Topics of Discussion - PowerPoint PPT Presentation

1 / 20
About This Presentation
Title:

Topics of Discussion

Description:

Screen saver. Antivirus. Disk Defragmenter. Files on disk tend to become fragmented. ... Enter a password to stop screen saver. AntiVirus Utility. Computer virus: ... – PowerPoint PPT presentation

Number of Views:12
Avg rating:3.0/5.0
Slides: 21
Provided by: csgf
Category:

less

Transcript and Presenter's Notes

Title: Topics of Discussion


1
Topics of Discussion
  • Booting up process.
  • Utility programs.
  • Defragmentation
  • Uninstaller
  • Screen saver
  • Antivirus

2
Starting a Computer
  • Booting
  • Load operating system into memory.
  • Cold boot is when you turn the computer on after
    it has been completely off.
  • Warm boot is when you restart or reset a computer
    that is already on.
  • CTRLALTDEL or pressing the rest button will
    perform a warm boot.

3
The Boot Process
  • Has six basic steps
  • Power up.
  • Start boot program
  • Power-On Self-Test (POST).
  • Load operating system.
  • Check configuration and customizations.
  • Ready for commands and data.

4
Power Up
  • Fan in the power supply begins to spin, and the
    power light on the case comes on.
  • Power supply sends electrical signals to the
    motherboard and other devices.

5
Start Boot Program
  • Computer begins to execute the boot program
    stored in ROM.

6
Power-On Self-Test
  • Diagnoses problems in the computer.
  • Makes sure the computer hardware is connected
    properly and operating correctly.
  • Tests graphics card, RAM, keyboard, drives.
  • POST test is compared to CMOS settings (stores
    information about computer configuration).

7
Load Operating System
  • After successfully completing the POST, the
    computer continues to follow the instructions in
    ROM to load the operating system.
  • A drive is checked for a disk, if no disk then
    C drive is checked.
  • Operating system is loaded from default disk into
    RAM.
  • Operating system now controls the computer.

8
Check Configuration and Customizations
  • Earlier on in boot process computer checks CMOS
    to determine amount of RAM and drive types.
  • More configuration data is needed for the
    computer to properly access all available
    devices, and set up screen based desktop.

9
Ready for Commands and Data
  • Boot process is complete when computer is ready
    to accept your commands.
  • In Windows, you will see the Windows desktop.

10
Utility Programs
  • Defragmentation.
  • Uninstaller.
  • Screen saver.
  • Antivirus.

11
Disk Defragmenter
  • Files on disk tend to become fragmented.
  • Each file is stored in many noncontiguous
    clusters.
  • Drive performance generally declines as it
    becomes harder to locate clusters that contain
    the parts of a file.
  • Defragmentation utility rearranges the files on
    disk so that they are stored in contiguous
    clusters.

12
(No Transcript)
13
Uninstaller
  • Removes applications safely.
  • When an application is installed, some files are
    written to the operating systems files.
  • If you delete the application using Windows
    Explorer (delete the folders) then the system
    file entries still remain.
  • Windows has a built in uninstaller use it to
    remove application programs.

14
(No Transcript)
15
Screen Savers
  • Originally developed to prevent a problem called
    ghosting.
  • Images could be permanently etched on a monitors
    screen.
  • Not a problem with modern monitors, but screen
    savers are still used for security reasons.
  • Enter a password to stop screen saver.

16
AntiVirus Utility
  • Computer virus
  • Is a program that attaches itself to a file,
    reproduces, and spreads from one file to another.
  • Four main types
  • Boot sector virus
  • File virus
  • Trojan horse virus
  • Macro virus

17
AntiVirus Utility
  • Boot sector virus
  • Replace the boot program user to start a
    computer, with an infected version. Virus is
    loaded into memory, and then can spread to disks
    inserted in the computer.
  • File virus
  • Attaches itself to or replaces program files the
    virus then spreads to any file that accesses the
    infected program.

18
AntiVirus Utility
  • Trojan horse virus
  • Hides within or is designed to look like a
    legitimate program.
  • Macro virus
  • Uses the macro language of an application to hide
    virus code. When you open a document with an
    infected macro the virus loads into memory.

19
AntiVirus Utility
  • Antivirus program protects a computer against
    viruses by identifying and removing any computer
    virus found in memory, storage or files.
  • Also protect against viruses that might be
    downloaded from the Web.
  • Identify the virus looking for specific patterns
    of known virus code called virus signature.

20
AntiVirus Utility
  • Your labs have F-Prot antivirus utility
    installed.
  • Use it to check for virus every time you put a
    disk in the computer.
Write a Comment
User Comments (0)
About PowerShow.com