Important Announcement
PubHTML5 Scheduled Server Maintenance on (GMT) Sunday, June 26th, 2:00 am - 8:00 am.
PubHTML5 site will be inoperative during the times indicated!

Home Explore English for Computer Unit7 Maintenance and Safety

English for Computer Unit7 Maintenance and Safety

Published by uninaja, 2017-03-22 06:56:48

Description: English for Computer Unit7 Maintenance and Safety

Search

Read the Text Version

Vocabulary MeaningActOffences พรบ., กระทำsections กำรกระทำผิดกฎหมำยsubject มำตรำimprisonment นำไปสู่fine กำรกระทำผดิ กฎหมำยAccess ค่ำปรบั , ปรับเป็นเงินcomputer system เขำ้ , ไดร้ บั สทิ ธ์หิ รอื โอกำสในกำรใช้specific ระบบคอมพิวเตอร์prevention โดยเฉพำะintended กำรปอ้ งกันmeasure ซึง่ มเี จตนำ, ซึ่งมีไว้prevent มำตรกำรspecifically ขัดขวำงthird party โดยจำเพำะ, เปน็ ลักษณะเฉพำะillegally ผอู้ นื่discloses ผดิ กฎหมำยcomputer data เปิดเผยEavesdrop ข้อมลู คอมพิวเตอร์process ลอบฟงั , แอบฟังpublic interest ดำเนินกำรdamages ผลประโยชน์สำธำรณะDestroys เสยี หำยCorrects ทำลำยchanges แก้ไขamends เปลย่ี นแปลงsuspended แกไ้ ขเพ่ิมเตมิDelay ระงับอย่ชู ว่ั ครำว, ถูกระงับHinder ลำ่ ชำ้ , ชะลอ ขัดขวำง

Vocabulary MeaningDisruptextent รบกวนoperate ขอบเขตsource ปฏิบตั ิAforementioned แหลง่ ขอ้ มลู , ต้นกำเนิดperpetrator ดงั ทกี่ ล่ำวมำกอ่ นแล้วoffence ผกู้ ระทำผดิcountry's security กำรกระทำผดิ กฎหมำยpublic security ควำมปลอดภัยของประเทศeconomic security ควำมปลอดภยั สำธำรณะpublic services. ควำมมน่ั คงทำงเศรษฐกิจdisseminates กำรบรกิ ำรสำธำรณะinstructions เผยแพร่commit คำสงั่import ทำควำมผิดForge นำเขำ้false ปลอมแปลงpornographic เทจ็publicly ภำพลำมกaccessible โดยประชำชนpanic ที่สำมำรถเขำ้ ได้Kingdom's security ตน่ื ตระหนกCriminal Code ควำมม่ันคงแห่งรำชอำณำจกั รdissemination ประมวลกฏหมำยอำญำforward กำรเผยแพร่provider สง่ ต่อintentionally ผใู้ ห้บรกิ ำรsupport โดยตัง้ ใจ, จงใจconsent สนับสนนุcreate ยนิ ยอม, อนุญำตedit สรำ้ งสรรค,์ สรำ้ งadd แกไ้ ข, ตัดต่อ เตมิ , เพิม่

Vocabulary Meaningadaptimpair ดดั แปลงreputation ทำใหแ้ ยล่ ง, ทำให้เสยี หำยdespise ชื่อเสียงdisgust เหยยี ดหยำม, ดูถูก, ดูหม่ินembarrass นำ่ รงั เกยี จpublicly ทำให้ลำบำกaccessible โดยประชำชนirrespective of ท่สี ำมำรถเข้ำได้Punish ไมว่ ่ำ, ไมค่ ำนึงถงึ ทำโทษ, ลงโทษ

Summary of Computer-Related Offences in Computer Crime Act 2007 In Chapter 1 Computer-Related Offences there are 13 sections if done shall besubject to imprisonment or a fine or both. The summary about sections of Act asfollow: 1. Accessing a computer system for which a specific access prevention measurethat is not intended for their own. 2. Knowing of a measure to prevent access to a computer system specificallycreated by a third party illegally discloses that measure in a manner that is likely tocause damage to the third party. 3. Illegally accesses computer data, for which there is a specific accessprevention measure not intended for their own use available. 4. Eavesdroping a third party's computer data in process of being sent in acomputer system and not intended for the public interest or general people's use. 5. Any person who illegally damages, destroys, corrects, changes or amends athird party's computer data, either in whole or in part. 6. who act something causes the working of a third party's computer system tobe suspended, delayed, hindered or disrupted to the extent that the computer systemfails to operate normally. 7. Sending computer data or electronic mail to another person and covering upthe source of such aforementioned data in a manner that disturbs the other person'snormal operation of their computer system. 8. The perpetrator of an offence that causes damage to the public or related tothe country's security, public security and economic security or public services. 9. Any person who sells or disseminates sets of instructions developed as a toolused in committing an offence. 10. import to a computer system of forged computer data, or false or apornographic nature that is publicly accessible to cause damage to that third party orpanic; import to a computer system of any computer data related with an offenceagainst the Kingdom's security under the Criminal Code; and dissemination orforwarding of computer data already known offence 11. The provider intentionally supporting or consenting to an offence. 12. import a third party's picture appears either created, edited, added oradapted by electronic means or otherwise in a manner that is likely to impair that thirdparty's reputation or cause that third party to be despised, disgusted or embarrassedto computer system that is publicly accessible. 13. Any person committing an offence against this Act outside the Kingdomirrespective of Thai or non-citizen offender for both were punished.

Help Any programs always come with the instruction manual, or a portion of themanual, integrated into the program. If you have some problem or forget acommand while the program is running, you can summon the documentation by pressingHelp key or entering a HELP command. F1 on keyboard is used in Windows for the Helpkey. When you summon the Help system, the program often displays a menu of Helptopics. You can choose the appropriate topic for whatever problem you are currentlyencountering. The program will display a help screen that contains the desireddocumentation. The Macintosh Help system is often referred to as Balloon Help because thehelp messages appear in a cartoon-like balloon. And newer Macs also have somethingcalled Interactive Help, which contains tutorials that display you how to performdifferent operations.TroubleshootingTroubleshooting is process to find the cause of problem to fix fail products orprocesses. It is used for repairing hardware, software and other products.For example; troubleshoot problems, and get the fixing internet connection problemsUnplug the modem, then plug it back inHow can you do? If you were able to surf the website but now you can’t.Step: 1. Close your Internet browser if it’s open. 2. Unplug the modem’s power cord. 3. Count to 15, which lets the modem power down. 4. Plug it back in. 5. Wait two minutes for the modem to initialize the connection. 6. Open your web browser. 7. Try to open a reliable web page, such as www.google.com.

Online Protection Tools Online tools are available that will let you control your kids' access to adultmaterial and help protect them from Internet predators. No option is going toguarantee that they'll be kept away from 100% of the risks on the Internet. So it'simportant to be aware of your kids' computer activities and educate them about onlinerisks. Many Internet service providers (ISPs) provide parent-control options to blockcertain material from coming into a computer. You can also get software that helpsblock access to certain sites based on a \"bad site\" list that your ISP creates. Filteringprograms can block sites from coming in and restrict personal information from beingsent online. Other programs can monitor and track online activity. Also, make sure yourkids create a screen name to protect their real identity. Do you love your computer? What do you do with it beside operate to work?If you do it only that. It’s easy to damage. For your computer is long life. You need to keep your computer healthy andin good working order. Maintaining a computer involves three things: keepingit physically clean, protecting it from malware, and backing up important files. Keep your computer physically clean. When dealing with computers,dust isn't just unattractive—it can potentially destroy parts of your computer.By cleaning your computer regularly, you can help to keep it workingproperly and avoid expensive repairs. How should you do to keep computer healthy?

Cleaning the keyboard A dirty keyboard doesn't look nice and can cause your keyboard do not work properly. Dust, food, liquid, and other particles can get stuck underneath the keys, which can prevent them from working properly. Check your owner's manual to see if the manufacturer has provided you with instructions for your specific keyboard. If so, follow them. If not, the following steps are basic cleaning tips that can help keep your keyboard clean. 1. Unplug the keyboard from the USB or PS/2 port. If the keyboard is plugged into the PS/2 port, you will need to shut down the computer before unplugging it. 2. Turn the keyboard upside down, and gently shake it to remove dirt and dust. 3. Use a can of compressed air to clean between the keys. 4. Moisten a cotton cloth or paper towel with rubbing alcohol, and use it to clean the tops of the keys. Do not pour alcohol or any other liquid directly onto the keys. 5. Reconnect the keyboard to the computer once it is dry. If you are connecting it to a PS/2 port, you will need to connect it before turning on the computer.Dealing with liquids If you spill liquid on the keyboard, quickly shut down the computer anddisconnect the keyboard and turn it upside down to allow the liquid to drain.If the liquid is sticky, you will need to hold the keyboard on its side under runningwater to rinse the sticky liquid away. Then turn the keyboard upside down to drainfor two days before reconnecting it. The keyboard may not be repairable at thispoint, but rinsing the sticky liquid off of it is the only chance for it to be usableagain. The best way to avoid this situation is to keep drinks away from the computerarea.Assignment: Demonstrates cleaning the keyboard.




Like this book? You can publish your book online for free in a few minutes!
Create your own flipbook