Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

ccoommppuutteerr

Mmaannaaggeemmeenntt
need
→ we to
manage
order to
our computers in

Passwords &
them to perform @ their *

reliable UP to date &


keeping
best and deliver software
* ones tar
. use different
results .

flaws
t
make You
→ bugs can
different accents

① Security -
computer venerable to
hacking
+
.
long = more effective than shoe

cause LOSS at data if APP when characters


* Installing
t
updating
& crashes
antivirus software -
.
avoid words found in
dictionary
companies reported bugs tows

→ tix +

• avoid personal into


essential tool for keeping
+
produce updates
from malware
°
Change regularly .

Computer sale

steal destroy
O
that to or
might try
Be trends
② Saving Time
* aware a- in

data crime * -
computer
→ research software first to
the

Detragrnentmg
release -
forums

Feed ly to subscribe to
hard drive *
make sure
↳ special software to
+ reviews RSS feeds relating to run

the disk
compiler security . rearrange files on

° Install only one antivirus produce in


that stored
So
they are
↳ tall tar
o set software to download new virus less
likely to sequence again .

tricks scans →
Fragmented =
files are broken up into
automatically
or
definitions
.

the several pieces t stored all over the



set software to scan removable
* Common Sense a disk instead of being in sequence
drives automatically
• re Cleve too
good to be ↳ takes longer
to read t write files to

Set software to scan entire computer
disk
a
true otters a fragmented .

automatically once week ( at least )



Snopes well do It @ least 6 months
can check
every
-
.
=
it

known scam ( more often It frequently copy t


*
Using a firewall A

into
delete )
-
search to move .

↳ protects from some forms of malware

like bank
that be avoided anti

email comes from organisation
't
using
-

can

contact to
telephonically or compare
-

virus .

↳ attack
directly through
Into an website -
dance click link !
your comp
the

network of the case at files and folders &


in
spyware ,
q managing
Ba
(
send data out to the malware all documents stored in
your . make sure

restricts your computers


-

creators the network a single root folder ( easy to backup by


using .

communications to most
A folder ,
→ A hardware software monitors common simply making
a
copy
or that settings
( e mail Internet a basic
the
applications using
-
,
which are o
create separate folders inside to hold flies
users )
productivity
communication link t
which parts are
being created by different software or for specific
used . -
Complexe
- check and change projects
→ most consumers don't use hardware individual
to
settings °
meaningful names
control access to
apps t
firewall -

used where a private


specific parts
network connects to the internet
make OS
indexing the Hardware Scttw area
sure is 8
Upgrading
e-

files in documents f- older → e-


budget to
plan
( an index that includes the contents → hardware becomes taster t
every year
well as home Software features
as more powerful .
= new

=
easy to Search tar .
+ devices are lighter
t
last longer

o use OS search tool bc faster than • Be realistic t cost et lecture .

update hardware every 3 5


browsing through folders years
-

+ software as needed ( determined

* Remember hardware requirements &


by new features )

↳ it software needs specific hardware costs at least as much as


replacing
or

requirements x
they are not met ,
the
original t
budget accordingly
software will be v slow + more o
software discant at
is
upgrading
-
=

to crash
likely .

between 10% -
SO
depending
on vendor .
Usually offered to

0
③ Reliability -
owners at last two
major versions

need latest features consistently ,



It

* Following a
good backup program
& consider SaaS as an alternative le

yearly upgrades
.

daily weekly monthly yearly policy



, , ,

keep backup in different location from be


you tallow
• '
-
make sure

your computer will


'

prepared for rebuild bc


keep backup sate ! ( anyone who help you when
you upgrade
steals or accesses
your backups
can
( smooth t
effluent )

take their time to break any

encvuption or
security )

* Be prepared to Rebuild *

↳ quickest solution to a serious computer

disaster

new comp or
by wiping
-

either as .

current
system
.

o
keep software installation CD/DVD /

downloads on removable
storage you
can
easily find .


make sure have a record d-
you
license + serial numbers
keys
( printouts
follow good backup
°
a
policy
+ know how to restore data

You might also like