You are on page 1of 52

TABLE OF CONTENT

Title Page
Certification i
Dedication ii
Acknowledgement iii
Abstract iv
Table Content v-vi
CHAPTER ONE
INTRODUCTION 1
Background of the Study 1-2
Motivation 2
Objectives of the study 2-3
Scope of the study 3
Expected contribution to knowledge 3
Methodology 3
CHAPTER TWO
LITERATURE REVIEW 4

2.1 History of processor 4-6

2.2 Function of the computer System 6-7

2.3 Computer Laboratory Security and Safety 7-8

2.4 Repairs and Maintenance/Assembly 8-12

2.5 Troubleshooting 13

2.6 Definitions of Terms 14


CHAPTER THREE
SYSTEM IMPLEMETATION

3.1 Tools required to set-up the computer

3.2 The components/parts required for pc assembly


3.3 The external and peripherals components

3.4 Pictures of the above-mentioned components and devices

3.5 Computer Networks

CHAPTER FOUR

SYSTEM DESIGN AND EVALUATION

4.1 Features of the Computer

4.2 Procedural for the assemblage of the pc (personal computer)

4.3 Process of assembling the pc

4.3.1 Installing a socket processor and the heat sink on the motherhood

4.3.2 Installing memory modules

4.3.3 Installation of the motherboard

4.3.4 Installing the CDROM and hard disk drives

4.3.5 Connecting the power supply cables to the motherboard

4.3.6 Connecting the motherboard to the drives

4.3.7 Connecting the front panel cable

4.4 Installing the Operating System

4.4.1 Step One: Setting the BIOS

4.4.2 Step Two: Installing the Windows operating system

4.4.3 Step Three: Activating the Windows operating system

4.4.4 Step Four: Install Windows Updates

CHAPTER FIVE

CONCLUSION AND RECOMMENDATION

5.1 Conclusion

5.2 Recommendation
ABSTRACT
Rapid advancements in Hardware and Software technology in today’s world have been
accompanied by the need for equipping Computer Engineering Laboratory Workshop with
the best Tools and Materials technology for computer hardware, repair, installation and
troubleshooting course for students. The biggest challenge in incorporating technology into
learning is allowing students to take advantage of Identifying and learning computer
hardware repair, installation, Networking and troubleshooting while ensuring that the
computer engineering laboratory Workshop is productive and well managed. The main
objective of this paper is to study the effects of using a Hardware and Software engineering
laboratory management system in computer lab sessions for smooth Engineering technology
integration and effective learning for students. The practice was evaluated through
comparative analysis of the student performance, survey results and feedback from Trainers,
students, and Institutions. Generally, the responses of participants were positive, more than
90% of them agreed that the system enhances the learning environment.

Keywords—E learning, Collaborative Learning, Technology, Computer Hardware and


Software Engineering
.
CHAPTER ONE
INTRODUCTION
In today’s world, Briefly, computer systems are made up of hardware and software. The
physical touchable part of the computer is called the hardware. This is the part that we can touch
and feel. The hardware parts of a computer include the keyboard, monitor, mouse and printer,
usually called the peripherals. Other hardware parts include scanner, light pen, Random Access
Memory (RAM) sticks or modules, processor etc.
The software is a set of instructions that control the computer’s functionality. It cannot be seen or
touched. We have two types, system software and application software. System software is further
broken down into Operating Systems and Compiler Software’s.
Operating systems are sets of instructions that enable interaction between the computer and the
hardware. They act as an interface between the user and the computer. Application software’s are
instructions which service a specific need such as Microsoft Excel, which is used for spreadsheets
etc.
computer hardware and software technology are rapidly pervading many fields of
human endeavor. It continues to have a significant impact on higher education. Nowadays
most educational institutions are equipped with computer labs to provide training for students
that qualify them for their professional life. In today’s educational environment, the need to
provide Computer Workshop with the best tools and material technology available is vital.
However, incorporating technology into learning is never without its challenges. The biggest
challenge is allowing students to take advantage of learning Hardware and Software
technology while keeping the laboratory productive and well managed. In a poorly managed
computer engineering workshop, the teaching and learning process will not be effective.
Previous studies show that the difficulties in teaching in computer engineering lab sessions
include losing class- room control and student attention, difficulties in monitoring of lab
exams, and teaching visually impaired students. In contrast, well-managed computer
engineering laboratory provides a positive learning environment that improves students’
performance and increases their academic engagement and achievement. However, most of
the Institutions computer laboratory management methods are outdated and cause heavy work
pressure for Trainer members.
1.1 BACKGROUND FOR THE STUDY
Computers are used in day to day activities. One of the most important factors used in a computer
are its hardware. The hardware is a vital part of a computer. The hardware plays a main role in the
computation and execution process of a computer. Computers have a tremendous scope for
improvement and refinement. The computers always have a scope which can be fully exploited.
Computer Hardware and Software Building brings significant benefits which is identified below.

i. Know about computer components and how they fit and work together.

ii. Understanding the internal and hardware workings of a computer.

iii. Learning computer hardware terminology

iv. Ability to customize a computer according to specialized specifications.

v. Building computer system from components.

vi. The satisfaction of a job well-done.

vii. Technical problem-solving ability.

1.2 MOTIVATION
I am persuaded that the computer engineering-built manufacturers in the economic only fit
in to general purpose computing which is quite different from the most required and needed
specification most time e.g. constructing, repairing, assembling of computer hardware in
conjunction with computer software’s.

1.3 OBJECTIVE OF THE STUDY


The main objective is to build well-functioning computer with purpose of:

i. Identifying computer components and how they fit and work together.

ii. Understanding the internal and hardware workings of a computer.

iii. Learning computer hardware terminology and geek-speak

iv. Ability to customize a computer according to specialized specifications.

v. Building and assembling computer system from components,

vi. The satisfaction of a job well-done


vii. Gathering technical problem-solving ability.

viii. Reduce the cost of buying new computer system

1.4 SCOPE OF THE STUDY


The focus of the study is to analyze, design, develop, test and implement an interactive
system for computer hardware, repair and troubleshooting course for students. Moreover, it
provides user-guides in resolving computer problems. The system also helps students to gain more
knowledge in repairing hardware parts of a computer system and troubleshooting some basic parts
of the computer system like Display Adapter, Motherboard, Hard Drives, Power Supply, CPU,
Mouse, Keyboard, as well as the system errors and failures. Furthermore, it serves as the aid to be
able to enhance the computer skills of the students.

1.5 EXPECTED CONTRIBUTION TO KNOWLEDGE


To specify the study of Computer hardware and software with their functionalities.
It will enable us to know that hardware cannot work alone to makes a computer without software
being installed.
It gears us up to know the functionality of human to computer system.

1.6 METHODOLOGY

To achieve the objective of the study, an interview was conducted before implementing the
practice with Computer Trainers through a semi- structured interview format. The list of
topics discussed with the Trainers include: Availability of a computing service to a user is a
measure of the proportion of real time for which a particular combination of hardware and software
is providing a service to the user. A frequently occurring problem is to decide the design of
hardware configuration and software so that availability to the user is a maximum.

If software usage of hardware is complex and/or reconfiguration can occur, the calculation of
availability to the user becomes complex.

This paper presents a methodology to rationalise the complexity of the software/hardware


interaction and to calculate the availability of a service to the user.
CHAPTER TWO
LITERATURE REVIEW
Previous studies have shown a positive relationship between engaged time,
appropriate academic activities on computer hardware and software, and high academic
achievement, and well-structured computer laboratory workshop. Kounin,(1970, p. 63)
defined effective computer laboratory workshop as “producing a high rate of work
involvement and a low rate of deviancy in academic settings” . The computer lab workshop
management software was identified in different ways, it can be software like Fortres that
shuts down the computer and only allows users access to limited software features. Recently,
computer engineering workshop management hardware and software has been defined as
programs used by a Trainer in computer labs to keep student attention and enhance
instructional delivery. Monitor sharing is a distinctive feature of engineering lab management
hardware and software that allows the trainer's computer monitor or another student's monitor
to be shared with other computers in the lab.
Recently, universities have started using computer laboratory management systems
that can be commercial software or a system designed in-house.

2.1 HISTORY OF PEER-TO-PEER NETWORK


In the early days after the Internet had been developed the most popular file sharing was
the FTP (file transfer protocol) because it was anonymous. Since, the file sharing is anonymous
over the FTP server lets users log-in with an anonymous name to receive files or share files on the
Internet. Computers were able to access remote files on other computers.
Usenet was one of the first developed in 1979; the network was initially based for dial-up
connection but has been transferred over to the Internet. Usenet uses a specialized client server
protocol called Network News Transfer Protocol (NNTP). This special server primary purpose is
the exchange of text messages, but attached to these messages is encoded files which are
distributed to subscribers of Usenet. Usenet is one of the largest carries of file sharing and Internet
traffic. Many legal questions have arisen around the use of copyrighted material over file sharing.
Between the developments of Usenet in 1979 to the 1990’s, files sharing was primarily done
through the use of bulletin board-based systems. The computer game Doom grew in popularity
due to the distribution of files through the bulletin board system. Bulletin board systems became
less desirable as the Internet grew and more advanced techniques for file sharing were developed.
About 20 years after Usenet had been developed, a new type of file sharing system was
created called Napster, which uses a centralized server to group all the files shared into v databases.
Since, Napster used a centralized server for file sharing services could not use the transitory
network transmission safe found in the Digital Millennium Copyright Act since they had control
over all functions of their network. The software Napster collected and stored file information
from their users’ computers to being made available for other people to download. Napster was
the client host, which provided the ability of file sharing between the users once it had been
authorized by Napster. Not long after Napster was created the company was charged with crimes
of copyright infringement, more specifically the case A&M Records, Inc. v. Napster, Inc. will be
looked at in greater depth later in the document.
After the legal concerns facing Napster, in 2000 Gnutella was released in March and was
the first decentralized file sharing network. The decentralized network was connected to all
software and therefore had no immediate point of failure unlike Napster. A year after Gnutella in
2001, Kazaa was developed and its FastTrack network was distributed and was assigned super-
nodes to increase the efficiency of networking between users. This network was encrypted and
made vast attempts to keep other competitors off the FastTrack network. Kazaa was one of the
most popular file sharing systems after Napster until its decline in 2004 due to bundled malware
and legal battles. Since these file sharing programs were getting into lawsuits, many universities
and institutions added file sharing regulations due to the legality concerns. Many others have been
developed for example LimeWire and Pirate Bay, have faced legal penalties. But, networks such
as Bit Torrent have seemed to manage and circumvent these legal ramifications due to its open
source clients. Bit Torrent uses a torrent file to store the metadata. The torrent file contains URL’s
of multiple trackers, which contain specific pieces of the file being downloaded. Simultaneously
your file is being downloaded from multiple sources at one time.

2.1.1 ADVANTAGES OF P2P NETWORK


It’s simple and easy to setup it requires only HUB or switches and RJ45 cables to connect
all the computers together.
File on the computer can be easily access on another computer if it set to shared folders.
It’s cheap than having to use a server. The only cost involved is hardware, cabling and
maintenance.
The architecture of the layout is simple (how it connects)
If one of the computers fails to work the other computers that connected will still be able
to work.
It doesn’t need any full-time system administrator. Every user is basically their own
administrator of their computers.

2.2 FUNCTION OF THE COMPUTER SYSTEM


Browsing the internet
To provide basic functionality to a user who just needs web surfing, a little-word
processing, and the occasional game of solitaire, it’s important not to go overboard. Such a user
has no need for a top of the line processor or 3D graphics card. A modestly configured system
with an adequate internet connection will suit this user best and can be assembled quite cheaply.
This usage pattern is not going to stress any particular component, you should be looking at a mid-
to low-level processor historically, and current, enough RAM for the OS (operating system) and
a mother board with built in Ethernet, video and audio. If you have a little extra money, spend it
on a better monitor, mouse/keyboard, and case power supply in that order.
Data processing in the offices
An office computer can be expected to do word processing, spreadsheet and database work,
internet and intranet access (including e-mail) and a little light development of spreadsheets,
databases, and presentations. It might also be called on to do page layout work, some 2D graphic
creation, and/or terminal emulation.
Gaming System
We’re not talking here about the occasional game of solitaire or a secret late-night Zuma
obsession. We’re talking about cutting edge 3D gaming first-person-shooters or real-time strategy
games with thousands of troops on the screen at the same time, specula reflections and a lot of
other confusing terminology that describes visual effects designed to make your system fall down
on its knees and cry like a little girl.
So, you’re going to need a fast processor that’s affordableh9 and plenty of RAM, as well
as a motherboard to match, since the speed of the motherboard buses can limit high-end
components.
Video editing
Big and fast hard drives are key, 10000 RPM Raptors in Raid 0 as working space with
multiple 750 GB drives or I terabyte drives for storage is a good target. SATA/300 is highly
recommended and SCSI subsystems should also be considered. A large amount of memory (2GB,
3GB, even 4GB) would be beneficial.
Music production
Plenty of disk space is important, but a music production (recording and mixing)
workstation is chiefly distinguished by specialized external components studio reference monitors
instead of speakers, mixing consoles, microphones, etc.
One piece of advice, if you have extra money, get better microphones, even if you have to
trade the Blues mobile.
Entertainment system/media center
This is a computer designed to sit in the living room with the rest of your A/V gear. The
idea is that it will record and serve audio and video files foreplay via your existing television and
stereo.

2.3 COMPUTER LABORATORY SECURITY AND SAFETY


SECURITY & SAFETY
2.3.1 Securing the Lab
It is essential that the computer lab be fully secured. Camara will not install PCs in an insecure
location.
COMPUTERS LABS MUST HAVE
A solid steel or grilled door with a strong lock
Grilled windows (with the bars firmly attached to the wall)
Solid walls with no gaps or holes
Sealed and secured roof/ceiling (if the lab is in a building of its own, a ceiling is not essential
provided that the roof is sealed and secure). The ceiling should be strong and made of three-ply or
stronger, to stop dust and falling objects from entering the room.
Cemented floors. These can be covered by carpet or another material, as long as it is non-slip and
well-maintained (i.e. no torn edges which can cause people to trip).
Windows that can be opened. Louvres should be placed over the windows to prevent dust and rain
from entering the room; this will also allow light to pass through.
An alarm system will add further protection, but this is not mandatory for receiving Camara
computers.
2.3.2 Lab Safety
REDUCE THE RISK OF DAMAGE TO COMPUTER PERIPHERALS
No smoking, food, or drink should be permitted in computer labs, as they can damage the
equipment and attract insects or rodents.
Supply garbage bins, and keep workspaces clean and clear of sharp objects and debris.
Secure monitors, keyboards, mice and audio hubs to prevent removal and theft.
Attach a small padlock to the back of each PC to prevent internal components, especially RAM,
from being stolen.
The standard user account is camara (password: camara). The administrator’s password should
not be disclosed to students.
2.3.3 Inventory & Lab Access
Camara will supply a full inventory of all equipment supplied upon the completion of any
installation. This record is an important document and should be treated as such.
Camara computers are valuable items and access to the lab should only be afforded to appropriate
people, the lab should remain locked outside of school hours unless an officially-sanctioned
event/training is taking place. Also, a teacher should always remain in the lab when students are
present; this is both for the safety & security of the lab, and the students.
Some computer malfunction may be because of missing internal components. The supplied
inventory can be referred to, e.g. to compare the amount of installed RAM in a PC to the amount
of RAM originally supplied by Camara (min. 512 MB).
2.3.4 Ventilation
A computerlab must have good air circulation.
AVOID DAMAGE TO ELECTRONIC COMPONENTS DUE TO OVERHEATING
Computers can generate a lot of heat. Without good air flow it may be difficult for anyone to use
the lab for extended periods of time. Camara Labs must be well ventilated as computers are easily
damaged by the excess heat.
Classrooms can become quite hot and computers increase the room temperature. In hot regions,
rooms must be kept cool by adequate airflow provided by windows and fans, or air conditioning.
It is advisable to place thin netting over the windows or louvres to prevent dust from entering the
room. This will still allow light and air to pass. Rooms should have fans placed at regular intervals.
Fans may be either wall- or ceiling-mounted, as pictured.
2.4 REPAIRS AND MAINTENANCE/ASSEMBLY
2.4.1 Introduction to Computer Hardware/Software
Briefly, computer systems are made up of hardware and software. The physical touchable
part of the computer is called the hardware. This is the part that we can touch and feel. The
hardware parts of a computer include the keyboard, monitor, mouse and printer, usually called the
peripherals. Other hardware parts include scanner, light pen, Random Access Memory (RAM)
sticks or modules, processor etc.
The software is a set of instructions that control the computer’s functionality. It cannot be
seen or touched. We have two types, system software and application software. System software
is further broken down into Operating Systems and Compiler Software’s.
Operating systems are sets of instructions that enable interaction between the computer and the
hardware. They act as an interface between the user and the computer. Application software’s are
instructions which service a specific need such as Microsoft Excel, which is used for spreadsheets
etc.
2.4.2 Tools and Materials Used in Maintenance
are required to make the job easier. Some recommended tools are screwdrivers (precision
screwdrivers preferably), pliers, parts bag, flashlight, Compact Disk (CD) and portable hard disk
or flash drive, and multimeter.
Screwdrivers are usually used to remove screws so as to dissemble computer component
parts or insert screws so as to assemble component parts. They are several types based on the shape
of the head. Commonly used ones are star head screw drivers and flat screw drivers. For laptop
computers, precision screw drivers are needed. These screw drivers are adapted for special and
smaller screws.
Pliers are used as alternatives to the fingers where the fingers may be too large, especially
on the motherboard where most of the components are small. Commonly used for this purpose are
the needle nose pliers.
Flashlights are small lighting devices which are used when working in the dark or in places
that are darkened, for instance, one may need a light within the system unit to see the components
more clearly.
Compact Disks (CDs) are storage devices which are used to keep information. You have
the recordable CD, which is typically used once, and the re-writeable CD, which can be used and
re-used. CDs are necessary for installation of software during maintenance activities, where
necessary.
Portable hard disk drives or flash drives are needed during maintenance operations to move
files from one place to another if necessary. A CD can also be used in this case, but flash drives
and portable hard disks are needed when the file or files to be moved around are not too large,
because it may be waste of the CD. These portable hard disks or flash drives may also contain
utility diagnostic software’s to be used for diagnostics of the system to be maintained. Portable
hard disks are also called External Hard disks.
A multimeter may also be required for checking of power supplies especially on desktop
systems.
2.4.3 Basic Components and Their Functions
They are several component parts of a computer, we have the outer parts of the computer
like the monitor, keyboard, mouse, system unit and we have the inner part of the computer which
contains the motherboard, the processor, the RAM sticks or modules, the cables, the hard disks or
secondary storage and many other components. Let us look at them in detail.
Monitor:
This is the visual part of the computer that looks like a television. It is called an output
device because it enables the user to view an output of whatever operation he or she is performing.
It is also called the visual display unit (VDU). Common problems we find with it include, slacking
of the video connector (VGA connector).
Keyboard/Mouse:
The keyboard is an input device and is typically used for inputting data into the computer.
The mouse is also an input device used as an alternative to the keyboard. The common problem
with the keyboard and the mouse is breaking of the pins in the PS/2 connectors on their connector
cables due to frequent plugging and unplugging.
System Unit/Chassis or Case:
The system unit basically holds the core components of the computer. It has a casing or
container. This container is designed such that some of the features of the core components within
the casing can be used. Within the system unit, we can find the motherboard.
Fig 2.4.1 Chassis or Case
Motherboard:
This is the most important component on a computer system. It is also called the main board.
Every internal component in a computer connects to the motherboard and its features largely
determine what the computer is capable of plus its overall performance. Motherboards are
classified based on form factors (form factor refers to the physical dimensions, sizes and shape as
well as certain connector, screw hole, and other positions that dictate into which type of case the
motherboard will fit).

Fig 2.4.2 Motherboard Sample

Processor:
The Central Processing Unit (CPU) or processor could be thought of as the engine of the computer.
It is identified by mainly two features, its speed and its width. The speed is a simple concept graded
in Megahertz (MHz). The faster the speed of the processor, the better the performance (speed) of
the computer.
Fig 2.4.3 Processor

Memory (RAM): The system memory is often called Random Access Memory (RAM). This is
the primary working memory. It holds all the programs and the data that the processor is using at
a given time.

Fig 2.4.4 RAM (memory)


modules

Power Supply: The power supply feeds electrical power to the internal components in the
computer.

Fig 2.4.5 Power Pack


Video Card: This is the component on the motherboard that controls the information that we see
on the monitor.
Sound Card: A sound card is the component on the motherboard that enables the PC to generate
complex sounds.

Fig 2.4.6 Sound/audio


device

Hard Drive: The hard disk is the primary high-capacity storage media for the system. All you
data is stored on hard disks.
Network Card/Modem: This is a component that is usually integrated on the motherboard to
provide an interface for network connectivity.

Fig 2.4.7
Network Card
2.5 TROUBLESHOOTING

Troubleshooting is simply the process of finding out why a particular device or component is

malfunctioning, and fixing or repairing that problem. There are various ways of troubleshooting

depending on the type of component to be repaired or fixed or the type of problem experienced.

Some basic troubleshooting tips I learnt during my attachment are given in the table below.

Table 1. Troubleshooting Tips

Problem Identification Possible Cause Solution

Operating system will Poor heat Check the capacity of the heat sink and
not boot. dissipation, replace it if necessary,
improper voltage Check the hard disk cables for tight
settings, loose connectivity and interchange them to ensure
connection of hard proper functionality.
disk or faulty hard
disk cable
Error: Operating system not Corrupt operating Verify that the hard disk is working correctly,
found system, bad hard re-install the operating system if necessary.
disk
System appears to work but no Monitor turned off Test the monitor and the power source and
video is displayed or has failed replace with known good source to confirm if
necessary
No sound No audio adapter Make sure the audio adapter is present and
present, incorrect well connected on the mother board, Ensure
connection of that the speakers are tightly connected and are
speakers or no linked to a working power source, ensure that
power to speakers, sound drivers for the sound device are
no audio drivers installed and working correctly.
present
Power supply failures like Faulty power supply Check the AC input, make sure the cord is
spontaneous rebooting during which may be due to firmly seated in the wall socket, and in the
normal operations, hard disk bad power cord, or power supply socket, or try a different cord,
and fan refusing to spin, over loose connection, also, check the DC connectors, make sure the
heating due to fan failure, motherboard and disk drive power connectors
electric shocks felt on the are firmly seated and making good contact,
system cases or connectors, check for loose screws.
smoke
2.6 DEFINITIONS OF TERMS
Computer: is an electronic device that is capable of accepting data and processing data to give a
desired output.
Computer Case: This is the actual case that will house all your other parts. Consider it your
computers house. It will dictate how your machine looks at first glance as well as what and how
many parts you can put into your machine.
Hard Drive/Hard Disk: This is the “long-term memory” of the computer, used for persistent
storage i.e. the things stored on it remains even when the computer is powered down. The operating
system and all your programs and data are stored here. It is also known as mass storage device.

Optical Drive Device: This is used for reading/writing disks. May read CDs, DVDs, or other
optical media, depending on the type. It is essential for installing operating systems and programs.
The Motherboard: is also called a main board, is an electronic circuit board that provide and
attachment for other internal and external components of the computer system to be fixed on.
Examples are RAM slot, PROCESSOR socket etc.
RAM: also known as random access memory is volatile memory storage that computer used to
run programs.
Processor: is the brain of the computer that performs the major operation that is being done inside
of the computer system.
CONTROL UNIT ARITHMETIC AND LOGICAL UNIT
Monitor: This is the device that display all processed data in computer system to the outside
world. Monitor can be in-`form of LCD/CRT.
Mouse: This is used to point and locate where necessary in the computer system. It can either be
PS2/optical mouse.
Speakers: This the medium that produces sounds made inside the computer such as audio sound,
midi, video sound.
CHAPTER THREE
SYSTEM IMPLEMENTATION IN THE LABORATORY
This phase discusses and enlighten the various parts/components and the require tools which will
be used to coupled it. This will be needed as a result of assembling the components to make it a
whole computer system.
3.1 TOOLS REQUIRED TO SETUP A WHOLE COMPUTER
i. Human effort and composure
ii. A small plastic bin(s) to put your screws and other small parts into. Needle nose pliers,
Screwdriver with a good collection of bits.
iii. A small flashlight. Used to check in to some internal component that is not seen clear.
iv. Antistatic Wrist Bank: Computer components are very sensitive to static electricity.(ESD
glooves)

Figure 3.1 tool/kits


3.2 THE COMPONENTS/PARTS REQUIRED FOR PC ASSEMBLY
The components that make a whole PC cannot be over emphasized because they all have various
functions and tasks they perform; these has made it known to the users that they come one after
the other thereby assembling it in procedural process (step by step). The majorly components that
will must put into consideration are.
3.2.1 Computer Case and Power Pack
This is the actual case that will house all your other parts. Name it computers house. It will dictate
how your machine looks all first glances as well as what and how many parts you can put into
your machine. It also let you know the type of motherboard you be going for. The type of casing
going for hare is ATX casing, it should be noted that most motherboard in this new age also comes
up with ATX power pack. So, you need not to go for a power separately except the voltage of the
power pack is either high or low to supply the motherboard.
3.2.2 Motherboard
A motherboard is also called a main board or just “The Board”. So don’t get confused, this is your
core computer part. It is where all your components will plug into.
It’s the electronic circuit that provides and attachment for other internal components of computer
system to be fixed on it, some of the attachments it provides are: RAM slot.
3.2.3 Hard disk
This is where your computer stores your programs, personal data and operating System. The
bigger the hard drive the more stuff you can fit on it. It’s also known as mass storage which stores
information for other time consultations.
3.2.4 CD/DVD-ROM
This is your optical drive. Optical drives are very handy and nowadays are in more systems than
floppy drives. You use this type of drive to listen to music, watch videos or to backup/move data.
This optical drive can be a CD-Rom/DVD-Rom capable only of reading CD’s/DVD’s or a
CD/DVD-RW that can read, write and re-write CD’s/DVD’s.
3.2.5 RAM (Memory)
Your RAM (Read Only Memory) aka Memory is what the computer uses to run programs. The
more RAM you have on your machine the easier you make it for your computer to perform its
functions. Is the one that first holds the data you inputted for processing; it is volatile in nature.
3.2.6 TYPES OF CARDS (Video card, Sound card, Network card)
These cards mentioned above has different functions they performed on computer, the Video card
deals with visualization and any type of graphical display of the monitor, it is the one that provide
where monitor can be connected to the computer system.
Sound card deals with production of sound either in audio or video format: it provides port where
audio devices can be plug into called sound jack. Network card: as the name implies it deals with
connection of networks (WAN, LAN) where it provides port in which connecting cables can be
plug into.
As the technologies improve these cards are now onboard with the motherboard so there is no
need to shop for it except if the system required being upgrade.
3.3 THE EXTERNAL AND PERIPHERALS COMPONENTS
Monitor: Display processed data made by the computer to the outside word for visualization. It
can be LCD/CRT.
Keyboard: This is used to computer data in to the computer system.
Mouse: It is use to point and click to the desire icon/program that one need to make use of at any
point in time.
Speaker: Produces the sound made by the computer to the outside world.

3.4 PICTURES OF THE ABOVE-MENTIONED COMPONENTS AND DEVICES

Figure 3.4.1 MOTHERBOARD Figure 3.4.2 ATX POWER PACK

Figure 3.4.3 COMPUTER CASING


Figure 3.4.4 HARD DISK DRIVE

Figure 3.4.5 DVD-ROM Figure 3.4.6 Keyboard

Figure 3.4.7 Computer casing Figure 3.4.8 Monitor (LCD Display)

Figure 3.4.9 Network card Figure 3.5. mouse


3.5 COMPUTER NETWORKS
Before going to discuss library networking, we may recall the concept, definition and
types of computer networking.
A Computer Network is linking together the CPUs and terminals via a communication
system. A network allows users at different locations to share files, devices and programs. Many
terminals may share the resources of one CPU, or multiple CPUs may be linked together.
Terminals and CPUs may be geographically dispersed or situated within the physical constraints
of a single office or building. The computer network means an interconnected collection of
autonomous computers. Two computers are said to be interconnected if they are able to exchange
information. With a network, users must log onto one machine, submit jobs remotely, move files
around explicitly. It is nothing but an inter-connection of computer systems and / or peripheral
devices with carriers and data communications devices for the purpose of exchanging data and
information.
Advantages of Computer Networking:
 Resources sharing
 High reliability
 Saving money
 Communication medium
 Access to remote information
 Person to person communication
 Interactive transfer of information
Types of Computer Networks:
There are three major types of computer networking, they are
 Local Area Networks (LAN)
 Metropolitan Area Network (MAN)
 Wide-Area Networks (WAN)
Local Area Networks (LAN):
A Local Area Networks (LAN) is two or more computers directly linked within a small
well-defined area such as room, building, or a campus. The main benefit of a LAN is the reduction
of hardware and software costs because users can share several computers, peripheral devices such
as laser printers, colour-printers, scanners, softwares etc. Another benefit is that the users can
share the same data.
Metropolitan Area Network (MAN):
A Metropolitan Area Network (MAN) is a network that is larger than a LAN. It is called
metropolitan since it normally covers the area of a city. Different hardware and transmission
media are often used in MANs because they must efficiently cover these distances or because they
don’t require complete access to locations between the networked sites.
Wide-Area Networks (WAN):
A Wide-Area Network (WAN) is two or more geographically dispersed computers, linked
by communication facilities such as telecommunication or microwave relays. In other words, one
of the most significant aspects of a wide-area network while comparing it with the freedom of a
local-area network is the involvement of a public telecommunications authority. WAN is usually
limited to use by the large organizations and government agencies due to high costs involved in
building and maintaining them.
A special designation has also been given to two specific WAN categories:
 Enterprise: An enterprise network connects all LANs of a single organization. The term
is normally used for networks connecting extremely large organizations, or for those that
cross regional boundaries.
 Global: A global network is one that spans the earth. While global networks may not
cover the entire globe, they cross multiple national boundaries and may include the
networks of several organizations.
Network Services:
Network services are provided by numerous combinations of computer hardware and
software. Depending upon the task, network services require data, input / output resources and
processing power to accomplish their goals.
The three types of service providers and requestors are as follows:
 Servers: Servers are only allowed to provide services.
 Clients: Clients are only allowed to request services from others.
 Peers: Peers may do both concurrently.
Computer networks are often classified as one of the following types
 Peer-to-Peer network
 Server-Centric network
Peer-to-Peer networks allow any entry to both request and provide network services. Peer-to-
Peer network software is designed so that peers perform the same or similar functions for each
other.
A Server-Centric network involves strictly defined roles. A Server-Centric network places
restriction upon which entity may make requests or service them. In the current trend, the most
popular personal computer networks are Server-Centric networks.
Library Networking:
Library network means interlinked libraries or a system in which many library points
stretched across a locality, city, state, region, nation or world are linked with each other for
information communication.
Networking implies putting together sub-sets of information centres or libraries in order to
act in a co-operative manner with the pre-determined obligation. It offers increased access to larger
resources and for a greater measure of service than the sum of all the constituents’ parts.According
to National Commission on Libraries and Information Science (NCLIS) in the context of Library
and Information Service a network is defined as “two or more libraries and/or other organizations
engaged in a common pattern of information exchange, through communication for some
functional purpose”.
Need for Library Networking:
 To improve flow of information
 To improve contact among individuals, groups or organizations
 To improve collection and mobility of data/information
 To maximize utilization of resources
 To facilitate the planning and implementing of policies and activities
 To avoid duplication in research and development
Network based Library Services:
All the libraries which are rich in collection provide more and effective services to the user
preciously. The result is not satisfying all the clients due to increase of user needs and lack of
manpower in libraries. But this scenario now changed by information explosion. Information
technology has given many useful changes in the libraries especially in the past ten years. Now a
day’s most of the libraries are providing IT based services to its clients.
Network based services are very cost effective and offer many opportunities provided to the users
through network which are not possible to provide manually.
Advantages of Network based Library Services:
 Library network offers great potential and new areas of sharing information among different
libraries at various levels.
 On-line access to information and reservation is possible without physically coming to the
library
 Information dissemination through e-mail and internet is quick and easy in a network
environment
 On-line acquisition of books and other materials are possible in the network environment.
 Electronic journals can be accessed by many clients at a time in network circumstances
 CD-ROM search and bibliographical search facility can be accessed by numerous users at a
time in networked environment
Library Resource Sharing:
Resource Sharing is nothing but sharing of library resources in terms of documents,
manpower, services and equipment by certain participating libraries among themselves on the
basis of the principle of co-operation.
The development and growth of electronic information network and the internet in
particular has provided a wider range of opportunities for provision of resource sharing.
Today we find that co-operation in all activities throughout the world. The library, the
social institution of social importance is no exception. Interlibrary loan is one of the ways of the
library co-operation. The library co-operation was later expanded to embrace activities that will
ensure co-operation in all facets of librarianship. Now, certain latest technological advances made
this easy.
Factors influencing Resource Sharing:
Resource sharing is necessary in libraries due to the following factors:
 Tremendous growth of literature
 Increasing cost of documents (document explosion)
 Declining library budget
 Reduce in the operational cost of libraries
 Technological solutions
 Optimum utilization of existing records
 Language barrier
 Diversity in users’ needs
Objectives of Resource Sharing:
 To maximize the availability of resources, services and accessibility and minimizing
the cost
 To assist member libraries in selection, purchase and processing of library documents
 To co-ordinate the co-operative acquisition
 To maximize user satisfaction
 To facilitate shared catalogue service
 To co-operate in the development of library personnel
 To achieve economy in the use of resources both human and material
Need of Resource Sharing
 To know the availability of infrastructure facilities and resources of various libraries
 To know the collection and services of these libraries.
 To know the future plans of these libraries in the digital Era
 Resource sharing fulfills the fourth law of library science – “Save the time of the user”
 It is very economical
 It helps to save the library space
 Through resource sharing, standardization of classification and cataloguing is possible
 Resource sharing avoids the duplication of documents and work
Levels of Resource Sharing:
Depending upon of the interest of the libraries the following levels of resource sharing is possible
 Local
 State
 Regional
 National and
 International
Methods of Resource Sharing
Interlibrary Loan (ILL):
Interlibrary loan (ILL) is the foremost technique in library co-operation by which the
participating libraries can share their resources such as printed materials, manuscripts, electronic
resources and other graphic records etc. It permits the users of one library to use the other library
by providing books and photocopies of articles, etc.

Co-operative Acquisition:
The library reading material acquired by certain libraries are very much demanded by the
users. This can be overcome by co-operative acquisition method. It is a centralized procurement
of documents by member libraries on a regional or national level. In this way, wasteful
expenditure, duplication of documents and storage problems would be encountered. It encourages
better book selection and ensures a faster flow of materials.
Centralized Cataloguing and Classification:
Centralized cataloguing and classification can be done by a single library or other
centralized agency for the use of participating libraries. It saves time and resources expenses.
Co-operative Storage (Depository House):
Many of the libraries particularly those located in the urban areas and university libraries
are facing the problem of spacing. Even though in this digital era, there is a tremendous growth of
printed literature and they require additional storage areas. But this additional space can be created
only by spending huge money. Unfortunately all the libraries are not able to spend more funds for
this . Therefore, it would be economical for the libraries to have a centralized storage points to
stock for the less used materials in the outskirts.
Co-operative Reference /Information Services:
Usually the co-operative reference and information services can be done by big library, if
it has a strong collection of reference works and information sources, it automatically become the
centre of intellectual gravity of teaching and research. So that, other libraries can also render this
facility.
Co-operative Reprographic Service:
It is a direct extension of traditional library. If a library has well equipped collection and
services with photographic reproducing materials, it can offer better service to its own library but
also other participating libraries. This service may be at international as well as national or local
level.
Documentation Centres:
The success of research depends on the prompt documentation services provided by the
library. But all the libraries can’t afford their own documentation centers. Hence, they should co-
operate fully with their national documentation centers and exploit their services.
Union List of Serials and Bibliographies:
The union list of serials may possess of serials of periodicals of all subjects or it can be
limited to special subjects. It may be possible through joint efforts to produce a list of periodicals
and distribute it among the member libraries
Union Catalogues:
The basic function of union catalogues is to locate publications. It is a tool for the
rationalization of interlibrary loan. It provides classification and cataloguing data. It also helps to
know and avoid duplication of little used materials.
Co-operative access to Online Resources:
Among the participating libraries, a co- operation can be possible to reach an agreement
with the publisher/producer of the databases to access the online resources in a reduced cost by all
the participating libraries through their institute’s IPs.
Barriers of Resource Sharing:
 Skilled manpower
 Loss of autonomy
 Psychological aspects
 Lack institutional support
 Difficulty in mutual agreement
 Legal and administrative problems
CHAPTER FOUR
SYSTEM DESIGN AND EVALUATION
This phase describes the process of how the components of the computer system are to be
assembled right from the major components/devices to the least. Thereafter the installation of the
operating system comes in to check and test for the required configuration of the system.

4.1 FEATURES OF THE COMPUTER


PROCESSOR SPEED 3.0GHZ
RAM 2GB
HDD 320GB
MONITOR LCDSCREEN
KEYBOARD PS2
MOUSE USB
ABILITY TO RUN PROGRAMS like Java, VB, and Fortran etc.

4.2 PROCEDURAL FOR THE ASSEMBLAGE OF THE PC (PERSONAL


COMPUTER)
Availability of workshop or a big table which you will put everything accordingly must be
considered first. Then next step is to un-wrap all the new components/devices from their sachets
staring from the motherboard, processor, memory etc. make sue the manuals of all the components
are intact and you follow as stipulated in other not to damage some components. The tool/kits
needed for the completion of the processes should be made available. After this must have been
done then the procedure begins;

4.3 PROCESS OF ASSEMBLING PC


Put on the Static Wrist protector; this will prevent accidental; electric shocks or damage to
the equipment. Always make sure the power IS NOT connected to your case/motherboard!
4.3.1 INSTALLING A SOCKET PROCESSOR AND THE HEAT SINK ON THE

Fig 4.3.1

MOTHERBOARD
Lift up the lever that is on the side of the socket. This unlocks the mechanism and gets it
ready for you to insert the processor. Carefully match up the pins on the bottom of the new
processor with the holes in the socket, and then VERY gently insert the processor into the socket.
If you don’t get it right on the first shot pull it straight back up, avoid bending the pins and try
again. Use the corner arrow reference marks on the processor and socket to align the processor in
the socket correctly. Do not force the processor into the socket or you could damage the processor,
It should go in smooth and fit like a glove. Placing the heat sink follows immediately. Connect
the fan power cable to the power cable connector on the system board.
4.3.2 INSTALLING MEMORY MODULES
1. Find the memory module bank on your system board. They should look similar to what
you see below. There may only be two slots instead of four as you see
2. Align the notches on the memory module with the notches on the memory module bank,
and then press the module firmly into the bank. The tabs on the sides of the module bank should
secure the memory module automatically. When the module Is secure, you hear a click.

Fig.4.3.2

3. Repeat this procedure for any additional memory modules that need to be installed.
4.3.3 INSTALLATION OF MOTHERBOARD.
After fixing all the necessary components/devices on the motherboard and making sure
that they all intact then installing of the motherboard to the system case follows, it should be noted
that the power pack comes with casing bough that’s why the step is sipped here. Slide the
motherboard gently towards the back of the Case. The system board standoffs side it the keyhole
slots. The picture is shown

Fig.4.3.3

Your board should have a thumbscrew to secure it to the case. Screw it in and lock it into place
using your screwdriver or thumb and fore-finger.
After this procedure for installing the motherboard, the outlook is shown above.
It should be noted that configuration set for the Hard Disk is master while the CD ROM Drive is
slave
4.3.4 INSTALLING THE CD ROM AND HARDISK
Readily the space for the Hard disk and the CR-ROM drive in the computer case are easy
to know. The HARD DISK and the CD-ROM drive should be placed in to the casing in the form
that will allow cables to be connected.
Connect power cables to your physical hard and CD-ROM drives.

Fig. 4.3.4
4.3.5 CONNECTING THE POWER SUPPLY CABLES TO THE
MOTHERBOARD
1. There is always a big power supply cable that connects the power supply to the main board
make sure the connector locks into place.

Fig. 4.3.5
2. If you have a second, smaller power cable (Usually four round connectors on it), connect the
smaller power cable to the system board as well, there is only one place it could go and make sure
the cable clicks into place.
4.3.6 CONNECTING THE MOTHERBOARD TO THE DRIVES
The picture below shows the IDE cable side that connects to the IDE socket on the main
board. The other end of this cable connects to your hard drive or optical.

Fig 4.3.6
4.3.7 CONNECTING THE FRONT PANNEL CABLE
With all the hardware installed correctly, follow these steps to connect the internal cabling.
This is the final step. What you’re going to do here is to make sure that power/standby buttons,
earphone port etc. that are located on the front of your case are working.
Depending on the case you got there should see a bunch of small cables coming out from it, they
should look similar to the ones below.

Fig 4.3.7

SPK (Speaker) – For small speaker mounted in the PC Case (if present)
PWR SW (Power switch) – Turns the PC on/off
RST SW (Reset switch) – Resets the system
PWR LED (Power LED) – Shows when system is on (usually green)
SLP LED (Sleep LED) – shows when system is suspended (in ‘sleep’ mode
HDD LED (HDD LED) - Shows when system is accessing hard drive (usually red)
These connectors need to be connected onto a set of grouped pins on the Motherboard. At this step
you will need to refer to your Motherboard manual for the connection method of these cables.

4.4 INSTALLING THE OPERATING SYSTEM


Now that you’ve put everything together, you’ve past all the difficult stages the rest is a
cakewalk. Here’s how to install your operating system and get everything up and running.
If you’ve never installed an OS before, it’s remarkably easy, if you have, I’d still suggest
reading through this guide to make sure you’ve got it all down. Installing Windows on a custom
machine can take a few extra steps than installing it on a pre-built machine. For this guide, we’re
going to use Windows 10 as an example, but you can of course install Window XP, Linux, or even
Mac OS X, if you’re building a Hackintosh. Refer to our Getting Started with Linux series and
easy Hackintosh guide if you’re using those OSes instead.
4.4.1 Step One: SETTING THE BIOS
When you first start up your computer, it’ll tell you to press a key to enter setup, usually
HP. This takes you to the setup of your Basic Inputs/Outputs System, or BIOS, here; you can
configure some of the lowest-level aspects of your new machine. You may not actually need to
edit any of these settings, but it’s a good idea to go through, get acquainted with them, and make
sure everything’s in good order before moving on.
Note that BIOS will be a little bit different on different brands of motherboard, so your
screen may not look exactly like the images here, but it should be close.
First, we should make sure that everything’s been installed correctly. If you have a System
Information page in your BIOS, head there and make sure the amount of RAM listed is the same
amount you put in. if it isn’t detecting all of your RAM, some of it might not be seated correctly,
so go back and fix that before continuing. If there isn’t a System Information page in your BIOS,
your motherboard probably lists the amount of RAM it detects on the POST screen, right after
you press the power button.
Fin the SATA configuration option, and make sure it’s configured as AHCI. If you’re
running Window XP you’ll need to change this to IDE, otherwise AHCI is probably what you
want to go with.
Lastly, find the “Boot Order” or “Boot Priority” page. Make sure your DVD drive is the
first drive on the list (or your USB drive if you’re installing from a flash drive), and that the hard
drive you’ll be installing to is second. Note that some BIOS utilities split this up into two menus
one for setting the boot order for your different media (CD-ROM, hard disks, USB disks) and
another that lets you choose the order of just the hard drives. If you don’t see your hard drive
listed, it may not be plugged in correctly or it may be dead. Turn your computer off and re-check
the connection if necessary.
4.4.2 Step Two: INSTALLING THE WINDOWS OPERATING SYSTEM
Next, grab your Windows installation DVD (or flash drive, if that be the case) and pop it
in. Start up your computer and it should automatically boot into the Windows installer. If you ever
get a “Press any key to boot from CD” option, make sure to hit a key on your keyboard to continue.
Once the installer loads, hit the “Install Now” button, accept the terms of use, and choose
“Custom (advanced)” when asked what type of installation you want. Find your primary hard drive
(if you have more than one), click on the “Unallocated Space” partition, and
Hit Next. Windows should start installing
If you aren’t using a brand-new drive, you may have to format it first. Click on the
currently-used partition, click “Drive options (advanced)”, and then hit “Format”, It should format
the drive to be Widows- compatible, after which you can hit next and let the installation run.
From there, the rest is just a waiting game. Leave your computer alone to do its thing. It’ll
copy all the necessary files to your disk and reboot a number of times in the process. You’ll know
you’re done when you hear the familiar startup chime and boot into the default Windows 7
desktop.
4.4.3 Step Three: ACTIVATING THE WINDOWS OPERATING SYSTEM
The last thing you need to do before you actually use your computer is install your drivers.
If your Ethernet or Wi-Fi works out-of-the-box, Windows may find most or all of your drivers for
you. If not, you’ll need to pop in the CD that came with your motherboard to install the Ethernet
or Wi-Fi drivers you need to access the internet. Don’t install any other drivers from that CD just
yet.
Once you’ve got the internet up and running, Windows will install drivers for you. It might
not catch everything though, so you’ll have to install some manually. The CDs that came with
your motherboard, video card, and other hardware are probably already out of date, so I don’t
recommend using these to install those drivers.
Instead, you’ll want to download the drivers manually from the manufacture’s web site.
Open up Device Manager by opening up the Start menu and searching for “Device
Manager”. Look for anything that has a question mark or an exclamation point next to it.
Often, it’ll tell you what the missing driver is for say, SATA and you can then head to your
motherboard manufacture’s web site, go to their support page, and download the drivers manually.
If it’s your video card that’s missing a driver, you’ll want to head to

Fig.4.4.3

NVIDIA or ATI’s web site instead.


If it says “Unknown Device” next to the driver-fewer devices, try inserting the CD that came with
your motherboard and seeing if there are any drivers that aren’t listed in the Device manager, and
try installing those from the manufacturer’s web site. Eventually, you should be able to get
everything installed.
4.4.4 Step Four: INSTALL WINDOWS UPDATES
The last thing you’ll want to do is get Windows up to date. Chances are, you’ve already gotten a
notification from Windows Update at this point, but if not, head into your Start Menu, go to
Programs, and hit Windows Update. Install all the updates it gives you, and reboot your
computer. Check for updates again and it’ll have a whole new slew of them for you. You’ll have
to do this quite a few times, but eventually it should stop serving you notifications and you’ll be
all up to date. When you are, you’re ready to actually start using your computer.
This is also a good time to get some antivirus on your machine, as well as any other basic
apps you want.
4.5 INSTALLATION OF PEER TO PEER NETWORK
During the installation process computer and workgroup name are automatically
generated. You could use these names but it would be better to have a good and descriptive name.
To change computer and workgroup name Right-click on My Computer and select Properties, or
open the System applet from Control Panel.

Fig. 4.5.1
Select the Computer Name tab ==> click Change to open the Computer Name Changes dialog
box.
Fig. 4.5.2
Follow this guideline while choosing name for computer and workgroup
Computer name should be unique in a workgroup.
Workgroup name should be same for all computer.
Workgroup name may be up to 15 characters long and may contain any alphanumeric (a-z and
0-9) characters, as well as special characters except for ; : " < > * + = \ | ?.
Computer name can be up to 15 characters long and have the same naming restrictions as
workgroup. In addition, the computer name cannot be the same as the workgroup name.
Enter a new computer name in the Computer Name field and new workgroup name in
Workgroup field and click OK.

Fig. 4.5.3
You will be prompted to restart your computer to complete the name change. Click yes to restart
your computer.

Fig. 4.5.4
We have completed our first necessary step. Now its time to configure LAN card.
Configure LAN card
First check LAN card driver
Right Click on My Computer ==> properties ==> Hardware ==> Device manager ==> Network
Adaptor ==> Check here (also check under the other devices tag)
Situation:- Showing

Fig. 4.5.5
Description:- Installed and working properly
Situation:-Showing with Yellow sign
Fig. 4.5.6
Description:- LAN card driver is corrupted
Solution:- Install LAN card driver. Situation:-
Showing with Red Cross
Description:- Either cable is unplugged or LAN card is disabled
Solution:- My network places ==> properties ==> local area connection ==> right click ==>
Enable (Follow only if Lan card is disable )
Check whether network cable is plugged or not
Situation:-Not Showing

Fig. 4.5.7
Description:- LAN card is not detected yet (Check for physical installation) Solution:- Open the
cabinet and check for physical detection Check Bios ==> On bord LAN Option should be enable
Checking LAN card in Network place
How to show my network place on Desktop?
Right click on the free space of desktop ==>Customize desktop ==>check mark on My
network places ==> Apply ==> Ok
My network place ==> properties ==> local area connection
Situation:- Showing

Fig. 4.5.8
Description:- Installed and working properly
Situation:-Showing with Red Cross

Fig. 4.5.9
Description:-cable is unplugged
Solution:-Check whether network cable is plugged or not
Situation:-Showing with Yellow sign
Description:-LAN is working on Automatic private IP.
Solution:- assign manually IP address
Situation:-Showing with disable
Fig. 4.6
Description:-LAN is disabled
Solution:-My network places ==> Local area connection ==> Right click ==> Enable (Follow
only if LAN card is disable )
Situation:-Showing with firewall

Fig. 4.6.1
Description:-LAN is firewall protected
Solution:-There is no need to on firewall unless you are connecting with internet. To turn off
firewall
My network place ==> properties ==>local area connection ==> properties
==>Advanced ==>Settings
Fig. 4.6.2
Genral==> Off

Fig. 4.6.3
Next step is to check 4 necessary configurations in LAN card properties
LAN cards drives
Client for Microsoft network
File and Printer Sharing Services
Internet Protocol (TCP/IP)
Fig. 4.6.4
CHAPTER FIVE

5.0 CONCLUSION AND RECOMMENDATION

5.1 CONCLUSION

A diverse range of important parts of a computer hardware were analyzed. These parts
are the core elements of a computer system. Without these parts a system can never perform. All
the technical terms discussed above are the core elements of a computer. The hardware and the
software together provide us with the proper usability of the computer. A system may not be able
to perform without the help of a hardware neither can it perform without the help of the
software. Hence the hardware and software component of a computer system are vital. The
above discussed hardware of the computers is the basic for any operating system. Apart from the
above discussed hardware, there do exist many which are yet to be discussed. The most
prominent hardware found in an operating system has been discussed.

5.2 RECOMMENDATION

Satisfactorily arriving at the pace of achieving a Hardware and Software repairing,


troubleshooting assembles and peer to peer network that has the functionality required. Its
durability which is well guarantee is therefore recommended to be used in the school computer
laboratories workshop.
 Institutions should show more commitment to the training of engineering students so as to

improve the quality of training given.

You might also like