Repair and maintenance
Repair is the restoration work when an asset is broken, damaged, or non-functional.
Maintenance refers to regular activities and/or corrective or preventive repairs performed on equipment to prevent damage and extend life expectancy.
Preventive Maintenance of the System
Preventive maintenance is the regular and systematic inspection, cleaning and replacement of worn parts, materials and systems. Effective preventative maintenance reduces failures of parts, materials and systems, keeping hardware and software in good working condition
Computer preventive maintenance
a. Clean our computer equipment
b. Download the latest drivers for our hardware.
c. Download the latest updates for our computer software.
d. Check to make sure that you have the latest antivirus protection updates our computer.
e. Run disk software utilities, such as Defrag and Scandisk on our hard drive.
f. Remove unused programs or other files from our computer.
g. If you don’t shut down our computer, you should restart our computer every few weeks, unless it’s an important computer, such as a server.
Fixing Wireless Network Connection Issues
Following are the steps for fixing the network problems:
-Make sure Wi-Fi is turned on. Select the “No internet connection” icon on the right side of the taskbar, and make sure Wi-Fi is turned on. If it isn’t, select it to turn it on. Also, make sure Airplane mode is turned off.
-Select Manage Wi-Fi connections on the Wi-Fi quick setting, see if a Wi-Fi network we recognize and trust appears in the list of networks. If it does, select the Wi-Fi network, and they try to connect to it. If it says Connected underneath the network name, select Disconnect, wait a moment, and then select Connect again
-Try connecting to a network on a different frequency band. Many consumer Wi-Fi routers broadcast at two different network frequency bands: 2.4 GHz and 5 GHz. These will appear as separate networks in the list of available Wi-Fi networks. If our list of available Wi-Fi networks includes both a 2.4 GHz network and a 5 GHz network, try connecting to the other network. To learn more about the differences between 2.4 GHz networks and 5 GHz. networks, check out Wi-Fi problems and our home layout.
-Make sure the physical Wi-Fi switch on our laptop is turned on .
-Run the Network trouble shooter. The Network trouble shooter can help diagnose and fix common connection problems.
To run the network trouble shooter
1. Select Start> Settings> System> Troubleshoot >Other trouble shooters
2. Under Other, select Network Adapter >Run
3. Follow the steps in the trouble shooter and see if that fixes the problem Restart our modem and wireless router. This helps create a new connection to our internet service provider (ISP)
When we do this, everyone that is connected to our Wi-Fi network will be temporarily disconnected. The steps we take to restart our modem and router can vary, but here are the general steps.
Power Source and Power Protection
Instead, current flows from alternating current (AC) supplied by the power company to direct current (DC) used by PC components at the required voltage. The power supply unit (PSU) converts the alternating current from the mains into low voltage regulated direct current for the internal components of the computer.
Power protection can save our real money, lost time, and even physical damage to our hardware. They protect our equipment from voltage effects and power outages. In particular, voltage spikes can damage computer equipment and power outages can cause data loss. In this section, we will learn about the four main types of power protection devices available and when we should use them.
The following types of power-protection devices are explained in the sectio that follow:
- Surge suppressors
- Phone-line surge protectors
- Line conditioners
- Standby power supplies (SPS)
- Uninterruptible power supplies (UPS)
Surge Suppressors (Protectors)
The handiest shape of strength safety is anybody of the commercially to be ha surge protectors that is, gadgets inserted among the machine and the strength line. These gadgets, can soak up the excessive-voltage transients produce through close by lightning moves and strength equipment. Some surge protection may be powerful for sure kinds of strength problems; however they prove simplest very constrained safety.
Phone Line Surge Protectors
In addition to power line protection, it is also important to protect the system from attached telephone lines. If we have a modem or fax card connected to CUT phone system, power surges or spikes transmitted onto our phone line can damage our system. In many areas, telephone lines are particularly vulnerable to lightning strikes, a leading cause of blown modems and damage to connected computer equipment
Line Conditioners
Other issues with incoming electricity can happen in addition to high voltage and current conditions. A brownout could occur if the voltage drops below the amount required to keep the system running. Other types of electrical noise, such as radio-frequency interference or electrical noise produced by motors or other inductive loads, may pass through the power line in addition to simple voltage surges or spikes.
Standby Power Supplies (SPS)
A self-sufficient power source is known as a stand-alone power system, o The home is powered by solar panels, which also keep the unit’s batteries charged for when the sun isn’t shining. When necessary, a starts up to maintain power. backup generator also starts up to maintain power
Uninterruptible Power Supplies (UPS)
An Uninterruptible Power Supply (UPS) is an essential device for computer systems, providing backup power during electrical outages and voltage fluctuations. It ensures that computers and other electronic devices remain operational, preventing data loss and hardware damage. A UPS typically includes a battery that activates when it detects a loss of power from the primary source, offering enough time to save work and safely shut down the system. Additionally, many UPS units feature surge protection, safeguarding devices against power spikes and surges. This reliability is crucial in environments where continuous power is critical, such as data centers, hospitals, and offices, making UPS units a vital component in maintaining the integrity and longevity of computer systems.
Failure or Improper Operation of Video Cards
The integrated circuit that produces the video signal supplied to a comp display is a video card, also known as a graphics card. The card is often found the motherboard of the computer or on a separate circuit board, though occasionally integrated into the computer display unit. A graphics card, also known as a video card, display card, graphics adapter GPU, VGA card or VGA, video adapter, or display adapter, is an extension c that produces an output image feed for a display device, like a computer monitor.
How to recognize a Dying Video card:
– Programs that frequently stutter or slow down.
– Crashes while Executing Graphics-Intensive Tasks.
– Unexpected Graphical Bugs That Didn’t exist before.
– extreme heat while while performing tasks that it used to perform well.
Causes of video card failure:
– A buildup of dust on the video card.
– Low or Defected RAM.
– Incorrectly installed card on motherboards or bad connections.
– An inoperative power supply unit (PSU).
– If the ventilation outlets are obstructed or the computer is kept in a poorly ventilated space, a high temperature may result.
– The video card may sustain physical harm if computer or laptop is droped.
Consequences of video card problems
Video card problems can lead to a range of issues affecting the performance and usability of a computer system. Here are some potential consequences and troubleshooting steps for common video card problems:
Loose Connection:
A loose video card connection can cause intermittent display issues, such as screen flickering, blackouts, or complete loss of video output.
Troubleshooting: Ensure the video card is securely seated in its slot. Power down the computer, open the case, and carefully reinsert the card, making sure it is fully engaged.
Swapping Graphics Card Slot:
If the video card is not functioning properly in its current slot, it might be due to a faulty slot on the motherboard.
Troubleshooting: Move the video card to another compatible slot. This can help determine if the issue is with the card itself or the slot.
Checking the PC Monitor:
A malfunctioning monitor can be mistaken for a video card problem, leading to unnecessary troubleshooting steps.
Troubleshooting: Test the monitor with another computer or use a different monitor with the current system to verify the monitor’s functionality.
Testing Another Graphics Card:
If the original video card is faulty, it can cause no display or graphical errors.
Troubleshooting: Install a known good graphics card to see if the issue persists. This helps determine whether the problem lies with the original card or another component.
Checking Sound Drivers:
Video card issues can sometimes affect audio, especially if the card supports audio over HDMI.
Troubleshooting: Ensure that sound drivers are up to date and functioning correctly. Check the sound settings in the operating system to confirm that the correct audio output device is selected.
Checking ‘Device Status’ of Graphics Card:
The operating system might report problems with the video card, such as driver conflicts or hardware failures.
Troubleshooting: In the Device Manager (Windows) or equivalent system utility (MacOS/Linux), check the status of the graphics card. Look for any error messages or status indications and update or reinstall drivers as necessary.
How to fix video card problems:
Fixing video card problems often involves a series of troubleshooting steps to identify and resolve the issue. Here are detailed steps on how to address common video card problems:
Upgrade Video Card:
If your current video card is outdated or not powerful enough for your needs, consider upgrading to a newer model.
Steps:
1. Research and purchase a compatible video card.
2. Power down the computer and open the case.
3. Remove the old video card and insert the new one into the appropriate slot.
4. Connect any necessary power cables.
5. Boot up the computer and install the latest drivers for the new card.
Disable and Enable Device:
Sometimes, temporarily disabling and then enabling the video card can resolve minor glitches.
Steps:
1. Open Device Manager (Windows) or the equivalent utility on your operating system.
2. Locate the video card under the “Display adapters” section.
3. Right-click on the video card and select “Disable device.”
4. Wait a few seconds, then right-click again and select “Enable device.”
Uninstall and Reinstall the Drivers:
Corrupted or outdated drivers can cause video card issues. Uninstalling and reinstalling the drivers can often fix these problems.
Steps:
1. Open Device Manager and find the video card.
2. Right-click on the video card and select “Uninstall device.”
3. Follow the prompts to remove the driver.
4. Restart the computer.
5. Download the latest drivers from the video card manufacturer’s website.
6. Install the new drivers and restart the computer again.
Cool and Clean Video Card:
Overheating can cause a video card to malfunction. Cleaning the card and ensuring proper cooling can mitigate these issues.
Steps:
1. Power down and unplug the computer.
2. Open the case and carefully remove the video card.
3. Use compressed air to blow dust out of the card and its heatsink.
4. Ensure that the cooling fans are working properly.
5. Reinsert the card and ensure there is adequate airflow within the case.
Replace Video Card:
If the video card is faulty and cannot be fixed, replacing it may be the only option.
Steps:
1. Purchase a new, compatible video card.
2. Power down the computer and open the case.
3. Remove the old video card and insert the new one into the appropriate slot.
4. Connect any necessary power cables.
5. Boot up the computer and install the latest drivers for the new card.
Image quality problems in monitor (resolution, layout)
Image quality problems in monitors can manifest in several ways, including issues with resolution and layout. Resolution problems often result in blurry or pixelated images, making text difficult to read and reducing overall sharpness. This can occur if the monitor’s native resolution is not matched by the settings on the connected device, or if the screen is physically damaged. Layout issues, such as incorrect scaling or aspect ratio, can distort images and make them appear stretched or squashed. This is often due to improper configuration settings or software glitches. Inconsistent colour representation and brightness levels across the screen can further degrade image quality, causing images to appear washed out or overly saturated. Ensuring the monitor is set to its optimal resolution, updating drivers, and calibrating the display can help mitigate these problems.
Steps of solving problem:
To solve image quality problems in monitors, follow these steps:
Check Physical Connections:
Ensure that all cables (HDMI, DisplayPort, VGA, etc.) are securely connected to both the monitor and the computer. Try different cables or ports to rule out a faulty connection.
Set Native Resolution:
Right-click on the desktop and select ‘Display settings’ (Windows) or ‘System Preferences’ > ‘Displays’ (Mac). Set the monitor to its native resolution for optimal clarity.
Adjust Scaling and Layout:
In the display settings, ensure the scaling and layout options are correctly configured. For Windows, this is under ‘Scale and layout’; for Mac, it’s in the ‘Displays’ settings.
Update Graphics Drivers:
Outdated or corrupt graphics drivers can cause display issues. Visit the website of your graphics card manufacturer (NVIDIA, AMD, Intel) and download the latest drivers.
Calibrate the Display:
Use built-in calibration tools to adjust brightness, contrast, and colour settings. For Windows, this is found under ‘Colour Management’ > ‘Advanced’ > ‘Calibrate Display’. For Mac, go to ‘System Preferences’ > ‘Displays’ > ‘Colour’ > ‘Calibrate’.
Check for Software Issues:
Sometimes, third-party software can interfere with display settings. Disable or uninstall any software that might be affecting display performance and see if the problem resolves.
Test with Different Hardware:
Connect the monitor to a different computer or device to see if the issue persists. This can help determine if the problem lies with the monitor or the original device.
Factory Reset:
If the problem continues, consider performing a factory reset on the monitor. This can usually be done through the monitor’s on-screen display (OSD) menu.
Professional Inspection:
If none of the above steps work, there may be a hardware issue with the monitor itself. Contact the manufacturer for support or take the monitor to a professional technician for inspection.
Input and Output device connection issues
Connection issues with input and output devices can be frustrating, but they are often resolvable through systematic troubleshooting. Here’s a guide to help you diagnose and fix common problems:
Check Physical Connections:
Ensure all cables are securely connected to the correct ports. Sometimes, unplugging and replugging cables can resolve issues. Verify that the devices have power. Some peripherals require an external power source.
Device Drivers:
Outdated or missing drivers can cause devices to malfunction. Go to the manufacturer’s website to download and install the latest drivers for your device. Sometimes, reinstalling drivers can solve the issue. Uninstall the device from the Device Manager and then restart your computer to allow it to reinstall the drivers.
Device Manager Check:
Open Device Manager (right-click Start > Device Manager) and look for any devices with a yellow triangle or red X. This indicates a problem with the device. Right-click the problematic device, select “Update driver,” and follow the prompts.
Compatibility Issues:
Ensure the device is compatible with your operating system. Check the manufacturer’s website for compatibility information. Sometimes, installed software can conflict with device operation. Try disabling or uninstalling recently added software to see if the issue resolves.
Check for Interference:
Wireless devices can experience interference from other wireless devices or networks. Ensure the device is within range and there are no obstructions. For Bluetooth devices, ensure they are properly paired and that Bluetooth is enabled on your computer.
Test on Another Computer:
Connect the device to another computer. If it works, the issue is likely with your original computer. If it doesn’t work, the device may be faulty.
System Updates:
Ensure your operating system is up to date as updates can fix bugs and compatibility issues. Check if the device has firmware updates available from the manufacturer.
Specific Device Troubleshooting:
Try different USB ports. For wireless, ensure batteries are charged. Check display settings and ensure the correct input source is selected. Test with another cable. Ensure it’s connected to the network (for network printers) and has paper and ink/toner. Run the printer troubleshooter.
Reset Devices:
Sometimes simply restarting the device and computer can solve the issue. As a last resort, some devices have a factory reset option. Refer to the device manual for instructions.
Seek Professional Help:
If you’ve tried everything and the device still doesn’t work, contact the manufacturer’s technical support for assistance. A local computer technician can provide hands-on help if needed.
Processor Power and Voltage Level
Processor power and voltage levels are crucial factors in the performance and stability of a computer. The processor, or CPU, requires a stable power supply to function correctly, and this power is delivered at specific voltage levels. Modern processors typically operate at lower voltage levels, ranging from about 0.7V to 1.4V, depending on the model and operating conditions. The voltage level is tightly regulated by the motherboard’s voltage regulator module (VRM), which converts the higher voltage from the power supply unit (PSU) to the lower voltage required by the CPU. Accurate voltage regulation is essential because even slight deviations can lead to instability, causing system crashes or reducing the lifespan of the processor. Additionally, processors are designed to adjust their power consumption dynamically based on workload through technologies like Intel’s Speed Step and AMD’s Cool’n’Quiet. This dynamic adjustment helps balance performance with power efficiency, reducing heat generation and conserving energy when full power is not needed. Overclocking enthusiasts often tweak voltage levels to achieve higher performance, but this must be done carefully to avoid damaging the CPU due to excessive voltage or heat.
Introduction to processor cooling
Processor cooling is a vital aspect of maintaining the performance and longevity of a computer. As processors execute millions of calculations per second, they generate significant amounts of heat, which must be efficiently dissipated to prevent overheating and ensure stable operation. Various cooling methods are employed to manage this heat, each with its own mechanisms and use cases.
Heat Sink:
A heat sink is a passive cooling device that absorbs heat from the processor and dissipates it into the surrounding air. Made from materials with high thermal conductivity, such as aluminum or copper, heat sinks increase the surface area available for heat dissipation. They often feature fins or other shapes to maximize airflow and cooling efficiency.
Fan:
A fan is an active cooling component often paired with a heat sink to enhance its cooling capacity. The fan creates airflow over the heat sink, rapidly moving heat away from the processor and dispersing it into the air. This combination is commonly referred to as an air cooler.
Thermal Pad or Thermal Paste:
Thermal pads and thermal paste are materials used to improve the thermal conductivity between the processor and the heat sink. These materials fill microscopic gaps and imperfections on the surfaces, ensuring better heat transfer. Thermal paste is typically more effective but requires careful application, whereas thermal pads are easier to apply but may offer slightly less performance.
Liquid Cooling:
Liquid cooling systems use a coolant to transfer heat away from the processor. The coolant circulates through a closed loop, passing over a water block attached to the CPU, then through a radiator where fans dissipate the heat. Liquid cooling is highly efficient and can handle high-performance and overclocked processors better than air cooling.
Vapor Cooling:
Vapor cooling involves phase change materials that absorb heat as they transition from liquid to vapor. The vapor then moves away from the heat source, cools down, and condenses back into liquid. This cycle effectively transports heat away from the processor. Vapor chambers, a form of this technology, are often integrated into high-end heat sinks and graphics card coolers.
Heat Pipe:
Heat pipes are sealed tubes containing a liquid that vaporizes when heated and condenses when cooled. They transfer heat rapidly from the processor to a heat sink or radiator, enhancing cooling efficiency. Heat pipes are often used in combination with other cooling methods for optimal performance.
Passive Cooling:
Passive cooling relies solely on natural convection and radiation to dissipate heat without any moving parts. It typically involves larger heat sinks with ample surface area. While it’s silent and requires no power, passive cooling is generally less effective than active cooling methods and is suited for low-power or low-performance systems.
Cooling and ventilation
Cooling and ventilation are essential aspects of computer system design aimed at managing heat generated by internal components, particularly the processor (CPU), graphics card (GPU), and other high-performance parts. Here’s a description of various methods to enhance cooling and ventilation:
Keep System Away from Vents and Windows:
Placing the computer system away from direct sunlight and air vents helps prevent exposure to excessive heat or cold drafts, which can affect system performance and longevity. Direct sunlight can cause components to overheat, while cold drafts can lead to condensation inside the system, potentially damaging electronic components.
Give System Some Breathing Room:
Ensure that the computer system has sufficient space around it to allow for proper airflow. Avoid placing the system in cramped spaces or against walls where airflow may be restricted. Sufficient breathing room allows for better ventilation and helps prevent overheating of internal components.
Close System’s Case:
Keeping the computer case closed helps maintain a controlled airflow path, directing air through the system’s cooling components such as fans and heat sinks. Closed cases also prevent dust and debris from entering the system, reducing the risk of component damage and overheating.
Clean Fans:
Regularly clean the fans inside the computer case to remove dust and debris buildup, which can obstruct airflow and reduce cooling efficiency. Use compressed air or a soft brush to gently clean the fan blades and surrounding areas. Clean fans operate more efficiently, ensuring proper ventilation and cooling.
Upgrade CPU Fans:
Upgrading the CPU fan to a more powerful or efficient model can improve cooling performance, especially if the system is experiencing overheating issues. High-performance CPU fans with larger heat sinks and faster airflow can better dissipate heat generated by the processor, enhancing overall system stability.
Add a Case Fan:
Installing additional case fans can increase airflow within the computer case, improving overall ventilation and cooling efficiency. Case fans can be positioned strategically to create a balanced airflow path, directing cool air to critical components such as the CPU, GPU, and motherboard.
Add More Cooling Fans:
In systems with high-performance components or overclocked hardware, adding multiple cooling fans can help dissipate heat more effectively. Additional fans can be installed on the front, rear, top, or side panels of the case to create a positive airflow pressure, expelling hot air and drawing in cool air from outside the case.
Get a Water Cooling Kit:
Water cooling kits use a closed-loop system to transfer heat away from the CPU or GPU to a radiator, where it is dissipated into the surrounding air. Water cooling offers superior thermal performance compared to air cooling and is ideal for overclocked or high-performance systems. However, it requires more setup and maintenance than traditional air cooling solutions.
Virus background
A virus is a type of malicious software (malware) designed to replicate itself and spread from one computer to another, often causing harm to files, applications, and the overall system. Viruses can vary in complexity and functionality, and they can be categorized into different types based on their method of operation and behavior. Here’s an overview of some common types of viruses:
File Virus:
File viruses attach themselves to executable files (e.g., .exe, .dll) and infect them. When an infected file is executed, the virus code runs, and it may replicate itself by infecting other files on the system.
Boot Sector Virus:
Boot sector viruses infect the boot sector of storage devices such as hard drives or USB drives. They typically spread when an infected bootable disk is accessed during system startup. Boot sector viruses can interfere with the boot process and may render the system unbootable.
Macro Virus:
Macro viruses infect documents and spreadsheets that contain macros, such as those created in Microsoft Office applications (e.g., Word, Excel). When an infected document is opened, the virus code embedded in the macros executes, allowing the virus to replicate and spread to other documents.
Source Code Virus:
Source code viruses infect programming source code files. When infected source code is compiled, the resulting executable files may also become infected. Source code viruses are often designed to target specific programming languages or development environments.
Encrypted Virus:
Encrypted viruses use encryption techniques to conceal their code and evade detection by antivirus software. When an encrypted virus infects a file, it decrypts its code before executing, making it difficult for antivirus programs to detect and remove.
Stealth Virus:
Stealth viruses actively hide themselves from detection by antivirus software and other security mechanisms. They may intercept system calls or manipulate file structures to avoid detection while remaining active in the background.
Tunneling Virus:
Tunneling viruses use techniques to bypass security measures, such as firewalls or intrusion detection systems, by “tunneling” through network protocols or exploiting vulnerabilities in network communications.
Multipartite Virus:
Multipartite viruses combine characteristics of multiple virus types, such as infecting both files and boot sectors. They can spread through various means and may be more challenging to detect and remove due to their multifaceted nature.
Browser Hijacker:
Browser hijackers are types of malware that modify web browser settings without the user’s consent. They may change the default homepage, search engine, or install unwanted browser extensions. Browser hijackers often redirect users to malicious websites or display unwanted advertisements.
Resident Virus:
Resident viruses embed themselves into the system’s memory (RAM) and remain active even after the initial infection process. They can infect files as they are accessed or executed, making them difficult to detect and remove.
Virus Detection, Protection and Prevention Techniques
Virus detection and prevention tips
perform the following tips:
- Before we try to open any files on any diskettes we receive from someone, run a virus check on the disk.
- Never open any files that are attached to emails from source that are unknown, dubious or unreliable.
- Even if it seems to be from the close friend never open any attachment from emails until we are sure what they are. It is better to verify that.
- It the subject line of an email seems suspicious or unexpected, do not open any attachments that are take a chance.
- Delete spam and chain emails. Don’t respond or forward any of them.
- Never downloads files from unknown sources.
- When downloading files from the internet, use caution.
- Every week update our antivirus programs.
- Make a regular backup for our files and folders.
Protect Yourself and Your Computer:
Be cautious when opening email attachments or clicking on links, especially from unknown or suspicious sources. Avoid downloading files or software from untrusted websites or peer-to-peer networks. Enable security features such as pop-up blockers and browser security settings. Be wary of social engineering tactics used by attackers to trick users into revealing sensitive information or installing malware.
Keep Your Device Secure:
Ensure your operating system, software applications, and firmware are regularly updated with the latest security patches and updates. Enable automatic updates whenever possible to ensure timely installation of security fixes. Disable unnecessary services and features to reduce the attack surface of your device.
Use Antivirus Software:
Install reputable antivirus software and keep it updated with the latest virus definitions. Perform regular scans of your system to detect and remove any malware or suspicious files.
Use Antispyware Software:
Supplement antivirus protection with antispyware software to detect and remove spyware, adware, and other potentially unwanted programs. Ensure antispyware software is updated regularly to detect new threats.
Firewalls:
Enable and configure a firewall to monitor and control incoming and outgoing network traffic. Use a hardware firewall provided by your router, as well as a software firewall on your computer for layered protection.
Use Strong Passwords:
Use complex passwords that include a combination of letters, numbers, and special characters. Avoid using easily guessable passwords such as “123456” or “password.” Consider using a password manager to generate and store strong passwords securely.
Use Stronger Authentication:
Enable multi-factor authentication (MFA) whenever possible to add an extra layer of security to your accounts. MFA requires users to provide two or more forms of authentication, such as a password and a unique code sent to their mobile device.
Protect Your Private Information:
Be cautious about sharing personal or sensitive information online, especially on social media platforms. Review privacy settings on websites and social media accounts to control who can access your information.
Be Careful What You Click:
Exercise caution when clicking on links or downloading files from unfamiliar websites or emails, as they may contain malware or phishing attempts.
Shop Safely:
Only make online purchases from reputable and secure websites with HTTPS encryption. Avoid entering sensitive information on public Wi-Fi networks or unsecured websites.
Be Careful What You Share:
Be mindful of the information you share on social media platforms and online forums to avoid exposing yourself to identity theft or other risks.
Responding to Data Breaches:
Stay informed about data breaches and security incidents that may affect your accounts or personal information. Change passwords and monitor accounts for any suspicious activity if you are notified of a data breach.
Parents Take Control:
Educate children about online safety and responsible internet use, including the dangers of clicking on unknown links or sharing personal information. Use parental control features to monitor and limit children’s access to inappropriate content and websites.