Thursday, 10 May 2012

Assignment 5 Health and Safety when connecting Peripherals

Working practices and health and safety issues when connecting the peripherals

In this document I will be explaining the health and safety issues when connecting peripherals to your computer.

The best way to connect peripherals to your CPU or computer is to make sure that you turn off any electrical components to do with your CPU or computer. You then can connect your peripherals to your computer without the worry of an electric shock. Another way to connect peripherals safely is to not touch any wires inside or outside of the device this could lead to an electric shock when they are turned on. If there is a wire that sticks out of a peripheral it is best that you disconnect or turn off power to the peripheral straight away for safety reasons. If you touch the device when it is connected to the computer you could have a heavy electrical shock because it is connected to the computer which will produce more of an electrical shock. When you aren’t using your peripherals plug them out of your CPU or computer. If you don’t do this it could lead to them burning out or over heating. Also if they your peripherals become over heated it is best that you keep it in a cool place so that it will cool down. If you don’t the peripheral will probably burn out and you won’t be able to use it.






















When connecting peripherals it is best that you keep your desk tidy so that any objects don’t get tangled up with wires or components also. If you do not keep your workstation tidy it could lead to wires over heating when any of your objects cover your components this can be a health and safety issue. Also it is very important that you don’t have any kind of liquid near your workstation this is a big health and safety issue. This could lead to you either spilling your drink over your computer which costs a lot of money or spill your drink over components this will lead to your workstation going on fire. It is best that you keep your workstation tidy so that any of these issues doesn’t happen to you.
















Thursday, 3 May 2012

Assignment 5 Connecting Peripherals To My Computer


User Guide




 

Introduction

I have been asked to do a practical computer setup of me connecting peripherals to my computer. I had to take photos of me switching a plug off, Connecting a speakers, Connecting a USB connection to a camera, Connecting the camera to the lead and finally I had to screen shot my photo graphs in my Computer systems folder.




Here is a picture of me turning off a plug before I proceed with the piratical computer setup incase I get an electrical shock. By doing this it will prevent you from any electrical components shocking you.












 

Here is a picture of me connecting up the speakers to the CPU so that I can listen to music and videos.












 


Here I have connected up the speakers to the CPU. This means that the speakers will output the sound from any video or music I listen to.






 


This is me connecting a USB connection to a camera so that I can open files from my camera into my computer. This means that I can view all my folders on my camera.









 

This is me connecting the camera to the lead and connecting it to the computer hard drive so that I can input my folders from my camera to my computer. This means i can input all my folders to my computer for example my images.








 



Now I will be explaining how I inputted the camera to the computer and how I inserted the pictures I took for the practical computer setup. 

Here is a picture of how I inserted the camera to my computer and opening the external memory to open my images folder. This means I can view my images that I have inserted from my camera.



























 

Here is a picture of the DCIM folder which has my images in it. This means that I can open this folder and view my images that I have taken for connecting peripherals to my computer.





 

Here is a print screen of my images that I inserted from my camera to my computer. This means I can copy all my images and save them into my files so that they won’t delete when I take out the lead from the camera to my computer.






 


Finally here is a print screen of all my images in my computer systems folder. This means that I have saved all my images from my camera.


























Friday, 23 March 2012

Assignment 4 Security Risks

Assignment 4

Security Risks

I have been asked to evaluate a network for security threats and provide solutions. Also I must explain these situations below and indentify them.

50 users on a network:

By having these many users it would be hard to get track of every user and protect them from unwanted viruses. Network licenses only provide several users and if you use more than that it is illegal. Also by having this many users it could lead to a fault in the network and can cause the users to lose data.


















No log on to the network:

By not having No Log on to a network people can access your internet and be able to use it with out you knowing. If something goes wrong with the network or file server the whole network will be unable to work properly. A user can log on to a computer anywhere on the network and access their work files from the file server.









Staff are ‘allowed’ to install and remove software:

By allowing staff to install or remove software can lead to the software being damaged or not working properly. Staff could not realize what they are doing and installing the wrong software this could lead to hackers or viruses. You should check that your staff knows what they are doing incase of this happening.


















Data back up tapes:

You would need to have a back up data just incase your data gets hacked so then you will be able to access it again. If you have a back up data they must be kept in a secure box so that nothing can damage it, no one can access it and it must be updated at least every week. If you do not keep your data back up save people can access it and access your personal information for e.g. bank details, Name and addresses. This is called data protecting law this is identity theft. It is against the law to use other people’s personal information. 

The possible threats too a data stored in a system is that it could be hacked by a virus and it could be in danger of losing the data. You must have good antivirus software to be able to defend your data.

The effects of having poor practice can lead the company losing all of there data furthermore the company can lose their business and can be fined by not protecting clients personal information.


















No firewall is in place:

A firewall is a software or hardware that protects you from viruses. If you do not have firewall you are open to viruses and this can lead to people accessing your information. The reason why you should have firewall is that you can defend against unwanted viruses and you are able to protect your personal information.











No restrictions on internet access:

By having no restrictions on the internet you are open to viruses, worms, adware, and trojans. If you are hacked by any of these viruses you are in danger of people accessing your personal information.  Also this can lead to your computer being non- responsive or not working.




























Downloads are not monitored:

Downloads that are not monitored can lead to viruses hiding behind the download and being able to disguise itself. This can easily happen if you do not keep your downloads monitored.





















IP address log is not kept on sites that you visited:

When a IP address log is not kept on sites that you visit this means that you will be in danger if you click on there link this can lead to Spyware, Trojan and other viruses hacking your computer.