Архитектура Аудит Военная наука Иностранные языки Медицина Металлургия Метрология
Образование Политология Производство Психология Стандартизация Технологии


Computer-related problems and solutions



 Let me introduce myself. I am Adil Kaliyev. I am a student of the first year of CSSE in IITU. I want to talk about computer.

Every computer owner experiences some kind of problem every now and then. Now matter how secure, new and updated your computer is, it will eventually run into some kind of problem.

Computer Won’t Turn On

A computer not turning on is something that’s beyond a computer owner’s control. A computer not turning on can be due to multiple reasons, and requires troubleshooting in order to zero down the problem. Most common reasons for computer can range from as simple as loose cord or as serious as faulty power supply.Another common issue with computer is that the device may power up but is unable to boot or just show a black screen. Probable reasons for a blank/ black screen include dead hard drive, corrupted boot sector or simply unplugged monitor or some kind of display issue.

Computer Gets Slow

This usually happens when the a large amount of junk files get accumulated over time. Whenever any application is uninstalled or removed from the computer, its leftover files may continue to occupy some space in the hard drive. Leftover files and data are useless and result in degradation of the hard drive, causing the computer to get slower over time. Other reasons for a computer getting slow are low or insufficient memory and low hard drive space.

*********************************************************************

Threats of computer use

 Let me introduce myself. I am Adil Kaliyev. I am a student of the first year of CSSE in IITU. I want to talk about threats of computer use.

Perhaps the most common threat in the computer is malware. "Malware can be computer viruses, worms, Trojan horses, spyware, and etc.

A computer virus is a small piece of software that can spread from one infected computer to another. The virus could corrupt, steal, delete data on your computer-even erasing everything on your hard drive. Users can infect their computers with Trojan horse software simply by downloading an application they thought was legitimate but was in fact malicious. Once inside your computer, a Trojan horse can do anything from record your passwords by logging keystrokes to hijacking your webcam to watch and record your every move. Malicious spyware is used to describe the Trojan application that was created by cybercriminals to spy on their victims. An example would be keylogger software that records a victim’s every keystroke on his or her keyboard. The recorded information is periodically sent back to the originating cybercriminal over the Internet. Keylogging software is widely available and is marketed to parents or businesses that want to monitor their kids’ or employees’ Internet usage. A computer worm is a software program that can copy itself from one computer to another, without human interaction. Worms can replicate in great volume and with great speed. For example, a worm can send copies of itself to every contact in your email address book and then send itself to all the contacts in your contacts’ address books.

*********************************************************************

Internet addiction

Let me introduce myself. I am Adil Kaliyev. I am a student of the first year of CSSE in IITU. I want to talk about Internet.

Internet addiction is very similar to pathological gambling. Some Internet users may develop an emotional attachment to on-line friends and activities they create on their computer screens. Internet users may enjoy aspects of the Internet that allow them to meet, socialize, and exchange ideas through the use of chat rooms, social networking websites, or "virtual communities." Other Internet users spend endless hours researching topics of interest Online or "blogging". Blogging is a contraction of the term "Web log", in which an individual will post commentaries and keep regular chronicle of events. It can be viewed as journaling and the entries are primarily textual.

Similar to other addictions, those suffering from Internet addiction use the virtual fantasy world to connect with real people through the Internet, as a substitution for real-life human connection, which they are unable to achieve normally.

Internet addiction results in personal, family, academic, financial, and occupational problems that are characteristic of other addictions. Impairments of real life relationships are disrupted as a result of excessive use of the Internet. Individuals suffering from Internet addiction spend more time in solitary seclusion, spend less time with real people in their lives, and are often viewed as socially awkward.

*********************************************************************


Поделиться:



Последнее изменение этой страницы: 2019-06-10; Просмотров: 168; Нарушение авторского права страницы


lektsia.com 2007 - 2024 год. Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав! (0.007 с.)
Главная | Случайная страница | Обратная связь