About David Scharton
Stories
Honors
Computers - #7 - Computer safety / surges / backup / viruses

Stage Seven of Computers - Explain how each of the following elements helps protect a computer system. Why is computer safety so important?

Remember that you should have a notepad or printout of your worksheet. The worksheet is located at the lower part of your Computer Screen. If you do not have a printout then take notes so you can put the information needed in the boxes.

  • Backup of personal files
    • An important fact about modern computing is that computers eventually fail. If the hard drive on a computer fails, it may be difficult or impossible to recover the data that is stored on it. Forward-thinking computer users keep all of their important personal files backed up on external media so that when the computer fails, they still have their data
  • Whole system image backup
    • It is not nearly as important to back up program files, because the program can be re-installed when the computer is repaired or replaced. However, re-installing every program that a computer user needs can be a time-consuming and frustrating process. If the whole system is backed up, it can be restored in short order.
  • Surge protection
    • The A/C power that feeds most businesses and households is subject to all kinds of disturbances that can disrupt or damage a computer. Lightning strikes can induce large currents in powerlines, and these translate into "surge" voltages. The increased voltage can easily damage a computer. Most often, this affects its power supply module. A surge protector is designed to absorb these voltage surges, preventing damage to the computer.
  • Internet safety hardware and software
    • An unfortunate fact of modern life is that the world is filled with evil (or immature) people who think it great fun to destroy data on a stranger's computer. Some of these people are capable of "hacking" their way into computer systems and altering files - even taking complete control of the computer. The computer can then be used to launch attacks against other computers. Sometimes this is done in order to install malicious software designed to analyze keystrokes. When the program detects that someone is engaged in online banking activities or ordering merchandise with a credit card, it springs into action, gathering account numbers and passwords which are then passed to the programmer. Once hacking was confined to a small community of immature, thoughtless programmers looking for a thrill, but it is becoming more and more an activity conducted by organized crime and rouge governments.
      Firewalls and antivirus software are designed to combat these operations, but in order to be effective, they must be installed and constantly updated.

What were the advantages and differences between the various safety programs and procedures?

Please listen to the Video for the needed information for step 7 on worksheet.

 
 

 


About Me | Contact Me | Site Map
Property of Mr. D - 2023