We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Maintenance Case Essay Sample

The whole doc is available only for registered users OPEN DOC
  • Pages:
  • Word count: 1631
  • Category: computer

Get Full Essay

Get access to this section to get all the help you need with your essay and educational goals.

Get Access

Maintenance Case Essay Sample

1. There are numerous pieces of software that help you to keep you’re computer running efficient and safe. Some of these pieces of software are included on your operating system, but also some are 3rd party, which means you have to purchase them from someone else, whether it is a download or on a disc.

One type of software is a registry cleaner. The registry cleaner goes through your windows operating system registry, and deletes unwanted or redundant files, causing an increase in your computers performance. However you should be careful to ensure that the software is recommended, as if it deletes a wrong file, then your operating system might not run correctly. An example of a registry cleaner is “Eusing Free Registry Cleaner” which is recommended by PC World, and can be obtained for free from the Eusing website.

Another type of software utility is a disk defragmenter. A disk defragmenter basically collects partial pieces of the same file from all over your hard drive, and puts them back together into one file. There is a disk defragmenter program available for your use on every Windows OS that has been released, which is fairly simple to use, however if you prefer a more thorough disk defrag, you are better off to go for “DiskKeeper” which is a 3rd party program, that is certified for Windows Vista and Windows Server 2008, this can be obtained from the DiskKeeper website for $29.95 which is roughly �15.

Yet another type of software utility is System Restore. System restore rolls back the settings of the computer, to a previously stored date. This can help if a program has been installed that is making your computer run slow, instead of having to go through the installation process, then the computer can roll back to before the program was installed. Again, Windows comes with this software pre installed, and it is relatively easy to use. If you prefer to use 3rd party software, there is also a program available from Horizon DataSys to do this process, it is available from www.rollbacksoftware.com for $69 or about �35.

Another type of software utility is System Profiler, this software utility is used to give you a full profile of all the software and hardware on your system. This is helpful as you can then tell whether you have any unwanted software, and also if you buy a new piece of software, then you can check the requirements from it on your system profile. Windows has a useful program that is similar to a system profiler, which is called system information, which gives you information on your hardware, software and even internet settings and office settings. However, for a more concise profile you could use the 3rd party software Belarc Advisor, which gives a very precise system profile, and is available free from www.belarc.com/free_download.html .

Your computer will need protection from harmful viruses that can be caught from the internet, emails, downloads and numerous other things. For this you will need a firewall, which blocks connections from unknown sources, or sources that you have not specified as safe. Luckily, Windows comes with its own built in security feature, ironically called “Windows Security Center” which includes a firewall. If you want a more comprehensive protection against viruses, then you can choose to purchase a 3rd party firewall, such as Norton Personal Firewall, which can be bought or downloaded from the internet.

If a virus does manage to slip through your firewall, then a good antivirus program is essential to locate and quarantine harmful files. Although Windows does not feature an anti-virus on the operating system, if your pc is bought from a retailer such as PC World, then an anti-virus software may already be installed for you. However if you do not have an anti-virus installed then a good example of a 3rd party anti-virus is Norton Anti-Virus, which can be picked up in store or downloaded via the internet.

If you feel you do not have enough storage space, and decide to clear your hard drive or buy an extra one, then you need to go through a process called Formatting. Formatting basically erases all data and also prepares the disk to store your data magnetically. If you have a version of Windows that is XP or under, then there is a handy tool to use that formats your C drive for you, this is called FDISK which can be run from command prompt. If you have a Vista powered computer, then you can use a 3rd party formatting software or partitioning software, such as Norton Partition Magic.

2. How to use disk defragmenter

First of all go to Start – Programs – Accessories – System Tools – Disk Defragmenter.

You will then get to this screen.

From this screen you can choose which volume that you want to defragment. For example if you take a look in the above picture, you can see the E: drive highlighted.

To continue, you can either go straight ahead with the defragmentation, or ask for an analysis of the volume you are defragmenting.

If you choose the analysis then you will receive this report, which shows you all of the fragmented files on the volume that you have analyzed.

When you have received the analysis you can either choose to defragment the volume or just leave it. To defragment, just click defragment. When you click defragment, the computer searches through the specified volume for fragmented files, and gathers the pieces of the same file and puts them back together, this will be represented by a loading screen. After this process, a report will appear on the screen, and then all you need to do is close the program.

How To Use Disk Cleanup

To start the disk cleanup, go to Start – Programs – Accessories – System Tools – Disk Cleanup.

At first the Disk Cleanup will calculate what files it can compress and delete, this will look like this;

After the computer has calculated what can be done to reduce the amount of space taken up on the hard drive, you will get this screen, which shows all of the options that you have to make extra space on your hard disk.

When you see this screen, select which actions you would like to do, for example delete the temporary files or empty the recycle bin to reduce the amount of disk space taken up. Then click ok. You will then get a screen that shows the progress of the action. It will look like this.

You have now finished your disk cleanup.

3. For my list of maintenance processes see the separate sheet.

4. How To Replace A Hard Drive

First of all, pull out the power cable from the back of the system, to make sure that there is no power source going into it, so you know you are not putting yourself at risk.

Next put on your anti-static wristband, and connect it to a non painted piece of metal on your case. The reason for using an anti-static wristband, is that it prevents static electricity building up, which can then cause an electrostatic discharge (ESD), this could seriously damage your motherboard and all of the components connected to it.

Next, take off the case cover on your computer, ensuring you keep any screws in a safe place so that you do not use them.

Now remove the IDE and Power cables from your HDD and remove it from the bracket/case that it may be in.

Now take your other hard drive, and make sure you set your jumper settings so that the hard drive is set to master, as seen below. To remove the pins use some small tweezers and be gentle, as not to bend the pins, then replace the jumper blockers in the appropriate position.

Now that you have set your drives jumper settings to master, remount it into the brackets that held it in the case and reinsert the power cable into the 4 pin power connector and insert the IDE cable into the 40 pin IDE connector.

Now slide your case cover back over the side of the case until the clips catch in and you are done.

5. How to install and clean peripherals

First of all I will tell you how to install your peripheral.

To install the printer, first plug the power cable into the plug socket in the wall.

Next plug the USB cable into your computers USB port.

Now insert the CD that came with the printer and run the setup file from the CD.

When the setup is complete, turn the power on, on the printer and it will configure itself.

Now to clean your screen, mouse and keyboard.

Take a screen wipe and gently rub it against the screen in a side-to-side motion and cover the whole surface of it. Certain types of monitor will require different types of wipes, as not to damage the monitor.

To clean the keyboard and mouse you can simply use the same screen wipe to clean around the keys on the keyboard and the buttons on the mouse. If you want to go more in depth with the cleaning, you can remove the keyboards keys to clean underneath and hard to reach places, and with the mouse, you can remove the ball and clean the dirt from the rollers that the ball rolls on (if you have a ball mouse).

6. For my agenda and minutes see the attached sheet.

We can write a custom essay

According to Your Specific Requirements

Order an essay

You May Also Find These Documents Helpful

Computer software programs

To know about the connection of these topics it is must to know about the link between these phrases as well as the basic concept of these two. Firstly, to know what is computer software and wireless Information systems and then secondly to discuss about their affects upon each other. Computer software is basically some programs or events that are written just to achieve certain...

The Turing Test Review

The Turing Test (TT) is used to test whether computers have mentality. The set up of the test is as follows: there are 3 subjects involved. All three subjects are accessible to each other via a chat program and nothing else. The first subject is a real person, a human being. The second subject is a computer. The third subject is an interrogator whose job...

Chic Paints Ltd Essay Sample

1 Chic Paints Limited (CPL) are a large manufacturing company who specialise in producing niche specialist paints such as those used on boats, cars and industrial machinery. As a result of a management buyout from Ashstead Plc 6 years ago, CPL was bought by 5 of Ashstead’s directors who had previously formed the board on Chic Paints when it was a subsidiary of Ashstead Plc....

What is Computer Crime?

It is unfortunate to see that the number of computer crimes is increasing and has been considerably swelling during the last few decades. However, computer and information technology provide many benefits for everyone. Although, they have sometimes used to annoy or harm people. This trend has caused several social issues as public property, unauthorized using password of someone, stealing a billion dollar from bank or...

The use of computer systems in different...

- Accounting is a paramount aspect of all businesses, as every venture has a legal duty to produce correct tax reports, an accountant job would be very difficult without a computer. For example, a human error in cash flow data can critically affect the management of a business and even result in an HMRC tax fine. Biz Brain is one of the most used online...

Get Access To The Full Essay
Materials Daily
100,000+ Subjects
2000+ Topics
Free Plagiarism
All Materials
are Cataloged Well

Sorry, but copying text is forbidden on this website. If you need this or any other sample, we can send it to you via email.

By clicking "SEND", you agree to our terms of service and privacy policy. We'll occasionally send you account related and promo emails.
Sorry, but only registered users have full access

How about getting this access

Become a member

Your Answer Is Very Helpful For Us
Thank You A Lot!


Emma Taylor


Hi there!
Would you like to get such a paper?
How about getting a customized one?

Can't find What you were Looking for?

Get access to our huge, continuously updated knowledge base

The next update will be in:
14 : 59 : 59
Become a Member