CEI45
ASSIGNMENT 1
     Shaniya Lal
    S11192617
1. A high strength password consists of more characters and humans and computer
     programs find hard to discover, effectively shielding data from unauthorized access.
     [ CITATION web20 \l 3081 ] For proper authorization and to prevent theft and fraud of
     documents and important files stored in a workplace.
2. Security options
        Security records
        User id
        User profile
        Copy user security
        Change sign in password
3.   - processor power
-    Memory – RAM
-    Secondary storage capacity
-    Architecture
-    Hard drive space; 16GB > 32 bit OS
                       32GB > 64 bit OS
4. NTFS
    Works easily with large files and is faster and secure [ CITATION IND20 \l 3081 ]
5. USB stick installation
   Hard drive installation
   Virtual Box installation[ CITATION chu16 \l 3081 ]
6.    Software set to designed to work similar programs. E.g.; Microsoft office / cross
     over is a compatibility layer of Microsoft word usable for Linux, mac OS and Chrome
     OS [ CITATION com17 \l 3081 ] [ CITATION wik201 \l 3081 ]
7. Performance monitor , resource monitor, open hardware monitor
     [ CITATION ang16 \l 3081 ]
8. CrystalDiskInfo , Hddscan, Malware bytes
     [ CITATION rya19 \l 3081 ]
9. I) is not a stand-alone component of security system, coexists with other security
   services and good tool to specify permissions.
   ii) Encrypt data at all times, make sure data is protected and can be accessed by
   authorized employees, regularly monitor your data [ CITATION mic16 \l 3081 ]
10. Network security tool monitoring incoming and outgoing network traffic and
    approving/blocking data packets according to a set of security rules. [ CITATION for20 \l
    3081 ]
       Gives protection against security threats/ imposes restrictions on network services
11. Via unknown email attachments, infected storage devices, software downloading
    from malicious websites, social media spams, visiting unknown links. [ CITATION
    Dan15 \l 3081 ]
12. OS: Windows 10- 64bit
     Microsoft office
     Antivirus software’s
     VLC Media player
     CCleaner
     GIMP ( image editor)
          [ CITATION Mar17 \l 3081 ]   [ CITATION the20 \l 3081 ]
13.
         Multitasking
         Multi programming
         Parallel processing
         Buffering
         Spooling
14. 1ghz or faster processer, 2gb for 64 bit RAM, 20gb for 64 bit OS hard disk space,
    virtual box installed since was a test machine
      [ CITATION EMI15 \l 3081 ]
15. Collections of operations performed by a computer device when electrical power is
      turned on. The cycle starts when a switched off computer is re- energized and ends
      when the computer is able to carry out its operations.[ CITATION VSk20 \l 3081 ]
16. ROM chip found on motherboards that allows you to access and customize the most
    basic level of your computer system. [ CITATION com20 \l 3081 ]
17. Press F2, F1 ESC, and DELETE – try to hold down either one of the keys
      immediately after starting or restarting your computer to pull up the BIOS screen
      during start-up phase [ CITATION PCN20 \l 3081 ]
18. A collection of rules regulating the data format transmitted over the internet or some
    other network. [ CITATION oxf20 \l 3081 ]
19. Each computer using the internet has a unique identifier
      Works by connecting a network that is linked to internet when you hop online to send
      an email. This connects to ISP you have at home or office computer network, your
      machine uses IP address to do this effectively.[ CITATION jay17 \l 3081 ]
20. Temporary IP address assigned to a computer device/ node when connected to a
    network.
      [ CITATION tec202 \l 3081 ]
21. Logical partition of an IP network into smaller, different segments of the network.
22. A Microsoft windows software system which is responsible for handling all print
    jobs that are currently being sent to the computer printer. [ CITATION com19 \l 3081 ]
23. Allows you to regulate the amount of paper consumption required by department.
    Also helps optimize costs. [ CITATION bbc20 \l 3081 ]
24. * Question repeated -23
25. Microsoft windows- Zoho assist[ CITATION tec203 \l 3081 ]
      Android- Team viewer
26.
           1. W7 is slow and lagging               Remove superfluous results
           2. W7 driver issues                     Upgrade or get new driver or reboot
           3. W7 theme changes custom icons        Personalize> change desktop
                                                   icons>clear allow themes> ok
27.
           1. Address book and mail tends to       Have backup and always try restarting
              crash together                       your address book
           2. Snow leopard wont install on         Can be fixed in disk utility
              hard disk
      [ CITATION tec204 \l 3081 ]
28. Take care of own and other workers health and safety, do not deliberately abuse
    anything to encourage health, safety and welfare at work. [ CITATION wor20 \l 3081 ]
29. Use ideal sitting posture, pus your hips far back of your chair. Keep your feet flat on
      the floor, head should be straight and neck should be straight as well. Make sure to
      take small breaks such as stretches in between.[ CITATION doh20 \l 3081 ]
      The picture below explains the correct posture while using computers
        Shoulders should be relaxed not stiffed, back should be straight and arms should be
        on the arm rest. Feet flat and together on the floor. [ CITATION erg20 \l 3081 ]
References
angeladmin, 2016. https://angelcom.com/. [Online]
Available at: https://angelcom.com/best-computer-diagnostic-tools/
[Accessed 4 april 2020].
bbcdigital, n.d. https://www.bbcdigital.com.au/. [Online]
Available at: https://www.bbcdigital.com.au/the-advantages-of-a-print-management-system/
[Accessed 5 april 2020].
Brinkmann, M., 2017. https://www.ghacks.net/. [Online]
Available at: https://www.ghacks.net/2015/07/26/essential-software-for-windows-10/
[Accessed 5 april 2020].
chubbable, 2016. https://chubbable.com/. [Online]
Available at: https://chubbable.com/endless-os-installation
[Accessed 4 april 2020].
consulting, d., n.d. https://www.ergonomics.com.au/. [Online]
Available at: https://www.ergonomics.com.au/how-to-sit-at-a-computer/
[Accessed 5 april 2020].
drolet, m., 2016. https://www.csoonline.com/. [Online]
Available at: https://www.csoonline.com/article/3067715/3-ways-to-protect-data-and-control-
access-to-it.html
[Accessed 5 april 2020].
dube, r., 2019. https://helpdeskgeek.com/. [Online]
Available at: https://helpdeskgeek.com/free-tools-review/15-windows-diagnostics-tools-to-improve-
your-pcs-health/
[Accessed 4 april 2020].
forcepoint, n.d. https://www.forcepoint.com/. [Online]
Available at: https://www.forcepoint.com//cyber-edu/firewall
[Accessed 4 april 2020].
hope, c., 2017. https://www.computerhope.com/. [Online]
Available at: https://www.computerhope.com/jargon/i/intesoft.htm
[Accessed 4 april 2020].
hope, c., 2019. https://www.computerhope.com/. [Online]
Available at: https://www.computerhope.com/jargon/p/prinspoo.htm
[Accessed 5 april 2020].
hope, c., 2020. https://www.computerhope.com/. [Online]
Available at: https://www.computerhope.com/jargon/b/bios.htm
[Accessed 5 april 2020].
miller, j., 2017. https://blog.telegeography.com/. [Online]
Available at: https://blog.telegeography.com/how-do-ip-addresses-work
[Accessed 5 april 2020].
Oh, D., 2015. https://insights.motherg.com/. [Online]
Available at: https://insights.motherg.com//blog/5-common-ways-computer-viruses
[Accessed 4 april 2020].
oxford, n.d. https://www.google.com/. [Online]
Available at: https://www.google.com/search?
q=internet+protocol&oq=internet+&aqs=chrome.1.69i57j0l7.6042j0j8&sourceid=chrome&ie=UTF-8
[Accessed 5 april 2020].
PC.Net, n.d. https://pc.net/. [Online]
Available at: https://pc.net/helpcenter/answers/key_to_enter_bios
[Accessed 5 april 2020].
PROTALINSKI, E., 2015. https://venturebeat.com/. [Online]
Available at: https://venturebeat.com/2015/03/18/microsoft-reveals-windows-10-hardware-
requirements-and-upgrade-paths/
[Accessed 5 april 2020].
technopedia, n.d. https://www.techopedia.com/. [Online]
Available at: https://www.techopedia.com/definition/28504/dynamic-internet-protocol-address-
dynamic-ip-address
[Accessed 5 april 2020].
techradar.pro, n.d. www.techradar.com. [Online]
Available at: https://www.techradar.com/news/best-remote-desktop-software
[Accessed 5 april 2020].
techradar, n.d. https://www.techradar.com/. [Online]
Available at: https://www.techradar.com//news/computing/apple/20-snow-leopard-problems-
solved-666067/2
[Accessed 5 april 2020].
thewindowsclub, 2020. https://www.thewindowsclub.com/. [Online]
Available at: https://www.thewindowsclub.com/best-free-software-for-windows-10
[Accessed 5 april 2020].
trends, e., n.d. http://ergonomictrends.com/. [Online]
Available at: http://ergonomictrends.com/creating-perfect-ergonomic-workspace-ultimate-guide/
[Accessed 5 april 2020].
UNIVERSITY, I., n.d. https://kb.iu.edu/. [Online]
Available at: https://kb.iu.edu/d/ajqm
[Accessed 4 april 2020].
VSkills, n.d. https://www.vskills.in/. [Online]
Available at: https://www.vskills.in/certification/tutorial/it-support/the-booting-process/
[Accessed 5 april 2020].
webopedia, n.d. https://search.webopedia.com/. [Online]
Available at: https://search.webopedia.com/serp?q=strong+password
[Accessed 4 april 2020].
wikipedia, n.d. https://en.wikipedia.org/. [Online]
Available at: https://en.wikipedia.org/wiki/CrossOver_(software)
[Accessed 4 april 2020].
worksafe, 2020. https://www.worksafe.vic.gov.au/. [Online]
Available at: https://www.worksafe.vic.gov.au//occupational-health-and-safety-your-legal-duties
[Accessed 5 april 2020].