Hardware Installation Flashcards

1
Q

BIOS

A

Basic Input and Output systems:
This is a special motherboard firmware that contains codes for Systems operating system and hardware settings such as RAM, Hard Drive, Processor
This is an important piece of software which is stored in a ROM (read-only memory) chip inside the computer motherboard. It is the first program that runs every time when we turn on our computer. It stores all instructions related to controlling the keyboard, serial/parallel ports, hard disk drive, and other various storage drives. The BIOS is also responsible for storing all the specifications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CMOS

A

The CMOS (Complementary Metal-Oxide-Semiconductor) is a volatile storage that stores configuration settings and other critical information needed by the BIOS to initialize hardware during the boot process. This includes system time and date, hardware settings (like hard drive configurations), and boot order preferences. The CMOS is powered by a small battery on the motherboard to retain this information even when the computer is powered off.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

POST

A

The Power-On Self Test (POST) is a diagnostic process that a computer performs immediately after it is powered on. During POST, the BIOS tests essential hardware components such as memory, storage devices, CPU, and graphics to ensure they are functioning correctly and are in a safe state before booting the operating system. If POST completes successfully, it may trigger a single beep (or no sound) to indicate that the system is ready. If errors are detected, POST may produce a series of beeping tones, each pattern indicating a specific type of error as defined by the manufacturer. Additionally, error messages or codes may be displayed on the screen to help diagnose the issue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Chipsets

A

a physical module containig Integrated microprocessors that perform certain functions as designed.

RE:
A physical module containing integrated microprocessors designed to perform specific functions. These microprocessors, embedded within the module, execute predefined tasks such as data processing, computation, and hardware control. Such modules are essential in various electronic devices, enabling functionalities in household appliances, automotive systems, industrial automation, and consumer electronics by following programmed instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Integrated vs non integrated processors

A

Integrated processors are embedded on the motherboard, non integrated are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Motherboard models

A

ATX, ATX Micro, BTX(thermal problems),

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Boot sequence

A

Load, decode, execute, unload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CPU components

A
  1. ALU
  2. Buses(control Bus, Address bus, Data bus)
  3. Cache(Temporary spu storage(L1(small and inside the processor, 16-64kb), L2, L3 are usuaally outside the processor, between the CPU and the RAM)
  4. Clock
  5. I/O unit
  6. Program counter
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Overclocking

A

Running a motherboard or processor at a higher speed than the manufacturer suggests, is called overclocking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Word size

A

Word size
The word size of the machine is how many bits the CPU can manipulate in one go. Each unique memory location in RAM holds one word of information. Every memory location has an unique address. RAM also has a word size measured in bits to indicate the size of the memory location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

32 vs 64 bits processor

A

32 bit and 64 bit CPU
CPUs are identified as either 32 bit or 64 bit. The amount of data that a CPU can manipulate with one machine code instruction or transfer over a bus is measured in bits. The CPU specification is 32 bit, 64 bit, or 128 bit. A CPU with a 64 bit word size can process 64 bits using one single machine code instruction. This is twice as many bits as a 32 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Throtling

A

Throttling: Most motherboards and processors offer some protection against overheating so that if the system overheats, it will throttle down or shut down to prevent the processor from being affected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hyper-threading

A

Hyper-threading (HT Technology): It is a technology developed by Intel for processing two execution threads within a single processor. Essentially when HT Technology is enabled in the system, BIOS and the processor is running a multi-threaded application and the processor is emulating two physical processors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

VRM

A

Voltage Regulator Module (VRM)

Voltage Regulator Module (VRM): A VRM is an essential component on the motherboard that regulates and supplies the appropriate voltage to the CPU, GPU, and other critical components. It ensures that these components receive a stable and consistent power supply, preventing damage and allowing for optimal performance. The VRM adjusts the voltage levels dynamically based on the power demands of the processor, contributing to the overall stability and efficiency of the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

x86 vs x64

A

x86 - 32bits, 4GB RAM Registers max
x64 - 64bits, > 4GB Ram registers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Intel vs AMD

A
  1. different processor sockets
  2. different types of microcode
  3. differences in dual-core and multi-core designs
  4. cache sizes
  5. performance versus clock speed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which was the first microprocessor?

A

(a) Intel 4004

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is not a system bus?

A

(d) Memory bus (System buses typically include the

address bus,
data bus,
and control bus.)

17
Q

Which of the following is not a part of a CPU?

A

(b) Memory (Memory is separate from the CPU; the CPU includes the Arithmetic Logic Unit (ALU), Control Unit (CU), and registers.)

18
Q

Which of the following register points to the next instruction to be executed?

A

(a) Program counter

19
Q

The clock speed of recent processors is measured in

A

(c) GHz (Gigahertz is the common unit for measuring the clock speed of modern processors.)

20
Q

The memory data bus width in the Pentium processor is _______________.

A

(c) 64 bit (Pentium processors typically have a 64-bit data bus width.)

21
Q

Copper and aluminum are used to prepare heat sinks because of _______________.

A

(d) high thermal conductivity and lightweight (Both copper and aluminum have high thermal conductivity, and aluminum is particularly lightweight.)

22
Q

A 32-bit CPU can address ___________ memory locations.

A

4 GB (A 32-bit CPU can address up to 2^32 memory locations, which equals 4 GB of RAM.)

23
Q

A 64-bit CPU can address ___________ memory locations.

A

16 exabytes (A 64-bit CPU can theoretically address up to 2^64 memory locations, which equals 16 exabytes, though practical limits are much lower.)

24
Q

Hyper-threading technology supports processing ___________ execution threads within a single processor.

A

Two (Hyper-threading technology allows a single physical processor to handle two execution threads simultaneously.)

25
Q

Contents of MAR is directly connected to the _____________ bus.

A

Address bus (The Memory Address Register (MAR) holds the address of the memory location to be accessed, and it is directly connected to the address bus.)

26
Q

Contents of MBR is directly connected to the _____________ bus.

A

Data bus (The Memory Buffer Register (MBR), also known as the Memory Data Register (MDR), holds the data read from or written to memory and is directly connected to the data bus.)

27
Q

What are the basic tasks performed by a CPU?

A

Fetch: Retrieve an instruction from memory.
Decode: Interpret the fetched instruction.
Execute: Perform the operation specified by the instruction.
Store: Write the result to memory or a register.

28
Q

What are the major components of a CPU?

A

Arithmetic Logic Unit (ALU): Performs arithmetic and logical operations.
Control Unit (CU): Directs the operation of the processor and manages the execution of instructions.
Registers: Small, fast storage locations within the CPU used for temporary data storage and manipulation.
registers used in a CPU?

Registers provide rapid access to data and instructions that the CPU is currently processing. They help speed up computations by storing intermediate results and control information.
Cache Memory: High-speed memory used to store frequently accessed data and instructions for faster access.

29
Q

Explain the use of the four registers—program counter, instruction register, memory address register, and memory buffer register.

A

Program Counter (PC): Holds the address of the next instruction to be executed.
Instruction Register (IR): Stores the current instruction being executed.
Memory Address Register (MAR): Contains the address of the memory location to be accessed.
Memory Buffer Register (MBR): Holds the data read from or written to memory.

30
Q

Instruction Cycle State Diagram:

A

Fetch: The CPU fetches the instruction from memory using the address in the PC.
Decode: The fetched instruction is decoded by the CU to determine the operation.
Execute: The CPU performs the operation as specified by the instruction.
Store: The result of the operation is stored in memory or a register.
The cycle then repeats for the next instruction.

31
Q

system bus

A

The system bus is a communication pathway that connects the CPU to other components of the computer, including memory and peripherals. It consists of the address bus, data bus, and control bus, facilitating the transfer of data, addresses, and control signals.

32
Q

Cold booting steps

A

Cold booting, also known as a hard boot, is the process of starting a computer from a completely powered-off state. The steps involved in cold booting are:

Power On:

The user presses the power button on the computer, which initiates the power supply to the system.
Power-On Self-Test (POST):

The BIOS performs a POST to check the essential hardware components such as the CPU, RAM, disk drives, and keyboard to ensure they are functioning correctly. If an error is detected, the system will emit a series of beeps or display an error message.
Load BIOS Settings:

After the POST, the BIOS loads the basic input/output system settings, which include system time, date, and hardware configuration.
Locate and Load the Bootloader:

The BIOS searches for the bootloader on the primary storage device (usually the hard drive or SSD). The bootloader is a small program that loads the operating system.
Load the Operating System:

The bootloader loads the operating system into RAM from the storage device. This involves loading the kernel and essential system files needed for the OS to function.
Initialize System Hardware and Software:

The operating system initializes the hardware components and starts necessary system services and background processes.
User Login:

Once the operating system is fully loaded, the user is prompted to log in, completing the boot process.

33
Q

3 Reasons why Computer Maintenance is Necessary

A

Prolong System Lifespan:

Regular maintenance helps to extend the life of the computer hardware by preventing the buildup of dust and dirt, ensuring components such as fans and heat sinks operate efficiently, and reducing the risk of overheating and hardware failure.
Improve System Performance:

Routine tasks such as defragmenting the hard drive, cleaning up temporary files, updating software, and running security scans help to keep the system running smoothly and efficiently, reducing lag and improving overall performance.
Enhance Security:

Regular maintenance activities such as updating antivirus software, applying security patches and updates to the operating system and applications, and monitoring for malware help to protect the computer from security threats and data breaches. This is crucial in safeguarding sensitive information and maintaining the integrity of the system.

34
Q

RAM Q n A

A

RAM is used as a temporary storage area so that the __________ can access that information more easily.

CPU
The data in ROM can only be read by ____________.

the system (or CPU)
Dynamic random access memory (DRAM) is widely used as a computer’s ______________.

main memory
Static random access memory (SRAM) does not need to be periodically _____________.

refreshed
DDR3 SDRAM runs at lower _____________.

voltage
To install the RAM first ensure its compatibility with _______________.

the motherboard
In dual channel, the system can access __________ bits at a time.

128 bits (64 bits per channel)
The DDR memory technology supports __________ channel operation.

dual (and sometimes quad)
Each channel represents a separate __________ bit communication path.

64-bit
The RAM is accessed by the ________________.

CPU

35
Q

RAM Q n A 2

A

True or False Statements

  1. Static memory will maintain storage even if power is removed.
    • False. Static RAM (SRAM) is volatile and will lose its data when power is removed.
  2. RAM is non-volatile.
    • False. RAM is volatile and loses its contents when power is turned off.
  3. RAM has a slow access time relative to other storage devices.
    • False. RAM has a much faster access time compared to other storage devices like hard drives and SSDs.
  4. RAM can be static or dynamic.
    • True. RAM can be either Static RAM (SRAM) or Dynamic RAM (DRAM).
  5. RAM holds the BIOS.
    • False. BIOS is stored in ROM, not RAM.
  6. RAM is part of the hard disk.
    • False. RAM is separate from the hard disk and is a different type of memory.
  7. ROM is volatile.
    • False. ROM is non-volatile and retains its contents even when the power is turned off.
  8. RAM stores programs/data used by the CPU.
    • True. RAM temporarily stores data and programs that the CPU needs while performing tasks.
  9. ROM contains the operating system.
    • False. ROM typically contains firmware and BIOS. The operating system is stored on the hard drive or SSD.
  10. RAM stands for readily accessible memory.
    • False. RAM stands for Random Access Memory.

Short Answer Questions

  1. Why is memory important in a computer?
    • Memory is crucial in a computer because it provides the CPU with a fast storage area to temporarily hold data and instructions that the CPU needs to access quickly while performing tasks. This speeds up the overall performance of the system.
  2. What is RAM?
    • RAM (Random Access Memory) is a type of computer memory that can be read and written to, and is used for storing data and instructions temporarily while a computer is running.
  3. Why are different types of RAM used?
    • Different types of RAM are used to cater to various performance and power consumption needs. For example, DRAM is typically used for main system memory due to its cost-effectiveness, while SRAM is used in cache memory for its faster access times.
  4. What are the different types of RAM?
    • The different types of RAM include Static RAM (SRAM) and Dynamic RAM (DRAM).
  5. What are the common types of DRAM?
    • Common types of DRAM include SDRAM (Synchronous DRAM), DDR (Double Data Rate) SDRAM, DDR2, DDR3, DDR4, and DDR5.
  6. Describe different types of DRAM packages.
    • DRAM packages include DIMM (Dual In-line Memory Module), SODIMM (Small Outline DIMM), and RIMM (Rambus Inline Memory Module). DIMMs are typically used in desktops, while SODIMMs are used in laptops and small form factor computers.
  7. Describe DIMM and SODIMM.
    • DIMM (Dual In-line Memory Module) is a type of memory module used in desktop computers and servers, characterized by separate electrical contacts on each side of the module. SODIMM (Small Outline DIMM) is a smaller version of DIMM used in laptops and other compact devices.
  8. What are the differences between single and multichannel memory modes?
    • Single-channel memory mode uses a single memory bus for data transfer, while multichannel (e.g., dual-channel or quad-channel) memory modes use multiple memory buses. Multichannel memory configurations can significantly increase data transfer rates and improve overall system performance.
36
Q

RAM Q&A 3

A
  1. ___________ consists of volatile chips that temporarily store data or instructions.
    • (d) RAM
37
Q

Management Utility Softwares

A

**Disk Defragmenter:
**
Description: Disk Defragmenter is a utility that reorganizes the data on a hard disk so that files are stored in contiguous blocks. This process helps improve the speed and efficiency of data retrieval by minimizing the time the disk’s read/write heads need to move to access files.
Function: By consolidating fragmented files and freeing up space, the disk defragmenter enhances the overall performance of the computer, making file access faster and more efficient.

**Scan Disk:
**Description: Scan Disk, also known as Check Disk (chkdsk in Windows), is a utility that scans the file system and disk surface for logical and physical errors. It checks the integrity of the file system and fixes file system errors and bad sectors.
Function: Scan Disk helps maintain the health of the storage device by identifying and repairing file system errors, thus preventing data loss and ensuring reliable access to stored data.

Disk Clean Up:
Description: Disk Clean Up is a utility that helps free up space on a computer’s hard drive by deleting unnecessary files such as temporary files, system cache, and files in the recycle bin.
Function: By removing unwanted files, Disk Clean Up improves system performance and creates more available storage space, which can help prevent slowdowns and other performance issues.

System Restore:
Description: System Restore is a utility that allows users to revert their computer’s state (including system files, installed applications, Windows Registry, and system settings) to a previous point in time.
Function: This utility is particularly useful for recovering from system malfunctions or instability caused by software installations, updates, or other changes. It helps restore the system to a stable state without affecting personal files.

38
Q

Four (4) Ways to Prevent Virus Infections

A
  1. Install and Update Antivirus Software:
  2. Avoid Clicking on Suspicious Links or Attachments:
  3. Be cautious about opening email attachments or clicking on links from unknown or untrusted sources.
  4. Keep Software and Operating Systems Updated:
  5. Use Strong Passwords and Enable Multi-Factor Authentication:
39
Q

Multi Q % A

A

Computer updating refers to the process of installing the latest versions of software, firmware, or drivers on a computer system. This can include operating system updates, application updates, security patches, and updates to hardware drivers. The goal of updating is to improve performance, add new features, fix bugs, and enhance security.
###
3b.
(i) Mention four (4) ways of updating software:

  1. Automatic Updates: Many software programs and operating systems have an option to automatically check for and install updates. This ensures that the software is always up to date without manual intervention.
  2. Manual Updates: Users can manually download and install updates from the software manufacturer’s website or through the application’s update feature.
  3. Using Update Managers: Tools such as Windows Update for Microsoft products or package managers like apt for Linux distributions can be used to manage and install updates systematically.
  4. Third-Party Update Tools: There are third-party software applications designed to check for and update multiple programs on a computer. Examples include software like Ninite or Patch My PC.

(ii) State three (3) ways to prevent a computer from overheating:

  1. Ensure Proper Ventilation: Make sure that the computer is placed in a well-ventilated area. Avoid blocking the airflow around the computer’s vents and fans.
  2. Regular Cleaning: Dust buildup can block air flow and cause overheating. Regularly clean the internal components of your computer, especially the fans and heatsinks, to prevent dust accumulation.
  3. Use Cooling Pads or External Fans: For laptops, cooling pads with built-in fans can help reduce temperature. For desktops, additional case fans or improved cooling solutions (like liquid cooling) can be used to manage heat.

3c. Mention five update-able device components:

  1. Operating System
  2. Firmware (BIOS/UEFI)
  3. Device Drivers (e.g., graphics card, network adapter)
  4. Software Applications
  5. Antivirus Definitions

4a. What is Computer Hardware Repair?

Computer hardware repair involves diagnosing and fixing issues with the physical components of a computer. This can include replacing faulty parts, upgrading components, and ensuring that all hardware is functioning correctly.

4b. List and explain four (4) major guidelines for repairing computers:

  1. Safety First: Always turn off and unplug the computer before opening it up. Use anti-static wrist straps to prevent electrostatic discharge, which can damage sensitive components.
  2. Proper Diagnosis: Accurately diagnose the problem before attempting any repair. Use diagnostic tools and software to pinpoint the issue and avoid unnecessary repairs or replacements.
  3. Use the Right Tools: Ensure you have the appropriate tools for the job. Using the wrong tools can cause further damage to the components.
  4. Follow Manufacturer Guidelines: Adhere to the manufacturer’s instructions and guidelines for repairing or replacing components. This ensures compatibility and maintains the integrity of the computer system.

4c. State nine (9) points when computer restarting is necessary:

  1. After Installing Updates: Many updates require a restart to apply changes.
  2. After Installing or Uninstalling Software: Some applications need a restart to complete the installation or removal process.
  3. To Fix Software Glitches: Restarting can often resolve software issues and improve performance.
  4. After Changing System Settings: Certain system settings changes require a restart to take effect.
  5. When System Performance Degrades: A restart can clear out temporary files and memory, improving performance.
  6. After Installing New Hardware: A restart ensures that the new hardware is correctly recognized and configured.
  7. Following a System Crash: Restarting can help recover from a crash and bring the system back to a stable state.
  8. To Complete a System Restore or Recovery Process: Some recovery operations require a restart to finalize changes.
  9. For Regular Maintenance: Periodically restarting the computer can help maintain optimal performance by refreshing system resources.
40
Q

Multi Q5

A

5a. Causes of Common Computer Issues/Problems

i) Blue Screen (Blue Screen of Death - BSOD):

  1. Driver Issues: Outdated, corrupted, or incompatible drivers can cause a BSOD.
  2. Hardware Failures: Faulty RAM, hard drives, or other hardware components can lead to system crashes.
  3. Software Conflicts: Conflicts between different software applications or system files.
  4. Overheating: Excessive heat can cause hardware components to fail and result in a BSOD.
  5. Virus/Malware: Malicious software can corrupt system files, leading to crashes.

ii) Blank Screen:

  1. Display Issues: Problems with the monitor or display settings.
  2. Graphics Card Failure: Faulty or improperly seated graphics card.
  3. Connection Problems: Loose or damaged cables connecting the monitor to the computer.
  4. BIOS/UEFI Settings: Incorrect BIOS/UEFI settings preventing the display from working.
  5. Hardware Failures: Other hardware issues such as faulty RAM or motherboard.

iii) Windows Do Not Boot Properly:

  1. Corrupted System Files: Missing or damaged system files can prevent Windows from booting.
  2. Hard Drive Issues: Problems with the hard drive, such as bad sectors or failures.
  3. Boot Configuration Errors: Incorrect boot order or corrupted boot configuration data (BCD).
  4. Hardware Conflicts: Conflicts between different hardware components.
  5. Virus/Malware: Infections that damage boot files or system integrity.

iv) Computer is On But Not Responding:

  1. Software Freezes: Applications that hang or crash can cause the system to become unresponsive.
  2. Insufficient Resources: Running out of RAM or CPU resources due to too many applications or processes.
  3. Driver Issues: Faulty or outdated drivers causing the system to hang.
  4. Overheating: Excessive heat leading to thermal throttling or hardware failure.
  5. Hardware Failures: Issues with RAM, hard drive, or other components.

v) External Device is Not Working:

  1. Driver Issues: Missing, outdated, or incompatible drivers for the device.
  2. Connection Problems: Loose, damaged, or incorrect cables and ports.
  3. Power Issues: External device not receiving sufficient power.
  4. Compatibility Issues: Device not compatible with the system or operating system.
  5. Faulty Device: The external device itself may be defective.

5b. Troubleshooting a System

Troubleshooting involves a systematic approach to diagnosing and resolving computer issues. Below is a step-by-step diagram and explanation:

Diagram: Troubleshooting Flowchart

```plaintext
Start
|
v
Identify the Problem
|
v
Gather Information
|
v
Establish a Theory of Probable Cause
|
v
Test the Theory to Determine Cause
|
+–> No –> Escalate or Research Further
|
v
Establish a Plan of Action and Implement the Solution
|
v
Verify Full System Functionality
|
v
Document Findings, Actions, and Outcomes
|
v
End
~~~

Explanation:

  1. Identify the Problem: Determine the exact nature of the issue. This could be through error messages, user reports, or observable symptoms.
  2. Gather Information: Collect all relevant data about the problem, including recent changes, hardware configurations, and software installations.
  3. Establish a Theory of Probable Cause: Based on the information gathered, hypothesize the most likely causes of the issue.
  4. Test the Theory to Determine Cause: Perform tests to confirm or rule out each hypothesis. This may involve checking connections, running diagnostics, or testing components.
  5. Establish a Plan of Action and Implement the Solution: Once the cause is identified, create a plan to resolve the issue and implement the necessary steps.
  6. Verify Full System Functionality: After implementing the solution, test the system thoroughly to ensure the problem is resolved and the system is functioning correctly.
  7. Document Findings, Actions, and Outcomes: Record the problem, the steps taken to resolve it, and the final outcome. This documentation can be useful for future reference and troubleshooting similar issues.

Additional Diagrams for Specific Issues

For more complex issues, additional diagrams like network troubleshooting flowcharts or hardware component testing procedures can be used to further guide the troubleshooting process.

41
Q

Q6.

A

6a. What is Malicious Software

Malicious software (malware) refers to any software intentionally designed to cause damage to a computer, server, client, or computer network. It includes viruses, worms, Trojan horses, ransomware, spyware, adware, and other malicious programs. Malware can disrupt computer operations, steal sensitive information, gain unauthorized access to system resources, and cause various other harms.

6b. Five Deadly Effects of a Virus

  1. Data Loss: Viruses can delete or corrupt files, leading to the loss of important data.
  2. System Crashes: A virus can cause frequent crashes, making the system unstable and unusable.
  3. Performance Degradation: Infected systems often slow down significantly due to the virus consuming system resources.
  4. Unauthorized Access: Some viruses can create backdoors, allowing hackers to gain unauthorized access to the system.
  5. Financial Loss: Viruses can lead to financial loss through data breaches, theft of sensitive information, and the need for costly repairs and recovery efforts.

6c. Five Virus Warning Signs on a Computer System

  1. Frequent Crashes and Errors: The system crashes frequently or displays error messages.
  2. Slow Performance: The computer runs noticeably slower than usual.
  3. Unusual Behavior: Programs open and close on their own, or unusual messages and prompts appear.
  4. Missing Files: Files go missing or are corrupted without any explanation.
  5. Increased Network Activity: Unexplained increase in network activity, potentially indicating data being sent to an external source.

6d. Four Major Functions of a Good Virus Protection Program

  1. Real-Time Scanning: Continuously monitors the system for any malicious activity and prevents threats in real time.
  2. Regular Updates: Frequently updates its virus definitions to protect against the latest threats.
  3. Scheduled Scanning: Allows users to schedule regular scans of the entire system to detect and remove any hidden malware.
  4. Threat Removal: Efficiently quarantines and removes detected viruses, spyware, and other malicious software.