0% found this document useful (0 votes)
37 views35 pages

DP Note

The document outlines a curriculum for a data processing course covering topics such as relational models, database security, file organization, and web design. It emphasizes the importance of data security, detailing various security controls like access control, auditing, encryption, and backup, as well as the role of a database administrator in maintaining security. Additionally, it discusses file organization methods, file access types, graphic packages, and their components and uses.

Uploaded by

n4t3.szn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views35 pages

DP Note

The document outlines a curriculum for a data processing course covering topics such as relational models, database security, file organization, and web design. It emphasizes the importance of data security, detailing various security controls like access control, auditing, encryption, and backup, as well as the role of a database administrator in maintaining security. Additionally, it discusses file organization methods, file access types, graphic packages, and their components and uses.

Uploaded by

n4t3.szn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 35

DATA PROCESSING

Week Topic
1 –2 Relational Models
3 –4 Database Security
5 –6 File Organization
7 Mid Term Break
8 –9 Web Design Package

DATABASE SECURITY

• Data security is the practice of keeping data protected from


corruption and unauthorized access. The focus behind data
security is to ensure privacy while protecting personal or
corporate data.
• It is a means of putting in place different forms of information
security controls to protect the database against compromise of
its confidentiality, integrity, and availability.

RISK ASSESSMENT

• This will enable you to identify the risks you are faced with and
what could happen if valuable data is lost through theft, malware
infection, or a system crash.

SECURING DATA
• Since data can be compromised in many ways, the best security
against misuse or theft involves a combination of technical
measures, physical security, and a well-educated staff. You
should implement clearly defined polices into your infrastructure
and effectively present them to the staff.

TYPES OF SECURITY CONTROL ON THE DATA

• Access Control
It is the selective restriction of access to a place or other
resource. The act of accessing may mean consuming, entering, or
using. Permission to access a resource is called authorization.
• Auditing
Database auditing involves observing a database so as to be
aware of the actions of database users.
• Database administrators and consultants often set up auditing for
security purposes, for example, to ensure that those without the
permission to access information do not access it.
• Some systems will cancel a session if your machine has been idle
for a certain amount of time, requiring that you prove
authentication once again to re-enter. You can log in using
multiple factors such as a password, a smart card, or even a
fingerprint.

 ENCRYPTION
This security mechanism uses a mathematical scheme and
algorithms to scramble data into unreadable text. It can only be
decoded or decrypted by the party that possesses the associated
key.

• BACKUP
This is the process of making a copy and archiving computer data
in the event of data loss, which is used to restore the original
data.
 PASSWORD
This is a sequence of secret characters used to enable access to
a file, program, computer system, and other resources.

IMPORTANCE OF DATA SECURITY

• Data security is critical for most business and even home


computer users. Client information, payment information,
personal files, bank account details- all this information can be
hard to replace and potentially dangerous if it falls into the wrong
hands.
• Data lost due to a disaster, such as a flood or fire, is crushing, but
losing it to hackers or a malware infection can have much greater
consequences.

MAJOR THREATS TO DATA SECURITY

• An accident can happen due to human error or software/


hardware error.
• Hackers could steal vital information, and fraud can easily be
perpetrated.
• Loss of data integrity.
• Improper data access to personal or confidential data. Loss of
data availability through sabotage, a virus, or a worm
INTEGRITY CONTROLS

• BACKUPS
The process of copying and archiving computer data is so that it
may be used to restore the original after a data loss event.
 Backups have two distinct purposes. The primary purpose is to
recover data after its loss, be it by data deletion or corruption.
The secondary purpose of backups is to recover data from an
earlier time, according to a user-defined data retention policy,
typically configured within a backup application for how long
copies of data are required. Backup is just one of the disaster
recovery plans.
THE ROLE OF A DATABASE ADMINISTRATOR IN DATA SECURITY

• The role includes the development and design of database


strategies, system monitoring and improving database
performance and capacity, and planning for future expansion
requirements. They may also plan, coordinate, and implement
security measures to safeguard the database.

A database administrator’s responsibilities can include the


following tasks:
• Installing and upgrading the database server and application
tools.
• Allocating system storage and planning future storage
requirements for the database system
• Modifying the database structure, as necessary, from information
given by application developers.
• Enrolling users and maintaining system security.
• Ensuring compliance with the database vendor license
agreement.
• Controlling and monitoring user access to the database.
• Monitoring and optimizing the performance of the database.
• Planning for backup and recovery of database information.
• Maintaining archive data.
• Backing up and restoring databases.
• Contacting the database vendor for technical support.
• Generating various reports by querying the database as per
need.

FILE ORGANIZATION
File organization refers to the logical relationships among various
records that constitute the file, particularly concerning the means of
identification and access to any specific record.
File organization is used to describe how the records are stored in
terms of blocks, and the blocks are placed on the storage medium. In
short, it refers to the way in which data records are stored or arranged.

Types of file organization

1. Serial (heap) files organization: records are placed in the


order in which they are inserted. A new record is inserted in the
last page of the file; if there is insufficient space in the last page,
a new page is added to the file. This makes insertion very
efficient, but since the heap file has no particular ordering
concerning field values, a linear search must be performed to
access the record as thus making it slower as compared to sorted
files.
2. Sequential file organization: Records are stored in some sort
of order (ascending, descending, or alphabetical) based on the
unique key field or search key. This method is fast & efficient for a
huge amount of data. A sorted file is inefficient as it takes time &
space for sorting records. A sequential file could be stored on a
sequential storage device such as magnetic tape or magnetic
disks. To access these records, the computer must read the file in
sequence from the beginning. The first record is read and
processed first, then the second record in the file sequence, and
so on.

3. Index Sequential Access Method (ISAM): Records are


organized in sequence, and an index table is used to speed up
access to the records without requiring a search of an entire file.
The records of the files can be stored in a random sequence, but
the index table is in a sorted sequence on the key value. This
type of file organization is best suited for situations where both
batch and online processing are to be supported.

4. Direct or Random file organization: In this file organization,


records are organized in such a way that it is possible for the
computer to directly locate the key of the desired record without
having to search through a sequence of records. Direct file
organization allows direct access to individual records stored in
any part of the file. These types of files are used in direct access
storage devices (DASD) like floppy disks, hard disks, and optical
disks.

FILE ACCESS

When a file is used, information is read and accessed into computer


memory, and there are several ways to access the information in the
file. The file accessing methods are:

1. Direct access: the information/data stored on a device can be


accessed randomly and immediately, irrespective of the order it
was stored. The data with this access method is quicker than
sequential access. This is also known as a random access
method. For example hard disk, flash drive, etc.
2. Sequential access: the information/data stored on a device is
accessed in the exact order in which it was stored, i.e., one record
after another, e.g., magnetic tape.
3. Random access: Random access file organization allows users
to access files in any order, rather than sequentially. This makes
it faster and more efficient to find specific data.

FILE CLASSIFICATION (ACCORDING TO USE)

 MASTER FILE: It is defined as a file that shows the current state


of some aspects of an organization’s activities. It is therefore a
semi-permanent reference information usually on disk or tape in
a stored form, which undergoes updates, maintenance,
amendments, deletion, and insertion, and can also generate
other master files.
 TRANSACTION FILE: A transaction file is a file that contains
changes made to the master files. It is also called transient data
and so has no static qualities because it is not retained for a long
period of time.
 REFERENCE FILE: It is a file with a reasonable degree of
permanency. Data used for reference purposes include price list,
salary table, names, address, tax table, table of rates, etc.
OTHER TYPES OF FILES:
 Program file: contains a program or program module.
 Data file: contains relevant data only, i.e, user’s file
 Document /text file: used in conjunction with word processing
or desktop publishing applications.
 Work file: It is a file created under the Work application.
 Scratch file: It is a file that is no longer needed and could be
overwritten.
 System files: These are files that the computer needs to boot,
operate, etc.
 Movement file: a file utilized to convey updated information
from one section or department to another in an organization.

THE CRITERIA FOR CLASSIFYING FILES.


 Nature of contents
 Organization method
 Storage medium

GRAPHICS PACKAGE

• A graphics package is an application that can be used to create


and manipulate images on a computer.

TYPES OF GRAPHIC PACKAGE


1. Painting packages: A painting package produces images by
changing the colour of pixels on the screen.
Note: a pixel is the smallest unit of a digital image that can be
displayed and represented on a digital display device.
2. Drawing packages: A drawing package produces images
that are made up of coloured lines and shapes such as circles,
squares and rectangles.

EXAMPLES OF GRAPHICS PACKAGES


• MS Paint
• PC Paintbrush
• Adobe Photoshop
• JASC’s Paint Shop Pro
• CorelDraw
• Micrographic Designer
• AutoCAD.

USES OF GRAPHIC PACKAGES

1. It is user friendly. The built – in graphics provided with user


interface use visual control items such as buttons, menus,
icons, scroll bar e.t.c which allow user to interact with
computer only by mouse click. Typing is necessary only to
input text to be stored and manipulated.

2. In industry, business, government and education organization


computer graphics is most commonly used to create 2D, 3D
graphics of mathematical, physical and economic functions in
form of histograms, bars and pie chats. These graphics and
charts are very useful for decision making.

3. The desktop publishing on person computer allows the use of


graphics for the creation and dissemination of information.
Many organization dose the in-house creation and
dissemination of documents. The desktop publishing allows
user to create documents which contains text, tables, graphs
and other forms of drawn or scanned images or pictures. This
is one approach towards the office automation.
4. Computer graphic packages are extremely fast, able to redo
work without starting over.
5. They are inexpensive to store and duplicate work fast and easy
to with others even if they are long way away.
6. Graphic packages are used to do all aspects of creating,
designing e.t.c from a single computer without leaving your
seat. Then you just send the final result to the printer or other
final output and it’s done.

Other Uses:
• It can be used to design letter, head paper, birthday card,
invitation card, wedding card, complimentary card, and banner.
• They allow graphic artist to create several types of computer-
generated art such as painting and drawing.
• It is used to manipulate images on a computer.
• It is used to create, edit, display and point graphic images

COMPONENT OF GRAPHIC PACKAGES


1. Drawing window- White portion on the Corel draw screen
where one can carry out all sort of drawing.
2. Printable page- Where printed drawing is been placed.
3. Menu bar- Contain the list of command that are used to
perform different tasks.
4. Tool bar- Group of icons that provide quick access to series
of related command.
5. Standard tool bar- Contain the list of command like new
copy.
6. Status bar- Provides information about a selected object or
about an action you are currently performing.
7. Colour palette-seen at the right side on your Corel draw
screen and on the tool bar for selecting outline and full colours.
8. Ruler- For sizing, positioning and switching window
Features of CorelDraw Environment
1. Title Bar: It is the first bar on the screen of any opened
application. It gives information about the program which you are
working on and also the name used in saving the document.
2. Menu bar: Menu bar is the area containing pull-down menu
options. CorelDraw as a program has Eleven (11) menus, they
include, File, Edit, View, Layout, Arrange, Effect, Bitmap, Texts,
Tools Window and Help menu. Each menu has its function. When
clicked on, the sub-menu list appears
3. Toolbar: A detachable bar that contains shortcuts to the menu
and other commands
4. Property Bar: A detachable bar with commands that relate to the
active tool or object. For example, when the text tool is active,
the text property bar displays commands that create and edit
text.
5. The Rule: The rule (horizontal and vertical rule) enables us to
determine the size and position of objects in a drawing
6. Drawing page: The area inside the drawing window. It is the
printable area of your work area. Any work done outside of the
printable page will not be printed
7. Drawing window: The area outside the drawing page bordered by
the scroll bars and application controls
8. Colour Palette: a dockable that contains colour swatches.
9. Docker: A window containing available commands to settings
relevant to a specific tool or task
10. Toolbox: A floating bar with tools for creating, filling and
modifying objects in the drawing
 PICK TOOL
It contains the following tools:
o The Pick tool lets you select, size, skew, and rotate objects.
o The Freehand pick tool lets you select objects by using a
freehand selection marquee.
o The Free Transform tool lets you transform an object by
using the Free rotation, Free angle reflection, Free scale, and
Free skew tools.
 SHAPE EDIT TOOLS
The shape edit tool contains the following tools:
o The Shape tool lets you edit the shape of objects.
o The Smooth tool lets you smooth curved objects to
remove jagged edges and reduce the number of nodes.
o The Smear tool lets you shape an object by pulling
extensions or making indents along its outline.
o The Twirl tool lets you create swirl effects by dragging
along the edge of objects.
o The Attract tool lets you shape objects by attracting nodes
to the cursor.
o The Repel tool lets you shape objects by pushing away
nodes from the cursor.
o The Smudge tool lets you distort a vector object by
dragging along its outline.
o The Roughen tool lets you distort the outline of a vector
object by dragging along the outline.

 CROP TOOLS
It has the following tools:
o The Crop tool lets you remove unwanted areas in objects.
o The Knife tool lets you slice objects, groups of objects, and
bitmaps along any path you specify.
o The Virtual segment delete tool lets you delete portions of
objects that are between intersections.
o The Eraser tool lets you remove areas of your drawing.
 ZOOM TOOLS
o The Zoom tool lets you change the magnification level in
the drawing window.
o The Pan tool lets you control which part of the drawing is
visible in the drawing window.

 CURVE TOOL
It has:
o The Freehand tool lets you draw single-line segments
and curves.
o The 2-point line tool lets you draw a straight two-point
line segment.
o The Bezier tool lets you draw curves one segment at a
time.
o The Pen tool lets you draw curves one segment at a
time.
o The B-spline tool lets you draw curved lines by setting
control points that shape the curve without breaking it
into segments.
 ARTISTIC MEDIA TOOL
The Artistic media tool provides access to the Preset, Brush,
Sprayer, Calligraphic, and Expression tools

 RECTANGLE TOOLS
It contains:
o The Rectangle tool lets you draw rectangles and squares.
o The 3-point rectangle tool lets you draw rectangles at an angle.

 OBJECT TOOLS
It contains:
o The Polygon tool lets you draw symmetrical polygons and
stars.
o The Star tool lets you draw perfect stars.
o The Complex star tool lets you draw complex stars that
have intersecting sides.
o The Graph paper tool lets you draw a grid of lines similar to
that on graph paper.
o The Spiral tool lets you draw symmetrical and logarithmic
spirals.
o The basic shapes tool lets you choose from a full set of
shapes, including a hexagram, a smiley face, and a right-
angle triangle.
o The Arrow shapes tool lets you draw arrows of various
shapes, directions, and numbers of heads.
o The Flowchart shapes tool lets you draw flowchart symbols.
o The Banner shapes tool lets you draw ribbon objects and
explosion shapes.
o The Callout shapes tool lets you draw callouts and labels.
• TEXT AND TABLE TOOLS
It contains:
• The Text tool lets you type words directly on the screen as artistic
or paragraph text.
• The Table tool lets you draw and edit tables.

 DIMENSION TOOLS
It contains:
o The Parallel dimension tool lets you draw slanted dimension lines.
o The Horizontal or vertical dimension tool lets you draw horizontal
or vertical dimension lines.
o The Angular dimension tool lets you draw angular dimension
lines.
o The Segment dimension tool lets you display the distance
between end nodes in single or multiple segments.
o The 3-point callout tool lets you draw a callout with a two-
segment leader line.
TRANSPARENCY TOOL
It contains:
o The Transparency tool lets you apply transparencies to objects.
o Eyedropper tools

It contains:
 The Color eyedropper tool lets you select and copy a colour
from an object on the drawing window or the desktop.
 The Attributes eyedropper tool lets you select and copy
object properties, such as line thickness, size and effects,
from an object on the drawing window.

 INTERACTIVE FILL TOOLS


It contains:
• The Interactive fill tool lets you apply various fills.
• The Mesh fill tool lets you apply a mesh grid to an object.
• The Smart fill tool lets you create objects from enclosed areas
and then apply a fill to those objects.

LOADING CORELDRAW APPLICATION


To access the CorelDraw application, take the following steps:
• Click on the start button
• Point to all Program
• Point to CorelDraw Graphic Suite 12 (Depending on the version
you are using)
• Select CorelDraw
EXITING CORELDRAW
To leave the CorelDraw environment, take the following actions;
• Save your drawing (In CorelDraw your document is called
drawing)
• Click on File Menu and select exit.
DRAWING SHAPES
• After loading application
• On the tool bar, Click Shapes
• At the drawing area, drag to create shape.
ADD COLOUR TO YOUR SHAPES
• After drawing your shapes
• Select the Drawing by clicking on it
• On the Tool bar, Click on the Fill Colour
• On the Text Menu, Click on “Fit text to Path”
• Click on the Circle Shape only and delete it

COMPUTER VIRUS
 A computer virus is a small software program that interferes with
computer operation and spreads from one computer to another.
 A virus is a self-replicating program that copies itself and that can
infect other programs by modifying them or their environment
such that a call to an infected program implies a call to a virus.
 Computer viruses are executable computer programs written by
software developers to check piracy on some of their system and
application software.

BRIEF HISTORY OF COMPUTER VIRUS


Robert Thomas, an engineer at BBN Technologies developed the first
known computer virus in the year 1971. The first virus was
christened the “Creeper” virus, and the experimental program
carried out by Thomas infected mainframes on ARPANET (Advanced
Research Projects Agency Network). The teletype message
displayed on the screens read, “I’m the creeper: Catch me if you
can” But the original wild computer virus, probably the first one to
be tracked down in the history of computer viruses was “Elk
Cloner.”
• The Elk Cloner infected Apple II operating systems through floppy
disks. The message displayed on infected Apple Computers was a
humorous one. The virus was developed by Richard Skrenta, a
teenager in the year 1982. It was Fred Cohen, who coined the
term “computer virus” and it was after a year in 1983. The term
came into being when he attempted to write an academic paper
titled “Computer Viruses – Theory and Experiments” detailing the
malicious programs in his work.

TYPES OF COMPUTER VIRUSES


• Boot Sector Virus: This type of virus infects the master boot
record. It is challenging and a complex task to remove this virus
and often requires the system to be formatted. Mostly it spreads
through removable media.
• Direct Action Virus: This is also called a non-resident virus; when
executed, it scans the disks for targets, infects them, and then
exits (i.e., it does not remain in the memory after it is done
executing).
• Resident Virus: A resident virus installs itself as part of the
operating system when executed, after which it remains in the
RAM from the time the computer is booted up to when it is shut
down.
• Multipartite Virus: This type of virus spreads in multiple ways. It
infects both the boot sector and executable files at the same
time.
• Polymorphic Virus: These types of viruses are difficult to identify
with a traditional anti-virus program. This is because polymorphic
viruses alter their signature pattern whenever they replicate.
• Overwrite Virus: This type of virus deletes all the files that it
infects. The only possible mechanism to remove is to delete the
infected files, and the end-user has to lose all the contents in it.
Identifying the overwrite virus is difficult as it spreads through
emails.
• Space filler Virus: This is also called “Cavity Viruses.” This is
called so as they fill up the empty spaces between the codes and
hence do not cause any damage to the file.
• Macro viruses: As the name suggests, macro viruses particularly
target macro language commands in applications like Microsoft
Word. The same is implied on other programs too.

Examples of Viruses:
 Trojan horse virus
 Sleeper
 Logic bomb Alabama virus
 Christmas virus
 Jerusalem virus
 Resident virus
 Nonresident virus
 Code Red
 I love you
 Creeper virus
 Stone
 November 17

SOURCES OF VIRUS
These are the means through which viruses could be spread from one
system to the other.
• They include:
• Infected memory devices (e.g., USB drives, external hard drives)
• E-mail attachments (especially suspicious or unexpected ones)
• Internet downloads (e.g., software, media files from untrusted
sources)
• Computer networks (through shared drives or network
vulnerabilities)
• Illegal duplication of software/cracked software
• Unsecured websites (malicious sites or compromised legitimate
sites)
• Malicious Websites (Drive-by Downloads)
• Malvertising (malicious advertisements)
• Outdated operating systems or applications)
• Social Media Scams (malicious links or files shared on social
platforms)
• Unsecured Public Wi-Fi Networks

VIRUS DETECTION (ANTI-VIRUS)


• Anti-viruses are also written programs by software developers to
stop and curb the spread of the virus in a system. Antivirus
software is a type of utility software used for scanning and
removing viruses from your computer. Once an anti-virus is
installed on a system, it will be hard for a virus to enter the
system except if the antivirus is outdated. All antivirus can be
updated on the internet.
• Examples of Antivirus Programs
o Norton Anti-virus
o McAfee
o AVG
o Bitdefender
o Panda Dome
o Trend Micro
o Malwarebytes
o Avira Prime
o Intego
o TotalAV
o Bitdefender Total Security
o Dr Solomon’s Tool Kit
o Penicillin
o Avast
o Windows Defender
o Kaspersky

COMPUTER VIRUS PREVENTIVE MEASURES

• Install a good Computer Antivirus.


• Timely update of the operating system.
• Timely update of antivirus software.
• Installation of only trusted or licensed software.
• Exercise care when you browse the internet.
• Use a firewall.
• Be cautious with public Wi-Fi.
• Educate yourself and others on common scam tactics, phishing
attempts, and social engineering tricks.
• Isolate infected system(s) immediately.
• Enable pop-up blockers in your web browser.
• Back up your files and data regularly.
• Be wary of email attachments and links from unknown or
suspicious sources.
• Use strong, unique passwords and Multi-Factor Authentication
(MFA) for your online accounts.
• Disable Autorun for external devices (like USB drives).
COMPUTER ETHICS
Definition of Computer Ethics
• Ethics is a set of moral principles that govern the behavior of a
• group or individual.
• Computer ethics can be defined as the set of moral principles
that
• regulate the use of computers.

RESPONSIBLE USE OF COMPUTER AND INTERNET

The following are the basic security measures taken to prevent


damage to computer system.
1. There must be adequate ventilation.
2. Adequate space must be allowed between each system unit.
3. Avoid dust by using cover.
4. Avoid moisture.
5. Provision of air conditioners and fans or other cooling machines.
6. Provision of UPS (Uninterruptible Power Supply) and other
electrical appliances to avoid loss of information and electrical
damage to the system.
7. Adequate care must be taken to storage devices like diskettes,
flash drive, CD/DVD writer drive, etc.
8. Disallow an unauthorized user from having access to your
computer.
9. Ensure maximum security to files and information on the
computer.
10. Provide computer with anti-virus program to avoid viruses.
11. Avoiding food particles dropping into the system.
12. Unplug the system when not in use for a long time.
13. Check your e-mail regularly.
14. Give prompt and polite response to mails.

REASONS FOR TAKING CARE OF THE COMPUTER


a. To avoid damage to files
b. To protect the system
c. To prolong the life of the system
d. To make the user comfortable for maximum efficiency.
AREAS OF ABUSE AND MISUSE OF THE COMPUTER

The following are areas in which computer can be misused.


1. Invasion of privacy (hacking)
2. Computer virus
3. Fraud
4. Stealing
5. Software piracy
6. Cyber war
7. Plagiarism
8. Pornography
COMPUTER SAFETY MEASURES
Computer Safety Measures are very important and should be
given consideration in any computing environment. These
measures ensure that no harm is done to the computer user, the
computer users or others around.

TYPES OF COMPUTER SAFETY MEASURES


There are two major types of computer safety measures. They
are:
1. The Physical or Computer Safety Measures
2. The Operational or User’s Safety Measures

1. The physical or computer safety measures relating to the computer


are:
i. Computers must be located in a secure environment to prevent
theft.
ii. Prevent unauthorized access to the computer with use of
password or passphrase.
iii. Backup your data on the computer to prevent loss.
iv. Ensure the use of password or passphrase to protect sensitive
data on your computer.
v. Do not spill liquid on the computer.
vi. Ensure you use good and current anti-virus software in your
computers.
vii. Do not use carpets or rugs on the floors of computer rooms.
viii. Ensure the use of good surge protectors.
ix. Ensure the use of Uninterruptible Power Supply (UPS)

2. Operational or user’s safety measures to be observed are:


i. maintain good sitting position when using the computer.
ii.Use anti-glare screen protector for your computer monitors.
iii. Operate the computer in a well illuminated room or
environment.
iv. Blink your eyes frequently to reduce dryness.
v. Shake your hands periodically after typing for a long period.
vi. take frequent short break when performing repetitive task.
vii. Do not always stay too long on the computer.
Computer Room
Computer room is a place where computers and its accessories are
kept for use by students or staff of the organization.
Computer Room Management Ethics
A computer room must be managed properly. Unlike our homes
we need to keep a computer room in a good condition always by:
1. Making it free of dust
2. Maintaining appropriate lighting
3. Maintaining adequate and appropriate ventilation
4. Proper setup of computer system
5. Avoid eating and drinking in computer room
6. Avoid noise making in a computer room
7. A maintenance officer should check all computers before and
after use.
8 A computer laboratory should be out of bound for non
computer users.
9. Keep the computer away from direct sunlight and sources of
heat.
Laboratory Rules and Regulations
In a computer laboratory, certain rules and regulations should be
observed. They include:
1. Chairs and tables should be arranged in a comfortable manner so
as to ease movement within the computer laboratory.
2. Power points should be attached to the wall close to each
computer.
3. The system unit and peripherals such as monitors, keyboard,
mouse etc should be arranged in an orderly manner.
4. A computer laboratory should be out of bound for non-computer
users.
5. Computers should be booted properly before use and shut down
properly after use to avoid damage to the memory files of the
computer.
6. There should be no smoking, eating or drinking in the computer
laboratory.
7. Keep the computer away from direct sunlight and sources of heat.
8. Be careful about using diskettes or external storage devices from
unknown sources as the computer could easily get infected with a
virus.

Computer Maintenance

Maintenance of computer hardware is a way of taking care, repairing


and replacing broken and failing computer hardware.

Maintenance is necessary on computer to avoid hardware failure or


loosing valuable information and most times, hardware breaks without
notice. Excess heat accelerates the deterioration of the delicate
circuits in the system. Dust and dirt are the most common cause of
overheating. Thus, cleaning a case is done to prevent components
from overheating.

Computer hardware components attract dust, dirt, lint, carpet fibres,


pet hair and smoke particles. The air from the computer cooling fan
contains grime which settles on the components and causes
overheating which eventually results in permanent hardware failure.

As a result of this, complete cleaning should be done at least once a


year and if the computer is used in hot, dusty moist environment,
cleaning must be performed more frequently.

PROCESS OF MAINTAINING COMPUTER HARDWARE


GENERAL COMPUTER CLEANING

Step 1: Always shut down, power off the system before carrying out
any computer maintenance.

Step 2: Never sprays any liquid onto any computer component. Spray
or pour the liquid on a lint – free cloth and wipe the PC with the cloth.
Avoid product with certain cellulose which will leave streaks on
your computer equipment. The use of paper towels or an old rag to
clean delicate surfaces of a computer should be discouraged because
paper products contain cellulose which can scratch delicate surfaces of
your hardware.

Step 3: Use vacuum cleaner to remove dirt, dust, food and hair from
keyboards.it is advisable to wear an anti – static wrist strip to
reduce the transfer of static electricity from the body to the computer.

Step 4: Do not apply cleaning solution including water directly


to computer components.

Step 5: Do not use your breath to blow the dust off the components
because your breath contains moisture and the components
are not built to be rust- proof.

Step 6: Sometimes, it is necessary to replace fans or physically wipe


some computer components.

Step 7: Do not use anything wet or damp inside the computer case.

Step 9: Do not attempt to clean the motherboard with a cloth as it may


damage the electrical components. Use a slightly moist cloth to wipe
off dust and grime inside the computer case.

Step 10: Do not allow any drink around the machinery.

Step 11: Avoid vibrations and shocks.

TOOLS FOR CLEANING COMPUTER HARDWARE

1. Aclean non-abrasive cloth such as microfiber, cotton, T-shirt,


cotton handkerchief should be used and avoid using paper
towels, dish towels, facial tissue, old rag.
2. Portable vacuum.
3. Appropriate cleaning solution.
4. Cotton swabs.
5. Foam swabs.
6. DVD or CD-ROM cleaner.

EVALUATION
1. State the steps involve in maintaining a computer hardware
2. Mention six tools used in cleaning computer hardware

HOW TO CLEAN YOUR MOUSE

Step 1: Disconnect the mouse cable from the back of


the computer case.

Step 2: Lightly dampen a cleaning cloth with isopropyl alcohol and


wipe down the outside of the
computer mouse an mouse pad.

Step 3: Remove the bottom cover of the mouse. To this, turn it over
and note the directional arrows that indicate the direction of rotation,
or how to slide it off. Press with your fingers in the direction of the
arrows and then turn the mouse right side up, letting the cover and
mouse ball drop into your hand.

Step 4: Wipe the computer mouse ball with a lint-free cloth dampened
with isopropyl alcohol. Put it aside.

Step 5: Dampen a swab with isopropyl alcohol and clean between,


around and on top the keys. Change swabs as they become dirty. You
may need several swabs.

Step 6: Replace the mouse ball and cover.

Step 7: Wipe the mouse cord. Lightly dampen a cleaning cloth with
mild soap solution and gently pull the cord through the cloth.

Step 8: Plug the mouse back into the computer.

HOW TO CLEAN YOUR MONITOR

Step 1: Unplug the power supply cord and cable from the back of the
monitor and allow it to cool for at least 20 minutes.

Step 2: Vacuum the outside of the monitor, particularly the cooling


grooves, holes or slots in the top surface where heavy dust or other
debris may have collected. Blow compressed air in short puffs at an
angle to the monitor surface. The goal is to remove dust and dirt
without letting anything fall into the ventilation holes.
Step 3: Lightly dampen a cloth with a mild soap solution and wipe
down the outside plastic portions of the monitor.

Step 4: Clean the monitor cables and power cord while they are
disconnected. Lightly dampen a cloth with mild soap solution and
gently pull the cables and cords through the cloth.

Step 5: Check the documentation or call the manufacturer to find out if


your monitor screen has anti-glare, or other delicate coatings. If so, ask
the manufacturer or cleaning instructions. If it does not have these
special coatings you may spray a window cleaner unto a lint-free cloth
and wipe it clean. Do not spray directly onto the screen. Chemicals
may drip inside the monitor and damage it.

Step 6: For dusty or dirty manufacturing environments use


a computer dust cover to protect the monitor

HOW TO CLEAN A KEYBOARD

Step 1: Remove the cable from the back of the computer case.

Step 2: Use a vacuum cleaner to remove debris between the key. If no


vacuum is available, turn the keyboard upside down and gently tap on
the back side dislodge debris.

Step 3: Aim between the keys and compressed air to remove


remaining dust and debris. Use short puffs of air applied at about a 30-
45 degree angle to the keyboard surface. Alternate between blowing
the keys and tapping the keyboard upside down to dislodge particles
until it is clean.

Step 4: Lightly dampen a cloth with a mild soap solution and wipe
down the outside of the keyboard. Do not spray soap solution directly
onto the keyboard.

Step 5: Dampen a swab with isopropyl alcohol and clean between,


around and on top of the keys. Change swabs as they become dirty.
You may need several swabs.

Step 6: Wipe the keyboard cord. Lightly dampen a cleaning cloth with
mild soap solution and gently pull the cord through the cloth. Dry the
cord with a dry cloth.
Step 7: For dusty or dirty manufacturing environments a good
keyboard cover is recommended.

BATTERY CHARGING AND REPLACEMENT

This can be divided into two types which are:

 Battery charging and replacement for laptop


 Battery charging and replacement for PC that used UPS.

HOW TO CHARGE A LAPTOP BATTERY

1. Plug your laptop into the socket and you can leave it there
whenever possible.
2. You can recharge your laptop’s battery whether the battery is
fully drained or not.
3. There is no need to fully drain your laptop’s lithium-ion battery
every time you use it.
4. Lithium-ion battery have a rapid-charging option. This option is
available either on a custom tab inside the Power Option dialog
box or from special battery software that came with your laptop.
5. Do not over charge the battery, charge the battery when is
getting low between 20%- 10% and do not dry the battery.

FOR PC THAT ARE USING UPS

1. The battery needed to be fully charge before use at least for 4 to


6 hours.
2. Ensure that the UPS is kept in contact o the its electrical ground
at all times. Do not over load
3. Do not let the UPS shut down by itself because it can damage
battery.

HOW TO CLEAN A DVD DRIVE

1. Purchase DVD laser cleaning kit. The kit is comprised of a single disc
that is design to spin in your drive and remove all dust from the lens.

2. Place the CD/DVD laser lens cleaning disc inside your DVD drive’s
tray. Close the tray and allow the CD spin in the drive. As it spins, it will
clear your lens of most, if not all, of the dust that is on it.
3. Purchase a can of spray air. As an extra precaution, open your
drive’s disc tray and gently spray a can of spray air into it. This will
remove any of the big pieces of dust that may be lurking inside the
tray.

SOFTWARE MAINTENANCE

The maintenance of programs inside the computer system such as


virus, a spyware removal, back up software and a registry removal,
cleaner. Every PC should be installed with an anti virus, a spyware
removal application back up and a registry cleanser.

Some helpful Tips

1. Always scan your system once a week.


2. The hardware should also be defragmented at least once a
month.
3. Delete all temporary files and cookies at regular interval.

TYPES OF SOFTWARE MAINTENANCE

1. Corrective Maintenance
2. Perfective Maintenance
3. Adaptive Maintenance
4. Preventive maintenance

1. CORRECTIVE MAINTENANCE

This type of maintenance involves developing and deploying solution


to problems that occur during usage of a software program. For
instance, when an error message comes up on the screen or program
is hanging or freezing or crashing, this implies that corrective software
maintenance is needed. A computer programmer is employed to work
on a more permanent solution to the problems.

 PERFECTIVE MAINTENANCE

This is a measure taken by computer programmer to upgrade the way


a software programs function or how fast it processes, requests,
develop software menu layouts and command interface so as to ensure
that the program has zero tolerance for flaws.

 ADAPTIVE MAINTENANCE
It takes care of the changes that occur in software development. For
instance, if there is a change in processors speed, thus change will
invariably affect how the software performs on a
single computer software interfaces with other software programs. So
changes in one program necessitates changes in other programs.

 PREVENTIVE MAINTENANCE

This is a situation whereby computer programmers try to prevent


problems with software programs before they occur. They seek to
prevent corrective maintenance as well as anticipating adaptive
maintenance needs before users encounter problems. This is done by
test running their programs to ensure that the software can handle
high data loads and other stressful opearatiobn without
difficulties. Computer programmers also ensure compatibility by
testing the software with other programs users that are likely to use
their software.

PREVENTIVE MAINTENANCE ACTIVITIES INCLUDE THE FOLLOWING:

1. Installing anti virus protection software and update


2. Install firewall on your computer
3. Keep computer registry up to date.
4. Make sure your operating system is up to date
5. Delete cookies

EVALUATION

1. Discuss the four types of software maintenance.


2. State five benefits of software maintenance.

BENEFITS OF SOFTWARE MAINTENANCE

1. It promotes fully functional and highly reliable computer.


2. If preventive maintenance operations are carried out regularly, a
PC will never run slowly or have programs that changes or
freezes the computer.
3. When programs like CC cleaners or disk cleanser is used to clean
up your hard drive , and also run Defraggler CD disk. Defragment
process pack your files that are scattered across your hard drive
into configures cluster ( Disk Defragmenter), allowing the file
system to locate them easily.
4. When a PC is protected and maintained by S/W clean up
programs, the hrd drive will not be slow and fragmentation will
hardly occur.
5. Registry cleaning.
6. Problems due to lack of maintenance are reduced.

ROUTINE COMPUTER MAINTENANCE

Routine Computer Maintenance consists of tasks performed


on computer daily, weekly or monthly in order to keep
the computer running efficiently for a long time.

1. Disk cleaning should be done weekly to get rid of “trash”.


2. Defragmentation- Run defrag which is located in terms tools to
pull those fragments into one location.
3. Always update your system
4. Back up with external hard drive and back-up software.
5. Physical maintenance, i.e., regular physical cleaning of the
hardware components should be observed.
6. Internet Security: Always run full updated antivirus program when
using the internet and also perform full system scan with your
anti virusprogram.It is ideal to run a firewall to block potential
threats.
7. Patches and updates: They are regularly released by software
companies to tackle security problems found in the programs.
System administrators and network technicians should regularly
download and apply these updates to ensure that their
computersand their networks are protected from hackers, viruses
and network intrusions.
8. Apply repair functions.

COMPUTER MAINTENANCE TIPS

1. Never turn your computer off with the power switch on until
window has shut down.
2. Get a UPS ( Uninterrupted Power Supply) for your computer.
3. Back up your data to external hard drives, DVD/ CD Roms, USB/
drives, memory card etc.
4. Run scan disk and defragment at least once in a month.
5. Never unplug peripheral from the computer when it is on.
6. Ensure that you have 300 mbs or 500-600 mbs of free space on
your C Drive for window XP, Vista, or Window 7.
7. Do not allow a lot of programs to load up when you start
your computer.
8. Use anti-virus checker regularly.
9. Use a firewall program for a high speed internet connection.
10. Keep track of the software disk you receive with
your computer and new peripheral.
11. Make sure window update is set.

You might also like