0% found this document useful (0 votes)
17 views

Application Assignment

This document contains a group assignment for a computer applications module at the University of Dar-es-Salaam Computing Center. The assignment includes questions on topics like the internet, domain name systems, IP addresses, search engines, online chatting vs social media, and the benefits of email for business. It lists the names and registration numbers of 9 students in the group. Additionally, it covers preventative maintenance for PCs, common PC issues and solutions, and applying the six-step troubleshooting process to resolve computer component problems.

Uploaded by

johnkiduge
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

Application Assignment

This document contains a group assignment for a computer applications module at the University of Dar-es-Salaam Computing Center. The assignment includes questions on topics like the internet, domain name systems, IP addresses, search engines, online chatting vs social media, and the benefits of email for business. It lists the names and registration numbers of 9 students in the group. Additionally, it covers preventative maintenance for PCs, common PC issues and solutions, and applying the six-step troubleshooting process to resolve computer component problems.

Uploaded by

johnkiduge
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

UNIVERSITY OF DAR-ES-SALAM

COMPUTING CENTER

MODULE CODE: CTT 04105


MODULE NAME: COMPUTER APPLICATION
LECTURE: MADAM BEATRICE
CLASS: CA30
GROUP ASSIGNMENT: 2
NAME: JOHN PHILIP KIDUGE
YEAR: 2023/2024
QUESTIONS

1.What is internet?
2. With example define domain name system?
3. Define IP address and write four properties of IP Address
4. What is the function of Search Engine?
5. Describe the difference between Online Chatting and
Social Networking Services
6. Describe the roles of Web crawler in Search Engines
7. Provide advantages and disadvantages of Internet
8. Describe the benefits of using email in a Business

Name Registration no
JOHN PHILIP KIDUGE 01-0923-01-81538
MANDALANGA CHRISTOPHER 01-0923-01-80613
MWINYIAMANI MWINYIJUMA 01-0923-01-81069
JERRY EDWIN 01-0923-01-81613
MOHAMED OMARY HOZA 01-0923-01-
JEREMIAH WOMMY MSUKU 01-0923-01-
RAHMA IDDY 01-0923-01-811143
JEPHTAH OSWARD 01-0923-01-80882
LUQMAN BAKARI 01-0923-01-80624
COLLINS FEDRICK 01-0923-01-
PREVENTATIVE MAINTANANCE
1. Explain why preventive maintenance must be performed on personal computers.
 Increased Reliability: Regular preventive maintenance helps identify and address
potential issues before they escalate, ensuring that the personal computer operates
reliably. This includes tasks like cleaning components and checking for loose
connections.
 Extended Lifespan: Performing preventive maintenance can prolong the lifespan of a
personal computer by addressing wear and tear, preventing overheating, and ensuring
optimal performance. This can save costs associated with frequent replacements.
 Enhanced Performance Regular maintenance, such as updating software, removing
unnecessary files, and optimizing settings, contributes to improved performance. This
ensures that the computer operates at its best capacity for a longer duration.
 Data Security: Maintenance activities often involve updating antivirus software,
checking for security vulnerabilities, and implementing patches. This helps protect
personal computers from malware and other security threats, safeguarding sensitive
data stored on the device.

2. Describe PC preventive maintenance


 Computer in optimal condition. Here are key components of preventive maintenance:
PC preventive maintenance involves a set of routine tasks aimed at keeping a personal
 Software Updates: Regularly update the operating system, antivirus software, and other
applications to ensure the latest security patches and features are in place.
 Disk Cleanup: Remove unnecessary files and applications to free up disk space,
enhancing overall system performance.
 Defragmentation: Periodically defragment the hard drive to organize data more
efficiently and improve access speeds.
 Check for Malware: Run regular scans with up-to-date antivirus software to detect and
remove any malicious programs that may compromise the system.
 Backup: Schedule regular backups of important data to prevent data loss in case of
hardware failure, accidental deletion, or other unforeseen issues.
 Hardware Inspection: Physically inspect the computer components, checking for dust
buildup, loose connections, and signs of wear. Clean vents and fans to prevent
overheating.
 Update Drivers: Ensure that all hardware drivers are up to date to maintain
compatibility and resolve potential issues.
 Check for Software Conflicts: Identify and resolve any conflicts between installed
applications that could impact system stability.

TROUBLESHOOTING PROCESS
1) Describe each step of the troubleshooting process
I. Identify the Problem:
 Define the specific issue with the computer component or peripheral.
 Determine when the problem started and any changes that may have occurred.
II. Establish a theory of probable cause
- This depends to some of probable cause. an establishment would include to
know
 Device is powered off
 Power switches for an outlet is turned off
 Surge protector is turned off
 Loose external cable connection
 Non- bootable disk in designated boot drive
 Incorrect boot order in BIOS setup
III. Test the theory to determine cause
- Test of theory help you after knowing the probable cause within theory through
troubleshooting. Therefore Test can help you to know the following include
 Ensure the device is powered on
 Ensure the power switches for an outlet is turned on
 Ensure the surge protector is turned on
 Ensure external cable connection are secure
 Verify boot order in BIOS setup
IV. Establish a plan action to resolve the problem and implement the solution
- In this stage it depends if there’s no solution do achieved in previous stage
therefore it will required as to generate further research needed to implement
solution such as
 Computer manuals
 Online forums
 Internet search
V. Verify full functionality and if applicable implement preventative measure
- In these stage will show how troubleshooting can be able for verification due for
knowing some steps for troubleshooting as well as possible cause that occur?
Therefore verification can be for
 Reboot the computer
 Ensure multiple application work properly
 Verify network and internet connection
 Print a document from one application
 Ensure all attached files worked properly
 Ensure no error message are received
VI. Documents finding action and outcomes
- Through these steps enable to provide your solving to solution to the problem
solving due to the other last steps that you have been purified, it enable to
 Discuss the solution implemented with the costumer.
 Have the costumer verify that the problem has been solved
 Provide the costumer with all paperwork
 Documents any component used in the repair
 Documents that amount of time spent to resolve the problem

2) Identify common problems and solutions for PCs.


 Slow Performance
 Problem: Sluggish operation, slow program response.
 Solution
- Check for malware using antivirus software.
- Free up disk space by removing unnecessary files.
- Upgrade RAM or consider optimizing startup programs.
 Internet Connection Issues:
 Problem: No internet or intermittent connectivity.
 Solution:
- Restart the router and modem.
- Check network cables and connections.
- Update network drivers.
 Blue Screen of Death (BSOD):
 Problem: System encounters a critical error, leading to a blue screen.
 Solution:
- Analyze error codes displayed on the BSOD.
- Update or roll back problematic drivers.
- Check for hardware issues, such as faulty RAM.
3) Troubleshoot computer components and peripherals using the six-step troubleshooting
process
i. Identify the Problem:
 Define the specific issue with the computer component or peripheral.
 Determine when the problem started and any changes that may have occurred.
ii. Establish a theory of probable cause
- This depends to some of probable cause. an establishment would include to
know
 Device is powered off
 Power switches for an outlet is turned off
 Surge protector is turned off
 Loose external cable connection
 Non- bootable disk in designated boot drive
 Incorrect boot order in BIOS setup
iii. Test the theory to determine cause
- Test of theory help you after knowing the probable cause within theory through
troubleshooting. Therefore Test can help you to know the following include
 Ensure the device is powered on
 Ensure the power switches for an outlet is turned on
 Ensure the surge protector is turned on
 Ensure external cable connection are secure
 Verify boot order in BIOS setup
iv. Establish a plan action to resolve the problem and implement the solution
- In this stage it depends if there’s no solution do achieved in previous stage
therefore it will required as to generate further research needed to implement
solution such as
 Computer manuals
 Online forums
 Internet search
v. Verify full functionality and if applicable implement preventative measure
- In these stage will show how troubleshooting can be able for verification due for
knowing some steps for troubleshooting as well as possible cause that occur?
Therefore verification can be for
 Reboot the computer
 Ensure multiple application work properly
 Verify network and internet connection
 Print a document from one application
 Ensure all attached files worked properly
 Ensure no error message are received
vi. Documents finding action and outcomes
- Through these steps enable to provide your solving to solution to the problem
solving due to the other last steps that you have been purified, it enable to
 Discuss the solution implemented with the costumer.
 Have the costumer verify that the problem has been solved
 Provide the costumer with all paperwork
 Documents any component used in the repair
 Documents that amount of time spent to resolve the problem

You might also like