Computer
Computer
ESOFT is one of the prominent ICT education centers in Sri Lanka which was established in
year 2000 with the vision of being the best IT training partner in South East Asia. It is a purely
Sri Lankan Company which provides ICT education programmers to the student population in
the country. ESOFT has a Quality Management System with ISO 9001:2008 Certification. It is
also accredited by the BCS (UK) as an Accredited Course Provider. ESOFT is also an Approved
Centre of Ed excel International. (Esoft, 2001)
Currently ESOFT is considered as one of the best institutes which provides the platform to the
students who wants to sharpen their ICT knowledge throgh a professional experience. It always
strive to provide the services to the students all over the country by maintaing a good branch
network with over 25 branches maintained islandwide.
TASK 01
Identify Machine Components Existing in the Organization
A computer system is a system of interconnected computers that share a central storage system
and various peripheral devices such as a printers, scanners, or routers. Each computer connected
to the system can operate independently, but has the ability to communicate with other external
devices and computers.
The computer systems mainly consist with major 4 components.
Hardware
Software
Firmware
Liveware
Hardware
Hardware is any physical electronic device. Computers, adapter cards and internet cables are
examples. It also can be defined as the result of a process that defines the interconnection,
configuration, and control of logic devices, input/output circuits, and other electronic devices and
circuits. Moreover the hardware components of a computer system are the electronic and
mechanical parts.
Software
Software is a broad term for the programs running on hardware. Familiar kinds of software are
operating systems, which provide overall control for computer hardware, and applications, which
are optional programs used for a particular job. Software resides on disks and is brought into
memory when it is needed. These components of a computer system are the intangible parts. It
includes the data and the computer programs.
1
Firmware
Firmware is software that is semi-permanently placed in hardware. It does not disappear when
hardware is powered off, and is often changed by special installation processes or with
administration tools. It is software that is stored in a non-volatile memory device.
Liveware
Liveware is a slang term used to denote people using (attached to) computers, and is based on the
need for a human, or liveware, to operate the system using hardware and software. Its a term to
describe the human system, opposed to hardware or software in a computer.
The details of the computer system used at Esoft are given below:
Processor
RAM
VGA
Hard disk
Sound card
Network card
Chip type
System manufacturer
System model
Monitor
Keyboard
Mouse
Processor
A processor is the logic circuitry that responds to and processes the basic instructions that drive a
computer. The term processor has generally replaced the term central processing unit (CPU). The
processor in a personal computer or embedded in small devices is often called a microprocessor.
Ex: Intel Pentium, Intel dual core, Intel core i3, Intel core i5, Intel core i7
SRAM: Static random access memory uses multiple transistors, typically four to six, for
each memory cell but doesn't have a capacitor in each cell. It is used primarily for store.
DRAM: Dynamic random access memory has memory cells with a paired transistor and
capacitor requiring constant refreshing.
Hard Disk
A hard disk is part of a unit, often called a "disk drive," "hard drive," or "hard disk drive," those
stores and provides relatively quick access to large amounts of data on an electromagnetically
charged surface or set of surfaces. Today's computers typically come with a hard disk that
contains several billion bytes (gigabytes) of storage.
Motherboard
The motherboard represents the logical foundation of the computer. In other words, everything
that makes a computer a computer must be attached to the motherboard. From the CPU to
storage devices, from RAM to printer ports, the motherboard provides the connections that help
them work together.
The most common motherboard design in desktop computers today is the AT, based on the IBM
AT motherboard. A more recent motherboard specification, ATX, improves on the AT design. In
both the AT and ATX designs, the computer components included in the motherboard are:
The microprocessor
(Optionally) coprocessors
Memory
basic input/output system (BIOS)
Expansion slot
Interconnecting circuitry
Sound Card
A sound card (also known as an audio card) is an internal computer expansion card that
facilitates the input and output of audio signals to and from a computer under control of
computer programs. The term sound card is also applied to external audio interfaces that use
software to generate sound, as opposed to using hardware inside the PC.
Sound cards are being used to functions such as Games, Audio CDs, Watch movies, Audio
conferencing, Creating and playing Midi, Educational software, Business presentations, Record
dictations, Voice recognition etc
Network Card
A network card is a piece of hardware that permits a computer to participate in a computer
network. There are different kinds of networks, such as Ethernet or wireless LAN. Other types of
network cards include Token Ring network cards. Ethernet network cards most often use RJ-45
jacks. Wireless network cards usually have no external connections other than a possible antenna
jack.
The network card is the physical interface between the computer and cable. It converts the data
sent by the computer into a form which can be used by the network cable, transfers that data to
another computer and controls the dataflow between the computer and cable. It also translates
the data coming from the cable into bytes so that the computer's CPU can read it. This is why a
network card is an expansion card inserted into an expansion slot.
Monitor
The computer monitor is an output device that is part of your computer's display system. A cable
connects the monitor to a video adapter (video card) that is installed in an expansion slot on your
computers motherboard. This system converts signals into text and pictures and displays them
on a TV-like screen (the monitor). Today, the most common type of monitors which are being
used are the he LCD monitor, which is thin, flat, and lightweight. It is a newer technology than
CRTs (Cathode-Ray Tube). The quality can be the same or even better than a CRT, but this type
of monitor usually costs more than a CRT.
Keyboard
One of the main input devices used on a computer, a PC's keyboard looks very similar to the
keyboards of electric typewriters, with some additional keys.
Mouse
Mouse is the device that controls the movement of the cursor or pointer on a display screen. A
mouse is a small object you can roll along a hard, flat surface.
References
www.pcbuyerbeware.co.uk
www.techterms.com
6
www.tpub.com
www.howstuffworks.com
www.harddiskhome.com
www.webopedia.com
www.techiwarehouse.com
TASK 02
Evaluate the Performance of the Selected System
A good computer system can make a real impact on the effective management of an
organization. The evaluation of performance of a computer system could be done from the
perspectives of both developers and users, of complex systems of hardware and software.
In here, the evaluation of the computer system of the Esoft has been done using both the aspects
of software and hardware. According the system prevailing in the organization, the following
evaluations could be done.
When it comes to the processor which is used in the computer lab, it was observed that
the processor type is Pentium(R) 4 CPU 2.40 GHz. This is enough for the day today
usage of the lab such as simple Microsoft office works using word, excel etc But if the
students want to use software like Photoshop, illustrator etc the capacity of the
processor is not enough since it makes the processing speed low.
The capacity of the RAM used in the computer lab is 512 Mb which sometimes not
giving proper processing speeds for the students in the case when they try to open several
windows together. If the RAM level could be increased by the organization, the students
would get a more processing speed than the current one.
The VGA card which is used in the Esoft computer lab is with the capacity of 64 Mb
where it provides enough capacity for the day today usage of the lab. But when it comes
to the current situation of the industry very high capacity VGA cards are available such as
2 GB cards. Therefore if the lab could adopt a card with such a capacity it will be easy for
the students when using high resolution programs such as multimedia programs.
The main lab is using a hard disk of 40 GB. This is actually an enough storage capacity
for the lab since the students are not using any heavy files in the lab such as films,
computer games etc
In the main lab Esoft is using CRT monitors for the machines and this can give both the
advantages and disadvantages. But in most of the cases most desktop computer systems
7
sold now by default come with LCD monitors. Therefore this can be compared with the
LCD monitors. The primary advantage that CRT monitors held over LCDs was their
color rendering. The contrast ratios and depths of colors displayed were much greater
with CRT monitors than LCDs. The other advantage that CRT monitors held over LCD
screens is the ability to easily scale to various resolutions.
While these two items may play an important role for CRT monitors, there are
disadvantages as well. The biggest of these are the size and weight of the tubes. An
equivalent sized LCD monitor is upwards of 80% smaller in size and weight compared to
a CRT tube. The larger the screen, the bigger the size difference. The other major
drawback deals with the power consumption. The energy needed for the electron beam
means that the monitors consumer and generate a lot more heat than the LCD monitors.
Finally the keyboard and the mouse can be evaluated as good since both provides the
enough support for the users of the lab. The type of mouse used by the lab is the optical
type which allows application easier. But this could be advanced to the laser mouse type
for it to be more easy application. Especially when it comes to the Photoshop application,
the mouse type should be a very user friendly one.
TASK 03
Contrast the Functions and Features of Different Types of Operating System
An operating system is a program designed to run other programs on a computer. A computers
operating system is its most important program. It is considered the backbone of a computer,
managing both software and hardware resources. Operating systems are responsible for
everything from the control and allocation of memory to recognizing input from external devices
and transmitting output to computer displays. They also manage files on computer hard drives
and control peripherals, like printers and scanners.
The operating system of a large computer system has even more work to do. Such operating
systems monitor different programs and users, making sure everything runs smoothly, without
interference, despite the fact that numerous devices and programs are used simultaneously. An
operating system also has a vital role to play in security. Its job includes preventing unauthorized
users from accessing the computer system.
Multi-user and Single-user Operating Systems: The operating systems of this type
allow a multiple users to access a computer system concurrently. Time-sharing system
can be classified as multi-user systems as they enable a multiple user access to a
computer through the sharing of time. Single-user operating systems, as opposed to a
9
multi-user operating system, are usable by a single user at a time. Being able to have
multiple accounts on a Windows operating system does not make it a multi-user system.
Rather, only the network administrator is the real user. But for a Unix-like operating
system, it is possible for two users to login at a time and this capability of the OS makes
it a multi-user operating system.
Embedded System: The operating systems designed for being used in embedded
computer systems are known as embedded operating systems. They are designed to
operate on small machines like PDAs with less autonomy. They are able to operate with a
limited number of resources. They are very compact and extremely efficient by design.
Windows CE, FreeBSD and Minix 3 are some examples of embedded operating systems.
10
In a multitasking operating system where multiple programs can be running at the same time,
the operating system determines which applications should run in what order and how much
time should be allowed for each application before giving another application a turn.
It manages the sharing of internal memory among multiple applications.
It handles and monitors input and output to and from attached hardware devices, such as hard
disks, printers etc
It sends messages to each application or interactive user (or to a system operator) about the
status of operation and any errors that may have occurred.
It can offload the management of what are called batch jobs (for example, printing) so that
the initiating application is free from this work.
On computers that can provide parallel processing, an operating system can manage how to
divide the program so that it runs on more than one processor at a time.
Scheduling the activities of the CPU and resources to achieve efficiency and prevention of
progress.
The operating system used by the Esoft lab is the Microsoft windows XP professional version
2002 in service pack 3. It increases the security, performance, stability better than to Windows
XP. Windows XP Professional primarily for software professionals and entrepreneurs all the
features of XP Professional come with more high tech features. Microsoft launched XP to
introduce a completely user friendly graphical interface that was complete stable, Microsoft XP
boot process is so quick that within seconds the applications open up a second major advantage.
Microsoft XP runs on almost every computer with AMD or an Intel processor. Windows XP is
Microsoft one of the best operating system till date.
References
homepages.uel.ac.uk
www.comptechdoc.org
cinformation.blogspot.com
www.wisegeek.com
www.buzzle.com
11
TASK 04
Understand How to Customize Operating System
By searching about the history files of the main lab, the following findings were gathered
regarding the operating system.
In the past they have used Microsoft Windows 98 and Windows XP operating system in the
laboratory. And now in the main lab, the operating system is the Microsoft windows XP
professional version 2002. In the period of using windows 98, the performance was low. But due
to the increase in student population as well the innovation in the software field they used new
operating system like Microsoft Windows XP. This is helpful for the students to make use with
the new software rather than working with windows 98. Yet the usage of the windows XP even
expired based on the new technology. Therefore a suggestion can be made to introduce ether
windows 7 or vista as the new operating system for the Esoft lab.
TASK 05
Investigate and Identify the Key Components for a Computer System for Particular Users
The investigation of the particular components and the users of the computer system were done
by using the particular system in the Esoft computer labs. Accordingly, the description of the
system components and the particular users can be identified as follows.
Main Computer Lab
The users of the main lab are mainly the Ditec students while sometimes the ICDL students do.
Apart from that if any student wants to browse internet they should use the computer main lab in
order of getting their task done. Therefore this lab is not in a need of having the high
performance computers for the students. Thus they use the Pentium 4 machines and the
computers have 512MB RAM, 64MB VGA cards, network cards and optical mouse etc
Since most of the students use internet from this main lab all the machines are being networked
by the administrators. Therefore the network card has become one of the most essential
12
components for the main lab. But when it comes to the RAM capacity of the main lab, the RAM
size is being used is 512MB which sometimes makes the process of data processing speed low.
Therefore there is a need of increasing the Ram level of the main computer lab in order to get the
students the ease of using the lab.
For example when the students using the programs like Photoshop, it is easy if the computer
RAM level is been increased up to the level where students can get the task done more easily.
High processing speed of the machine also will make the time consumption of the students in lab
low where lot of them will get the chance of using the computer main lab.
Lab No. 01
The main purpose of the Lab No. one is to have applications like Oracle and Networking.
Therefore the system which is been used in this lab is with high performance computers like with
dual core processors, 2GB RAM with LCD monitors and the operating system is Windows 7.
As per the components of the system mainly the high speed RAM i.e. 2 GB is used in the lab to
make the users very easy to process with the above applications. This is because both the RAM
and the VGA card should be with a good speed and a capacity to process with the applications
such as Oracle.
Yet there is one drawback which can be identified in this lab. i.e. not having the internet facility.
Due to this reason students have to always go for the main computer lab to browse with the
internet. But if they can use the same lab at the same time to browse the internet also it will give
the time efficiency as well the effectiveness of the work been done.
Lab No. 02
The students who use the lab no. 2 are the person who follows the courses such as BCS plus,
HND and O/L ICT courses.
The main components of these computers are the RAM and the VGA card been used for the
machines. The speeds of these components are enough for the applications since these students
go up to the level of multimedia and C sharp applications. Therefore this lab doesnt in a need of
having high performance computers like in lab no. 1. Apart from these applications in this lab,
sometimes the accounts and hardware classes also conducted by the lecturers.
By and large, it is visible that the key components used in theses labs depend upon the users as
well as the applications used by the users in order to perform their tasks.
13
TASK 06
A New Computer System to the Organization to Increase the Efficiency and Reduce the
Cost
Any organization may suppose to introduce new computer systems in order to increase the
performance and to reduce the cost of its operations. In order to do so there are mainly three
steps available in developing a new computer system. Therefore if the organization wish to have
a good computer operating system it is important to follow the following steps of obtaining it.
Requirement analysis
Hardware design
Software design
Requirement Analysis
requirements of the users it will not be an effective system. Since this is the proposal to
design a system for the main computer lab depending on the students who are using the
computers, it can be suggested that there is no need of having computers with lot of
capacity to have high performance. In most of the times the main lab is been used by the
Ditec students and they do not require very high end computers.
Hardware Design
Machine Speed
Change in the machine speed makes the tasks easy. But it will be a very time wasting and
very expensive investment. If the lab users want to have a great speed at the machine, it is
better to increase the speed. But if the lab is for the general purpose, not for hard
applications there is no necessity of increasing the machine speed. The machine speed
depends on several factors such as processor speed, RAM capacity and speed, BUS speed
and software compatibility etcSince the proposed new system will be implemented at
the main lab and the lab is been used by mainly the ditec students the current machine
speed will give the same benefit rather than increasing the speed with a huge investment.
data capacity will be enough as 40 GB. But if the users are supposed to have applications
like videos, multimedia and huge software, it will increase the requirement level of the
data storage capacity. Therefore not for the all machines, I would suggest a higher storage
capacity for example 160 GB capacity for certain machines in the main lab in order to use
it for the high resolution applications.
Therefore when selecting any special hardware the above criteria should be considered
very carefully in order to get success with the implementation of the new computer
system.
Software Design
Installation of the correct software to the computer system is also very important as much as the
hardware system components. Therefore it is very vital to select the correct software needed by
the users of the lab. Installation of the unnecessary software will reduce the storage capacity of
the machines rather giving any benefit to the users. In the main lab ditec students just want to
have very simple applications such as the office applications. Therefore I would suggest having
more than one version of office packages like Microsoft Office 2003 and Microsoft Office 2007.
Sometimes students need special software to work with the particular assignments. But
we should install this software in a reliable mode to the system. But most of this software
comes under the system software such as;
Ex Anti virus
Firewall
Utility software (Esoft)
New Computer System to the Esoft Main Lab
According to the analyzed scenario above the suggested system for the Esoft main lab can be
mentioned as follows. This new system was designed for the main lab and mainly for the ditec
students who use main lab system for their learning.
This is the computer system
Processor
Intel dual core 2.0 GHz processor
RAM
1 GB DDR2
VGA
64 MB
Hard disk
80 GB
Sound card
Onboard
Network card
Onboard
Monitor
CRT monitors
Keyboard
PS2 or USB keyboard
Mouse
Optical mouse
One printer to the whole lab
One DVD writer to whole lab
The suggested software are as follows:
Operating system
Software
References
Esoft. Computer Platfroms.
17
TASK 07
Produce a Plan That Checks the Main Hardware and Software Components Using
Standards Techniques
Software testing is an investigation conducted to provide stakeholders with information about the
quality of the product or service under test. Software testing can also provide an objective,
independent view of the software to allow the business to appreciate and understand the risks of
software implementation. Test techniques include, but are not limited to, the process of executing
a program or application with the intent of finding software bugs (errors or other defects).
Software testing can be stated as the process of validating and verifying that a software
program/application/product:
1. meets the requirements that guided its design and development;
2. works as expected; and
3. can be implemented with the same characteristics.
Software testing, depending on the testing method employed, can be implemented at any time in
the development process. However, most of the test effort occurs after the requirements have
been defined and the coding process has been completed. As such, the methodology of the test is
governed by the software development methodology adopted.
There are certain methods of software testing and mainly there are two methods which can be
identified.
Black box testing
Black-box testing, also called behavioral testing, focuses on the functional requirements of the
software. That is, black-box testing enables the software engineer to derive sets of input
conditions that will fully exercise all functional requirements for a program. Black-box testing is
not an alternative to white-box techniques. Rather, it is a complementary approach that is likely
to uncover a different class of errors than white-box methods.
Black-box testing attempts to find errors in the following categories:
18
1.
2.
3.
4.
5.
19
TASK 08
Produce User Documentation for Your System
Students are not allowed to use mobile phones inside the laboratory.
Please keep silence inside the laboratory.
Inside the laboratory new user can follow this user guide he/she can use computer system
properly. These are the main points.
Locate the monitor an L shaped desk parallel with the keyboard location.
And you must adjust the distance of your face and monitor like face of the monitor is at least full
arms length away from your seated position.
References
www.monash.edu.au
21
TASK 09
Produce a Security Policy for Your System
Computer security is the process of preventing and detecting unauthorized use of your computer.
Computer security is a branch of computer technology known as information security as applied
to computers and networks. The objective of computer security includes protection of
information and property from theft, corruption, or natural disaster, while allowing the
information and property to remain accessible and productive to its intended users.
These are the ways of security in computing.
Trust all the software to abide by a security policy but the software is not trustworthy
Trust all the software to abide by a security policy and the software is validated as trustworthy
Trust no software but enforce a security policy with mechanisms that are not trustworthy
Trust no software but enforce a security policy with trustworthy
Computer security will be attacked by any of these methods mentioned below:
- Hardware failure
- Virus attacked
- Application errors
- User errors
- Facing disasters
Therefore as per the new system of security in the computer lab following areas are suggested:
Maintaining Backups
A backup or the process of backing up refers to making copies of data so that these additional
copies may be used to restore the original after a data loss event. Backups have two distinct
purposes. The primary purpose is to recover data as a reaction to data loss, be it by data deletion
or corrupted data. Data loss is a very common experience of computer users. The secondary
purpose of backups is to recover data from a historical period of time within the constraints of a
user-defined data retention policy, typically configured within a backup application for how long
22
copies of data are required. The suggested storage Medias for the backups is hard disk, other
removable disks, rewritable CDs and DVDs and network locations.
Data Recovery
Data recovery means by recovery lost or damage data again for that we made have to use special
software and techniques.
These are the recovery methods to be followed:
- Hardware repair
- Disk imaging
- Consistency checking
- Data carving
Antivirus Software
Using antivirus software we can prevent detects and removes computer viruses. And it also
removes adware, spyware and malwares. Using that software we can secure data from viruses.
As a result of virus attacked some time unauthorized person have to chance access our programs
without permission and computer speed become very slow. Therefore in the suggested system,
antivirus software also has been included for the security purpose of the system.
Access Controlling
Controlling the access of the information for users is another way to have a great security over
the information been used. Sometimes unauthorized people may do unnecessary processing of
information and this can be controlled by restricting the access of information for the users. For
some files only lecturers will have the access and the students will be permitted to access certain
data only.
Insure the Organization
In order to have the security over the physical components of the organization it is wise to have a
insurance been made over the organization. This will cover the firm in a situations where they
face natural disasters, fire etc This will also make them free from the financial constraints in
such situation.
23
References
Esoft. Computer Platfroms.
www.wikipedia.org
TASK 10
Demonstrate That the System Meets Health and Safety
Many students use computers or visual display units (VDUs) as part of their course. Most suffer
no ill-effects. VDUs don't give out harmful levels of radiation and rarely cause skin complaints.
For example, students might suffer from strain in the back of the hand due to excessive 'mouse'
clicking, or stress or neck ache if you use a VDU without a break for a long time. Problems like
these can be avoided by a well-designed computer lab environment.
For the health and safety of the students following suggestions could be made.
The display screen
This should:
The keyboard
This should:
24
be tiltable and separate from the screen to allow the user to adopt a comfortable working
position
have a space in front to provide support for the hands or arms of the user
have a stable, adjustment document holder, which should be at the same level as the
screen and at the same viewing distance.
provide sufficient space for the user or the operator to alter position comfortably
lighting must be adequate with suitable contrast between the screen and background
windows should be fitted with adjustable coverings to alter the daylight level.
References
www.atl.org.uk
www.learninglink.ac.uk
http://ictknowledgebase.org.uk/healthandsafety
https://msds.open.ac.uk/your-record/health.htm
25