10 guidance for safety students of microcomputers

Source: Internet
Author: User

Microcomputer is the most commonly used computer, emblem of the use of the machine safety concerns tens of thousands of households, and the road by the virus damage is the emblem of the use of the most common problems, so, this section first introduced the general knowledge of the use of microcomputer security, and then focus on the prevention of computer virus knowledge.

The use of microcomputer safety

Microcomputer system consists of hardware and software, is a more expensive electronic equipment, if used improperly, easy to cause hardware or software damage. In the use of the computer generally should pay attention to the following points:

(1) Environmental requirements generally include: clean dust-free, ambient temperature and humidity to meet the requirements of electromagnetic waves have a good shielding, stable and reliable power, preferably equipped with a voltage regulator or uninterruptible power supply (UPS).

(2) In use, should first open the peripheral power, and then open the host power. When the shutdown, you should first turn off the host power, and then turn off the peripheral power.

(3) Avoid switching power supply repeatedly, especially not in the instantaneous switching power supply, or it will generate power spikes, burning the electronic circuit in the computer. Freeze state, try to use hot start.

(4) Smoking, drinking water and eating food in the computer room should be prohibited. Smoke can damage the disk; Food and dust off the keyboard can cause mechanical dysfunction; moisture and rollover may cause the device to short-circuit.

(5) Prevent the Hui machine from being exposed to sunlight directly.

(6) Huizhou machine and magnetic medium should be away from the strong magnetic field. A strong magnetic field interferes with the normal operation of electronic devices in the computer. Magnetic media change information in strong magnetic fields.

(7) The operation of the software should follow the instructions or prompts to operate, the operation is completed, should exit through the normal way, without exiting the software in the case of the opportunity caused by the loss of data.

(8) In the editing operation, should pay attention to save in time to prevent sudden power loss caused by the data.

(9) Pay attention to the confidentiality of important data such as door order, encryption and decryption key.

(10) The use and maintenance of microcomputers shall be registered.

This article from the Internet and the search engine IT Technology blog http://www.guhongtao.com/issued reprint please be sure to indicate

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.