Lesson_03 - Lesson 3 Computer Protection Computer Literacy...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3 , 3 rd Edition Morrison / Wells
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Lesson 3 Morrison / Wells CLB: A Comp Guide to IC 3 3E 2 Objectives Identify the importance of protecting computer hardware from theft and damage. Explain how to protect data. Identify environmental factors that can cause damage to computer hardware and media. Identify how to protect computer hardware from power loss and fluctuation. Identify common problems associated with computer hardware.
Background image of page 2
Lesson 3 Morrison / Wells CLB: A Comp Guide to IC 3 3E 3 Vocabulary backup data theft driver encryption humidity ping power spikes surge suppressor uninterruptible power supply (UPS)
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Lesson 3 Morrison / Wells CLB: A Comp Guide to IC 3 3E 4 Introduction As the use of computers has grown in volume and importance, protecting computer systems and the information they hold has become increasingly important. There are many issues of computer maintenance, the risks of computing, and the measures that can be taken to minimize those risks.
Background image of page 4
Lesson 3 Morrison / Wells CLB: A Comp Guide to IC 3 3E 5 Protecting Computer Hardware from Theft and Damage Theft of and damage to computer equipment is a serious problem. Safeguards include: Physically secure equipment Use security locks Mark equipment with identification mark Insure the equipment Back up data to a separate system Employees using company computers for personal use can be a type of theft.
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Lesson 3 Morrison / Wells CLB: A Comp Guide to IC 3 3E Data Protection Data is a critical component of businesses. The risk and severity of data theft is due to:
Background image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 12/01/2011 for the course EGR 125 taught by Professor Dianeboseman during the Spring '11 term at Guilford Tech.

Page1 / 20

Lesson_03 - Lesson 3 Computer Protection Computer Literacy...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online