Verified Document

Computer Networks Understood. Please Start Reviewing Articles Essay

¶ … computer networks understood. Please start reviewing articles discussing stranger requests received IT personnel: Jennifer Mears & Denise Dubie, Funny tech support stories, CD-ROM coffee holders, homemade cookies, frozen computers, The seven most important things about computer networks that should be understood by everyone who uses one

Principle one: Know how to 'talk the talk'

In the article "They've heard them all," two of the most humorous stories detailing naive users' confusion about computers revolve around simple misunderstandings of vocabulary (Mears & Dubie 2006:1). Some people do not clearly understand what 'cookies' are on their computers -- and even if most users today are cognizant of the fact that cookies in IT parlance means something different than chocolate chip vs. peanut butter, they may merely know that cookies are 'bad' without understanding how websites use them to track or store user information. Simply having users familiar with the vocabulary of their computers -- what is a hard drive, what is hardware vs. software, the difference between the corporate Intranet vs. The Internet as a whole -- can be useful in making communication more effective between IT help staff and the rest of the workers at the organization.

Principle two: 'Safety first'

Information security is particularly critical at most organizations today. Even the smallest institution must be wary about the threat...

Employees may be lax about updating antivirus protection or opening emails that seem obviously corrupted to IT staff, but harmless to the eyes of ordinary users. Yet everyday workers are the 'first line of defense' in ensuring that networks do not become impinged upon. All employees must know how to protect themselves and the organization's computer infrastructure with their own, everyday actions. Users should also know how to use anti-viral programs effectively. "One way viruses try to hide from virus removal software is by hiding themselves inside Microsoft Windows or inside other programs on your computer, so when Windows or a program starts to act strangely, you should check to see if you have a virus. A full-disk virus scan will take a while, so start the scan before you head out to lunch" (Harding 2012). They should also be aware of the need to update all programs, as well as all antivirus programs, to 'patch' any potential vulnerabilities.
Principle three: 'When in doubt, back it up'

During 'crunch time,' it is very easy for employees to put off backing up critical system files. Employees may not know how to do so, or they feel pressured to accomplish critical tasks immediately, and do not worry about backing up files until it is too late. Employees should be well-versed in how to do so and must make it part of their regular 'routine' rather than something they vaguely know they should do. "Small USB 2.0 flash drives…

Sources used in this document:
References

Mears, Jennifer & Denise Dubie. (2006). They've heard them all. Network World. Retrieved:

http://www.networkworld.com/news/2006/021306widernetusers.html?t5&story=1-0214

Harding, David. (2012). Top 10 common computer trouble-shooting tips. Tips4pc.

http://tips4pc.com/computer_tips_and_tricks/top-10-common-computer-troubleshooting-tips.htm
http://www.aimforawesome.com/life-philosophy/life-tips/6-things-everyone-should-know-if-using-a-computer/
Cite this Document:
Copy Bibliography Citation

Related Documents

Network Technology, Structure, and Protocols
Words: 999 Length: 3 Document Type: Case Study

Wireless and Wi-Fi The dominant approach used today for connecting to network, wireless technologies including W-Fi is dominating the entire area of networking, from 3G and 4G on smartphones and tablet PCs to the development of hotspot technology on the attest iPad. This is the future of networking for many consumers. The reliance on Wi-Fi as a means to stay connected to business and friends has exponentially increased and will continue

Delphi Study Influence of Environmental Sustainability Initiatives...
Words: 17687 Length: 60 Document Type: Literature Review

Delphi Study: Influence of Environmental Sustainability Initiatives on Information Systems Table of Contents (first draft) Green IT Current Methods and Solutions Green IT and energy costs Green It and Email Systems Green IT and ICT Green IT and ESS Green IT and TPS Green IT and DSS Green IT and other support systems Green IT and GHG reduction Green IT and the Government Sector Green IT and the Corporate Sector Future Prospects of Green IT in the software industry The paper focuses on how the

Role of Life Long Learning in Creating an Ecologically Minded Society...
Words: 15657 Length: 50 Document Type: Dissertation or Thesis complete

popularized social and cultural trends are merging, intentionally or not, toward laying the foundation for generating a new narrative about what it means to learn across a lifespan in an environment conducive to healthy living. It seeks to examine the coalescing of what is called lifelong learning side-by-side with the theories and practices related to the evolution of ecological thinking and environmental awareness. The idea that life can be

Children, Grief, and Attachment Theory
Words: 22384 Length: 75 Document Type: Term Paper

Figure 1 portrays three of the scenes 20/20 presented March 15, 2010. Figure 1: Heather, Rachel, and Unnamed Girl in 20/20 Program (adapted from Stossel, 2010). Statement of the Problem For any individual, the death of a family member, friend, parent or sibling may often be overwhelming. For adolescents, the death of person close to them may prove much more traumatic as it can disrupt adolescent development. Diana Mahoney (2008), with the

Teacher Attitudes and Perceptions About Curriculum Innovation in...
Words: 22121 Length: 76 Document Type: Term Paper

Self-Efficacy: A Definition Social Cognitive Theory Triangulation Data analysis Teacher Self-Efficacy Problems for the researcher Data Analysis and Related Literature review. Baseline Group Gender Deviation Age Deviation Comparison of data with other literature in the field. Everyday Integration Efficacy, Self-esteem, Confidence and Experience Barriers to use Integration paradigm. Co-oping and Project design. Organizational Climate Teacher Integration Education. Meta-evaluation of data and related literature. Data Analysis and Comparison Recommendation for Further Research Data Review Report Teacher efficacy in the classroom is facilitated by a number of different factors for different professions. However,

Strategic and Financial Changes in Private, Not-For profit
Words: 4350 Length: 15 Document Type: Literature Review

Strategic and Financial Changes in private, not-For=profit higher education institutions in Jamaica A Quantitative Analysis of Strategic and Financial Changes in private, not-for-profit higher education institutions in Jamaica Summary of Chapter 1 and introduction to chapter 2: Researchers are of the opinion that SIHE is in danger of being affected by external forces such as innovation, competition, and other disruptive forces (Christensen, Anthony, & Roth, 2004; Kirp, 2004; Koblik & Graubard, 2000;

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now