What are the protection systems for computers? How does it work?

Updated on technology 2024-02-09
6 answers
  1. Anonymous users2024-02-05

    There are two parts: hardware protection system and software protection system.

    1. Hardware protection system:

    1. The motherboard I 0 boots up the hardware self-test system, detects if there is hardware that does not meet the startup conditions, refuses to start, and gives a self-test report. Prompt the name and cause of the faulty part;

    2. Under normal working conditions, if the hardware is defective, or the parameters deviate too much from the normal parameters, the hardware and the approximate cause of the problem will be prompted to the user. But it's usually less accurate;

    3. If the faulty hardware occurs suddenly, the computer will display the problem in the form of a blue screen**, allowing the user to check the software and hardware problems. In severe cases, it will crash directly, such as the sudden failure of the graphics card, memory, and hard disk. If the situation is more serious, he will die with a black face.

    Protect other hardware from being encumbered.

    2. Software protection system:

    1. There is a comprehensive security control panel in the system, which also includes firewalls, virus scanning, system restoration functions, and wndows security center services, which is the "security center" that comes with the operating system.

    2. Its secure account login protects the personal privacy of multiple users when using the computer, and restricts the permissions of users of different levels to ensure the security of system software applications;

    3. Antivirus software defender cooperates with firewall to defend against malicious programs and visitors from external invasions, protect the system from intrusion, and maintain the normal operation environment of the software system;

    4. System internal monitoring procedures and self-healing procedures. When the core program of the system is damaged and cannot work normally, they will restart the system to repair the task, such as the hard disk error, and call the chkdsk tool to repair the hard disk (such as illegal shutdown of the disk file and broken link); When the program is damaged and cannot run normally, a prompt will be given to explain the reason, or a solution will be given.

  2. Anonymous users2024-02-04

    I think you're trying to build a secure system!

    Absolute security is not possible, because the national bank network can be hit by merit, and all we can do is do our best.

    As a computer user, develop a good habit:

    1 Try not to use the administrator user to log in, if you really want to use it, don't use the administrator user, create a new administrator user, and then disable the administrator.

    2 Develop a habit of using user passwords, don't just try to save time, maybe before you know it, it will play an important role.

    3 Install the right antivirus software and firewall, anyway, I've been using Kaspersky antivirus and 360 security and hygiene, it's okay (just settle these enough, don't install Rising or something, change the registry after expiration, you can try it indefinitely, the way to find it on the Internet).

    4 Develop a good habit of surfing the Internet, don't be irregular**, they are not protected by law, so they are also a den of computer viruses.

    5 Clean up your computer junk regularly.

    Wait, you can look for other methods on the Internet, these are just the ones I use regularly.

  3. Anonymous users2024-02-03

    You have too many antiviruses, generally speaking, as long as one company is enough, and there will be conflicts if you install too much. Your Kaba has expired and removed it.

  4. Anonymous users2024-02-02

    If you have too much, you can have a caba or a Rising or a 360.

  5. Anonymous users2024-02-01

    It's too, and generally there is an antivirus software that can be used, because the antivirus software comes with a firewall, but I don't need a firewall, and it's better to have a problem in the detection and killing.

  6. Anonymous users2024-01-31

    1. Right-click this computer on the desktop (win7 is called this computer), and select Properties in the pop-up menu.

    2. After entering the properties page, click Advanced System Settings.

    3. Click on the System Protection option in the interface that opens.

    <>5. In the interface that opens, click Enable System Protection, and click Zheng Congding, at this time, the system protection of the computer has been turned on successfully.

Related questions
11 answers2024-02-09

1。Dustproof, pay attention to blowing the dust inside the chassis for half a year or so, dust is one of the main killers of computer hardware. >>>More

9 answers2024-02-09

Lack of Windows NT and Windows 95 and the early Win32, DOS, and Apple machine-specific IMAC operating system, you can search for these related introductions.

30 answers2024-02-09

Can business management be like using a mobile phone?

7 answers2024-02-09

There are too many standard interfaces, and there are a few pins of aviation connectors. >>>More

9 answers2024-02-09

Now there are a lot of system disks that can be installed with one click, which is very convenient, you can buy a disk like this, set it to a disc and start it, put the disc in it, and press a key again.