Chapter Fifteen
Chapter Fifteen
Chapter Fifteen
CHAPTER FIFTEEN
COMPUTER MAINTENANCE
Overview
In the course of time, the performance level of your computer is likely to go down for a number of
reasons. In some cases problems may arise that disable parts or all of the functions of the computer. The
goal of this chapter is to minimize problems and to provide an approach to dealing with problems with
minimal hassle and cost.
1. An ounce of prevention is worth a pound of cure. Most problems can be avoided if some
prevention is done. Even if there is an issue, the earlier it is discovered the less damage there
will be. Regular computer maintenance will avoid a world of problems.
2. In this chapter there are some helpful guidelines listed will simplify problem solving to a great
degree.
3. Finding the cause of the problem is the first step to the solution. There are many aids to
troubleshooting available.
4. You can fix many problems but some require more care or expertise.
Learning Objectives
Computer Virus
Types of Virus
Symptoms of a computer virus
Spyware
Process to remove a Computer Virus and Spyware
Uninterruptible power supply
Hardware maintenance tips
Software maintenance
Computer Maintenance Tips.
Page- 389
Chapter Fifteen Computer Maintenance
Introduction
Computer maintenance is the practice of keeping computers in a good state of repair. Computer
Maintenance can is in the form of any activity as given below:
Computer cleaning
Computer cleaning is the practice of physically cleaning the interior, and exterior, of a computer
including the removal of dust and debris from cooling fans, power supplies, and hardware components.
Backup
Important data stored on computers may be copied and archived securely so that, in the event, of
failure, the data and systems may be reconstructed. When major maintenance such as patching is
performed, a backup is recommended as the first step in case the update fails and reversion is required.
Disk maintenance
Disk storage, such as your hard drive, fills up with unwanted files over time. Disk cleanup may be
performed as regular maintenance to remove these. Files may become fragmented and so slow the
performance of the computer. Disk defragmentation may be performed to combine these fragments and
so improve performance.
Dust
Dust and other cruft may accumulate as a result of air cooling. If filters are used to prevent this then
they will need regular service and changes. If the cooling system is not filtered then regular Computer
cleaning may be required to prevent short circuits and overheating.
Law
Computer maintenance activities are specifically exempt from the Digital Millennium Copyright Act
and so copies of copyright files may be made in the course of maintenance provided that they are
destroyed afterwards.
Registry
Operating systems files such as the Windows registry may require maintenance. A utility such as a
registry cleaner may be used for this.
Security
Service intervals
Depending on your environment computers should be serviced at least once per quarter, though
monthly service is optimal. This will ensure your computers run at their peak performance.
Software updates
Software packages and operating systems may require regular updates to correct software bugs and
address security weaknesses. An automated or semi-automated program such as Windows update may
be used for this.
Computer Virus
A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is
also commonly but erroneously used to refer to other types of malware, including but not limited to
adware and spyware programs that do not have the reproductive ability. A true virus can spread from
one computer to another (in some form of executable code) when its host is taken to the target
computer; for instance because a user sent it over a network or the Internet, or carried it on a removable
medium such as a floppy disk, CD, DVD, or USB drive.
Page- 390
Chapter Fifteen Computer Maintenance
Types of Viruses
Not all computer viruses behave, replicate, or infect the same way. There are several different
categories of viruses and malware. Below I list and discuss some of the most common types of
computer viruses.
Trojan horse:
A Trojan horse program has the appearance of having a useful and desired function. While it may
advertise its activity after launching, this information is not apparent to the user beforehand. Secretly
the program performs other, undesired functions. A Trojan horse neither replicates nor copies itself, but
causes damage or compromises the security of the computer. A Trojan horse must be sent by someone
or carried by another program and may arrive in the form of a joke program or software of some sort.
The malicious functionality of a Trojan horse may be anything undesirable for a computer user,
including data destruction or compromising a system by providing a means for another computer to
gain access, thus bypassing normal access controls.
Worms:
A worm is a program that makes and facilitates the distribution of copies of itself; for example, from
one disk drive to another, or by copying itself using email or another transport mechanism. The worm
may do damage and compromise the security of the computer. It may arrive via exploitation of a system
vulnerability or by clicking on an infected e-mail.
Macro Virus:
Macro viruses are viruses that use another application's macro programming language to distribute
themselves. They infect documents such as MS Word or MS Excel and are typically spread to other
similar documents.
Page- 391
Chapter Fifteen Computer Maintenance
Polymorphic Viruses:
A polymorphic virus not only replicates itself by creating multiple files of itself, but it also changes it's
digital signature every time it replicates. This makes it difficult for less sophisticated antivirus software
to detect.
Page- 392
Chapter Fifteen Computer Maintenance
Spyware
Spyware can install on your computer without your knowledge. These programs can change your
computer’s configuration or collect advertising data and personal information. Spyware can track
Page- 393
Chapter Fifteen Computer Maintenance
Symptoms of Spyware
When a computer becomes affected by Spyware, the following may result:
Slow internet connection.
Changing your web browser’s home page.
Loss of internet connectivity.
Failure to open some programs, including security software.
Unable to visit specific websites, which may include redirecting you to another one.
Even for an expert, removing a computer virus or spyware can be a difficult task without the help of
computer malicious software removal tools. Some computer viruses and other unwanted software
reinstall themselves after the viruses and spyware have been detected and removed. Fortunately, by
updating the computer and by using malicious software removal tools, you can help permanently
remove unwanted software.
To remove a computer virus and other malicious software, follow these steps:
Install the latest updates from Microsoft Update:
1. For Windows Vista and Windows 7:
a. Click the Pearl (Start) button, then type Windows Update in the search box.
b. In the results area, click Windows Update.
c. Click Check for Updates.
d. Follow the instructions to download and install the latest Windows Updates.
2. For Windows XP:
a. Click Start, then click Run.
b. Type sysdm.cpl and press the Enter key.
c. Click the Automatic Updates tab and choose the Automatic (recommended)
option.
d. Click OK.
Page- 395
Chapter Fifteen Computer Maintenance
generators and flywheels for high power users. The on-battery runtime of most uninterruptible power
Fig 15.1: Picture of an UPS
sources is relatively short—5–15 minutes being typical for smaller units—but sufficient to allow time to
bring an auxiliary power source on line, or to properly shut down the protected equipment. While not
limited to protecting any particular type of equipment, a UPS is typically used to protect computers,
data centers, telecommunication equipment or other electrical equipment where an unexpected power
disruption could cause injuries, fatalities, serious business disruption or data loss. UPS units range in
size from units designed to protect a single computer without a video monitor (around 200 VA rating)
to large units powering entire data centers, buildings, or even cities.
Software maintenance
Software Maintenance in software engineering is the modification of a software product after delivery
to correct faults, to improve performance or other attributes.
A common perception of maintenance is that it merely involves fixing bugs. However, studies and
surveys over the years have indicated that the majority, over 80%, of the maintenance effort is used for
non-corrective actions (Pigosky 1997). This perception is perpetuated by users submitting problem
reports that in reality are functionality enhancements to the system.
Software maintenance and evolution of systems was first addressed by Meir M. Lehman in 1969. Over
a period of twenty years, his research led to the formulation of eight Laws of Evolution (Lehman 1997).
Key findings of his research include that maintenance is really evolutionary development and that
maintenance decisions are aided by understanding what happens to systems (and software) over time.
Lehman demonstrated that systems continue to evolve over time. As they evolve, they grow more
complex unless some action such as code refactoring is taken to reduce the complexity.
The key software maintenance issues are both managerial and technical. Key management issues are:
alignment with customer priorities, staffing, which organization does maintenance, estimating costs.
Key technical issues are: limited understanding, impact analysis, testing, and maintainability
measurement.
Following this rule will prevent permanent hard drive defects caused by the hard drive heads contacting
the surface of the drive disc, and it will prevent a host of Windows problems.
Whenever possible, recover from crashes by pressing the Ctrl + Alt + Delete keys at the same time.
Press them again to reboot your computer.
2. I highly recommend that you purchase an UPS (uninterruptible power supply) for your computer.
This will keep your computer from crashing during power outages, and will protect your computer from
low and high voltage occurrences.
An UPS is far superior to a surge protector and will save your computer from almost any type of power
disaster. (See #1 above for what happens when your computer crashes.)
3. Backup, backup, backup, any data you cannot afford to lose to at least two separate physical drives.
So backup data to external hard drives, USB/thumb drives, CD-RW's etc.
The time to backup is when you create something you can't afford to lose. Don't wait until tomorrow.
4. Run Scandisk and Defragment at least once a month. This will keep your hard drive healthy and
prevent crashes. Alternatively, purchase a disk utility program and use it to keep your hard drive
healthy. These programs are part of Windows and can be found at Start/Computer then Right click on
the drive you want to fix. Choose Scandisk or Defragment from the menu.
5. Never unplug peripherals from the computer when it is powered up. Unplugging with the power
on can short out the connector socket or the motherboard. The only exception to this rule is if you know
a peripheral is "hot pluggable". If you do not know what "hot pluggable" means then ignore this
exception.
6. Do keep at least 300 MBs of your C: drive free for Windows to use. If you use Windows XP,
Vista, or WIndows 7 then you should have 400-600 MBs of free space on your C: drive.
If you do not have enough free space you will choke Windows and it will start dumping data to your
hard drive (or designated virtual drive), or it will just get really, really, slow (you will see your hard
drive light on all the time and your computer will be locked up until the drive stops spinning).
Page- 397
Chapter Fifteen Computer Maintenance
Use the ADD/Delete tool in the Windows Control Panel to delete unneeded programs from your drive.
You can also use disk/utility cleaning programs to get rid of clutter on your hard drive and to speed up
your system, we recommend using a PC speed up program like PC Cleaner.
7. Do not let a lot of programs load up when you start your computer . They use valuable memory
and Windows Resources (Windows internal workspace).
All programs in your Windows System Tray (in the lower left of your screen) are running on your
computer. Close them if you don't need them or run them and configure them not to load when you boot
up. Other programs running in the background can be found by pressing Ctrl + Alt + Delete at the same
time.
8. Do use an antivirus checker regularly. Everyone should have an antivirus checker that boots up
when their computer starts. The best type of protection is continuous monitoring from a dedicated anti-
virus program (for example Ad Aware Pro, Panda AntiVirus Pro, BitDefender Total Security, Spyware
Doctor with AntiVirus). Also, make sure the anti-virus program is set to update automatically. These
programs must regularly update their virus definitions to provide the best defense against new viruses
and other malware..
9. If you have a high speed Internet connection, you need a firewall program. A firewall program
keeps those who want to hijack your computer from gaining access to your system. You really do not
want someone else running your computer.
All current versions of Windows come with a built in firewall program. You can access the Windows
firewall at Start/Control Panel/Internet Connections/Windows Firewall. This program should always be
running unless you choose to use a different firewall program.
For additional protection, you should consider Internet security software that has firewall programs and
other web security tools built-in e.g. PC Tools Internet Security, Panda AntiVirus Pro, and BitDefender
Total Security have firewall, antivirus, and other security programs bundled together in one package.
Case in point: When I am online 10 hours or more with my DSL connection, my computer is usually
attacked by a hacker at least once.
Do not think you are safe from hackers!! Hackers use search programs to seek out computers at
random. Get a firewall program and use it.
10. Keep track of the software disks you receive with your computer and new peripherals. These
disks contain valuable software drivers and programs for Windows and are needed when Windows
must be reloaded. Keep these disks and your Windows software disks in a safe, dry, place -- you never
know when you will need them.
11. Make sure Windows Update is set to Automatically Update your computer. Windows is
frequently updated by Microsoft to prevent virus and malware attacks, to improve Windows
performance, and to provide new features. Access Windows Update at Start/Control Panel/System/
Security/Windows Update.
Keeping these computer maintenance tips in mind will keep your PC in top shape and keep you from
having an expensive repair bill.
Page- 398
Chapter Fifteen Computer Maintenance
Page- 399
Chapter Fifteen Computer Maintenance
Update your anti-virus scan and anti-spyware definitions, if they aren’t being done
automatically.
Back up any critical files that you have changed today to your flash drive.
Make sure your anti-virus and anti-spyware programs have been updated with the latest
definitions, and run a full scan from both programs.
Reboot your computer. (If you shutdown your computer each night, disregard this tip). If you
leave your computer on all the time, definitely do this. It will reset the RAM, and your
computer will run much better and faster.
Page- 400
Chapter Fifteen Computer Maintenance
Clean up your temp files, your temporary internet files, and other junk files about once a
month. To do this easily, you can either download my favorite program for cleaning, CCleaner.
Or you can run the built-in Windows Disk Cleanup tool for XP or the Disk Cleanup for
Windows 7.
Ensure you have the latest Windows updates installed. Go to Internet Explorer, Tools,
Windows Update. Click on the Custom button. (I always use the Custom button so I can check
what’s going to be installed before it gets installed). Windows update may ask you to
download and install the latest version of itself. Go ahead and do that, then click Close when
it’s finished, and then Continue. It will then check again for real updates and offer those.
Choose which updates you want to install. Uncheck the ones you don’t want to install.
Clean out your email, paying special attention to your Inbox and Sent box. The easiest way
I’ve found is to sort your email box by size of the message, and delete the largest unneeded
emails first.
Exercise
1. What do you mean by Computer Maintenance?
2. Define Computer Virus and write about the types of virus.
3. What do you mean by Virus infected computer?
4. What are the Symptoms of a Computer Virus?
5. What is Spyware? What are the Symptoms of Spyware?
6. Write the process to remove a Computer Virus and Spyware
7. Write the names of Anti Virus.
8. Describe Uninterruptible power supply.
9. What are Hardware maintenance tips and Software maintenance?
10. Write the importance of Software maintenance.
11. Write about the tips of Computer Maintenance.
Page- 401