Ict
Ict
Why must there be safety rules and precautions in the computer laboratory?
1. To avoid accidental injuries to the users
2. To avoid damage of computers
3. To provide a safe environment for computer use
Computer literacy
Computer literacy refers to having the knowledge and understanding of computers and their
uses.
2) Air conditioner
Used to regulate temperature in a computer room
3) Fire extinguisher
Used to stop fire outbreaks
4) CCTV cameras
Record and playback activities for reference purposes
Surveillance-act as a deterrent to theft and other crimes
Monitor security at data centers
6) Antiglare screens
Regulate excess light from monitors especially CRT monitors.
9) Wool carpet
Absorbs moisture from the floor
Absorbs sounds from movements
Protects devices from damage when they fall
Protects users from electrocution
Absorbs dust and prevents it from entering the computers
Cable insulation
Prevents electric shock
Prevents power disconnections
A surge protector used to protect computer equipment against under voltage and over voltage
Standard furniture
Tables should be wide and strong enough to bear the weight and accommodate all peripherals.
Provide adjustable chairs for users
Physical security
1. Employ security guards to keep watch over data centers.
2. Apply burglar proof to access points like windows, doors, and roofing with metal grills
and use strong padlocks.
3. Set up alarms to alert you in case of break-ins.
4. Use system locks to protect internal components like hard disks and memory sticks.
5. Use cables to lock the equipment to desk, cabinet or floor.
6. Electronic locking mechanism with keys, swipe cards, finger print recognition.
7. Set up CCTV Cameras to monitor data centers
Software security measures
1. Install security software like deep freeze to limit and block certain activities
2. Remote administration software should be considered with high number of computers in
a computer center.
3. Computer management software to monitor and limit web browsing should be installed
for example K9 web protection.
4. Group policy or security software to prevent malicious software from being executed
and installed.
5. Assigning unique authorised log-in for authentication before granting network access.