Secretarial knowledge > School management system

Office computer use system


Office computer use system
1. Before starting the machine, check whether the power supply, microcomputer, equipment, etc. are in good condition. If problems are found, report them to the classroom in time, and do not handle them by yourself.
2. The operation of the machine should be carried out strictly according to the program. If a fault or emergency is found, immediately turn off the power or turn off the power. After the end of the use, you must press the program to shut down and turn off the power.
3. It is strictly forbidden to move the machine at will, open the cover or connect various cables. Do not place objects on the machine. Do not allow small objects to fall into the gaps in the machine.
4. It is strictly forbidden to use floppy disks of unknown origin to prevent virus intrusion. Do not arbitrarily delete the data information in the machine.
5. Do not browse unhealthy web pages. You can't chat, play games, listen to music, or watch movies during working hours.
6. The office machine is managed by the office director. It is strictly forbidden to use by non-school staff.
7. It is strictly forbidden to use the computer to do things that are not related to work during working hours. Do not share your computer completely.

Network access and management system
1. The school's network access computer should be responsible for and strictly managed. Regularly organize relevant personnel to carefully study the various provisions in the Jiangsu Province Public Information Network account users' network access responsibility book, and strictly enforce them.
2. Keep your user account and password secure. The user account and password are controlled by a special person and must not be leaked to avoid loss.
3. Regularly turn on the Internet every day during the working day, and the mail distributed by the Education Bureau to the e-mail address should be promptly received. Materials and data required to be submitted by e-mail should be reported on time.
4. When using the information network, the operator must abide by the relevant laws and regulations of the state, abide by social morality, and must not disseminate, distribute or copy the following information online:
Information that jeopardizes national security and social stability;
Information that reveals state secrets;
Information that is inconsistent with existing national policies, laws, and regulations;
Information related to pornography and obscenity;
Gambling information;
There is information that harms social morality and infringes upon the legitimate rights and interests of others.
5. Do not blindly receive unsolicited e-mails to prevent viruses from intruding and affect the normal operation of the computer. Regular regular drug and anti-drug work should be done to strengthen the routine maintenance of the computer.
6. Computers should have online records on the Internet, and record the time of each network access, Internet operators, content, etc. for future reference.

recommended article

popular articles