You are on page 1of 52

Computer Platforms

INTERNATIONAL HIGHER DIPLOMA IN COMPUTER NETWORKS


Assignment
STUDENT NAME : W.G. Isuru Vishwajith Jayasingha

EDHAT REGISTRATION NO. :

PROGRAMME : International Higher Diploma in Computer Networks

SUBJECT CODE &TITLE : GCU 0103 / Computer Platforms

ASSIGNMENT TITLE : Selecting a Computer System for a Graduate student

Summary of the Learning Outcomes covered:

1. Investigate computer systems


2. Investigate operating systems
3. Design a computer system
4. Test a computer system

ASSIGNMENT TYPE : Individual Assignment

ISSUED DATE : 26/06/2021

DUE DATE : 26/07/2021

DATE SUBMITTED : 26/07/2021

ASSESSOR : Mrs. Sajani Thalgaswaththa

INTERNAL VERIFIER :

PLAGIARISM:
While research and discussion are an essential part of an assignment, the deliberate copying of someone else’s
work or unacknowledged copying from printed or electronic sources is NOT permitted. You may be subject to
disciplinary procedure if you do this. You should sign this sheet to show that you comply with these regulations.

Student’s Signature: Date: _____/_____/ ___________

International Higher Diploma in Computer Networks / Individual Assignment 1 | P a ge


Computer Platforms

Mark Range Grade Point Grading Representation

0 - 29 0.0 E

30 - 39 1.0 D

40 - 49 1.7 C-

50 - 54 2.0 C

55 - 59 2.3 B-

60 - 64 2.7 B

65 - 69 3.0 B+

70 - 74 3.3 A-

75 - 79 3.7 A

80 and above 4.0 A+

Assessor Comments:

Assessor:
Signature: Date:_____/_____/ ___________

International Higher Diploma in Computer Networks / Individual Assignment 2 | P a ge


Computer Platforms

Internal Verifier’s Comments:

Internal Verifier: Date:_____/_____/ ___________


Signature:

International Higher Diploma in Computer Networks / Individual Assignment 3 | P a ge


Computer Platforms

Allocated Given
TASK 1: Preparing a specification to a Personal Computer Marks Marks
T 1.1 Outline the main checklist for a record of computer specification 15

Assess functions that are undertaken / purpose of each checklist item that
T 1.2 was found in the above task (T 1.1) 45

Evaluate the performance of the computer system and suitability for the use
T 1.3 in a class. 40

Total 100

Allocated Given
TASK 2 : Evaluate Operating Systems Marks Marks
Research on various Operating systems types available in the market and
T 2.1 present your findings including their special features, Strengths and 30
Weaknesses.
Do a Comparison on identification of differences between operating
T 2.2 systems types on the basis of the purpose / situation those operating 30
systems are appropriate.
Discus features of varies types of operating system in a view of the
T 2.3 performances required by Postgraduate students. Propose basic 40
customization for chosen operating system.
Total 100

Allocated Given
TASK 3: Identifying the key components Marks Marks
To increase the performance of a computer, what are the key components
T 3.1 that need to be consider 30

Propose key components that have to be changed in order to suit needs


T 3.2 of the above specified users (Graduate Student). If you find it cheaper and 30
suitable you can also specify completely new system.
T 3.3 For the new proposed system produce a security policy 40

Total 100

Allocated Given
TASK 4 : Testing the Computer Systems and providing end user support Marks Marks
Produce a Hardware and Software test plan for the system after those
T 4.1 changes that implemented as in before tasks. 30

T 4.2 Produce Health and Safety plan for the Computer System 30

T 4.3 Product End user support documentation for the new Computer System 40

Total 100

International Higher Diploma in Computer Networks / Individual Assignment 4 | P a ge


Computer Platforms

Outcomes/Assessment Criteria for the Possible Page Feedback


C / B-/ B Grading (Pass evidence No.
P 1. Investigate computer systems

P1.1. Select machine components or Task 1.1, Task 1.2


subsystems appropriate to given tasks

P1.2. Evaluate the performance of the Task 1.2, Task 1.3


selected system

P 2. Investigate operating systems

P2.1. Contrast the functions and features Task 2.1, Task 2.2
of different types of operating systems

P2.2. Understand how to customize Task 2.3


operating systems.

P 3. Design a computer system

P3.1. Investigate and identify the key Task 3.1


components for a computer system for a
particular user.

P3.2. Specify a complete computer system Task 3.2


to suit a given task

P 4. Test a computer system

P4.1. Produce a plan that checks the main Task 4.1


hardware and Software components, using
standard techniques

P4.2. Produce user documentation for your Task 4.2


system

P4.3. Produce a security policy for your Task 3.3


system

P4.4. Demonstrate that the system meets Task 4.3


health and safety requirements

Outcomes/Assessment Criteria for the Possible Status. Feedback


B+ /A- Grading (Merit) evidence

International Higher Diploma in Computer Networks / Individual Assignment 5 | P a ge


Computer Platforms

M 1 Use of different theories, strategies M 1.1 Selecting the


to apply the suitable solution/s suitable solution
Selecting example
issues in a system
and applying the
most suitable
solution to manage
the quality

M 2 Use of various sources and/or resources M 2.1 Selection of


different
information
sources Using a
proper referencing
system to evidence
the variety of
information
sources and
resources

M 3 Presenting the completed work M 3.1 Structuring


and/or concluded findings the collected
completed
findings Proper
flow of
information with
an organised set
of topics and sub
topic list.
M 3.2
Streamlining the
presented outcome
Well organised
documentation
with no duplication
of information

International Higher Diploma in Computer Networks / Individual Assignment 6 | P a ge


Computer Platforms

M 4 The use of critical self evaluation and M 4. 1 Effective


justification use of justifying
the own work
The use of
statements that
evidence the own
conclusions

Outcomes/Assessment Criteria for the A Possible evidence Status. Feedback


/ A+ grading (Distinction)

D 1 The use of clear definitions D 1.1 Selection of


and explanations clear and complete
definition
High percentage of
clear explanations
to make the
reading easier

D 2 Clear organisation and D 2.1 Activity and


management of the assessment work time management
A Gant Chart that
consists of all the
records about how
activities have been
managed

International Higher Diploma in Computer Networks / Individual Assignment 7 | P a ge


Computer Platforms

D 3 Topic relevancy D 3.1 High


demonstration
of maintaining
timely topics All
the topics and sub
topics must have
a close
relationship to the
given task set.

D 4 High level of concentration on D 4.1 Appliance of


creative and innovative thinking creative and
innovative ideas
Clear evidence to
highlight the
creative thoughts
and making the
documentation
interesting to the
reader

END OF ASSIGNMENT

International Higher Diploma in Computer Networks / Individual Assignment 8 | P a ge


Computer Platforms

Table of Contents
Introduction. ........................................................................................................................ 10
TASK 01 ............................................................................................................................. 11
Task 1.1 .................................................................................................................... 11
Task 1.2 .................................................................................................................... 12
Task 1.3 .................................................................................................................... 13
TASK 02 ............................................................................................................................. 14
Task 2.1 .................................................................................................................... 14
Task 2.2 .................................................................................................................... 17
Task 2.3 .................................................................................................................... 20
TASK 03 ............................................................................................................................. 27
Task 3.1 .................................................................................................................... 27
Task 3.2 .................................................................................................................... 30
Task 3.3 .................................................................................................................... 31
TASK 04 ............................................................................................................................. 33
Task 4.1 .................................................................................................................... 33
Task 4.2 .................................................................................................................... 34
Task 4.3 .................................................................................................................... 37
Conclusion. ......................................................................................................................... 47
Reference. .......................................................................................................................... 48
Gantt Chart. ........................................................................................................................ 50

International Higher Diploma in Computer Networks / Individual Assignment 9 | P a ge


Computer Platforms

Introduction.

This assignment about computer Platforms. In this assignment, we need to selecting a


computer system for a graduate student. First of all, we must select components for create a
new computer and need to explain the purpose of that hardware and software we choose.
Also, we need to write a note about computer performance measuring parameters. In the
next task, we need to described the various OSs that are available in the market and types
of OSs that are available and also, giving brief description about OSs that can be use
student. After, we need to describe how to improve computer performance and design a new
computer for the student. At last, there is a testing plan that we create to this system and
there is a health plan, safety plan, and user manual to the beginners.

International Higher Diploma in Computer Networks / Individual Assignment 10 | P a ge


Computer Platforms

TASK 01: Preparing a specification to a Personal Computer.


Task 1.1: Outline the main checklist for a record of computer
specification.
Items

Hardware Software
Peripheral Devices Internal Devices OS Other Software
Keyboard CPU Windows 10 Pro Office 2016
Mouse RAM Adobe Reader
Monitor VGA Card Antivirus Program
Printer Motherboard WinRAR
Webcam Power Supply Teams/Zoom
Speaker/Headphone HDD Google Chrome
Router CD/DVD Drive
Cooling Fans

➢ Note - If needed,
Pen drive/ External HDD, Scanner

Figure 1

International Higher Diploma in Computer Networks / Individual Assignment 11 | P a ge


Computer Platforms

Task 1.2: Assess functions that are undertaken / purpose of each


checklist item that was found in the above task. (T 1.1)
Item Purpose
Keyboard Putting information including letters, words and numbers into our
computer.
Mouse Transmits our commands to the computer by controlling the
movement of the cursor/pointer on the computer screen.
Monitor A main output device in the PC setup. It displays information in
pictorial form.
Printer A device that accepts text and graphic output from a computer and
provide hard copies for the users.
Webcam A video camera that feeds or streams an image or video in real
time. we can use it for online classes.
Speaker/Headphone A device that can output computer sound. it outputs computer
generated sounds.
Router A device that receives and sends data on computer networks.
router is important to connect internet.
CPU CPU is the brain of the computer. it controls the function of all the
other components.
RAM RAM is essentially short-term memory where data is stored as the
processor needs it.
VGA Card VGA card is generating a feed of output images to a display
device.
Motherboard The backbone that ties the computer's components together at
one spot and allows them to talk to each other.
Power Supply An electrical device that supplies electric power to an electrical
load. It is converting electric current from a source to the correct
voltage, current, and frequency to power the load.
HDD A traditional storage device that uses mechanical platters and a
moving read/write head to access data. it allows to us store
information that we processed.
CD/DVD Drive CD/DVD drive allows to use read and write data or information to
the optical drive.
Cooling fans Used to draw cooler air into the casing from the outside.
Windows 10 Pro This is allowing to us communicate between the user and
hardware. we can choose lot of OSs but I think this is good for
students overall.
Office 2016 Office 2016 include word processing, spreadsheet, presentation
and many more other software’s that we can use our day-to-day
works.
Adobe Reader Using this software, we can viewing, printing, signing, sharing and
annotating to PDFs.
Antivirus Program Used to prevent, scan, detect and delete viruses from a computer.
WinRAR Using this software, we can compress, archiving files and
software.
ZOOM/Teams These are cloud-based video conferencing software. that can be
used video conferencing, audio conferencing and many more.
Google Chrome For access the World Wide Web and running Web-based
applications.
Pen Drive/ External These can be used to store, backup and transfer data.
HDD

International Higher Diploma in Computer Networks / Individual Assignment 12 | P a ge


Computer Platforms

Task 1.3: Evaluate the performance of the computer system and


suitability for the use in a class.
Computer performance is the amount of useful functions that a computer system performs. It
means, defined as the process by which a computer system's resources and outputs are
assessed to determine whether the system is performing at an optimal level. If computer
performing well, the following one or more factors might be involved,
• Short response time for a given piece of work.
• High throughput (rate of processing work).
• Low utilization of computing resource(s).
• Fast (or highly compact) data compression and decompression.
• High availability of the computing system or application.
• High bandwidth.
• Short data transmission time.

There are different kind of aspects to evaluate the computer performance. which are,
❖ Availability
Usually, Availability of a computer measured as a factor of its reliability. if
reliability increases, less downtime. Availability of a computer may also be
increasing testability and maintainability and not on reliability.
❖ Response time
Response time is the total amount of time it takes to respond to a request for
service. It is sum of three numbers of conditions,
Service time - How long it takes to do the work requested.
Wait time - How long the request has to wait for requests.
Transmission time – How long it takes to move the request to the
computer doing the work.
❖ Speed
The speed is usually in reference to the clock speed of the processor. The
clock speed is defined as the clock cycles per second, which determines the
rate at which instruction processing takes place. basically, Processing speed
is instructions that can be process per second (Instructions per second).
❖ Latency
Latency is the term used to describe the state of existence of something in
transition. Every transmitted piece of information on a computer system
travels over some sort of medium. Computer latency is defined as the time it
takes to communicate a message, or the time the message spends traveling
on the wire.
❖ Channel capacity
Channel capacity is the tightest upper bound on the rate of information that
can be reliably transmitted over a communications channel.
❖ Bandwidth
In computer networking, bandwidth is a measurement of bit-rate of available
or consumed data communication resources. it's measured by bits per
second or multiples of it (bit/s, Kbit/s, Mbit/s, Gbit/s, etc.).

Considering these all, if this student computer has high availability, low response time, high
speed, low latency and high bandwidth, that computer is suitable for his/her classes.

International Higher Diploma in Computer Networks / Individual Assignment 13 | P a ge


Computer Platforms

TASK 02: Evaluate Operating Systems.


Task 2.1: Research on various Operating systems types available in the
market and present your findings including their special features,
Strengths and Weaknesses.
What is an operating system?
An operating system is a program that acts as an interface between the user and the
computer hardware and manages the hardware and other software in a computer system.
There are important functions of an operating System. Which are,
• Control security
• Control over system performance
• Error detections
• Coordination between other software and users
• Memory Management
• Processor Management
• Device Management
• File Management
There are lot of Operating Systems type we can figure out. Among them all, some widely
used operating system types are as follows,

01. Batch Operating System


This OS takes similar jobs having the same requirement and group them into
batches. It is the responsibility of the OS to sort jobs with similar needs.

Features
• Same jobs in the batch are higher executed speed.
• Next job executed without any user interaction.
• CPU utilization gets improved.
• The batch process can partition into the number of processes, that can be speed up
processing.
Strengths
• Multiple users can share the batch systems same time.
• The idle time of the batch operating system is very less.
• It is easy to manage large work repeatedly in batch systems.
Weaknesses
• The users should be well known with batch systems.
• Batch systems are hard to debug.
• It is sometimes costly.
• If any job fails, the other jobs will have to wait until an unknown time.

Ex: Payroll System, Bank Statements

02. Time-Sharing Operating Systems


Each task is given some time to execute so that all the tasks work smoothly.
After this time interval is over OS switches over to the next task.

Features
• It provides the advantage of quick response.
• This type of operating system avoids duplication of software.

International Higher Diploma in Computer Networks / Individual Assignment 14 | P a ge


Computer Platforms

Strengths
• Each task gets an equal opportunity to CUP processing time.
• Fewer chances of duplication of software.

• These OSs reduce CPU idle time.


Weaknesses
• In this OS we have reliability problem.
• One must have to take care of the security and integrity of user programs and data.
• Data communication problem.

Ex: Multics, Unix

03. Distributed Operating System


In this type of OSs, various autonomous interconnected computers
communicate with each other using a shared communication network. These are
referred to as loosely coupled systems or distributed systems.
Features
• Reliability
• Transparency
• Scalability
• Connecting user and resources
• High performance
Strengths
• All systems are independent from each other, Therefore failure of one will not affect
the others.
• Since resources are being shared, computation is highly fast and durable.
• These systems are easily scalable as many systems can be easily added to the
network.
• It reduces data processing delay.
Weaknesses
• Failure of the main network will stop the entire communication.
• To establish distributed systems the language which is used are not well defined yet.
• These types of systems are very expensive.

Ex: LOCUS

04. Network Operating System


These systems run on a server and provide the capability to manage data,
users, groups, security, applications, and other networking functions.

Features
• Basic support for protocols, hardware detection, multiprocessing and processor
support.
• Printer and application sharing.
• Common file system and database sharing.
• Backup and web services.
• Network security capabilities such as user authentication and access control.
• Internetworking.
Strengths
• Highly stable centralized servers.
• Some security concerns are handled through this OSs.

International Higher Diploma in Computer Networks / Individual Assignment 15 | P a ge


Computer Platforms

• Server access is possible remotely from different locations and types of systems.
Weaknesses
• These Oss are very expensive.
• User has to depend on a central location for most operations.
• Maintenance and updates are required regularly and sometimes it will be costly.

Ex: Windows Server 2016, Windows Server 2019, UNIX, Linux, Mac OS X, Novell NetWare

05. Real-Time Operating System


These types of OSs, the time interval required to process and respond to
inputs is very small. There are two types of Real-Time,
i. Hard Real-Time Systems
These OSs are meant for applications where time constraints are very
strict and even the shortest possible delay is not acceptable.
ii. Soft Real-Time Systems
These OSs are for applications where for time-constraint is less strict.
Features
• These types of OSs are consuming fewer resources and use very less memory.
• Response times are highly predictable.
• The Kernel saves the state of the interrupted task and then determines which task it
should run next.
Strengths
• Maximum utilization of devices and system.
• The time assigned for shifting tasks in these systems are very less (around 3-10
microseconds).
• Highly priority on running applications and less priority to applications which are in
the queue.
• RTOS can also be used in embedded systems like in transport and others.
• These types of systems are error-free.
• Memory allocation is best managed.
Weaknesses
• Very few tasks run at the same time.
• Use heavy system resources.
• The algorithms are very complex and difficult for the design.
• It needs specific device drivers and interrupts signals to respond earliest to interrupts.

Ex: Scientific experiments, medical imaging systems, industrial control systems, weapon
systems

International Higher Diploma in Computer Networks / Individual Assignment 16 | P a ge


Computer Platforms

Task 2.2: Do a Comparison on identification of differences between


operating systems types on the basis of the purpose / situation those
operating systems are appropriate.
Batch operating system
The purpose of batch operating system is to speed up processing. to do this, jobs
with similar needs are batched together and run as a group.

The batch operating systems are usually use to process group of data. it means, it
uses to Payroll System, Bank Statements. for example, payroll systems are gathering
employee’s data within month and input that data to the system and calculate the
employees’ salaries. that is batch operating system.

Figure 2

Time-sharing operating system


The purpose of time-sharing operating system is to give access and facilities to the
many people, located at various terminals, to use a particular computer system at the same
time. the objective is the time-sharing system to minimize response time.
This kind of operating systems are used to multiprocessing or multitasking operating
systems. Like Multics
and Unix OS.

Figure 3

International Higher Diploma in Computer Networks / Individual Assignment 17 | P a ge


Computer Platforms

Distributed Operating System


The purpose of distributed operating system is serving multiple real-time applications
and multiple users. Accordingly, Data processing jobs are distributed among the processors.
Also, these are known as loosely coupled systems or distributed systems.
To a user, a distributed OS works in a manner similar to a single-node, monolithic
operating system. That is, although it consists of multiple nodes, it appears to users and
applications as a single-node.

Figure 4

Networking operating system


The purpose of networking operating system is to manage network, data, users,
groups, security, applications, and other networking functions. The primary purpose of the
network operating system is to allow shared file and printer access among multiple
computers in a network, typically a local area network (LAN), a private network or to other
networks.
These operating systems are usually installing into the server machine and manage
network functions like client-server network, peer-to-peer network.

Figure 5

International Higher Diploma in Computer Networks / Individual Assignment 18 | P a ge


Computer Platforms

Real-time operating system


The purpose of real-time operating system is to serve real-time applications that
process data as it comes in, typically without buffer delays. Processing must be done within
the defined constraints or the system will fail.
These types of operating systems are
used to Scientific experiments, medical
imaging systems, industrial control systems,
weapon systems, robots, air traffic control
systems, etc. For example, medical imaging
systems need to be got quick decisions.
Therefore, real time operating systems input
data and process that data as much as
possible speed and show output quickly.

Figure 6

International Higher Diploma in Computer Networks / Individual Assignment 19 | P a ge


Computer Platforms

Task 2.3: Discuss features of various types of operating system in a view


of the performances required by Postgraduate students. Propose basic
customization for chosen operating system.
There are thousands of operating systems available in the market. Among them all, I was
figured out 10 operating systems that can be used to student. Which are,

01. Microsoft Windows


Windows is the most popular and familiar operating system on this list.
Windows has around 76.45% of OS market shares. From Windows 95, all the way to
the Windows 10 and latest windows 11, it has been the go-to operating software that
is fulfill the computing systems worldwide.
Features.
• Windows has user-friendly interface and have start menu on the bottom that can
easily navigate any app or program.
• The Task View feature lets the users switch between multiple workspaces at once.
• Multifactor authentication technology for higher security like BIN, PIN, Fingerprint
recognition, etc.
• A new Multiple Desktops feature lets you run another set of windows as if on another
screen, that might be useful to the multi-tasking.
• Windows will provide a new way to look at all your notifications in one place. called
action center.

Figure 7

International Higher Diploma in Computer Networks / Individual Assignment 20 | P a ge


Computer Platforms

02. Ubuntu
Ubuntu is a Linux based OS that comes with everything that you are looking
for in an operating system. It is free to download, use, and share and it is the best OS
in open source category. It is backed by Canonical which is a global software
company, and now by the leading Ubuntu service providers.

Features
• Ubuntu is an Open Source software, which allows it to be freely downloaded, used
and shared by its users.
• Ubuntu is secure than windows. It comes with a built-in firewall and virus protection
software.
• You get five years of security patches and updates.
• It works and is compatible with all the latest laptops, desktops and touch screen
devices.

Figure 8

03. Kali Linux


Kali Linux is a Debian-based Linux distribution that comes with a plethora of pre-
installed tools to help with information security tasks like ethical hacking. Newest Kali
Linux version includes with lot of new features.
Features
• Over 600 penetration testing tools pre-installed. It is useful to pen-tester, ethical
hacker and who works at network industry.
• Kali Linux tools include multi-lingual support to enable its users to operate in their
native language.
• Only a limited number of trusted individuals can interact with the Kali Linux code
repositories. Therefore, Kali Linux is secure.

International Higher Diploma in Computer Networks / Individual Assignment 21 | P a ge


Computer Platforms

• Kali Linux adheres to FHS in order to locate libraries, support files, etc. with ease.
• Kali Linux is free to use, and its developers promise that it will remain so. Therefore,
Kali Linux is open source and any developer can build their own version and share
that.

Figure 9

04. Mac OS
The Mac OS has been the staple of almost all Apple devices. It has evolved
with time to include the features that first and foremost define innovation. For Apple
users, there is no other option except the MAC OS.
Features
• The new dark mode gives your desktop interface a more unique design look which is
easier on the eyes.
• Mac OS helps to automatically organize your desktop files by kind, date or tag.
• Continuity camera that scans or photographs a document nearby your iPhone and
automatically
appears on your
mac.
• Can communicating
between apple
device more easily.
• Prevent websites
from tracking your
Mac by making your
profile more
anonymous online.

Figure 10

International Higher Diploma in Computer Networks / Individual Assignment 22 | P a ge


Computer Platforms

05. Chrome OS
Chrome OS is another Linux-kernel based operating software that is designed
by Google. As it is derived from the free chromium OS, it uses the Google Chrome
web browser as its principal user interface. This OS is very simple and primarily
supports web applications.
Features
• It is optimized for good battery life, and pre-install valid google applications.
• With Chrome OS it is possible to run Linux applications.
• Remote application access and virtual desktop access.
• Chrome OS is designed to be compatible with all the Android applications.

Figure 11
06. CentOS
The CentOS is another community-driven open source free software that
allows server management. This OS is mostly support to manage network and It is
best for developers who are looking for an operating system that simply helps them
to perform their coding tasks. CentOS included good technologies for secure your
data from threat.
Features
• Advanced networking, compatibility, and security features that are still missing in
many OS today.
• This OS provide good
support to network and
server management.
• It allows for seamless
interoperability by
solving hundreds of
hardware and software
problems.
• Extensive resources for
coders looking to build,
test and release their
codes.

Figure 12

International Higher Diploma in Computer Networks / Individual Assignment 23 | P a ge


Computer Platforms

07. Debian
Debian is again a Linux kernel-based free open-source OS. It comes with
over 59000 packages and is a pre-compiled software bundled in a nice format.
Debian OS had nice user interface and it is user-friendly.
Features
• Faster and lighter than the other OS.
• It comes with in-built security firewalls to protect your data and information.
• Easy to install through any medium.
• Advanced networking, compatibility, and security features.

Figure 13
08. Solaris
Solaris is a UNIX based operating system which was originally developed by
Sun Microsystems in the mid-’90s. After 2010 it was renamed as Oracle Solaris. It is
known for its scalability and several other features that made it possible such as
Dtrace, ZFS (Zettabyte File System) and Time Slider.
Features
• It offers indisputable performance advantages for web, database, and java-based
services.
• The software partitioning function provides multiple independent fine-grain OS
environments in the server. Up to 8192 partitions even without hardware or firmware
based partitioning
features.
• Delivers high-
performance networking
without any modification.
• Unlimited capacity for
helping in managing file
system and databases.
• High-level access
control, controlling
access to system
resources in a detailed
level, can improve entire
system stability.
Figure 14

International Higher Diploma in Computer Networks / Individual Assignment 24 | P a ge


Computer Platforms

09. Parrot OS
Parrot OS has all the tools needed to do forensic acquisitions and evidence
identifications in a safe comprehensive and portable virtual lab. Not just forensic
tools, it also packs powerful cryptographic front-ends to work both with symmetric
and asymmetric encryption. It is Debian GNU/Linux 9 based operating system. Parrot
has multiple editions that are based upon Debian, with various desktop environments
available. which are, Parrot Security, Parrot Home, Parrot ARM.
Features
• Always updated, frequently released with many hardening and sandboxing options
available. it is secure.
• Parrot OS is lightweight and run surprisingly fast even on very old hardware or with
very limited resources.
• Feel free to use the Parrot tools on Windows, Mac OS or any other Linux distribution
without changing.
• A full development stack with the best editors, languages and technologies available
out of the box.

Figure 15

10. Fedora
Fedora is another Linux based system. Fedora is reliable, user-friendly and
makes for a powerful operating system for any laptop and desktop computer. Fedora
is for casual users and caters to students, hobbyists, and professionals working in
corporate environments.
Features
• A sleek new user interface
that allows the developers
to focus on their code on
Gnome 3 environment.
• It offers a complete open-
source toolbox with
languages, tools, and
utilities.
• Powerful virtualization
tools to get virtual
machines up and running.
• OCI (Open Container
Initiative) image support.
Figure 16

International Higher Diploma in Computer Networks / Individual Assignment 25 | P a ge


Computer Platforms

Most of people choose windows operating system because of how it has evolved with
time and it has simple and user-friendly user interface. But we must consider the cost of
windows OS. windows might be costly than other OS. Therefore, cost is restriction to the
student use this OS. On the other hand, we need to consider our requirement and what is
the purpose to use OS. Also, we need to consider about required minimum computer
specifications.
In my cause, I would like to suggest Kali Linux or Parrot OS. because these OSs are
Linux based and also, those are lightweight. These OSs are more secure than other OSs
and latest updates are released with lots of new features. Student can run there all software
and app in this platform. But sometimes we need windows OS for our works. that is why I
said before, we must consider about what is the purpose of that we use this OS. However,
my suggest is Kali Linux or Parrot OS or if needed windows.

International Higher Diploma in Computer Networks / Individual Assignment 26 | P a ge


Computer Platforms

TASK 03: Identifying the key components.


Task 3.1: To increase the performance of a computer, what are the key
components that need to be consider.
There are so many components that can helps to us improve computer performance. Among
them all, below is a list of the main components,

01. Processor (CPU)


A good processor is capable of executing more instructions every second, hence,
increased speed. As an example, CPU is the brain of the computer. So, if we have faster
thinking brain, we can get
decision faster. My opinion is, if
you need to update your
processer, move from an i3 to an
i5 or from an older generation to
a newer one. But don't go for
processer just because it has a
faster clock speed. Also, this is
an expensive way to speed up
your computer. Figure 17

02. RAM (Random access memory)


A computer with more memory (RAM) is capable of storing more programs that are
currently running in memory. A RAM upgrade delivers an instant performance boost to
almost all PCs that are running slow.
In the RAM, we can choose various
kind of speeds. it is measured in
megahertz (MHz). Also, we have few
generations that we can choose.
Therefore, we can choose speedest
and new generation RAM to speed
up the computer. Also, It's affordable,
you can do it on almost any
computer.

Figure 18

03. Cache
Although today's processors can execute billions of
instructions every second, the processor is usually
waiting for those instructions from the slower types of
memory in the computer. Because RAM and the hard
drive speeds are slower than the CPU. Therefore,
computer processors and motherboards use cache to
transfer data between the processor and memory. The
cache is the fastest type of memory. Computers with
more level cache memories (L2 cache, L3 cache) can
store more instructions and send them to the processor
more efficiently.
Figure 19

International Higher Diploma in Computer Networks / Individual Assignment 27 | P a ge


Computer Platforms

04. Bus speed


The bus speed of the motherboard increases the speed at which data is being
transferred between all the hardware
components. For example, an FSB (front-side
bus) of 66 MHz is going to be much slower
than a 400 MHz FSB. If the computer has a
slow bus, the processor has to wait longer for
the instructions, which makes the computer
run slower. In these days, Intel use QPI
(QuickPath Interconnect) instead of FSB.
AMD use HyperTransport instead of FSB.
QPI and HyperTransport allow for faster
communication between the processor, RAM,
hard drive, and other hardware, meaning a
faster computer. Figure 20

05. Hard drive


If your PC currently has a 5400RPM drive, then upgrading to a 7200RPM model will
give you a nice speed boost. But one of the most useful computer upgrades is to switch
to a solid state
drive. A HDD
(traditional hard
drive) makes a
computer slower
because of the
moving parts inside
it, which results in
slower read and
write times.
However, an SSD
(solid-state drive)
has no moving
parts, which results
in faster read and
Figure 21
write times. On
average, a
5400RPM drive might achieve write speeds up to 100Mbps, a 7200RPM drive up to
150Mbps, and a solid state drive over 500Mbps. Higher end SSDs have incredibly high
write speeds of 3300Mbps and more.

06. Video Card


A powerful video card with its
own processor (GPU) and its own
memory (VRAM) make them run
faster your graphical process.
These types of video cards help
with the performance of the
computer by taking on the
responsibilities of processing the
3D rendering and other complex
tasks.

Figure 22

International Higher Diploma in Computer Networks / Individual Assignment 28 | P a ge


Computer Platforms

07. Use latest OS and software


As new technologies are introduced, for them to be fully supported by a
computer, the operating system must also be written to interact with those new
technologies. So it would be a significant impact on your overall computer's
performance. Although today's operating systems release updates to support new
technologies. As an example,Windows 10 runs faster than a computer with Windows
XP because it supports all the latest hardware and is more optimized.
Also the softwares you're using can also affect the speed of a computer. If the
software that you use are not optimized to your new hardware, it can cause your
computer to run slow while those programs are used. Therefore make sure you have
all the latest updates.

This all components can increase the performance of your computer. But before update
these things, you need to consider what is your purpose. because these components are
change for a particular user requirements. As an example, if you've video editor you need a
good processor, more RAM and video card, if you've programmer you need a good
processor, enough RAM and SSD or NVMe drive. Therefore these things are change on
requirement.

International Higher Diploma in Computer Networks / Individual Assignment 29 | P a ge


Computer Platforms

Task 3.2: Propose key components that have to be changed in order to


suit needs of the above specified users (Graduate Student). If you find it
cheaper and suitable you can also specify completely new system.
If you need best performance computer, as I said before you need to update your
CPU, RAM module, HDD to SSD and your video card and as a software vice update your
OS and software. if you need to update your L2 and L3 cache and bus speed, you need to
purchase new motherboard. Also, these all things are change on your requirements. If this
student is programmer, I recommend upgrade your processor and storage drive. because
programmer need to execute lots of instructions and algorithms it consume more processing
power and need to communicate real time with storage device. Also, need enough RAM.
Considering these all. we need good processor. but we can't update processor that
we have. we need to buy new one to update it. processors are expensive and new
generation CPUs are not support old motherboard. Therefore, we need to buy supported
new motherboard. also, if we update our RAM kit, we need to find how much is the capacity
and RAM speed that our motherboard support. if motherboard don't support, we need to
purchase new motherboard. And these reasons are same to the storage device and video
card. Therefore, my opinion is, it is more effective build a
new computer than upgrade computer.
If you build new computer you can build it for fulfill
your requirements as you own. also, we can build it specific
budget range.
In this case, I provide a list of computer hardware
components that can be used for students’ studies. it's
under 1200-dollar budget (depends on market). Using this
hardware, you can build all-rounded PC.
➢ AMD Ryzen™ 5 3600 (up to 4.2Ghz 6-cores 12-
threads) 35M Cache
➢ B450 Motherboard
➢ 16GB 2666 DDR4 RAM
➢ 1TB SATA 7200 Rpm HDD
➢ 120GB SSD NVME (for OS and software) Figure 23
➢ 550W 80+ power Supply
➢ Nvidia GTX 1050ti 4GB DDR5
➢ ANTEC NX110 Casing
➢ Mouse, Keyboard, Speakers or Headset
➢ BENQ GW2283 EYE-CARE 22" IPS Monitor ($130)

Figure 24

International Higher Diploma in Computer Networks / Individual Assignment 30 | P a ge


Computer Platforms

Task 3.3: For the new proposed system produce a security policy.
What is the security policy?

A security policy is a set of rules, policies and procedures designed to ensure all
users and networks within an organization meet minimum IT security and data protection
security requirements. The policies are valid for all who accessing and using an
organization's IT assets and resources. An effective IT security policy is a unique document
for each organization, cultivated from its people’s perspectives on risk tolerance, how they
see and value their information, and the resulting availability that they maintain of that
information. The main objectives of an IT security policy are the preservation of
confidentiality, integrity, and availability of systems and information used by an
organization’s members.

Why is a security policy needed?

The aim of security policies is to address security threats and implement strategies to
mitigate IT security vulnerabilities, as well as defining how to recover when a network
intrusion occurs. Also, security policies are providing relevant direction and value to the
employees within an organisation with regard to security. There also needs to be a plan for
what to do when a threat actually materializes. that is why we need security policies.

New system protection security policy

Purpose
The purpose of this policy is to administrative direction, procedural requirements, and
technical guidance to ensure the appropriate protection of new system and components.

Scope
This policy applies to all who access and use this new system. Throughout this
policy, the word “user” will be used to collectively refer to all such individuals. The policy also
applies to all computer components and software owned by or administered by owner or its
partners.

Policy
All components and systems that has not been specifically identified as the property
of other parties will be treated as though it is a asset of new system. It is the policy of new
system to prohibit unauthorized use of computer or software, modification, destruction, loss
and theft of this components.

SYSTEM ACCESS CONTROL

End-User Passwords
• Any password that use to access must be at least 8 characters long, contain at least
one uppercase letter and one number or special character.
• Passwords will expire monthly - every 30 days. When a password expires or a
change is required, users should create a new password that is not identical to the
last four passwords previously employed.
• Passwords may not be written down and left in a place where unauthorized persons
might discover them.
• Passwords may never be shared or revealed to anyone other than the authorized
user.

International Higher Diploma in Computer Networks / Individual Assignment 31 | P a ge


Computer Platforms

Password System Set-Up


• All licensed software must have password access controls. If the computer systems
contain confidential or protected information, an extended user authentication system
approved by the owner of computer must be used. Multi-user systems should employ
user IDs and passwords unique to each user.
• All vendor-supplied default fixed passwords must be changed before any computer
or system is used.
• Where systems software permits, the number of consecutive attempts to enter an
incorrect password must be strictly limited. After five unsuccessful attempts to enter a
password, the involved user ID must be suspended until temporarily disabled for no
less than five minutes.
• Whenever system security has been compromised or if there is a reason to believe
that it has been compromised, all users must reset their passwords.

SYSTEM PRIVILEGES

Limiting System Access


• The computer and system privileges of all users, systems, and independently
operating programs such as agents, must be restricted based on the need to know.
The privileges must not be extended unless a legitimate business-oriented need for
such privileges exists.
• Default user file permissions must not automatically permit anyone on the system to
read, write, execute or delete a system file.

Process for Granting System Privileges


• Third-party software’s and cracked software’s must not be given any access to the
system.
• Special privileges, such as the default ability to write to the files of other users, must
be restricted to those responsible for administrative users.

COMPONENTS PROTECTION
• All components are used must original product and don't buy it third-party vendors.
• Need to provide physical security for the components.
• Must follow recommended settings for all new components.

COMPUTER VIRUSES, WORMS, AND TROJAN HORSES


• Users must keep approved and current virus-screening software enabled on their
computers. Users must not bypass scanning processes that could stop the
transmission of computer viruses.
• Users are responsible for damage occurring because of viruses on computer
systems under their control.
• Users must not use any vulnerable software and don't connect any free Wi-Fi that
provided public.
• All users must scan the computer twice a week authorized virus guard.

Following these few security policies, you can protect your computer / new system.

International Higher Diploma in Computer Networks / Individual Assignment 32 | P a ge


Computer Platforms

TASK 04: Testing the Computer Systems and providing end


user support.
Task 4.1: Produce a Hardware and Software test plan for the system
after those changes that implemented as in before tasks.
Working power supply After give voltage, the
indicator must light-up.
Motherboard working After turn on computer, the
indicator must light-up. Fans
start to working.
RAM kit working After turn on computer, the
RGB indicators must light-
up.
NVME and HDD working After turn on computer,
BIOS must load correctly
and OS must load to the
RAM. No any error sound.
Video Card working After turn on computer, the
RGB indicators must light-
up. Fans start to work.
Mouse and Keyboard working While loading BIOS, the
indicators light-up and check
Mouse & Keyboard work.
(Error - mouse did not plug
correctly.)
CD/DVD drive working Test using CD or DVD.
reading and writing.
IPS Monitor working After give voltage, the
indicator must light-up and
after turn on, display
outputs.
Printer and Scanner working Test printer using picture or
document print. Scan a
document to test scanner.
(Error- device drivers are
not installed correctly)
Windows 10 Pro (OS) working After BIOS, OS must load
RAM and show graphical
user interface.
Office 2016 working Edit word document using
word, use excel and try
other applications to the test
office 2016.
Adobe Reader, Antivirus Program, WinRAR, Read PDF to test adobe
Zoom/Teams,Google Chrome working reader, scan the computer
to test virus guard and
compress file to test
WinRAR, join meeting with
Zoom, browse web with
chrome (Error- Virus guard
not activated)

International Higher Diploma in Computer Networks / Individual Assignment 33 | P a ge


Computer Platforms

Task 4.2: Produce Health and Safety plan for the Computer System.
As a student these days students need to spend a large part of their day in front of a
computer screen, whether it’s a desktop computer, a laptop, tablet or even a smartphone.
Also, in fact, it’s rare to find a working environment where computer screens aren’t used.
Most of the time, display screen equipment – like your computer – is completely harmless.
However, if you spend prolonged periods in front of it (such as several hours each day), it
can pose significant health risks, like those listed above. sitting in front of a computer monitor
for a long time, and using keyboard and mouse wrong posture may lead to,
• Upper and Lower Back Pain
• Repetitive Strain Injury (RSI)
• Strain in Legs and Feet
• Eye Strain and Headaches

Health plan for these problems

Upper and Lower Back Pain


Both back and neck ache can be caused by sitting incorrectly and using poor quality
chairs without back rests. This is called poor posture. Back ache and neck ache can cause
great pain. When sat in your desk chair, your spine
should be in an upright position. Avoid slouching down
into your chair or leaning forward onto the desk, as this
can cause strains, aches and pains. Use correct
postures while sitting in front of a computer for avoiding
back and neck pain.

To help keep your back free of strain,


• Stand up and walk around every hour or so, so
that you’re not sat in the same position all day.
• Slowly lean your torso over to one side of the
chair and then the other to stretch your sides and
spine.
• Stand up and put your hands together, elbows Figure 25
out, then slowly twist to the left and then to the right.
• Adjust the tilt and height of your screen or your chair if you need to and, if you have a
laptop, you should use a stand to raise it up.

Reduce tension by regularly moving your neck and shoulders,


• Sit up straight and slowly tilt your head down to one shoulder and then to the other to
stretch your neck.
• Move your shoulders around in small circles, first in one direction and then the other.
• Slowly bring your chin down to your chest, hold for 3 seconds, and then release.

Repetitive Strain Injury (RSI)


RSI causes painful swelling of the wrist and fingers. Sufferers with really bad RSI are
unable to use their hands at all. RSI is caused by doing the same small movements over and
over again across a long period of time. there are few reasons for the RSI. which are, typing
on a computer for too long, using a mouse for long periods, holding the mouse incorrectly,
working in a cramped workspace.
There should be enough room in front of your keyboard to support both your
forearms and your wrists on the desk. Push your computer screen and your keyboard back a
bit if necessary. When typing, keep your wrists straight.

International Higher Diploma in Computer Networks / Individual Assignment 34 | P a ge


Computer Platforms

To keep your arms and wrists ache-free,


• Reach your arms out in front of you and draw big circles with your wrists, first in one
direction and then the other.
• Stretch your arms out to the side as far as you can and then above your head as high
as you can to stretch your arms, wrists and back.
• Interlock your fingers and then push them out in front of you, with palms facing out.

Figure 26
Figure 27

Strain in Legs and Feet


Your desk chair should be positioned so that you can sit comfortably with your feet
flat on the floor and your lower legs vertical. Make sure that there’s enough space to change
position and stretch your legs out every now and then, too.

Avoiding stiff legs, ankles and feet,


• Rotate your ankles round in circles under the desk.
• Stand up and march on the spot for 30 seconds to improve the blood flow in your
legs.
• Stretch upwards, as tall as you can, to release some of the tension in your ankles,
legs, back, arms and neck.

Eye Strain and Headaches


Staring at a computer screen for too long can strain your eyes and cause headaches.
Also, working in a room with bad lighting, using a computer screen with glare or flickers, dirt
on the screen might causes to the eyes strain. Eye strain can cause your vision to blur.

To reduce the risks of visual problems


• Reposition the screen to avoid glare from lights or windows.
• Ensure the screen colors are
easy to look at, and that the
characters are sharp and
legible.
• Look away from the screen into
the distance for a few moments
to relax your eyes. use 20-20-
20 rule for this. (focus on
something 20 meters away for
20 seconds every 20 minutes)
• Keep the screen clean of dirt.
• Use LCD screens rather than
CRT as they have less flicker.
• Have eyes tested regularly.

Figure 28

International Higher Diploma in Computer Networks / Individual Assignment 35 | P a ge


Computer Platforms

There are few safety issues that can arise from using ICT devices. Which are,
• Electrocution
• Tripping over wires and cables
• Heavy equipment falling on you
• Fire risk

Safety Plan

Electrocution
ICT devices are required an electrical power source. When you connect your device
to the electrical power sources you run the risk of the electrocution. If you connect Faulty
equipment, the risk is higher. Spilling drinks over electrical equipment and touch electrical
equipment with wet hand is risky.
How to Prevent Electrocution,
• Make sure wires are insulated and Don't use exposed electrical wires.
• Keep drinks away from equipment.
• Report any malfunctioning equipment to a technician.
• Never open up an electrical device.

Tripping over wires and cables


ICT devices with wires can make a room a potential hazard.sometimes long wires
and cables spread across a floor. It could be an accident.
How to prevent tripping over wires,
• Hide wires in cable ducts.
• Tuck trailing wires under desks or carpets.
• Use wireless technology. that can be eliminate some of the use of wires altogether.

Heavy equipment falling on you


Some ICT devices might fairly heavy and can cause injury if they fall on you. That
equipment should be positioned securely on strong desks.Also, don't use poor quality and
flimsy desks.
How to prevent equipment falling,
• Make sure that equipment don't positioned from the edge of desks.
• Use strong desks that can support the weight with ease.

Fire risk
ICT devices require power from a mains outlet. If too many devices are plugged into
a single mains at the same time it is possible to overload the circuit and start an electrical
fire. Also, leaving devices plugged in unattended for long periods and covering air vents on
devices like laptops may reasonable reason for the fire.
How to prevent fires,
• Make sure that your room has plenty of mains outlets and don't plug too many
devices into the same outlet.
• Turn off and unplug devices if you are going to be away for a long time.
• If you working an organization, make sure have a CO2 fire extinguisher at hand.
• Leave air vents on devices uncovered.

International Higher Diploma in Computer Networks / Individual Assignment 36 | P a ge


Computer Platforms

Task 4.3: Product End user support documentation for the new
Computer System.

Desktop PC

User Guide

Device identification
Figure 29

Figure 31

Figure 30

Desktop PC Keyboard Mouse

Figure 33

Figure 32

Monitor Power Cable

Chapter 01

Getting Started

Welcome!

The Desktop PC provides cutting-edge performance, uncompromised reliability, and user-


centric utilities. All these values are encapsulated in a stunningly futuristic and stylish system
casing.

International Higher Diploma in Computer Networks / Individual Assignment 37 | P a ge


Computer Platforms

Getting to know your computer

Front

1 2 3 4 5
6

Figure 34

1 Power Button. (Press this button to turn on your computer)

2
Microphone and Headphone ports. (These ports connect to a microphone and
headphone or speaker)

USB 2.0 ports. (These USB 2.0 ports connect to USB 2.0 devices such as a mouse,
3
keyboard, printer, scanner, camera and others)

USB 3.0 gen 1 port. (The USB 3.1 gen 1 port connects to USB 3.1 gen 1 devices
4
such as a mouse, printer, scanner, pen drive and others)
o Due to USB 3.1 gen 1 controller limitations, USB 3.1 gen 1 devices can only
be used under an OS environment and after USB 3.1 gen 1 driver
installation.
o DO NOT connect a keyboard/ mouse ta any USB 3.1 gen 1 port when
installing OS.
o USB 3.1 gen 1 devices can only be used as data storage only.

5 Restart Button. (Press this button to restart your computer)

6 RGB control button. (Just single press to change the front panel’s ARGB lights)

International Higher Diploma in Computer Networks / Individual Assignment 38 | P a ge


Computer Platforms

Rear

Figure 35

1 Flash BIOS Button

2 PS/2 Combo Port

3 USB 3.1 Gen 1 Port

4 LAN (Rj-45) Port

5 HD Audio Connectors

6 USB 2.0 Port

7 DVI-D Port

8 HDMI Port

9 USB 3.1 Gen 2 Type A+C port

Setting up your computer

o
Connecting an external monitor
Connect your monitor to the display output port on the discrete Graphics
Card.
To connect monitor,
1. Connect a monitor to a display output port on the graphics Card.
2. Plug the monitor to a power source.

International Higher Diploma in Computer Networks / Individual Assignment 39 | P a ge


Computer Platforms

o Connecting a USB keyboard and USB mouse


Connect a USB keyboard and USB mouse to the USB ports on the rear
pannel of your computer.

Turning your computer ON


This section describes how to turn on your computer after setting up your computer.

To turn your computer ON:


1. Turn your monitor ON using monitor power ON button.
2. Press the power button on your computer.
3. Wait until the operating system loads automatically.

For details on shutting down your Desktop PC, refer to the OS user manual that you installed
your PC, which can be found in this manual.

Chapter 02

Connect a USB storage device

This Desktop PC provides USB 2.1 and USB 3.1 gen1 ports on the front and rear
panels. The USB ports allow to connect USB device such as storage devices.

To connect a USB storage device to your computer,


Insert the USB storage device to your computer USB port.

Figure 36

Connecting microphone and speakers

This desktop PC comes with microphone port and speaker port on both the front and
rear panels. The audio I/O ports located on the rear panel allow you to connect 2.1-channel,
4.1-channel, 5.1-channel and 7.1 channel stereo speakers.

International Higher Diploma in Computer Networks / Individual Assignment 40 | P a ge


Computer Platforms

Connecting Headphone and Mic

Figure 37

Connecting 2.1-channel Speakers

Figure 38

Connecting 7.1-channel Speakers

Figure 39

International Higher Diploma in Computer Networks / Individual Assignment 41 | P a ge


Computer Platforms

Chapter 03

Using your computer

Use proper posture when using your Desktop PC


(refer TASK 4.2)

Using the optical drive

To insert an optical disc:


1. While your system is ON, press the eject button to open the tray.
2. Place the disc on the optical drive with correct position.
3. Push the tray gently to close it.

To remove an optical disc:


1. While the system is ON, do either of the following to eject the tray:
o Press the eject button below the drive bay cover.
o From the start menu, click File Explorer, right-click the CD/DVD drive icon,
and click Eject.
2. Remove the disc from the disc tray.

Chapter 04

Connecting to the Internet

Wired connection
Use RJ-45 cable to connect your computer to a DSL/ cable modem or a local area network
(LAN).

To connect:
1. Connect one end of RJ-45 cable to the LAN port on the rear panel of your
computer and the other end to your LAN.
2. Turn on your computer.
3. Configure the necessary Internet connection setting. (refer OS user manual to
find how to connect Internet)

Figure 40

International Higher Diploma in Computer Networks / Individual Assignment 42 | P a ge


Computer Platforms

Wi-Fi connection

Connect your computer to the Internet through a wireless connection.

Figure 41

Chapter 05

Working with computer day-to-day

Log in to operating system.


As I mentioned before, I recommended to this computer Kali Linux. But most of
computers are pre-installed windows OS. So here that you can use windows 10 OS to your
day-to-day working.

Figure 42

• Enter your user name and password that you created while installing windows 10 and
log in to the system.

International Higher Diploma in Computer Networks / Individual Assignment 43 | P a ge


Computer Platforms

OS interface Figure 43

Shut down the computer


• Start >> Power >> Shut down

Figure 44

International Higher Diploma in Computer Networks / Individual Assignment 44 | P a ge


Computer Platforms

Add new user to the computer


• Start >> Setting >> Account >> Family & other member >> Add account

Figure 45
Pin app to the taskbar and start menu
• Right click on the app that you want >> Select Pin to taskbar or start

Figure 46

International Higher Diploma in Computer Networks / Individual Assignment 45 | P a ge


Computer Platforms

Sing out the user


• Start >> Click Profile Picture >> Select sign out, lock or change account settings

Figure 47
Use the task view
When you have several running apps, you can click task view icon from the taskbar to
display all your running apps and click on an app or item to lunch it.

Figure 48

❖ If any further more information do you need to know. contact technical engineer or
help desk that your computer owns.

International Higher Diploma in Computer Networks / Individual Assignment 46 | P a ge


Computer Platforms

Conclusion.

This assignment is providing a lot of important information about basic computer knowledge.
we can get knowledge about what we need to build a new computer or upgrade our own
computer. I was finishing this assignment within one weeks and found lot of important. Also,
student who study this assignment they can get good knowledge about computer hardware,
operating systems, computer security and software/ hardware testing, and also, basically
how to use a computer.

International Higher Diploma in Computer Networks / Individual Assignment 47 | P a ge


Computer Platforms

Reference.
Figur URL Date(2021)
e
Figure https://www.msi.com/Landing/mystic-light-rgb-gaming-pc/compatible- 20.07
01 products
Figure https://padakuu.com/article/27-batch-operating-systems 20.07
02
Figure https://afteracademy.com/blog/what-are-the-types-of-an-operating- 20.07
03 system
Figure https://cdn.openpr.com/T/1/T117502514_g.jpg 20.07
04
Figure https://digitalthinkerhelp.com/network-operating-system-nos-tutorial- 20.07
05 examples-and-types/
Figure https://www.microcontrollertips.com/real-time-standard-how-to-choose- 20.07
06 rtos/
Figure https://www.gsmarena.com/windows 11 20.07
07
Figure https://www.omgubuntu.co.uk/2021/01/ubuntu-21-04-release-features 20.07
08
Figure https://twitter.com/Anonymousnn3/status/1407404533752512516/phot 21.07
09 o/1
Figure https://www.lifehacker.com.au/2020/06/the-best-features-of-macos- 21.07
10 big-sur-so-far/
Figure https://www.pcmag.com/reviews/google-chrome-os 21.07
11
Figure https://blog.vpscheap.net/how-to-setup-a-desktop-environment-in- 21.07
12 centos-7/
Figure https://www.softwaretestinghelp.com/wp- 22.07
13 content/qa/uploads/2019/09/Debian.png
Figure https://www.indiamart.com/proddetail/application-software-packages- 22.07
14 7566958388.html
Figure https://mydistroreview.com/parrot/ 22.07
15
Figure https://simple.wikipedia.org/wiki/Fedora_(operating_system) 22.07
16
Figure https://www.pcgamesn.com/cpu-upgrade 23.07
17
Figure https://segmentnext.com/articles/best-ddr4-ram-gaming/ 23.07
18
Figure https://www.gatevidyalay.com/cache-memory/ 23.07
19

International Higher Diploma in Computer Networks / Individual Assignment 48 | P a ge


Computer Platforms

Figure https://www.computerhope.com/jargon/b/bus.htm 23.07


20
Figure https://www.backblaze.com/blog/ssd-vs-hdd-future-of-storage/ 23.07
21
Figure https://www.computerhope.com/jargon/v/video-card.htm 24.07
22
Figure https://www.nexxcom.lk/product/antec-nx110/ 24.07
23
Figure https://www.nanotek.lk/product/1820 24.07
24
Figure https://www.techandq.com/features-of-ergonomically-designed-chair- 25.07
25 for-correct-posture/
Figure https://jvphysio.files.wordpress.com/2017/01/keyboard_position1.jpg? 25.07
26 w=584
Figure https://healthsafetywhenusingacomputer.weebly.com/rsi.html 25.07
27
Figure https://www.johnoconnor.co.nz/digital-eye-strain/ 25.07
28
Figure https://ark.com.bd/antec-nx110-mid-tower-gaming-casing/ 26.07
29
Figure https://www.techarp.com/computer/alienware-aw410k-keyboard- 26.07
30 details/
Figure https://www.thermaltake.com/argent-m5-rgb-gaming-mouse.html 26.07
31
Figure https://mzee.lk/product/benq-eye-care-22-ips-frameless-monitor/ 26.07
32
Figure https://shieldnseal.com/shop/product/power-cord/ 26.07
33
Figure https://www.antec.com/product/case/nx110 26.07
34
Figure https://www.msi.com/Motherboard/B450-TOMAHAWK/Specification 26.07
35
Figure https://pureinfotech.com/windows-10-new-login-screen-enable/ 26.07
42

International Higher Diploma in Computer Networks / Individual Assignment 49 | P a ge


Computer Platforms

Gantt Chart.
Deadline – 26.07.2021
TASK 01
Task 1.1
Task 1.2
Task 1.3
TASK 02
Task 2.1
Task 2.2
Task 2.3
TASK 03
Task 3.1
Task 3.2
Task 3.3
TASK 04
Task 4.1
Task 4.2
Task 4.3
TASKS
2021.07.20

2021.07.21

2021.07.22

2021.07.23

2021.07.24

2021.07.25

2021.07.26
Dates

International Higher Diploma in Computer Networks / Individual Assignment 50 | P a ge


Computer Platforms

Declaration of Academic Honesty Instructions


1. You must submit a completed copy of this form every time you submit an assignment.
2. You must submit this declaration electronically, either within your assignment, file, or as
a separate file.
3. If you do not submit this declaration, your work will not be assessed.
4. If any student is found to have been dishonest, then the student may face disciplinary
action as stated in the IDM Nations Campus Plagiarism Policy.

Student’s Full Name : W.G. Isuru Vishwajith Jayasingha


Date : 26/07/2021
Assignment Title : Computer Platforms
Declaration (Insert YES or NO here): YES

1. I confirm that this assignment is my own work:

2. I confirm that where ever I have used someone else’s words, concepts, graphics or data
in my work, I have clearly indicated exactly where I have done so, using the Harvard
referencing system.
(insert yes or no here):

3. I confirm that I have indicated by referencing, where I have used someone else’s words,
concepts, graphics or data, irrespective of whether I have quoted verbatim or I have
paraphrased in my own words.

4. I have clearly indicated in my assignment any work that has been contributed by another
student.

5. I have clearly indicated in my assignment any work that has been carried out
collaboratively with another student.

……………………………………………..
Student Signature

International Higher Diploma in Computer Networks / Individual Assignment 51 | P a ge


International Higher Diploma in Computer Networks / Individual Assignment

You might also like