L3_Lecture_Notes - Computer Literacy BASICS A Comprehensive...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Computer Literacy BASICS: A Comprehensive Guide to IC 3 , 3 rd Edition Lesson 3: Computer Protection Our latest online feature, CourseCasts, is a library of weekly podcasts designed to keep your students up to date with the latest in technology news. Go to http://coursecasts.course.com , where you can download the most recent CourseCast onto your mp3 players. The coursecasts covers the latest in technology and sorts through and aggregates the most pertinent news and information for CourseCasts . Lesson Objectives You will have mastered the material in Lesson 3 when you can: Identify the importance of protecting computer hardware from theft and damage. Explain how to protect data. Identify environmental factors that can cause damage to computer hardware and media. Identify how to protect computer hardware from power loss and fluctuation. Identify common problems associated with computer hardware. Data Files Data Files You will not need data files to complete this lesson. Mod1-54: Introduction Mod1-54: Introduction As the use of computers has grown in volume and importance, protecting computer systems and the information they hold has become increasingly important. You should be aware of the importance of computer maintenance, the risks of computing, and the measures that can be taken to minimize those risks. 1) Identify some responsibilities that govern your use of technology. In what ways do those help protect privacy, exercise ethics, or maintain a safe work environment? Mod1-54: Protecting Computer Hardware from Theft and Damage Theft of and damage to computer equipment are serious problems. To make sure your computer is safe, - Physically secure equipment. - Use security locks. - Mark equipment with identification mark. - Insure the equipment. - Back up data to a separate system. Employees using company computers for personal use may not realize that this could constitute theft. Some companies offer security software for notebook computers that can trace the location of a stolen computer when it is connected to the Internet. The location information is forwarded to the company, and they contact law enforcement officials who may be able to recover the computer. Spend some time researching the legal aspects of companies using spyware to monitor personal
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
computer use by employees. Do you think employees accessing company computers for personal use is a crime and therefore companies have a right to prevent this type of theft . Research the risk factors you can think of that might put equipment such as notebook computers, handheld devices, cell phones, and other transportable devices in danger of being stolen or damaged. For each risk factor, brainstorm ideas about how to minimize the risk. Mod1-55: Data Protection
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

Page1 / 5

L3_Lecture_Notes - Computer Literacy BASICS A Comprehensive...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online