Professional Documents
Culture Documents
INTERNAL VERIFIER :
PLAGIARISM:
While research and discussion are an essential part of an assignment, the deliberate copying of someone else’s
work or unacknowledged copying from printed or electronic sources is NOT permitted. You may be subject to
disciplinary procedure if you do this. You should sign this sheet to show that you comply with these regulations.
0 - 29 0.0 E
30 - 39 1.0 D
40 - 49 1.7 C-
50 - 54 2.0 C
55 - 59 2.3 B-
60 - 64 2.7 B
65 - 69 3.0 B+
70 - 74 3.3 A-
75 - 79 3.7 A
Assessor Comments:
Assessor:
Signature: Date:_____/_____/ ___________
Allocated Given
TASK 1: Preparing a specification to a Personal Computer Marks Marks
T 1.1 Outline the main checklist for a record of computer specification 15
Assess functions that are undertaken / purpose of each checklist item that
T 1.2 was found in the above task (T 1.1) 45
Evaluate the performance of the computer system and suitability for the use
T 1.3 in a class. 40
Total 100
Allocated Given
TASK 2 : Evaluate Operating Systems Marks Marks
Research on various Operating systems types available in the market and
T 2.1 present your findings including their special features, Strengths and 30
Weaknesses.
Do a Comparison on identification of differences between operating
T 2.2 systems types on the basis of the purpose / situation those operating 30
systems are appropriate.
Discus features of varies types of operating system in a view of the
T 2.3 performances required by Postgraduate students. Propose basic 40
customization for chosen operating system.
Total 100
Allocated Given
TASK 3: Identifying the key components Marks Marks
To increase the performance of a computer, what are the key components
T 3.1 that need to be consider 30
Total 100
Allocated Given
TASK 4 : Testing the Computer Systems and providing end user support Marks Marks
Produce a Hardware and Software test plan for the system after those
T 4.1 changes that implemented as in before tasks. 30
T 4.2 Produce Health and Safety plan for the Computer System 30
T 4.3 Product End user support documentation for the new Computer System 40
Total 100
P2.1. Contrast the functions and features Task 2.1, Task 2.2
of different types of operating systems
END OF ASSIGNMENT
Table of Contents
Introduction. ........................................................................................................................ 10
TASK 01 ............................................................................................................................. 11
Task 1.1 .................................................................................................................... 11
Task 1.2 .................................................................................................................... 12
Task 1.3 .................................................................................................................... 13
TASK 02 ............................................................................................................................. 14
Task 2.1 .................................................................................................................... 14
Task 2.2 .................................................................................................................... 17
Task 2.3 .................................................................................................................... 20
TASK 03 ............................................................................................................................. 27
Task 3.1 .................................................................................................................... 27
Task 3.2 .................................................................................................................... 30
Task 3.3 .................................................................................................................... 31
TASK 04 ............................................................................................................................. 33
Task 4.1 .................................................................................................................... 33
Task 4.2 .................................................................................................................... 34
Task 4.3 .................................................................................................................... 37
Conclusion. ......................................................................................................................... 47
Reference. .......................................................................................................................... 48
Gantt Chart. ........................................................................................................................ 50
Introduction.
Hardware Software
Peripheral Devices Internal Devices OS Other Software
Keyboard CPU Windows 10 Pro Office 2016
Mouse RAM Adobe Reader
Monitor VGA Card Antivirus Program
Printer Motherboard WinRAR
Webcam Power Supply Teams/Zoom
Speaker/Headphone HDD Google Chrome
Router CD/DVD Drive
Cooling Fans
➢ Note - If needed,
Pen drive/ External HDD, Scanner
Figure 1
There are different kind of aspects to evaluate the computer performance. which are,
❖ Availability
Usually, Availability of a computer measured as a factor of its reliability. if
reliability increases, less downtime. Availability of a computer may also be
increasing testability and maintainability and not on reliability.
❖ Response time
Response time is the total amount of time it takes to respond to a request for
service. It is sum of three numbers of conditions,
Service time - How long it takes to do the work requested.
Wait time - How long the request has to wait for requests.
Transmission time – How long it takes to move the request to the
computer doing the work.
❖ Speed
The speed is usually in reference to the clock speed of the processor. The
clock speed is defined as the clock cycles per second, which determines the
rate at which instruction processing takes place. basically, Processing speed
is instructions that can be process per second (Instructions per second).
❖ Latency
Latency is the term used to describe the state of existence of something in
transition. Every transmitted piece of information on a computer system
travels over some sort of medium. Computer latency is defined as the time it
takes to communicate a message, or the time the message spends traveling
on the wire.
❖ Channel capacity
Channel capacity is the tightest upper bound on the rate of information that
can be reliably transmitted over a communications channel.
❖ Bandwidth
In computer networking, bandwidth is a measurement of bit-rate of available
or consumed data communication resources. it's measured by bits per
second or multiples of it (bit/s, Kbit/s, Mbit/s, Gbit/s, etc.).
Considering these all, if this student computer has high availability, low response time, high
speed, low latency and high bandwidth, that computer is suitable for his/her classes.
Features
• Same jobs in the batch are higher executed speed.
• Next job executed without any user interaction.
• CPU utilization gets improved.
• The batch process can partition into the number of processes, that can be speed up
processing.
Strengths
• Multiple users can share the batch systems same time.
• The idle time of the batch operating system is very less.
• It is easy to manage large work repeatedly in batch systems.
Weaknesses
• The users should be well known with batch systems.
• Batch systems are hard to debug.
• It is sometimes costly.
• If any job fails, the other jobs will have to wait until an unknown time.
Features
• It provides the advantage of quick response.
• This type of operating system avoids duplication of software.
Strengths
• Each task gets an equal opportunity to CUP processing time.
• Fewer chances of duplication of software.
Ex: LOCUS
Features
• Basic support for protocols, hardware detection, multiprocessing and processor
support.
• Printer and application sharing.
• Common file system and database sharing.
• Backup and web services.
• Network security capabilities such as user authentication and access control.
• Internetworking.
Strengths
• Highly stable centralized servers.
• Some security concerns are handled through this OSs.
• Server access is possible remotely from different locations and types of systems.
Weaknesses
• These Oss are very expensive.
• User has to depend on a central location for most operations.
• Maintenance and updates are required regularly and sometimes it will be costly.
Ex: Windows Server 2016, Windows Server 2019, UNIX, Linux, Mac OS X, Novell NetWare
Ex: Scientific experiments, medical imaging systems, industrial control systems, weapon
systems
The batch operating systems are usually use to process group of data. it means, it
uses to Payroll System, Bank Statements. for example, payroll systems are gathering
employee’s data within month and input that data to the system and calculate the
employees’ salaries. that is batch operating system.
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6
Figure 7
02. Ubuntu
Ubuntu is a Linux based OS that comes with everything that you are looking
for in an operating system. It is free to download, use, and share and it is the best OS
in open source category. It is backed by Canonical which is a global software
company, and now by the leading Ubuntu service providers.
Features
• Ubuntu is an Open Source software, which allows it to be freely downloaded, used
and shared by its users.
• Ubuntu is secure than windows. It comes with a built-in firewall and virus protection
software.
• You get five years of security patches and updates.
• It works and is compatible with all the latest laptops, desktops and touch screen
devices.
Figure 8
• Kali Linux adheres to FHS in order to locate libraries, support files, etc. with ease.
• Kali Linux is free to use, and its developers promise that it will remain so. Therefore,
Kali Linux is open source and any developer can build their own version and share
that.
Figure 9
04. Mac OS
The Mac OS has been the staple of almost all Apple devices. It has evolved
with time to include the features that first and foremost define innovation. For Apple
users, there is no other option except the MAC OS.
Features
• The new dark mode gives your desktop interface a more unique design look which is
easier on the eyes.
• Mac OS helps to automatically organize your desktop files by kind, date or tag.
• Continuity camera that scans or photographs a document nearby your iPhone and
automatically
appears on your
mac.
• Can communicating
between apple
device more easily.
• Prevent websites
from tracking your
Mac by making your
profile more
anonymous online.
Figure 10
05. Chrome OS
Chrome OS is another Linux-kernel based operating software that is designed
by Google. As it is derived from the free chromium OS, it uses the Google Chrome
web browser as its principal user interface. This OS is very simple and primarily
supports web applications.
Features
• It is optimized for good battery life, and pre-install valid google applications.
• With Chrome OS it is possible to run Linux applications.
• Remote application access and virtual desktop access.
• Chrome OS is designed to be compatible with all the Android applications.
Figure 11
06. CentOS
The CentOS is another community-driven open source free software that
allows server management. This OS is mostly support to manage network and It is
best for developers who are looking for an operating system that simply helps them
to perform their coding tasks. CentOS included good technologies for secure your
data from threat.
Features
• Advanced networking, compatibility, and security features that are still missing in
many OS today.
• This OS provide good
support to network and
server management.
• It allows for seamless
interoperability by
solving hundreds of
hardware and software
problems.
• Extensive resources for
coders looking to build,
test and release their
codes.
Figure 12
07. Debian
Debian is again a Linux kernel-based free open-source OS. It comes with
over 59000 packages and is a pre-compiled software bundled in a nice format.
Debian OS had nice user interface and it is user-friendly.
Features
• Faster and lighter than the other OS.
• It comes with in-built security firewalls to protect your data and information.
• Easy to install through any medium.
• Advanced networking, compatibility, and security features.
Figure 13
08. Solaris
Solaris is a UNIX based operating system which was originally developed by
Sun Microsystems in the mid-’90s. After 2010 it was renamed as Oracle Solaris. It is
known for its scalability and several other features that made it possible such as
Dtrace, ZFS (Zettabyte File System) and Time Slider.
Features
• It offers indisputable performance advantages for web, database, and java-based
services.
• The software partitioning function provides multiple independent fine-grain OS
environments in the server. Up to 8192 partitions even without hardware or firmware
based partitioning
features.
• Delivers high-
performance networking
without any modification.
• Unlimited capacity for
helping in managing file
system and databases.
• High-level access
control, controlling
access to system
resources in a detailed
level, can improve entire
system stability.
Figure 14
09. Parrot OS
Parrot OS has all the tools needed to do forensic acquisitions and evidence
identifications in a safe comprehensive and portable virtual lab. Not just forensic
tools, it also packs powerful cryptographic front-ends to work both with symmetric
and asymmetric encryption. It is Debian GNU/Linux 9 based operating system. Parrot
has multiple editions that are based upon Debian, with various desktop environments
available. which are, Parrot Security, Parrot Home, Parrot ARM.
Features
• Always updated, frequently released with many hardening and sandboxing options
available. it is secure.
• Parrot OS is lightweight and run surprisingly fast even on very old hardware or with
very limited resources.
• Feel free to use the Parrot tools on Windows, Mac OS or any other Linux distribution
without changing.
• A full development stack with the best editors, languages and technologies available
out of the box.
Figure 15
10. Fedora
Fedora is another Linux based system. Fedora is reliable, user-friendly and
makes for a powerful operating system for any laptop and desktop computer. Fedora
is for casual users and caters to students, hobbyists, and professionals working in
corporate environments.
Features
• A sleek new user interface
that allows the developers
to focus on their code on
Gnome 3 environment.
• It offers a complete open-
source toolbox with
languages, tools, and
utilities.
• Powerful virtualization
tools to get virtual
machines up and running.
• OCI (Open Container
Initiative) image support.
Figure 16
Most of people choose windows operating system because of how it has evolved with
time and it has simple and user-friendly user interface. But we must consider the cost of
windows OS. windows might be costly than other OS. Therefore, cost is restriction to the
student use this OS. On the other hand, we need to consider our requirement and what is
the purpose to use OS. Also, we need to consider about required minimum computer
specifications.
In my cause, I would like to suggest Kali Linux or Parrot OS. because these OSs are
Linux based and also, those are lightweight. These OSs are more secure than other OSs
and latest updates are released with lots of new features. Student can run there all software
and app in this platform. But sometimes we need windows OS for our works. that is why I
said before, we must consider about what is the purpose of that we use this OS. However,
my suggest is Kali Linux or Parrot OS or if needed windows.
Figure 18
03. Cache
Although today's processors can execute billions of
instructions every second, the processor is usually
waiting for those instructions from the slower types of
memory in the computer. Because RAM and the hard
drive speeds are slower than the CPU. Therefore,
computer processors and motherboards use cache to
transfer data between the processor and memory. The
cache is the fastest type of memory. Computers with
more level cache memories (L2 cache, L3 cache) can
store more instructions and send them to the processor
more efficiently.
Figure 19
Figure 22
This all components can increase the performance of your computer. But before update
these things, you need to consider what is your purpose. because these components are
change for a particular user requirements. As an example, if you've video editor you need a
good processor, more RAM and video card, if you've programmer you need a good
processor, enough RAM and SSD or NVMe drive. Therefore these things are change on
requirement.
Figure 24
Task 3.3: For the new proposed system produce a security policy.
What is the security policy?
A security policy is a set of rules, policies and procedures designed to ensure all
users and networks within an organization meet minimum IT security and data protection
security requirements. The policies are valid for all who accessing and using an
organization's IT assets and resources. An effective IT security policy is a unique document
for each organization, cultivated from its people’s perspectives on risk tolerance, how they
see and value their information, and the resulting availability that they maintain of that
information. The main objectives of an IT security policy are the preservation of
confidentiality, integrity, and availability of systems and information used by an
organization’s members.
The aim of security policies is to address security threats and implement strategies to
mitigate IT security vulnerabilities, as well as defining how to recover when a network
intrusion occurs. Also, security policies are providing relevant direction and value to the
employees within an organisation with regard to security. There also needs to be a plan for
what to do when a threat actually materializes. that is why we need security policies.
Purpose
The purpose of this policy is to administrative direction, procedural requirements, and
technical guidance to ensure the appropriate protection of new system and components.
Scope
This policy applies to all who access and use this new system. Throughout this
policy, the word “user” will be used to collectively refer to all such individuals. The policy also
applies to all computer components and software owned by or administered by owner or its
partners.
Policy
All components and systems that has not been specifically identified as the property
of other parties will be treated as though it is a asset of new system. It is the policy of new
system to prohibit unauthorized use of computer or software, modification, destruction, loss
and theft of this components.
End-User Passwords
• Any password that use to access must be at least 8 characters long, contain at least
one uppercase letter and one number or special character.
• Passwords will expire monthly - every 30 days. When a password expires or a
change is required, users should create a new password that is not identical to the
last four passwords previously employed.
• Passwords may not be written down and left in a place where unauthorized persons
might discover them.
• Passwords may never be shared or revealed to anyone other than the authorized
user.
SYSTEM PRIVILEGES
COMPONENTS PROTECTION
• All components are used must original product and don't buy it third-party vendors.
• Need to provide physical security for the components.
• Must follow recommended settings for all new components.
Following these few security policies, you can protect your computer / new system.
Task 4.2: Produce Health and Safety plan for the Computer System.
As a student these days students need to spend a large part of their day in front of a
computer screen, whether it’s a desktop computer, a laptop, tablet or even a smartphone.
Also, in fact, it’s rare to find a working environment where computer screens aren’t used.
Most of the time, display screen equipment – like your computer – is completely harmless.
However, if you spend prolonged periods in front of it (such as several hours each day), it
can pose significant health risks, like those listed above. sitting in front of a computer monitor
for a long time, and using keyboard and mouse wrong posture may lead to,
• Upper and Lower Back Pain
• Repetitive Strain Injury (RSI)
• Strain in Legs and Feet
• Eye Strain and Headaches
Figure 26
Figure 27
Figure 28
There are few safety issues that can arise from using ICT devices. Which are,
• Electrocution
• Tripping over wires and cables
• Heavy equipment falling on you
• Fire risk
Safety Plan
Electrocution
ICT devices are required an electrical power source. When you connect your device
to the electrical power sources you run the risk of the electrocution. If you connect Faulty
equipment, the risk is higher. Spilling drinks over electrical equipment and touch electrical
equipment with wet hand is risky.
How to Prevent Electrocution,
• Make sure wires are insulated and Don't use exposed electrical wires.
• Keep drinks away from equipment.
• Report any malfunctioning equipment to a technician.
• Never open up an electrical device.
Fire risk
ICT devices require power from a mains outlet. If too many devices are plugged into
a single mains at the same time it is possible to overload the circuit and start an electrical
fire. Also, leaving devices plugged in unattended for long periods and covering air vents on
devices like laptops may reasonable reason for the fire.
How to prevent fires,
• Make sure that your room has plenty of mains outlets and don't plug too many
devices into the same outlet.
• Turn off and unplug devices if you are going to be away for a long time.
• If you working an organization, make sure have a CO2 fire extinguisher at hand.
• Leave air vents on devices uncovered.
Task 4.3: Product End user support documentation for the new
Computer System.
Desktop PC
User Guide
Device identification
Figure 29
Figure 31
Figure 30
Figure 33
Figure 32
Chapter 01
Getting Started
Welcome!
Front
1 2 3 4 5
6
Figure 34
2
Microphone and Headphone ports. (These ports connect to a microphone and
headphone or speaker)
USB 2.0 ports. (These USB 2.0 ports connect to USB 2.0 devices such as a mouse,
3
keyboard, printer, scanner, camera and others)
USB 3.0 gen 1 port. (The USB 3.1 gen 1 port connects to USB 3.1 gen 1 devices
4
such as a mouse, printer, scanner, pen drive and others)
o Due to USB 3.1 gen 1 controller limitations, USB 3.1 gen 1 devices can only
be used under an OS environment and after USB 3.1 gen 1 driver
installation.
o DO NOT connect a keyboard/ mouse ta any USB 3.1 gen 1 port when
installing OS.
o USB 3.1 gen 1 devices can only be used as data storage only.
6 RGB control button. (Just single press to change the front panel’s ARGB lights)
Rear
Figure 35
5 HD Audio Connectors
7 DVI-D Port
8 HDMI Port
o
Connecting an external monitor
Connect your monitor to the display output port on the discrete Graphics
Card.
To connect monitor,
1. Connect a monitor to a display output port on the graphics Card.
2. Plug the monitor to a power source.
For details on shutting down your Desktop PC, refer to the OS user manual that you installed
your PC, which can be found in this manual.
Chapter 02
This Desktop PC provides USB 2.1 and USB 3.1 gen1 ports on the front and rear
panels. The USB ports allow to connect USB device such as storage devices.
Figure 36
This desktop PC comes with microphone port and speaker port on both the front and
rear panels. The audio I/O ports located on the rear panel allow you to connect 2.1-channel,
4.1-channel, 5.1-channel and 7.1 channel stereo speakers.
Figure 37
Figure 38
Figure 39
Chapter 03
Chapter 04
Wired connection
Use RJ-45 cable to connect your computer to a DSL/ cable modem or a local area network
(LAN).
To connect:
1. Connect one end of RJ-45 cable to the LAN port on the rear panel of your
computer and the other end to your LAN.
2. Turn on your computer.
3. Configure the necessary Internet connection setting. (refer OS user manual to
find how to connect Internet)
Figure 40
Wi-Fi connection
Figure 41
Chapter 05
Figure 42
• Enter your user name and password that you created while installing windows 10 and
log in to the system.
OS interface Figure 43
Figure 44
Figure 45
Pin app to the taskbar and start menu
• Right click on the app that you want >> Select Pin to taskbar or start
Figure 46
Figure 47
Use the task view
When you have several running apps, you can click task view icon from the taskbar to
display all your running apps and click on an app or item to lunch it.
Figure 48
❖ If any further more information do you need to know. contact technical engineer or
help desk that your computer owns.
Conclusion.
This assignment is providing a lot of important information about basic computer knowledge.
we can get knowledge about what we need to build a new computer or upgrade our own
computer. I was finishing this assignment within one weeks and found lot of important. Also,
student who study this assignment they can get good knowledge about computer hardware,
operating systems, computer security and software/ hardware testing, and also, basically
how to use a computer.
Reference.
Figur URL Date(2021)
e
Figure https://www.msi.com/Landing/mystic-light-rgb-gaming-pc/compatible- 20.07
01 products
Figure https://padakuu.com/article/27-batch-operating-systems 20.07
02
Figure https://afteracademy.com/blog/what-are-the-types-of-an-operating- 20.07
03 system
Figure https://cdn.openpr.com/T/1/T117502514_g.jpg 20.07
04
Figure https://digitalthinkerhelp.com/network-operating-system-nos-tutorial- 20.07
05 examples-and-types/
Figure https://www.microcontrollertips.com/real-time-standard-how-to-choose- 20.07
06 rtos/
Figure https://www.gsmarena.com/windows 11 20.07
07
Figure https://www.omgubuntu.co.uk/2021/01/ubuntu-21-04-release-features 20.07
08
Figure https://twitter.com/Anonymousnn3/status/1407404533752512516/phot 21.07
09 o/1
Figure https://www.lifehacker.com.au/2020/06/the-best-features-of-macos- 21.07
10 big-sur-so-far/
Figure https://www.pcmag.com/reviews/google-chrome-os 21.07
11
Figure https://blog.vpscheap.net/how-to-setup-a-desktop-environment-in- 21.07
12 centos-7/
Figure https://www.softwaretestinghelp.com/wp- 22.07
13 content/qa/uploads/2019/09/Debian.png
Figure https://www.indiamart.com/proddetail/application-software-packages- 22.07
14 7566958388.html
Figure https://mydistroreview.com/parrot/ 22.07
15
Figure https://simple.wikipedia.org/wiki/Fedora_(operating_system) 22.07
16
Figure https://www.pcgamesn.com/cpu-upgrade 23.07
17
Figure https://segmentnext.com/articles/best-ddr4-ram-gaming/ 23.07
18
Figure https://www.gatevidyalay.com/cache-memory/ 23.07
19
Gantt Chart.
Deadline – 26.07.2021
TASK 01
Task 1.1
Task 1.2
Task 1.3
TASK 02
Task 2.1
Task 2.2
Task 2.3
TASK 03
Task 3.1
Task 3.2
Task 3.3
TASK 04
Task 4.1
Task 4.2
Task 4.3
TASKS
2021.07.20
2021.07.21
2021.07.22
2021.07.23
2021.07.24
2021.07.25
2021.07.26
Dates
2. I confirm that where ever I have used someone else’s words, concepts, graphics or data
in my work, I have clearly indicated exactly where I have done so, using the Harvard
referencing system.
(insert yes or no here):
3. I confirm that I have indicated by referencing, where I have used someone else’s words,
concepts, graphics or data, irrespective of whether I have quoted verbatim or I have
paraphrased in my own words.
4. I have clearly indicated in my assignment any work that has been contributed by another
student.
5. I have clearly indicated in my assignment any work that has been carried out
collaboratively with another student.
……………………………………………..
Student Signature