Hphone Myint Moh( Computer System Assignment)
Hphone Myint Moh( Computer System Assignment)
Introduction
There are computers and server machines within our network. Servers facilitate the sharing of
information and essential files needed to sustain the operations of our company. Data
management is handled by software and stored in storage devices. An enterprise application is
an extensive software solution designed to address the challenges faced by the entire
organization. Networking platforms comprise operating systems such as Windows Server OS,
Linux, Unix, and various others. Major components of the internet relate to and sometimes
overlap with network infrastructure and hardware and software platforms.
Software for market research facilitates statistical analysis of data, allowing the company to
correlate consumer behavior with highly specific geographic, demographic, and psychographic
variables. Database marketing depends on the gathering and utilization of extensive databases
to categorize potential customers and communicate with them using personalized promotional
information.
The primary obstacle in integration lies in its concealed nature throughout the software
development process, only surfacing towards the conclusion. This results in supplementary
expenses, delays, diminished quality, and occasionally, project failure. Addressing
contemporary technology demands, including prioritizing mobile and desktop compatibility,
frequently poses a challenge. If your workforce lacks practical expertise in current technology
trends, it is likely to impact the speed at which your product reaches the market.
Evaluating a software system within a controlled setting presents challenges because the user
is not fully engaged in a genuinely realistic work scenario. It is impractical to gauge how a user
will interact with the application under various circumstances on a regular basis until it is put into
operation.
Oversee operating systems (such as Windows Server OS, Linux, and Unix) and networking
platforms.
Make that the network infrastructure is secure and stable.
Deal with problems pertaining to communication and connection inside the company.
Performance:
Response Time: To guarantee a flawless user experience, the system must react to user
activities in no more than two seconds.
Throughput: During periods of high demand, the system should be able to process at least 100
transactions per second.
Security:
Data Encryption: Industry-standard methods should be used to encrypt any sensitive data being
transferred across a network.
Access Control: To protect the integrity and security of data, user access should be role-based
and subject to stringent restrictions.
Scalability:
Horizontal scaling: As the user base expands, the system should be able to accommodate the
addition of more servers to help spread the load and guarantee peak performance.
Usability:
User Interface Consistency: To improve user familiarity and minimise the requirement for
training, the user interfaces of various modules should have a uniform design.
Helpdesk Response Time: In order to offer effective service, the helpdesk should reply to user
questions or concerns within 24 hours.
Dependability:
Availability: Users should be informed in advance of scheduled maintenance windows, and the
system should be up and running 99.9% of the time.
Backup and Recovery: In the case of a breakdown, the system should be able to be restored
within four hours. Regular backups should also be carried out.
Appendix
(a) Explanation of the importance of CPU type (Single/Multi-core),
RAM and Disk space in the performance of system
The CPU (Central Processing Unit), RAM (Random Access Memory), and Disk Space are
crucial components of a computer system, and their specifications play a significant role in
determining the overall performance and efficiency of the system.
Importance: The CPU is often referred to as the "brain" of the computer, responsible for
executing instructions and processing data. The type of CPU, specifically whether it is a single-
core or multi-core processor, is critical for system performance.
Single-core: Older systems may have single-core processors, capable of handling one task at a
time. However, modern applications, especially those designed for multitasking and parallel
processing, benefit significantly from multi-core processors.
Multi-core: Multi-core processors can handle multiple tasks simultaneously, improving overall
system responsiveness and the ability to run resource-intensive applications concurrently.
Tasks such as video editing, gaming, and virtualization benefit greatly from multi-core
architectures.
Importance: RAM is the memory used by the computer to store data that is actively being used
or processed. It is volatile memory, meaning it is cleared when the system is powered off. The
amount and speed of RAM have a direct impact on system performance.
Amount of RAM: Sufficient RAM allows the system to run multiple applications simultaneously
without slowing down. Inadequate RAM can lead to slowdowns and even system crashes,
especially when dealing with memory-intensive tasks.
RAM Speed: Faster RAM enables quicker access to data, improving the speed at which
applications load and run. It is particularly important for tasks that involve large datasets or
complex calculations.
Disk Space:
Importance: Disk space refers to the storage capacity of the computer's hard drive or solid-state
drive (SSD). It is where the operating system, applications, and user data are stored.
Operating System and Software Installation: A sufficient amount of disk space is required for the
installation of the operating system and software applications. Running out of disk space can
hinder system updates and the installation of new software.
Data Storage and Retrieval: Adequate disk space is crucial for storing user data, documents,
multimedia files, and other content. Insufficient space can lead to performance issues and may
limit the ability to save or download files.
In summary, the CPU type, amount and speed of RAM, and available disk space collectively
contribute to the overall performance and functionality of a computer system. Upgrading these
components, when necessary, can enhance system speed, responsiveness, and the ability to
handle modern computing demands.
In our software company, meticulous disk space organization is pivotal for an efficient
computing infrastructure. We allocate dedicated segments for critical functions—source code
repositories in development, ensuring collaborative version control, and segregated areas for
build artifacts. Testing environments have designated space for test data and results, facilitating
rigorous quality assurance. Deployment areas are structured with distinct space for software
packages and versioned releases, enabling seamless distribution. Monitoring systems benefit
from allocated space for logs and metrics, providing comprehensive performance oversight.
Backup and recovery processes are managed with dedicated space for regular backups and
organized recovery points, ensuring data integrity. This strategic approach underpins the
reliability, scalability, and streamlined functionality of our software development lifecycle.
Standard specifications
The following minimal system specifications, which are given in the table below, will be
necessary for the system that the firm will shortly be using.
Feature Description
Operating System Window 10
Processor Type and Generation Core i5 and 6Gen
Processor Speed 1.20 GHz
Processor Core Dural-Core
Memory (RAM) 8 GB
Storage Windows OS: 128 GB of available disk space
Display 1280 x 768
Network & Communication Wireless and Fast Ethernet
Browser Microsoft edge, chrome and fire fox
.Net version .net 3.5 or 4.6
Security Anti-virus software
Others Database Management, Networking
Reasons:
Capacity and Speed: The 32GB capacity and 3600 MHz speed deliver a balance of ample
memory for multitasking and high-speed data access, enhancing overall system performance.
Performance: G.SKILL is a reputable brand known for manufacturing high-performance memory
modules, ensuring reliability and optimal system responsiveness.
Reasons:
Performance: The Samsung 970 EVO Plus provides superior read and write speeds compared
to the WD Blue SN550, resulting in faster data access and improved system responsiveness.
Reliability: Samsung SSDs are renowned for their reliability, durability, and consistent
performance over time.
Reasons:
Speed and Cache: The Seagate Barracuda's 7200 RPM speed and 256 MB cache offer faster
data access, making it suitable for tasks requiring quick retrieval of large files or data.
Reputation: Seagate is a well-established brand known for producing reliable and durable hard
drives.
Reasons:
Capacity: The APC Back-UPS Pro 1500VA provides a substantial capacity of 1500 VA / 865
Watts, ensuring sufficient power backup during outages.
Surge Protection: APC is recognized for manufacturing reliable UPS solutions with effective
surge protection features, safeguarding connected devices from power fluctuations.
Reasons:
Adequate Wattage: The 650W wattage is suitable for the system's power requirements,
providing a reliable and stable power supply for the components.
Modularity: The fully modular design allows for cleaner cable management, improving airflow
within the system and enhancing overall aesthetics.
Reputation: EVGA is a trusted brand known for producing high-quality and reliable power
supplies.
8. Monitor: Dell UltraSharp U2719D, 27"
Reasons:
Resolution and Panel Type: The Dell UltraSharp U2719D offers a higher resolution (2560 x
1440) and features an IPS panel, delivering superior image quality, color accuracy, and wider
viewing angles.
Reputation: Dell UltraSharp monitors are known for their exceptional build quality, reliability, and
suitability for professional tasks such as content creation and design.
Reasons:
Wireless Convenience: The Logitech MK270 Wireless Combo provides the convenience of
wireless connectivity for both the mouse and keyboard, reducing cable clutter and offering
flexibility in positioning.
Brand Reputation: Logitech is a well-established and trusted brand, known for manufacturing
reliable and durable input devices, ensuring a positive user experience.
Task2- Windows Installation
Before placing my USB drive into the computer to install it when the boot disc is ready, be sure
that no other USB drives are connected in.
After selecting my preferred language, time zone, and keyboard input, click "Next".
Fig-1
And then, click “Install Now”.
Fig-2
I'll then be prompted to input an activation key. If I already have a copy, I may input it right now.
Click "I don't have a product key" if it isn't.
Fig-3
Click “Next”
Fig-4
It will be required of me to read the licence terms. After checking the box that
says "I accept the licence terms," click "Next."
Fig-5
Choose the “Custom: install windows only (advanced)”.
Fig-6
After selecting the hard disc to install, select "Next."
Fig-7
Windows 10 is now being installed. My PC will automatically restart itself when
all installation processes are complete.
Fig-8
Fig-9
Wait for a while to get ready.
Fig-10
Fig-11
Verify whether or not my keyboard is proper. Click "Yes" if it is correct. This is
where I may choose a different keyboard.
Fig-12
I can install a second keyboard here. I may select "Add Layout" if I'd like. Click
"Skip" if not.
Fig-13
Click “I don’t have internet”.
Fig-14
Fig-15
Write my user-name and click “Next”.
Fig-16
Set my own password and click “Next”. Make sure to remember my password.
Fig-17
Type my password one more time and click “Next”.
Fig-18
Change all the setting to “No” and click “Accept”.
Fig-19
Click “Not now”.
Fig-20
Wait to finish.
Fig-21
Window 10 installation is completed. This is the desktop of window 10.
Fig-22
The operating system may connect to hardware, such as a scanner or printer, thanks to device
drivers, which are software programmes. These drivers enable data transmission and reception
from hardware devices and aid the operating system in figuring out how to communicate with
them.
Device and operating system use determine where the device driver is located. All device
drivers, however, may be downloaded from the manufacturer's website either alone or as a
component of an installation package.
The manufacturer's website is where you can get scanner drivers. Canon, for instance, offers
scanner drivers that are available through the image capture software on MacOS and may be
downloaded from their website.
3. Unresolved issues – especially missing device drivers
Resolved problems can result in a range of infections with hardware devices, including poor
performance, instability, and malfunction. This is especially true for issues related to missing
device drivers. Among the frequent reasons why device drivers disappear are:
Device not recognised: When a device driver is absent, the hardware device is not
recognised by the operating system and is not displayed in the device manager or functions
poorly.
Device malfunction: Errors or incorrect results might arise from a driver that is out-of-date or
does not correspond with the hardware device.
Poor performance: Outdated or missing device drivers might cause a hardware device to be
less capable, respond more slowly, or not have enough capability.
Security risks: Devices and systems become at risk of security threats when outdated or
malfunctioning device drivers are used.
In order to fix difficulties related to missing device drivers, it is recommended that you first
establish which precision device is malfunctioning. Once the device has been identified, the
user may utilise the operating system's updated function or visit the manufacturer's website
to look for the relevant driver. To fix the issue, it might occasionally additionally be required
to replace the hardware or perform an operating system restore. In order to prevent possible
security problems, it is crucial to make sure that the right device driver is installed and that
the best course of action is taken.
(b) Antivirus Software Installation
Software for preventing malware from infecting computers, mobile devices, and other
devices is called antivirus software, sometimes referred to as anti-malware software. Malware,
which includes viruses, spyware, and other malicious programmes, is found and eliminated by
antivirus software using a range of techniques. Devices must have antivirus software installed in
order to guard against malware, which may lead to a number of problems including financial
fraud, identity theft, and data loss. Anti-virus programmes come in a variety of forms, including
Avast, Kaspersky, Norton, and McAfee.
Fig-1
And wait for a few second.
Fig-2
Click “Yes”.
Fig-3
I have to wait to finish.
Fig-4
Fig-5
And then, wait until it is completely done.
Fig-6
Click “Continue”.
Fig-7
Click “Run First Scan”.
Fig-8
Fig-8
Fig-9
Fig-10
3. Identification and description of problems and unresolved issues
The following are a few typical concerns and open problems with Avast antivirus software:
System performance lag: Some customers have complained that Avast causes their system
to function slowly, particularly when it's fully loaded. This can be the result of software
consuming a significant amount of system resources.
Technical concerns: Just like any other programme, Avast may encounter viruses or other
issues that might lead to issues for users.
Updates automatically: As per the patent, Avast upgrades itself automatically each time a new
version or update is made available. This guarantees that the most recent software version, bug
patches, and security features are always accessible.
Updates by hand: Should you want to update by hand. First, choose "Menu" > "Settings" >
"General" when the Avast user interface opens. Additionally, choose "Update" before selecting
"Check for Updates" to check for any available updates. To install an update, simply click
"Update" if one is available.
c) Installation of office software
(Fig-1)
(Fig-2)
(fig-3)
Completed installation
(fig-4)
Within Microsoft 365 Business Standard, users might encounter a number of difficulties,
including activation difficulties, slow performance when collaborating online, email delivery
delays, OneDrive synchronisation problems, compatibility issues with third-party apps, and
security and compliance configuration worries. Solving these problems requires thorough
troubleshooting, which includes checking email settings, maximising internet access, and
confirming product keys. Updating systems and apps is essential, and consumers may find
detailed answers by visiting Microsoft's help pages. A flawless integration experience is ensured
by routinely checking for compatibility updates from Microsoft and other suppliers, which
promotes the best possible Microsoft 365 Business Standard environment.
(d) Installation of free utility
1.Identification of VLC Media Player, outline of what VLC Media Player does and reason why I
chose VLC Media Player
Utility Identification: Popular formats including MP3, AVI, and MKV play smoothly with the help
of VLC Media Player, a flexible multimedia player that can handle a broad range of music and
video formats.
Outline of functions: VLC shines with a wide range of functions, supporting a variety of
multimedia codecs for playing. With cross-platform support on Windows, macOS, Linux, and
mobile devices, users may adjust playback speed, change settings, and enjoy streaming.
Reason for Selecting VLC Media Player:
VLC is free and updated regularly by a committed community, having been chosen for its open-
source nature. Multimedia playback is made easy with its user-friendly interface, cross-platform
compatibility, stability, and unmatched capacity to handle any kind of material.
(Fig – 1)
Select "Download VLC" from the menu. Your OS system will be automatically detected by the
website, which will then recommend the appropriate version for download.
(fig-2)
Double-click the downloaded file to initiate installation after the download is finished.
(fig-3)
The VLC media player setup wizard will appear. To continue, click the "Next" button.
(fig-4)
The "Choose Components" window will then appear, allowing you to decide which VLC media
player components you want to install. The default selections are typically adequate, but you
can uncheck any elements you don't require. To continue, click the "Next" button.
(fig-5)
Don't interrupt the installation process by turning off your computer. The installation will fail if
you shut down your computer.
(fig-6)
(fig-8)
You can use VLC player right now. It is really easy to install the step that I would demonstrate.
(fig-9)
Users of VLC Media Player may experience a number of problems, such as incompatibility with
certain codecs that causes playback issues, delays in streaming, synchronisation issues with
subtitles, a complicated user interface for novices, issues with audio and video synchronisation,
sporadic crashes or freezes, and performance issues on older hardware. To address these
issues, you may use different media players for different situations, change the settings, and
keep up with VLC updates for continuous compatibility and performance enhancements. For
thorough answers catered to their own circumstances, users are urged to investigate official
material and community forums.
Faulty PCs
Slow System Performance: The system experiences sluggish performance, slow application
launches, and delayed response times.
Malware Infections: PCs are vulnerable to malware, including viruses, spyware, or ransomware,
compromising system integrity and data security.
Data Loss: Accidental deletion, hardware failure, or data corruption leading to the loss of critical
files and information.
Preventative maintenance
The following list of five possible causes for a user's computer to be running slowly includes
suggestions for looking into and handling each situation:
Insufficient RAM (Random Access Memory): When a computer runs out of RAM, it starts using
the hard drive as virtual memory, which is significantly slower. This can lead to a noticeable
decrease in performance, especially when running multiple applications or resource-intensive
tasks.
Low Disk Space on the Hard Drive: If the hard drive is almost full, the operating system may
struggle to find space for temporary files and may not have enough room for efficient file
operations. This can result in slow read and write speeds, affecting overall system performance.
Malware or Virus Infection: Malicious software can consume system resources, run unwanted
processes in the background, and cause general system slowdowns. Viruses and malware may
also damage system files, leading to performance issues.
Outdated or Incompatible Software: Running outdated or incompatible software can cause
conflicts, errors, and inefficiencies. Old software may not be optimized for the latest operating
system updates, leading to compatibility issues and degraded performance.
Fragmented Hard Drive: As files are created, modified, and deleted over time, the data on a
hard drive becomes fragmented, meaning it's scattered in different locations. This can slow
down read and write speeds because the system has to search for and gather the various
fragments of a file.
https://www.amazon.com/
https://www.freecodecamp.org/news/what-is-cpu-meaning-definition-and-what-cpu-stands-for/
https://www.techtarget.com/searchstorage/definition/RAM-random-access-memory
https://www.techtarget.com/search/query?q=disk+space