0% found this document useful (0 votes)
5 views

Hphone Myint Moh( Computer System Assignment)

The document outlines the requirements for updating IT infrastructure in a software company, detailing current problems, necessary systems, and non-functional requirements. It includes specifications for hardware and software installations, as well as a critical evaluation of system components. The document emphasizes the importance of performance, security, and usability in the design and maintenance of IT systems.

Uploaded by

Hphone Myintmoh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Hphone Myint Moh( Computer System Assignment)

The document outlines the requirements for updating IT infrastructure in a software company, detailing current problems, necessary systems, and non-functional requirements. It includes specifications for hardware and software installations, as well as a critical evaluation of system components. The document emphasizes the importance of performance, security, and usability in the design and maintenance of IT systems.

Uploaded by

Hphone Myintmoh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 42

Table of Contents

Task 1 – Updating IT Infrastructure....................................................................................................1


Part a) Outline Requirement Specification.......................................................................................1
Introduction..........................................................................................................................................1
Outline of the industry and organization’s business.................................................................1
Systems needed to support the business....................................................................................1
Outline of current problems.............................................................................................................2
Outline list of system functions:.....................................................................................................2
Information sharing and server management:........................................................................2
Storage and Management of Data:.............................................................................................2
Monitoring of Network Infrastructure:.......................................................................................3
Database management and market research:.........................................................................3
Outline list of non-functional requirement...................................................................................3
Performance:...................................................................................................................................3
Security:............................................................................................................................................3
Scalability:........................................................................................................................................3
Usability:...........................................................................................................................................4
Dependability:..................................................................................................................................4
Appendix...................................................................................................................................................4
(a) Explanation of the importance of CPU type (Single/Multi-core), RAM and Disk space
in the performance of system..........................................................................................................4
CPU Type (Single/Multi-core):.....................................................................................................4
RAM (Random Access Memory):................................................................................................5
Disk Space:......................................................................................................................................5
(b) Discussion of disk space organized for my software company.......................................5
Part b) System Design Specification.................................................................................................6
Part c) Critical Evaluation and System Selection...........................................................................8
Task2- Windows Installation..............................................................................................................11
(a) Installation of window....................................................................................................................11
(1) Key State of installation............................................................................................................11
2. Device drivers and their source locations.............................................................................23
3. Unresolved issues – especially missing device drivers.....................................................24
(b) Antivirus Software Installation....................................................................................................25
1. Identification of product used...................................................................................................25
2. Identification and description of key stages in installation........................................................25
3. Identification and description of problems and unresolved issues................................31
4. Outline of the update process for Avast:...............................................................................31
c) Installation of office software........................................................................................................32
(1) Identification of product used.................................................................................................32
(2) Identification and description of key stages in installation.............................................32
3. Identification and description of problems and unresolved issues................................33
(d) Installation of free utility...............................................................................................................34
2. Key state of installion..................................................................................................................34
(3)Identification and description of problems and unresolved issues................................38
Task-3 Faulty PCs and Software Maintenance..............................................................................38
Faulty PCs..........................................................................................................................................38
Maintenance of Computer System...............................................................................................39
Preventative maintenance..............................................................................................................39

Task 1 – Updating IT Infrastructure

Part a) Outline Requirement Specification

Introduction

I am an IT advisor in a small software company. A software engineering firm is tasked with


crafting and upkeeping software applications. We collaborate with clients to comprehend their
requirements and subsequently devise tailored solutions. Additionally, a company remains
committed to delivering continual support and upkeep for the software we produce. In order for
software teams to operate independently, they require an adaptable technological framework.
Essential elements of this framework encompass APIs capable of reaching the foundational
data, algorithms, and procedures within legacy systems. Distributing software on a large scale
differs significantly from selling the majority of other goods. For instance, unlike most non-
software enterprises that employ cost-plus pricing strategies centered on margins, software, due
to its minimal incremental costs post-development, necessitates pricing strategies grounded in
the value it delivers to the customer.
Outline of the industry and organization’s business

There are computers and server machines within our network. Servers facilitate the sharing of
information and essential files needed to sustain the operations of our company. Data
management is handled by software and stored in storage devices. An enterprise application is
an extensive software solution designed to address the challenges faced by the entire
organization. Networking platforms comprise operating systems such as Windows Server OS,
Linux, Unix, and various others. Major components of the internet relate to and sometimes
overlap with network infrastructure and hardware and software platforms.

Systems needed to support the business

Software for market research facilitates statistical analysis of data, allowing the company to
correlate consumer behavior with highly specific geographic, demographic, and psychographic
variables. Database marketing depends on the gathering and utilization of extensive databases
to categorize potential customers and communicate with them using personalized promotional
information.

Outline of current problems

The primary obstacle in integration lies in its concealed nature throughout the software
development process, only surfacing towards the conclusion. This results in supplementary
expenses, delays, diminished quality, and occasionally, project failure. Addressing
contemporary technology demands, including prioritizing mobile and desktop compatibility,
frequently poses a challenge. If your workforce lacks practical expertise in current technology
trends, it is likely to impact the speed at which your product reaches the market.
Evaluating a software system within a controlled setting presents challenges because the user
is not fully engaged in a genuinely realistic work scenario. It is impractical to gauge how a user
will interact with the application under various circumstances on a regular basis until it is put into
operation.

Outline list of system functions:


Information sharing and server management:

Maintain and manage servers to provide effective information sharing.


Make that all of the network's server computers are operating properly.
To maintain business operations, provide smooth communication and data interchange.

Storage and Management of Data:

Put technological solutions in place for efficient data administration.


To safely store and arrange important data, make use of storage devices.
Make that backup plans, accessibility, and data integrity are all met.
The development and integration of enterprise applications.
Provide comprehensive software solutions that are designed to benefit the entire company.
In order to overcome organisational obstacles, integrate corporate applications.
Utilise digital tools to improve productivity and streamline procedures.

Monitoring of Network Infrastructure:

Oversee operating systems (such as Windows Server OS, Linux, and Unix) and networking
platforms.
Make that the network infrastructure is secure and stable.
Deal with problems pertaining to communication and connection inside the company.

Database management and market research:

Utilise statistical software to analyse market research data.


Databases may be used to classify prospective clients in order to conduct focused marketing.
Encourage targeted advertising campaigns that are based on the demographics and behaviour
of your customers.
Outline list of non-functional requirement

Performance:

Response Time: To guarantee a flawless user experience, the system must react to user
activities in no more than two seconds.
Throughput: During periods of high demand, the system should be able to process at least 100
transactions per second.

Security:

Data Encryption: Industry-standard methods should be used to encrypt any sensitive data being
transferred across a network.
Access Control: To protect the integrity and security of data, user access should be role-based
and subject to stringent restrictions.

Scalability:

Horizontal scaling: As the user base expands, the system should be able to accommodate the
addition of more servers to help spread the load and guarantee peak performance.

Usability:

User Interface Consistency: To improve user familiarity and minimise the requirement for
training, the user interfaces of various modules should have a uniform design.
Helpdesk Response Time: In order to offer effective service, the helpdesk should reply to user
questions or concerns within 24 hours.

Dependability:

Availability: Users should be informed in advance of scheduled maintenance windows, and the
system should be up and running 99.9% of the time.
Backup and Recovery: In the case of a breakdown, the system should be able to be restored
within four hours. Regular backups should also be carried out.

Appendix
(a) Explanation of the importance of CPU type (Single/Multi-core),
RAM and Disk space in the performance of system

The CPU (Central Processing Unit), RAM (Random Access Memory), and Disk Space are
crucial components of a computer system, and their specifications play a significant role in
determining the overall performance and efficiency of the system.

CPU Type (Single/Multi-core):

Importance: The CPU is often referred to as the "brain" of the computer, responsible for
executing instructions and processing data. The type of CPU, specifically whether it is a single-
core or multi-core processor, is critical for system performance.
Single-core: Older systems may have single-core processors, capable of handling one task at a
time. However, modern applications, especially those designed for multitasking and parallel
processing, benefit significantly from multi-core processors.
Multi-core: Multi-core processors can handle multiple tasks simultaneously, improving overall
system responsiveness and the ability to run resource-intensive applications concurrently.
Tasks such as video editing, gaming, and virtualization benefit greatly from multi-core
architectures.

RAM (Random Access Memory):

Importance: RAM is the memory used by the computer to store data that is actively being used
or processed. It is volatile memory, meaning it is cleared when the system is powered off. The
amount and speed of RAM have a direct impact on system performance.
Amount of RAM: Sufficient RAM allows the system to run multiple applications simultaneously
without slowing down. Inadequate RAM can lead to slowdowns and even system crashes,
especially when dealing with memory-intensive tasks.
RAM Speed: Faster RAM enables quicker access to data, improving the speed at which
applications load and run. It is particularly important for tasks that involve large datasets or
complex calculations.

Disk Space:
Importance: Disk space refers to the storage capacity of the computer's hard drive or solid-state
drive (SSD). It is where the operating system, applications, and user data are stored.
Operating System and Software Installation: A sufficient amount of disk space is required for the
installation of the operating system and software applications. Running out of disk space can
hinder system updates and the installation of new software.
Data Storage and Retrieval: Adequate disk space is crucial for storing user data, documents,
multimedia files, and other content. Insufficient space can lead to performance issues and may
limit the ability to save or download files.
In summary, the CPU type, amount and speed of RAM, and available disk space collectively
contribute to the overall performance and functionality of a computer system. Upgrading these
components, when necessary, can enhance system speed, responsiveness, and the ability to
handle modern computing demands.

(b) Discussion of disk space organized for my software company

In our software company, meticulous disk space organization is pivotal for an efficient
computing infrastructure. We allocate dedicated segments for critical functions—source code
repositories in development, ensuring collaborative version control, and segregated areas for
build artifacts. Testing environments have designated space for test data and results, facilitating
rigorous quality assurance. Deployment areas are structured with distinct space for software
packages and versioned releases, enabling seamless distribution. Monitoring systems benefit
from allocated space for logs and metrics, providing comprehensive performance oversight.
Backup and recovery processes are managed with dedicated space for regular backups and
organized recovery points, ensuring data integrity. This strategic approach underpins the
reliability, scalability, and streamlined functionality of our software development lifecycle.

Part b) System Design Specification

Standard specifications
The following minimal system specifications, which are given in the table below, will be
necessary for the system that the firm will shortly be using.
Feature Description
Operating System Window 10
Processor Type and Generation Core i5 and 6Gen
Processor Speed 1.20 GHz
Processor Core Dural-Core
Memory (RAM) 8 GB
Storage Windows OS: 128 GB of available disk space
Display 1280 x 768
Network & Communication Wireless and Fast Ethernet
Browser Microsoft edge, chrome and fire fox
.Net version .net 3.5 or 4.6
Security Anti-virus software
Others Database Management, Networking

Product A Product A Product B Product B


Price Price
CPU Model: Intel Core i5, 6th (172.18 £) Type: DDR4 (240.25£)
Gen,Cores: Quad-Core, Capacity: 32 GB (2 x 16GB)
Clock Speed: 2.40 GHz, Speed: 3600 MHz
Cache: 6 MB, CAS Latency: 18
Socket Type:LGA1151, Manufacturer: G.SKILL
Manufacturer: Intel
Motherboard Model: ASUS Prime Z390-A (140.45 £) Model: MSI B450 (123.63£)
Form Factor: ATX TOMAHAWK MAX
Socket Type: LGA 1151 Form Factor: ATX
RAM Slots: 4 DDR4 Socket Type: AM4
Expansion Slots: PCIe x16, RAM Slots: 4 DDR4
PCIe x4, PCIe x1 Expansion Slots: PCIe x16,
USB Ports: Multiple USB 3.1 PCIe x4, PCIe x1
and 2.0 ports USB Ports: Multiple USB
Manufacturer: ASUS 3.2 and 2.0 ports
Manufacturer: MSI
Ram Type: DDR4 (75.9£) Type: DDR4 (140.5£)
Capacity: 16 GB (2 x 8GB) Capacity: 32 GB (2 x 16GB)
Speed: 3200 MHz Speed: 3600 MHz
CAS Latency: 16 CAS Latency: 18
Manufacturer: Corsair Manufacturer: G.SKILL
SSD Model: Samsung 970 EVO (98.32£) Model: Western Digital Blue (125£)
Plus SN550
Capacity: 500 GB Capacity: 1 TB
Interface: NVMe M.2 Interface: NVMe M.2
Read Speed: Up to 3,500 Read Speed: Up to 2,400
MB/s MB/s
Write Speed: Up to 3,300 Write Speed: Up to 1,950
MB/s MB/s
Manufacturer: Samsung Manufacturer: Western
Digital
HDD Model: Seagate Barracuda (49.03£) Model: WD Blue (80.12£)
Capacity : 2 TB Capacity: 4 TB
Speed: 7200 RPM Speed: 5400 RPM
Cache: 256 MB Cache: 64 MB
Form Factor: 3.5 inches Form Factor: 3.5 inches
Manufacturer: Seagate Manufacturer: Western
Digital
UPS Model: APC Back-UPS Pro (210.02£) Model: CyberPower (190.1£)
1500VA CP1500AVRLCD
Capacity: 1500 VA / 865 Watts Capacity: 1500 VA / 900
Outlets: 10 Watts
Battery Runtime: Varies based Outlets: 12
on load Battery Runtime: Varies
Surge Protection: Yes based on load
Manufacturer: APC Surge Protection: Yes
Manufacturer: CyberPower
Power Model: EVGA SuperNOVA (78£) Model: Corsair RM750x (97.23£)
650 G5 Wattage: 750 Watts
Supply
Wattage: 650 Watts Efficiency: 80 PLUS Gold
Efficiency: 80 PLUS Gold Modular: Fully modular
Modular: Fully modular Manufacturer: Corsair
Manufacturer: EVGA
Monitor Model: Dell UltraSharp (275.01£) Model: ASUS VG279Q (250.21£)
U2719D Size: 27 inches
Size: 27 inches Resolution: 1920 x 1080
Resolution: 2560 x 1440 Refresh Rate: 144 Hz
Refresh Rate: 60 Hz Panel Type: IPS
Panel Type: IPS Manufacturer: ASUS
Manufacturer: Dell
Mouse and Model: Logitech MK270 (30.38£) Mouse Model: Razer (180.55£)
Wireless Keyboard and Mouse DeathAdder Elite
Keyboard
Combo Keyboard Model: Corsair
Connection: Wireless K95 RGB Platinum XT
Features: Compact design, Connection: Wired
long battery life Features: Gaming-centric
Manufacturer: Logitech design, customizable RGB
lighting
Manufacturers: Razer
(Mouse) and Corsair
(Keyboard)
Part c) Critical Evaluation and System Selection

1. CPU: AMD Ryzen 5 3600


Reasons:
Performance: The AMD Ryzen 5 3600 offers superior performance with a higher clock speed
(3.60 GHz) and more cores (Hexa-Core) compared to the Intel Core i5, 6th Gen. This is
particularly advantageous for multi-threaded tasks and modern applications.
Modern Architecture: The Ryzen 5 series features a more recent architecture, providing better
support for newer technologies and potential future software updates.
2. Motherboard: ASUS Prime X570-P
Reasons:
Compatibility: The ASUS Prime X570-P is designed for AMD processors, ensuring seamless
compatibility with the chosen AMD Ryzen 5 3600 CPU.
Expansion Options: It provides ample PCIe lanes and USB ports, offering excellent expansion
options for future upgrades. This enhances the system's scalability and adaptability to evolving
hardware requirements.

3. RAM: G.SKILL 32GB (2 x 16GB), DDR4 3600 MHz

Reasons:

Capacity and Speed: The 32GB capacity and 3600 MHz speed deliver a balance of ample
memory for multitasking and high-speed data access, enhancing overall system performance.
Performance: G.SKILL is a reputable brand known for manufacturing high-performance memory
modules, ensuring reliability and optimal system responsiveness.

4. SSD: Samsung 970 EVO Plus, 500GB

Reasons:
Performance: The Samsung 970 EVO Plus provides superior read and write speeds compared
to the WD Blue SN550, resulting in faster data access and improved system responsiveness.
Reliability: Samsung SSDs are renowned for their reliability, durability, and consistent
performance over time.

5. HDD: Seagate Barracuda, 2TB

Reasons:

Speed and Cache: The Seagate Barracuda's 7200 RPM speed and 256 MB cache offer faster
data access, making it suitable for tasks requiring quick retrieval of large files or data.
Reputation: Seagate is a well-established brand known for producing reliable and durable hard
drives.

6. UPS: APC Back-UPS Pro 1500VA

Reasons:

Capacity: The APC Back-UPS Pro 1500VA provides a substantial capacity of 1500 VA / 865
Watts, ensuring sufficient power backup during outages.
Surge Protection: APC is recognized for manufacturing reliable UPS solutions with effective
surge protection features, safeguarding connected devices from power fluctuations.

7. Power Supply: EVGA SuperNOVA 650 G5, 650W

Reasons:

Adequate Wattage: The 650W wattage is suitable for the system's power requirements,
providing a reliable and stable power supply for the components.
Modularity: The fully modular design allows for cleaner cable management, improving airflow
within the system and enhancing overall aesthetics.
Reputation: EVGA is a trusted brand known for producing high-quality and reliable power
supplies.
8. Monitor: Dell UltraSharp U2719D, 27"

Reasons:

Resolution and Panel Type: The Dell UltraSharp U2719D offers a higher resolution (2560 x
1440) and features an IPS panel, delivering superior image quality, color accuracy, and wider
viewing angles.
Reputation: Dell UltraSharp monitors are known for their exceptional build quality, reliability, and
suitability for professional tasks such as content creation and design.

9. Mouse and Keyboard: Logitech MK270 Wireless Combo

Reasons:

Wireless Convenience: The Logitech MK270 Wireless Combo provides the convenience of
wireless connectivity for both the mouse and keyboard, reducing cable clutter and offering
flexibility in positioning.
Brand Reputation: Logitech is a well-established and trusted brand, known for manufacturing
reliable and durable input devices, ensuring a positive user experience.
Task2- Windows Installation

(a) Installation of window

(1) Key State of installation

Before placing my USB drive into the computer to install it when the boot disc is ready, be sure
that no other USB drives are connected in.

After selecting my preferred language, time zone, and keyboard input, click "Next".

Fig-1
And then, click “Install Now”.

Fig-2

I'll then be prompted to input an activation key. If I already have a copy, I may input it right now.
Click "I don't have a product key" if it isn't.

Fig-3
Click “Next”

Fig-4

It will be required of me to read the licence terms. After checking the box that
says "I accept the licence terms," click "Next."

Fig-5
Choose the “Custom: install windows only (advanced)”.

Fig-6
After selecting the hard disc to install, select "Next."

Fig-7
Windows 10 is now being installed. My PC will automatically restart itself when
all installation processes are complete.

Fig-8

Fig-9
Wait for a while to get ready.

Fig-10

Click "Yes" after verifying that my region is right.

Fig-11
Verify whether or not my keyboard is proper. Click "Yes" if it is correct. This is
where I may choose a different keyboard.

Fig-12
I can install a second keyboard here. I may select "Add Layout" if I'd like. Click
"Skip" if not.

Fig-13
Click “I don’t have internet”.

Fig-14

Click “Continue with limited setup”.

Fig-15
Write my user-name and click “Next”.

Fig-16
Set my own password and click “Next”. Make sure to remember my password.

Fig-17
Type my password one more time and click “Next”.

Fig-18
Change all the setting to “No” and click “Accept”.

Fig-19
Click “Not now”.

Fig-20

Wait to finish.

Fig-21
Window 10 installation is completed. This is the desktop of window 10.

Fig-22

2. Device drivers and their source locations

The operating system may connect to hardware, such as a scanner or printer, thanks to device
drivers, which are software programmes. These drivers enable data transmission and reception
from hardware devices and aid the operating system in figuring out how to communicate with
them.

Device and operating system use determine where the device driver is located. All device
drivers, however, may be downloaded from the manufacturer's website either alone or as a
component of an installation package.

The manufacturer's website is where you can get scanner drivers. Canon, for instance, offers
scanner drivers that are available through the image capture software on MacOS and may be
downloaded from their website.
3. Unresolved issues – especially missing device drivers

Resolved problems can result in a range of infections with hardware devices, including poor
performance, instability, and malfunction. This is especially true for issues related to missing
device drivers. Among the frequent reasons why device drivers disappear are:

Device not recognised: When a device driver is absent, the hardware device is not
recognised by the operating system and is not displayed in the device manager or functions
poorly.

Device malfunction: Errors or incorrect results might arise from a driver that is out-of-date or
does not correspond with the hardware device.

Poor performance: Outdated or missing device drivers might cause a hardware device to be
less capable, respond more slowly, or not have enough capability.

Security risks: Devices and systems become at risk of security threats when outdated or
malfunctioning device drivers are used.

In order to fix difficulties related to missing device drivers, it is recommended that you first
establish which precision device is malfunctioning. Once the device has been identified, the
user may utilise the operating system's updated function or visit the manufacturer's website
to look for the relevant driver. To fix the issue, it might occasionally additionally be required
to replace the hardware or perform an operating system restore. In order to prevent possible
security problems, it is crucial to make sure that the right device driver is installed and that
the best course of action is taken.
(b) Antivirus Software Installation

1. Identification of product used

Software for preventing malware from infecting computers, mobile devices, and other
devices is called antivirus software, sometimes referred to as anti-malware software. Malware,
which includes viruses, spyware, and other malicious programmes, is found and eliminated by
antivirus software using a range of techniques. Devices must have antivirus software installed in
order to guard against malware, which may lead to a number of problems including financial
fraud, identity theft, and data loss. Anti-virus programmes come in a variety of forms, including
Avast, Kaspersky, Norton, and McAfee.

2. Identification and description of key stages in installation

First, download Avast by searching for it on any browser I use.

Fig-1
And wait for a few second.

Fig-2

Click “Yes”.

Fig-3
I have to wait to finish.

Fig-4

Then click “Install”.

Fig-5
And then, wait until it is completely done.

Fig-6
Click “Continue”.

Fig-7
Click “Run First Scan”.

Fig-8

Fig-8
Fig-9

MY computer is now protected.

Fig-10
3. Identification and description of problems and unresolved issues

The following are a few typical concerns and open problems with Avast antivirus software:

System performance lag: Some customers have complained that Avast causes their system
to function slowly, particularly when it's fully loaded. This can be the result of software
consuming a significant amount of system resources.

Incorrect behaviour: Occasionally, legitimate files or applications may be mistakenly


classified as malicious software, resulting in inappropriate actions that irritate users and may
erase crucial data or applications.

Technical concerns: Just like any other programme, Avast may encounter viruses or other
issues that might lead to issues for users.

4. Outline of the update process for Avast:

Updates automatically: As per the patent, Avast upgrades itself automatically each time a new
version or update is made available. This guarantees that the most recent software version, bug
patches, and security features are always accessible.

Updates by hand: Should you want to update by hand. First, choose "Menu" > "Settings" >
"General" when the Avast user interface opens. Additionally, choose "Update" before selecting
"Check for Updates" to check for any available updates. To install an update, simply click
"Update" if one is available.
c) Installation of office software

(1) Identification of product used


Our software company's unique needs for software development and collaboration have
an impact on the Microsoft Office 365 product that we choose. For our business users,
Microsoft 365 Business Standard is helpful since it provides an extensive collection of
Office apps together with effective capabilities for collaboration. Consider Microsoft 365
Enterprise for a more customised approach; it offers sophisticated security measures
appropriate for a software development environment. The main consideration in this
decision is how well the solution fits the unique software development, collaboration, and
security requirements of our organisation.

(2) Identification and description of key stages in installation

Log in to Microsoft Office 354 and download the office installation.

(Fig-1)

Run downloaded installer file

(Fig-2)
(fig-3)
Completed installation

(fig-4)

3. Identification and description of problems and unresolved issues

Within Microsoft 365 Business Standard, users might encounter a number of difficulties,
including activation difficulties, slow performance when collaborating online, email delivery
delays, OneDrive synchronisation problems, compatibility issues with third-party apps, and
security and compliance configuration worries. Solving these problems requires thorough
troubleshooting, which includes checking email settings, maximising internet access, and
confirming product keys. Updating systems and apps is essential, and consumers may find
detailed answers by visiting Microsoft's help pages. A flawless integration experience is ensured
by routinely checking for compatibility updates from Microsoft and other suppliers, which
promotes the best possible Microsoft 365 Business Standard environment.
(d) Installation of free utility

1.Identification of VLC Media Player, outline of what VLC Media Player does and reason why I
chose VLC Media Player
Utility Identification: Popular formats including MP3, AVI, and MKV play smoothly with the help
of VLC Media Player, a flexible multimedia player that can handle a broad range of music and
video formats.
Outline of functions: VLC shines with a wide range of functions, supporting a variety of
multimedia codecs for playing. With cross-platform support on Windows, macOS, Linux, and
mobile devices, users may adjust playback speed, change settings, and enjoy streaming.
Reason for Selecting VLC Media Player:
VLC is free and updated regularly by a committed community, having been chosen for its open-
source nature. Multimedia playback is made easy with its user-friendly interface, cross-platform
compatibility, stability, and unmatched capacity to handle any kind of material.

2. Key state of installion

Visit the VLC media player's official website at www.videolan.org.

(Fig – 1)
Select "Download VLC" from the menu. Your OS system will be automatically detected by the
website, which will then recommend the appropriate version for download.

(fig-2)

Double-click the downloaded file to initiate installation after the download is finished.

(fig-3)
The VLC media player setup wizard will appear. To continue, click the "Next" button.
(fig-4)

The "Choose Components" window will then appear, allowing you to decide which VLC media
player components you want to install. The default selections are typically adequate, but you
can uncheck any elements you don't require. To continue, click the "Next" button.

(fig-5)

Don't interrupt the installation process by turning off your computer. The installation will fail if
you shut down your computer.
(fig-6)

Click " Finish " when the installation is finished.

(fig-8)
You can use VLC player right now. It is really easy to install the step that I would demonstrate.

(fig-9)

(3)Identification and description of problems and unresolved issues

Users of VLC Media Player may experience a number of problems, such as incompatibility with
certain codecs that causes playback issues, delays in streaming, synchronisation issues with
subtitles, a complicated user interface for novices, issues with audio and video synchronisation,
sporadic crashes or freezes, and performance issues on older hardware. To address these
issues, you may use different media players for different situations, change the settings, and
keep up with VLC updates for continuous compatibility and performance enhancements. For
thorough answers catered to their own circumstances, users are urged to investigate official
material and community forums.

Task-3 Faulty PCs and Software Maintenance

Faulty PCs

Slow System Performance: The system experiences sluggish performance, slow application
launches, and delayed response times.

Malware Infections: PCs are vulnerable to malware, including viruses, spyware, or ransomware,
compromising system integrity and data security.

Outdated Software: Running outdated operating systems or software applications, leading to


security vulnerabilities and potential incompatibility issues.
Hardware Component Failures: Malfunctioning hardware components, such as RAM, hard
drives, or graphics cards, causing system instability or complete failures.

Data Loss: Accidental deletion, hardware failure, or data corruption leading to the loss of critical
files and information.

Maintenance of Computer System

Slow System Performance:


Maintenance: Conduct regular disk cleanup to free up space, optimize startup programs, and
consider hardware upgrades such as adding more RAM or switching to a faster storage drive.
Use performance monitoring tools to identify resource-intensive applications.
Malware Infections:
Maintenance: Implement and regularly update robust antivirus software. Conduct frequent
malware scans and educate users on safe online practices, including avoiding suspicious
emails and websites. Ensure that operating systems and security software are up to date.
Outdated Software:
Maintenance: Establish a centralized system for tracking software updates. Schedule regular
updates for operating systems, applications, and security patches. Conduct compatibility checks
to ensure smooth transitions between software versions.
Hardware Component Failures:
Maintenance: Conduct routine hardware diagnostics to identify potential issues before they
escalate. Monitor system temperatures to prevent overheating and ensure proper ventilation.
Promptly replace malfunctioning components and keep firmware up to date.
Data Loss:
Maintenance: Implement regular automated backups with offsite storage for critical data. Verify
backup integrity periodically and conduct data recovery drills to ensure seamless restoration in
case of data loss. Educate users on best practices for data storage and backup.

Preventative maintenance

The following list of five possible causes for a user's computer to be running slowly includes
suggestions for looking into and handling each situation:

Insufficient RAM (Random Access Memory): When a computer runs out of RAM, it starts using
the hard drive as virtual memory, which is significantly slower. This can lead to a noticeable
decrease in performance, especially when running multiple applications or resource-intensive
tasks.
Low Disk Space on the Hard Drive: If the hard drive is almost full, the operating system may
struggle to find space for temporary files and may not have enough room for efficient file
operations. This can result in slow read and write speeds, affecting overall system performance.
Malware or Virus Infection: Malicious software can consume system resources, run unwanted
processes in the background, and cause general system slowdowns. Viruses and malware may
also damage system files, leading to performance issues.
Outdated or Incompatible Software: Running outdated or incompatible software can cause
conflicts, errors, and inefficiencies. Old software may not be optimized for the latest operating
system updates, leading to compatibility issues and degraded performance.
Fragmented Hard Drive: As files are created, modified, and deleted over time, the data on a
hard drive becomes fragmented, meaning it's scattered in different locations. This can slow
down read and write speeds because the system has to search for and gather the various
fragments of a file.

Regular Data Backups:


Importance: Protects against data loss due to hardware failure, accidental deletion, or other
unforeseen events.
Explanation: Schedule regular backups of important files to an external hard drive, cloud
storage, or a dedicated backup service. Automated backup tools can simplify this process.
Disk Cleanup:
Importance: Frees up disk space by removing unnecessary files, temporary files, and system
caches.
Explanation: Use the built-in Disk Cleanup tool (on Windows) or similar tools on other operating
systems to delete temporary files, system files, and other items that are taking up space but are
not essential.
Update Operating System and Software:
Importance: Enhances security, stability, and performance by applying the latest patches and
improvements.
Explanation: Regularly check for and install operating system updates and updates for installed
software. Enable automatic updates when possible to ensure the system is always up-to-date.
Install and Update Antivirus Software:
Importance: Provides a crucial layer of defense against malware and viruses.
Explanation: Install a reputable antivirus program and keep it updated with the latest virus
definitions. Schedule regular scans to detect and remove any potential threats.
Manage Startup Programs:
Importance: Improves system startup time and overall performance by preventing unnecessary
programs from launching at boot.
Explanation: Review the list of startup programs and disable any that are not essential for
system operation. This can be done through the Task Manager (on Windows) or similar tools on
other platforms.
By regularly performing these maintenance tasks, users can ensure their computer operates
smoothly, remains secure, and avoids common performance issues.
References
CCleaner. (s.d.). What is Defraggler? – piriform support. Récupéré sur CCleaner:
https://support.piriform.com/hc/en-us/articles/360048554171-What-is-Defraggler-

https://www.amazon.com/

https://www.freecodecamp.org/news/what-is-cpu-meaning-definition-and-what-cpu-stands-for/

https://www.techtarget.com/searchstorage/definition/RAM-random-access-memory

https://www.techtarget.com/search/query?q=disk+space

You might also like