0% found this document useful (0 votes)
24 views16 pages

Intro To Comp Week-4

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views16 pages

Intro To Comp Week-4

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

Course Code and Title: INTRODUCTION TO COMPUTER & OFFICE

PRODUCTIVITY TOOLS (BAEN 4)


Lesson Number: Lesson 4 (Week 4)
Topic: Security and Maintenance

INTRODUCTION:
Modern technology has enabled people to work, earn, and safeguard their
hard-earned money and possessions. Unfortunately, the same advanced technology
makes online crime possible, hence the need for learners to become familiar with the
fundamentals of computer security and maintenance to safeguard online information
from cyber theft. This course is designed to arm learners with the necessary skills and
tools to secure their computer data from online theft. By the end of the course,
learners are expected to be familiar with standard computer security programs and
the skills to conduct routine maintenance to keep their computer systems updated
and performing in tip-top shape.

LEARNING OBJECTIVES:
● Understand more about Computer Security
● Perform basic Computer System Configuration and Maintenance
● Appreciate the importance of Computer Security in our daily lives.

PRE-ASSESSMENT:
Multiple Choice: Choose the letter of the best answer. Write your answer on the
sheet provided. (2 pts. each)

1. It examines each packet that crosses the firewall and tests it according to a set of
rules that you set up.
A. Antivirus C. Packet Tracing
B. Disk cleanup D. Packet-filtering firewall
2. A program that can discover programs/files/software/etc. That might compromise
your computer, either by being executable or misusing powerlessness within the
program ordinarily assumed to prepare them.
A. Malware C. Antivirus
B. Windows Firewall D. cleanmngr.exe
3. It means securing a standalone machine by keeping it updated and patched and
also known as cybersecurity
A. Computer Security C. Anti Security
B. Virtual Guard D. Computer Guard
4. It is a computer concerned that only authorized users should be able to modify the
data when needed
A. Authentication C. Virtual
B. Integrity D. Availability
5. A run command alternate route to open the Add/Remove Programs or Uninstall a
Program list on Microsoft Windows XP, Vista, 7, 8, 10 and 11.
A. ipconfig C. cmd
B. msinfo32 D. appwiz.cpl

LESSON PRESENTATION:

Computer Security
Computer security, moreover known as
cybersecurity or IT security, ensures data
frameworks from robbery or harm to the
equipment, the program, the data on them,
and the disturbance or confusion of the
administrations they give. It incorporates
controlling physical get to the equipment and securing against hurt, which will come
through arrange to get to, information, and code infusion. Due to administrators'
negligence, whether deliberateness, coincidental, or due to them being deceived into
going astray from secure methods.
WHAT ARE THE CONCERNS OF COMPUTER SECURITY?
Computer Security is concerned with four primary areas:
1. Confidentiality: As it was authorized, clients can get to information assets and
information.
2. Integrity: As it was authorized, clients ought to be able to adjust the information
when needed.
3. Availability: Information ought to be accessible to clients when required.
4. Authentication: are you communicating with whom you think you're talking with.

WHY IS COMPUTER SECURITY IMPORTANT?


Avoidance of information robbery such as bank account numbers, credit card data,
passwords, work-related records or sheets, etc. is fundamental in today’s
communications since numerous of our day to day activities depend on the security of
the information ways.
Unauthorized intrusions can also misuse data present on a computer. A gatecrasher
can adjust and alter the program source codes and utilize your pictures or email
accounts to make abusive substances such as explicit pictures, fake deluding, and
hostile social accounts.
Malicious intents can also be a factor in computer security. Intruders often use your
computers for attacking other computers or websites or networks for creating havoc.
Vengeful hackers might crash someone’s computer system to create data
loss. DDOS (distributed denial-of-service) attacks can be made to prevent access to
websites by crashing the server.
The above factors imply that your data should remain safe and confidential.
Therefore, it is necessary to protect your computer, and hence the need for Computer
Security arises.

WHAT IS COMPUTER SECURITY AND ITS TYPES?

One way to discover the resemblances and contrasts among Computer Security is by
asking what is being secured. For outline,
● Information security is securing data from unauthorized get to, alteration &
cancellation.
● Application Security is securing an application by building security highlights
to avoid Cyber Dangers such as SQL infusion, DoS assaults, information
breaches, etc.
● Computer Security implies securing a standalone machine by keeping it
overhauled and fixed.
● Network Security is by securing both the program and equipment innovations.
● Cybersecurity is characterized as ensuring computer frameworks, which
communicate over the computer systems.

Windows Firewall is a Microsoft Windows application that filters information coming


to your system from the Internet and blocking potentially harmful programs. The
software prevents most programs from communicating through the firewall.

THE TYPES OF FIREWALLS

1. The Packet-filtering firewall analyzes each parcel that crosses the firewall
and tests the bundle agreeing to a set of rules merely set up. If the package
passes the test, it's permitted to pass. On the off chance that the bundle
doesn't pass, it's rejected. Bundle channels are the slightest costly sort of
firewall. As a result, packet-filtering firewalls are exceptionally common.
2. Stateful packet inspection (SPI) could be a step up in insights from basic
bundle sifting. A firewall with stateful packet inspection looks at bundles in
bunches instead of independently. It keeps track of which bundles have passed
through the firewall and can identify unauthorized get to designs.

3. Deep packet inspection (DPI) the genuine substance of the bundles is


reviewed, so infections, spam, and other destructive substance can be
blocked.DPI moreover permits hones, such as information mining, listening in,
and substance censorship, which make it utilize a controversial subject.

Antivirus - A computer program that will discover programs/files/software/etc. That


might compromise your computer, either by being executable or by misusing
helplessness within the program ordinarily gathered to prepare the -- sorts of
malware. It identifies these sorts of hurtful programs introduced on your computer or
almost to be introduced.

It can perform different defensive measures (based on the security settings within
the Anti-virus software) such as quarantine, permanent expulsion, settle, etc. It'll too
search for possibly hurtful records that are download.

At last, whereas the Web has changed and incredibly made strides our lives, this
great organization and its related innovations have opened the entryway to an
expanding number of security dangers that people, families, and businesses must
ensure themselves.
The results of assaults can extend from the gently badly arranged to the weakening.
Vital information can be misplaced, security can be damaged, and your computer
can indeed utilize an exterior assailant to assault other computers on the Web.
PERFORM BASIC COMPUTER SYSTEM CONFIGURATION

The Most Important Commands

1. CMD - In Windows operating systems, the Command Incite could be a


program that imitates the input
field in a text-based client
interface screen out with the
Windows graphical client
interface (GUI). It can be utilized
to execute entered commands
and perform progressed
regulatory capacities.

To open CMD, press Windows key + R/press R, type CMD, and then press ok.

2. msinfo32 - Windows incorporates


an instrument called Microsoft
Framework Data (Msinfo32.exe). This
apparatus accumulates data almost
your computer and shows a
comprehensive view of your
equipment, framework components,
and program environment, which you'll utilize to analyze computer issues.
To open type msinfo32 in command prompt, and press Enter.
Now you can see the summary system information of your windows that can use for
diagnostic repairing in your computer system.

3. Appwiz.cpl - is a run command


alternate route to open the
Add/Remove Programs or
Uninstall a Program list on
Microsoft Windows XP, Vista, 7,
8, and 10. To utilize the
appwiz.cpl command on your
computer, press the Windows Key ( ) + R on your console simultaneously. The Run
Command window ought to come up.

To open type appwiz.cpl in the command prompt, and press Enter.

The Control Panel window will


appear, and it shows Program
Lists in the systems, you can
add/remove or uninstall programs.

4. Cleanmgr.exe - is designed to clear unnecessary files from your computer's hard


disk. You can configure
Cleanmgr.exe with
command-line switches to
clean up the files you want.
At that point, you'll plan the
errand to run at a particular
time by utilizing the Scheduled Tasks tool.

To open type cleanmgr.exe in the command prompt, and press Enter.

The Disk Cleanup will appear on your window, and you can now choose what drive
to clean up, then press ok.

In this step, you can choose what to cleanup for


free up space in your drive, and you can see the
capacity that you can get a free space in your drive,
then click ok.

A message
window will
appear
confirming if
you want to continue deleting your files
or cancel the Dick
Cleanup.

Disk Cleanup will now clean your files.


5. ipconfig -Displays all current TCP/IP network configuration values and refreshes
Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS)
settings. Used without parameters, ipconfig displays Internet Protocol version 4
(IPv4) and IPv6 addresses, subnet mask, and default gateway for all adapters.

To open type ipconfig in the command prompt, and press Enter.

The ipconfig command underpins the command-line switch /all. This comes about in
more point by point data than ipconfig alone.

A vital extra include of ipconfig is to drive


reviving of the DHCP IP address of the have
the computer to ask a different IP address. It
is typically done utilizing two commands in
the grouping. First, ipconfig /discharge is
executed to constrain the client to quickly
deliver up its rent by sending the server a
DHCP discharge notice, which upgrades the
server's status data and marks the ancient
clients.
The IP address as "accessible." At that point, the command ipconfig /recharge is
executed to ask a modern IP address. A computer is associated with a cable or DSL
modem. It may have to be stopped straightforwardly into the modem arrange harbor
to bypass the switch, sometime recently utilizing ipconfig /discharge and turning off
the control for a few time, to guarantee that another computer takes the ancient IP
address.
The /flushdns parameter can be utilized to clear the Space Title Framework (DNS)
cache to guarantee future demands. It can use unused DNS data by driving
hostnames to be settled once more from scratch.

6. DirectX Diagnostic Tool- A DxDiag report is a diagnostics apparatus utilized to


test DirectX usefulness and troubleshoot video- or sound-related equipment
issues. DirectX Symptomatic can spare content records with the filter comes
about. These records are frequently posted in tech gatherings or connected to
support emails to grant bolster workforce distant better; a much better; a higher; a
stronger; an improved">an improved thought of the PC the requester is utilizing in
case the blunder is due to an equipment disappointment or incongruence.

To open type dxdiag in command prompt, and press Enter.

The System tab shows the current DirectX form, the computer's hostname, the
working system's form, BIOS, and other information. The DirectX Records tab
shows data approximately the forms of particular DirectX framework records
convenient executables or dynamic-link libraries (DLLs).

DxDiag displays information about the current display settings and the video
hardware on the Display tab. If the computer has more than one monitor, DxDiag
will display a separate tab for each monitor. This tab can disable
DirectDraw, Direct3D, and AGP Texture Acceleration for troubleshooting purposes.
If the installed display driver has passed Windows Hardware Quality Labs testing,
DxDiag will display this result on the right side of the window.

Windows Resource and Performance Monitor


Windows has a built-in diagnostics tool called Performance Monitor. It can review
your computer's activity in real-time or through your log file. You can use its
reporting feature to determine what's causing your PC to slow down.

To access Resource and Performance Monitor, open Run, and type PERFMON.

This will open the Performance Monitor.

Go to Data Collector Sets > System. Right-click System Performance then click
Start.
This action will trigger a 60-second test. After the test, go to Reports > System >
System Performance to view the results.

In the report above, Performance Monitor noticed a high CPU load from the top
process running, which in this case is sqlservr.exe.

This lets me know that sqlservr.exe is stressing the PC out.

The diagnostic tool can offer more detailed explanations. You need to dive deeper
into the subsections if you need to know more.

COMPUTER MAINTENANCE

What is the significance of computer maintenance?


Keeping computers well-maintained can keep both infections and malware absent
and keep your computer running in tip-top shape. Customary upkeep can too assist
you to guarantee your antivirus program is up-to-date and working accurately.
Nothing can be more disappointing than a computer that forms as well gradually.

10 ESSENTIAL COMPUTER MAINTENANCE TIPS


1. Protect your PC Laptop with padding, and to your desktop, place your pc
desktop into a smooth wooden table to avoid scratches and overheat. The
mouse recommends using your mouse pad to prevent damage or scratch to
the sensor or the trackball itself.
Taken from nerdtechy.com Taken
from refixya.com
2. Organize cords – To avoid a shortage,
fluctuation, and damage to your devices or
computer. Also, it is helpful to work in your
workplace with a nice, neat, and clean
area.

Taken from pinterest.com

3. Update your operating system – In


updating the operating system, it will
give you the latest service with good
speed and new features to your
desktop.

4. Unplug to avoid overcharging in your laptop battery to avoid damage.


5. Purge your framework of garbage records and programs – by cleansing; it
makes a difference in the capacity to provide the free development of speed
benefit to your computer.

6. Run regular antivirus scans – It is safe to


work if you regularly scan your computer with
an antivirus scanner to avoid viruses,
malware, Trojans, etc. that can damage your
operating system or computer.

Taken from bitdefender.com


7. Clean the keyboard and case – cleaning your
keyboard and case, use a small paintbrush,
cleaning cloth, can of compressed air
(aerosol/bicarbonate), and cotton swabs.

Taken from shutterstock.com

8. Update your passwords – updating your passwords,


keeping calm your mind, changing passwords always
avoid by hacking or stealing your personal
information.

Taken from optimalbi.com

Tip: If you don't know how, don't push it, better to know, and learn it first.

SYNTHESIS:

Personal information like the many personal properties we own should be regularly
monitored and secured since our loved ones, and we have worked hard for them.
Lawless elements value personal information theft since our most liquid assets
(e.g., cash, credit, online identity, etc.) could be stolen using the personal
information they obtained. It is, therefore, important to be familiar with the various
computer security platforms and how to effectively configure them for the kind of
technology we use for various electronic and online transactions.

Computer security entails a conscious awareness of the kind of data available on a


computer device and how to secure them. Fortunately, the availability of computer
security software like antivirus and firewalls give users a certain degree of protection
and comfort. Even so, computer professionals need to be abreast with the
corresponding maintenance skills to ensure that IT safeguards are always updated
and in proper working forms to deter lawless elements from stealing personal and
restricted institutional information.

EVALUATION: LESSON 4

Multiple Choice: Choose the letter of the best answer. Write your answer on the
sheet provided. (2 pts. each)

1. It means securing a standalone machine by keeping it updated and patched and


also known as cybersecurity
A. Computer Security C. Anti Security
B. Virtual Guard D. Computer Guard
2. A software that can discover programs/files/software/etc. That might compromise
your computer, either by being executable or misusing helplessness within the
program regularly gathered to handle them.
A. Malware C. Antivirus
B. Windows Firewall D. cleanmngr.exe
3. A Microsoft Windows application filters information is coming to your system from
the Internet and blocks potentially harmful programs.
A. Computer Security C. Anti Security
B. Virtual Guard D. Windows Firewall
4. It is a computer concerned that only authorized users should be able to modify the
data when needed
A. Authentication C. Virtual
B. Integrity D. Availability
5. This apparatus accumulates data approximately your computer and shows a
comprehensive view of your equipment, framework components, and program
environment, which you'll be able to utilize to analyze computer issues.
A. ipconfig C. cmd
B. msinfo32 D. Alt-f4
REINFORCEMENT

Answer the following question. Write your answer on the sheet provided. (40
points)
1. Types of operating systems? (5 points)
2. System requirement of Operating system? (10 points)
3. What is the purpose of system requirements? (10 points)
4. What is the OS available? In the market today? (5 points)
5. In two to three sentences, write the importance of Computer Security in
your life? (5points)
6. Differentiate the types of a computer system using a Venn Diagram.
(5points)

REFERENCES:
Rouse, G., et al, (2021), OCR GCSE Computer Science,
Hoddereducation.co.uk
Perdew, L, (2017), Information Literacy in The Digital Age. Abdopublishing, inc.
Doyle, S. (2017), Complete ICT for Cambridge IGCSE, (2nd Edition)
Brown, G., (2019), Cambridge IGCSE ICT, (2nd Edition)
Alford, D., (2021), BGE S1-S3 Computing Science and Digital Literacy for third
and fourth levels
Reeves, B, (2019), AQA A Level Computer Science
Medicine, J., (2019), Networking for Beginners the Complete Guide to
Computer Network Basics, Wireless Technology and Network Security.

You might also like