-
One listen, two looks, three smells, four touches, five change cards.
-
The state implements a graded network security protection system. Network operators shall perform the following security protection obligations in accordance with the requirements of the tiered network security protection system, to ensure that the network is protected from interference, destruction, or unauthorized access, and to prevent network data from being leaked, stolen, or tampered with:
Formulate internal security management systems and operating procedures, determine the person in charge of network security, and implement network security protection responsibilities; Adopt technical measures to prevent computer viruses, network attacks, network intrusions, and other behaviors that endanger network security.
Employ technical measures to monitor and record network operation status and network security incidents, and retain relevant network logs for at least six months in accordance with regulations; Take measures such as data classification, backup and encryption of important data; Other obligations stipulated by laws and administrative regulations.
1. Computer management implements the principle of "who uses and who is responsible". Take care of the machine, understand and be familiar with the performance of the machine, and check or clean the computer and related peripherals in a timely manner.
2. Master the general knowledge of work software, office software and network use.
3. There are no special work requirements, and all work must be carried out on the intranet. The management and destruction of work content stored on storage media (USB disks, optical disks, hard disks, and mobile hard disks) should comply with confidentiality requirements and strictly prevent leakage.
4. Confidential information shall not be processed on the Internet, the Internet, or the intranet, and confidential information can only be operated on a separate computer.
5. When it comes to computer user name, password password, and hardware encryption, it is necessary to pay attention to confidentiality, and it is strictly forbidden to leak it, and the password setting should be reasonable.
6. Computers with wireless interconnection functions shall not be connected to the intranet, and shall not operate or store confidential documents or work secret documents.
7. Non-internal computers are not allowed to access the intranet.
8. Abide by the regulations promulgated by the state on the use of the Internet, and strictly prohibit illegal logins; It is strictly forbidden to chat online, play games, watch movies, etc. during working hours.
9. Adhere to the "safety first."
1. Prevention first", strengthen computer security education, and enhance the security awareness and consciousness of employees. The computer shall be checked for viruses frequently, and the computer operator shall immediately interrupt the operation and eliminate it in time if the computer is infected with a virus. Ensure the security management of the computer.
10. Turn off the power in time after work and cut off the power supply.
-
In order to eliminate the faults and errors that occur in the operation of the system, the software and hardware maintenance personnel should make necessary modifications and improvements to the system; In order to adapt the system to the changes in the user environment and meet the new needs, it is also necessary to make some partial updates to the original system, which is called system maintenance.
The task of system maintenance is to correct the hidden errors found in the use of the software system, and to expand the new functions and performance requirements put forward by users in the process of use, and its purpose is to maintain the normal operation of the software system. The documentation at this stage is the Software Problem Report and the Software Modification Report, which documents the discovery of software bugs and the process of modifying the software.
What the system maintains.
System maintenance is oriented to each component of the system, and the content of system maintenance can be divided into the following categories according to different maintenance objects:
1. System application maintenance. Application software maintenance is the most important content of the maintenance of the sensitive slip grip system. It refers to the modification and improvement of the corresponding application and related Wenqiao Qing files.
The business processing process of the system is realized through the operation of the application, once the program has a problem or the business changes, it will inevitably cause the modification and adjustment of the program, so the main activity of system maintenance is to maintain the program.
2. Data maintenance. The database is the basic platform that supports business operations, and the running status needs to be checked regularly. In addition to the regular and normal update of the main business data in the system, there are many data that need to be updated from time to time, or adjusted with changes in the environment or business, as well as the increase of data content and the adjustment of data structure.
In addition, data backup and recovery are all part of data maintenance.
3. Maintenance. Maintenance work such as augmenting, adding, or deleting the original **. With the expansion of the application scope of the system and the change of the application environment, all kinds of ** in the system need to be added, modified, deleted to a certain extent, and new ** needs to be set.
4. Hardware equipment maintenance. The daily maintenance and management of the host and peripherals, such as the cleaning and lubrication of machine parts, the maintenance of equipment failures, the replacement of vulnerable parts, etc., should be carried out regularly by special personnel to ensure the normal and effective operation of the system.
5. Changes in institutions and personnel. The information system is a human-machine system, and manual processing also occupies an important position, and the role of people is dominant. In order to rationalize the processes of the information system, there are sometimes changes in institutions and personnel.
This change also tends to affect the maintenance of equipment and procedures.
-
1.External environment: Keep the environment clean, control temperature, humidity.
2.Layout environment: reasonable layout, neat lines, once there is a problem, it can be found and dealt with immediately.
3.Computer hardware (including network): regular cleaning, obsolescence, and updating.
4.Computer Software: Regular System Updates, Full Patches, Regular Virus Cleanup, Rogue Control Cleanup. Ensure the stable operation of the system.
-
Precautions for computer use:
1. Switch on/off:
Computer equipment must be properly powered off, otherwise it will affect its working life and is also the culprit of some failures.
The correct order of turning on and off the computer is: turn on the computer, first turn on and turn on the power of the computer's peripheral devices (such as monitors, printers, etc.), and then turn on the power of the computer host; The shutdown sequence is reversed, powering off the host first and then disconnecting the power to other peripherals.
2. Safety instructions for the use of computer equipment:
1) Computer equipment should not be placed in a dusty place (such as a window near the roadside, etc.), if there is no condition to change places, it should be able to cover it with a dust cover when not in use; It should not be placed in a humid place (such as a water bottle concentration place, next to a water dispenser, etc., where people pour water and easily splash water on the equipment), and pay attention to the heat dissipation of the main chassis to avoid direct sunlight on the computer;
2) It is strictly forbidden to use other electrical appliances, hand warmers and other personal electrical appliances on the computer special power socket, and check whether the computer equipment is all turned off before leaving.
-
1.Power on and off: Turn on the monitor first, then the console. Power off: Shut down in the system, and then turn off the monitor.
2.During use: The chassis must be fixed, it is best not to move, because the hard disk is still mechanical, so try not to move it to avoid harming the hard disk.
3.Maintenance: Mainly to clean up the dust, clean it once a year.
-
When switching on and off the computer normally, installing anti-virus software, and installing programs, try to install it on the D disk.
Remember to clean the dust of the main unit and do not put it in a humid place.
-
Turn on the monitor first, then turn on the host ......
Dizzy. I actually ran here and asked.
Don't worry. See for yourself ......Intercepted in the courtyard, does it make sense that the people are so good overall? >>>More
Your question is not specific, computer major is a big concept, and now the school is generally refined, there are computer network technology, computer application technology, software development, software testing, game development, multi-technology and so on. You have to ask the specific major, so that you can tell you what courses are available.
Computer theory courses include: Principles of Computer Composition, Assembly Language Programming, Object-Oriented Technology, Discrete Mathematics of Data Communication, Principles of Data Structures, Digital Circuits and Logic Design, Programming Course Design, Data Structure Course Design, Computer Composition Principles Experiment, Digital Circuit and Logic Design Experiment, Fundamentals of Computer Culture, Computer Programming, Linear Algebra, Probability Theory and Mathematical Statistics, Database Systems, Operating Systems, Computer Network Systems and Security, Computer System Architecture, General Physics, circuit electronics, etc.
360TimeProtect time protection tool.
Thanks to MJ0011 for delivery. >>>More
The performance of the assembly machine is good, and the brand machine has good after-sales service. >>>More