ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Computer Customization and Protection in a Computer Classroom Using the Features of an Operating System

Proceeding: 3rd Contemporary Issues in Economy & Technology Conference (CIET)

Publication Date:

Authors : ; ; ; ;

Page : 509-520

Keywords : computer customization; access limitation; operating system features;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Computer protection issue in computer classrooms is very significant for the quality of teaching. It is necessary for the computers to perform well and be properly customized. Besides common hardware and software failures, computers can be vulnerable because of the large number of users, who, either on purpose or accidentally, delete system files, install unwanted software, visit websites infected with malwares etc. There is certain commercial software that can remove this problem; the drawbacks are the lack of options for overall protection and computer customization as well as price (the price of the software proportionally grows with the number of computers in a classroom). Microsoft had offered a free software for computer protection, called Windows Steady State; however, this software was not compatible with Windows 7 or later operating systems. Even so, it is possible to protect and customize your computer if you know and understand well the Microsoft operating systems; you'll do that by customizing user profiles, customizing the settings of the operating system by using the console and defining the access rights to folders and files. This approach enables the computers to look the same and to perform in the same way, which might be of a great help for the teacher himself/herself. This paper aims at describing the way in which the computers at the University Department of Professional Studies have been customized and protected by using the operating system features, taking into consideration faults and problems that may occur during this process.

Last modified: 2018-06-18 00:16:21