the computer and remove any dust particles inside to keep the cooling fan functioning properly. The hard drive is main part of a PC. It is where all the files are stored; therefore, cleaning the hard drive and defragmenting it is necessary to keep the computer from slowing down and freezing up. To do this process, just go into your computers programs, find accessories and click to system tools. Go to defragment and start the process. This should be done every two to three months to keep your computer in top shape. Be sure you have good antivirus software installed in your computer and make sure it is always updated. Viruses are among one of the main causes of computer failure. You should do a complete virus scan on your computer regularly. Also a good way to avoid viruses is to avoid visiting websites......

Words: 557 - Pages: 3

Premium Essay

Individual Assignment

...the world today, there are many companies and homes who own computers. Computers that store personal information, which can be stolen by hackers. It is important to install anti-virus software and ensure their personal computers are secured with passwords. In the military, they have top security firewalls, with these security measures hackers are not able to transfer personal information. Gene Spafford states, “The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards.” Spafford,G. (2012). Keeping your system updated increases the protection of important information, although it is hard to maintain a track record of updates. There are many ways to ensure the disposal of personal data is performed properly, one way to dispose data is to completely erase the information in the system and hard drive. Data storage depends on the current space of your hard drive, but it is important for security measures to be installed and updated frequently. In a computer, there is a control panel to control the users of your computer system, setting up a password for users to specifically view certain websites and also a folder in which only the authorized account holder may access. Identity theft is the most common thing that happens when information is stored without ensuring the security protection on computers are maintained and updated. As we all know your system will have many problems, there will be people......

Words: 591 - Pages: 3

Premium Essay

Individual Assignment

...the world today, there are many companies and homes who own computers. Computers that store personal information, which can be stolen by hackers. It is important to install anti-virus software and ensure their personal computers are secured with passwords. In the military, they have top security firewalls, with these security measures hackers are not able to transfer personal information. Gene Spafford states, “The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards.” Spafford,G. (2012). Keeping your system updated increases the protection of important information, although it is hard to maintain a track record of updates. There are many ways to ensure the disposal of personal data is performed properly, one way to dispose data is to completely erase the information in the system and hard drive. Data storage depends on the current space of your hard drive, but it is important for security measures to be installed and updated frequently. In a computer, there is a control panel to control the users of your computer system, setting up a password for users to specifically view certain websites and also a folder in which only the authorized account holder may access. Identity theft is the most common thing that happens when information is stored without ensuring the security protection on computers are maintained and updated. As we all know your system will have many problems, there will be people out......

Words: 590 - Pages: 3

Premium Essay

Uuyv

...C0177, C0186, C0184, C0185, | Unit title: Computer Systems | Learner name: | Date issued: W/C 26th January 2016 | Assessor name: Mark Dollan | Completion date: W/E 1st Feb 2016 | Written by: M Dollan | Submitted on: | Verified by: Karl Indans | Assignment title: System Software & Configuration (ref: L3-CS02) | In this assessment you will have opportunities to provide evidence against the following criteria. Indicate the page numbers where the evidence can be found also PPD (Personal and Professional Development) and EE | Grading Criteria | Criteria ref | To achieve the criteria the evidence must show that the student is able to: | Task | Evidence | Page | P2 | Explain the purpose of operating systems | 1 | Written | | P3 | Explain the purpose of different software utilities | 3 | Written | | P6 | Configure a computer system to meet user needs | 5 | Practical | | P7 | Test a configured computer system for functionality | 6 | Practical | | M1 | Compare the features and functions of different operating systems | 2 | Written | | M3 | Evaluate the performance of a computer system | 7 | Written | | D1 | Explain how software utilities can improve the performance of computer systems | 4 | Written | | This is an official course assessment and you must make a good attempt at all criteria available, you must also make sure that you meet the deadline stated and hand in this assessment brief with your completed assessment Learning......

Words: 2093 - Pages: 9

Free Essay

Crimes in Cyber Café and Its Rules and Ragulation, Perspective Bangldesh

...2012 JAGANNATH UNIVERSITY DEPARTMENT OF LAW Shakil Ahmed 3rd Batch [CRIMES IN CYBER CAFÉ AND ITS RULES AND RAGULATION] The study investigates the cyber café rules around Bangladesh: law and reality. It evaluates whether the guideline for cyber café owners’ and users are properly maintained or not. This study also reveal how crime occurred on the cyber café and why and it also investigate whether the guidelines are sufficient or not. At last this study recommend some point by which we can maintain our cyber café institution properly and by how we can reduce crime occurred on the cyber café. Index Abstract ………………………………………………………………………...………. 2 2 2 2 2 2 2 2 3 5 5 5 5 6 7 8 8 9 13 14 17 17 19 1. Introductory part ………………………………………………………….……..…. 1.1 Aim of the study ……………………………………………….……….... 1.2 Object of the study ……………………………………………...……….. 1.3 Methodology ……………………………………………………….......... 2. Definition ………………………………………………………………….….......… 2.1 Cyber café ……………………………………………………….……..... 2.2 Necessity ……………………………………………………………….... 3. Amount of cyber café around Bangladesh …………………………………..………. 4. Law regarding cyber café ……………………………………………………....…… 4.1 BTRC ………………………………………………………………...….. 4.2 CCOAB …………………………………………………………….…..... 4.3 Guidelines ……………………………………………………….…..….... 4.4 Law and its Reality……………………………………………………...... 4.4.1 Reality in Dhaka………………………………………....… 4.4.2 Reality on other area ……………………………………..... 5. Crime in cyber café …………………………………………………………............. 5.1......

Words: 6680 - Pages: 27

Free Essay

Technical English-Ii

...Write a letter calling for Quotation for some electronic equipment for your college electronics laboratory. Write to M/S Electro products Ltd., R.G.Road, Chennai – 33. Assume that you are the H.O.D of ECE department in NIT - Chennai-16 National institute of technology Chennai-16 Date…………. To M/S Electro products Ltd., R.G.Road, Chennai – 33. Dear Sir, Sub: calling for quotation – reg. We require the following items for our concern before 16-05-2013. The details of our requirement are given below. S.No. | Items | Quantity | 1. | Function generator | 2 Nos | 2. | Multi meter | 2 Nos | 3. | IC Chips LM 339 | 3 Nos | 4. | IC Chips LM 7400 | 3 Nos | 5. | Diode IN 4007 | 20 Nos | We request you to quote your lowest price with complete details and delivery date. If your rates are competitive we would place an order for the same. Thanking you Yours faithfully, (k.subash) Prof. & Head of ECE Calling for quotation Sample 2 Assume yourself to be the purchase officer Royal Foundations Pvt. Ltd., Write a letter calling for Quotation to buy certain computer peripherals from Alpha technologies Pvt. Ltd., 25,Gandhi Street, Chennai. 25 Royal Foundations Pvt. Ltd. Chennai-25 Date…………. To Alpha technologies Pvt. Ltd., 25,Gandhi Street, Chennai. 25 Dear Sir, Sub: calling quotation for computer peripherals – reg. We require the following items for our concern......

Words: 1752 - Pages: 8

Premium Essay

Unbit 2 Pe

...Subsidiary Diploma | Unit number and title | Unit 2 – Computer Systems | Assignment number and title | 1 – Components of a computer system | Start date | 21/9/15 | Hand in date | 1/11/15 | Assessor | WMG | Scenario You are a junior technician in a small business and you are responsible for the IT. The business has 10 computers in all comprised of desktop computers and a server. There are six employees based in the Head Office and your company have taken on a junior employee called Jamil who will be expected to help you out perform basic administrative tasks in the office as well as maintain the ICT systems. Task 1 – Computer hardware components You need to make sure Jamil has a reference guide for the machines in the business to help him understand the environment he will be working in and in case any components fail. You need to put together a presentation slideshow on internal computer components. a) You need to explain the function of internal hardware components of a computer b) Discuss how the components communicate with one another The components are: * Processor * RAM * Hard drive * Power supply unit * Fan * Heatsink * Motherboard * Graphic card and sound cards * CD/DVD drive This task will allow you to provide evidence for: P1 - Explain the function of computer hardware components Task 2 – Jamil asks for advice Jamil is about to buy a new computer and tablet but wants to understand the......

Words: 737 - Pages: 3

Premium Essay

The Benefits and Uses of Virtual Memory

...paper will discuss the benefits and uses of virtual memory. Programs require memory to start and run on computers. When several jobs are being processed at the same time, the operating system must keep track of how the computer’s memory and make sure there is enough. Computers come with a limited amount of random access memory which is known as RAM. RAM is the main memory on a computer. If a user is running multiple applications at the same time, the RAM on it will not be enough to execute the processes. This is when virtual memory comes in and balances the process. Virtual memory is a memory management technique. Virtual memory is secondary memory that can act as if it were part of the main memory. When the RAM is used up, virtual memory places data by using the hard disk or another disk of some kind for space. The hard disk is much slower then RAM so the more virtual memory used, the slower your computer will run. The computer will look for areas on the RAM that are not in use and copy it to the hard disk to free up space on the RAM. Virtual memory keeps ‘active’ process in the RAM and keeps the ‘inactive’ processes on the address space on the disk. When an ‘inactive’ process is needed, it will bring that process back to the RAM from the disk. This process is running in the background without the user being aware. The disk runs much slower so the more RAM a computer has, the fast it will run. When using multiple or large applications, it is best to have as much......

Words: 788 - Pages: 4

Premium Essay

Club It Part One

...Services A management department uses a computer based system that provides managers with the tools needed to organize, evaluating, and they run their departments more efficiently. They use software that can look at the past, present, andthefuture information. This is calledthe Management Information Service that includes the software to run the databases, the decision support system, and they also have applications that can run the department of the business more efficiently. These systems (management information systems) provide the department employee with the information to run his operations. It also supports the planning, effective resource management; it will enhance customer service, and promote communications. Decision Support Systems Decision Support Systems (DSS) is an interactive computer system that will obtain data from a wide range of sources, for the business purposes. DSS applications are systems that help personal make decisions based on the information pulled from wide range of sources. Company wants to sell his products but needs to know if it is a wise decision for his business. He will then use the DSS from his computer system; it will allow him to determine if he has the......

Words: 978 - Pages: 4

Free Essay

Sec 402 Wk 7 Case Study 2 Developing the Forensics

...SUPPORT@ACTIVITYMODE.COM SEC 402 WK 7 CASE STUDY 2 DEVELOPING THE FORENSICS SEC 402 WK 7 Case Study 2 - Developing the Forensics, Continuity, Incident Management, and Security Training Write a five to seven (5-7) page paper in which you: 1. Consider that Data Security and Policy Assurance methods are important to the overall success of IT and Corporate data security. a. Determine how defined roles of technology, people, and processes are necessary to ensure resource allocation for business continuity. b. Explain how computer security policies and data retention policies help maintain user expectations of levels of business continuity that could be achieved. c. Determine how acceptable use policies, remote access policies, and email policies could help minimize any anti-forensics efforts. Give an example with your response. 2. Suggest at least two (2) models that could be used to ensure business continuity and ensure the integrity of corporate forensic efforts. Describe how these could be implemented. 3. Explain the essentials of defining a digital forensics process and provide two (2) examples on how a forensic recovery and analysis plan could assist in improving the Recovery Time Objective (RTO) as described in the first article. 4. Provide a step-by-step process that could be used to develop and sustain an enterprise continuity process. More Details hidden... Activity Mode aims to provide quality study notes and tutorials to the students of SEC 402 WK......

Words: 1406 - Pages: 6

Premium Essay

It 255

...Assignment 1&2 Enhance an existing it security policy framework Security policy planners must consider and the tasks they must complete to deploy an effective security audit policy in a network that includes computers running Windows 7 or Windows Server 2008 R2. Organizations invest a large portion of their information technology budgets on security applications and services, such as antivirus software, firewalls, and encryption. But no matter how much security hardware or software you deploy, how tightly you control the rights of users, or carefully you configure security permissions on your data, you should not consider the job complete unless you have a well-defined, timely auditing strategy to track the effectiveness of your defenses and identify attempts to circumvent them. To be well defined and timely, an auditing strategy must provide useful tracking data on an organization's most important resources, critical behaviors, and potential risks. In a growing number of organizations, it must also provide absolute proof that IT operations comply with corporate and regulatory requirements. Unfortunately, no organization has unlimited resources to monitor every single resource and activity on a network. If you do not plan well enough, you will likely have gaps in your auditing strategy. However, if you try to audit every resource and activity, you may find yourself with far too much monitoring data, including thousands of benign audit entries that an analyst would......

Words: 1876 - Pages: 8

Premium Essay

Work

...help us to develop and maintain software developments here are some questions that should be asked. 1. Which of your departments would need which of the different kind of software that we have? 2. What is the software that you would need to be distributed to the different departments from question 1? 3. Would you need them to be option or mandatory software updates? 4. Would there be any exceptions to the group that I assign the updates too. In other words is there anyone that you do not want to get the software? 5. Could I get a list of all you users and how many computers that the software updates will affect? 6. How often would you like the software deployed and how often is the systems backed up. 7. What kind of computer virus protection do you have? 8. How often would you like the software to be updated? 9. Do you have anyone that I could add to the administrator list that could help with the Maintenance of the software application? 10. Is there any software that you would like to be removed from your system and what is the name of said software? Hope this helps let me know if I can help you out anymore yours truly Sherry Thornton Dear Mr. Manager I have reviewed you following email and this is what I would do to I would make sure know of your computer have windows XP as a operating system let me know I could update them for you. Also I would use group policies to set it up where the computers that you need updated......

Words: 726 - Pages: 3

Free Essay

How Will Computer Information Systems Fit Into Your Professional Life

..."How will Computer Information Systems fit into your professional life?" 1 "How will Computer Information Systems fit into your professional life?" Nicholas M. Hayes DeVry University 29 May 2015 "How will Computer Information Systems fit into your professional life?" 2 Computer Information Systems' mission is to develop, market, deliver and maintain seamlessly integrated, mission critical public safety software systems that will be continually enhanced to keep current with emerging Windows Technology and protect the agency's investment. To start off with an explanation how Computer Information Systems will fit into my professional life I'd like to discuss the basic concept behind what CIS is. Computer Information Systems program graduates and experts study the applications of technology aiding a variety of organizations while adding value to their offerings. To be able to apply technological efficiency, students and experts learn about multiple subjects. These subjects include but are not limited to ethics, communication, networking, software design, mathematics and systems analysis. I believe that the biggest impact that Computer Information Systems will have on my professional life would be focusing on practical applications of technology as it's used in many jobs and a good skill to have. Computer Information Systems will aid and fit into my professional life by making my life more on the interesting side and keep me up to date with all technological......

Words: 441 - Pages: 2

Premium Essay

Accounts Computers in Acounting

...INTRODUCTION Accountants measure a business entity's income, expenses and changes resources. Back in the day, prior to the widespread use of spread sheet and computer applications, Accountants used journals and ledgers in which they recorded business transactions. Hence the term keeping the books. As computer applications became main stream, this keeping of the books Accountants do, has gradually migrated into computerized spreadsheets. Gradually, Accounting systems dedicated to this function were developed and the term Computerized Accounting was born ADVANTAGES * Faster and efficient in processing of information; * Automatic generation of accounting documents like invoices, cheques and statement of account; * With the larger reductions in the cost of hardware and software and availability of user-friendly accounting software package, it is relatively cheaper like maintaining a manual accounting system; * More timely information can be produced; * No more manual processing of the data- all automatically been posted to the various ledgers/accounts and * Many types of useful reports can be generated for management to make decisions 12.3 NEED AND REQUIREMENTS OF COMPUTERSIED ACCOUNTING The need for computerised accounting arises from advantages of speed, accuracy and lower cost of handling the business transactions. l Numerous Transactions The computerised accounting system is capable of......

Words: 1703 - Pages: 7

Free Essay

Samsung Segmentation and Target Market Paper

...Samsung Segmentation and Target Market Paper Positioning Statement The world has started to take on a healthier lifestyle. Watching what we eat and making sure to incorporate physical activity daily. In order to maintain these numbers many people have started to use technology to record the calories burned as well as monitor their heart rate while working out. Most people have a heart rate monitor and then have to record their information manually to another program in order to keep track of how well they are doing. Samsung has met with this issue by including a Smart watch called the Gear and the Gear Fit in which connects to its Samsung Galaxy 5 and automatically records information from your work out. The company has also included many other features that go along with the use of both its smart phone the Galaxy 5 and its Smart Watch the Gear and Gear Fit. Samsung has cornered the market with this innovative smart watch introducing a new way to stay fit and get healthy and making it easier to maintain records of all of your fitness endeavors. “Introducing Samsung’s first network-connected wearable.** So now you can make and answer calls when your phone isn’t nearby. You can also check texts, emails, updates— even stream and listen to music, right from your wrist.” (Samsung, 2014) Background “At Samsung, we follow a simple business philosophy: to devote our talent and technology to creating superior products and services that contribute to a better global society....

Words: 3181 - Pages: 13