Computer Systems Architecture
VerifiedAdded on 2023/01/07
|15
|4443
|2
AI Summary
This document provides an overview of computer systems architecture, including the relationships between hardware and network addresses, setup and configuration of hardware and software systems for network connectivity, troubleshooting methods, and maintenance activities. It also explains different features of operating systems.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Computer Systems
Architecture
Architecture
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents
INTRODUCTION ..........................................................................................................................1
TASK 3............................................................................................................................................1
P5. Explain the relationships between hardware and network addresses including their use
with regards to networking devices and components.................................................................1
P6. Setup, configure and document appropriate hardware and software systems to establish
computer based network connectivity.........................................................................................3
TASK 4............................................................................................................................................4
P7. Use information gathering methods to assess, troubleshoot and document solutions to a
number of different technical hardware, software and networking issues..................................4
P8. Conduct and document a range of maintenance activities with regards to computer
hardware and software................................................................................................................4
CONCLUSION................................................................................................................................4
REFERENCES................................................................................................................................5
INTRODUCTION ..........................................................................................................................1
TASK 3............................................................................................................................................1
P5. Explain the relationships between hardware and network addresses including their use
with regards to networking devices and components.................................................................1
P6. Setup, configure and document appropriate hardware and software systems to establish
computer based network connectivity.........................................................................................3
TASK 4............................................................................................................................................4
P7. Use information gathering methods to assess, troubleshoot and document solutions to a
number of different technical hardware, software and networking issues..................................4
P8. Conduct and document a range of maintenance activities with regards to computer
hardware and software................................................................................................................4
CONCLUSION................................................................................................................................4
REFERENCES................................................................................................................................5
INTRODUCTION
A computer system is considered as the nutshell as it include looking back to the timeline
of the computer evolution over the decades. A computer is a machine which is instructed in
terms of carrying out the significant sequence of logical operations automatically through
computer programming. These programmes include computers in terms of performing wide
range of task as it include hardware, operating system, software and other concerning
equipments that are used for the further operations and referred as the computer system (Lao and
et. al., 2020). It is a programmable device which automatically perform prominent sequence of
calculations and other operations as it can store, process, retrieve and process data as per the
internal instructions. The report is going to cover the relationship among hardware and network
address including their usage concerning the networking devices and also setup, configure and
document hardware and software system for the effectively developing computer based network.
Furthermore, it also use the prominent information of collecting various methods to assess and
document solutions to the number of various technical hardware and other networking issues.
Lastly, it conduct a range of care activities for computer.
P3 Explicate different features of operating system.
The interface in between users and computer hardware is referred to as operating system.
It is a software that is liable for performing basic tasks such as memory, process and file
management. The different functions can be carried out by making use of OS are specified
below: Memory Management: This denotes managing main or primary memory. This provides
fast storage which can be directly accessed by CPU. This is responsible for keeping track
and allocation of memory. In case of multiprogramming, the operating system is liable
for deciding which process will be provided with memory and for how long this will
occur. Processor Management: In this case, OS is responsible for deciding which process will
be provided with processor and for how long (Ahmadi and et. al., 2018). This function is
referred to as process scheduling. Track processor along with status of process will be
maintained. The program is liable for carrying out this task, and this is known as traffic
controller.
1
A computer system is considered as the nutshell as it include looking back to the timeline
of the computer evolution over the decades. A computer is a machine which is instructed in
terms of carrying out the significant sequence of logical operations automatically through
computer programming. These programmes include computers in terms of performing wide
range of task as it include hardware, operating system, software and other concerning
equipments that are used for the further operations and referred as the computer system (Lao and
et. al., 2020). It is a programmable device which automatically perform prominent sequence of
calculations and other operations as it can store, process, retrieve and process data as per the
internal instructions. The report is going to cover the relationship among hardware and network
address including their usage concerning the networking devices and also setup, configure and
document hardware and software system for the effectively developing computer based network.
Furthermore, it also use the prominent information of collecting various methods to assess and
document solutions to the number of various technical hardware and other networking issues.
Lastly, it conduct a range of care activities for computer.
P3 Explicate different features of operating system.
The interface in between users and computer hardware is referred to as operating system.
It is a software that is liable for performing basic tasks such as memory, process and file
management. The different functions can be carried out by making use of OS are specified
below: Memory Management: This denotes managing main or primary memory. This provides
fast storage which can be directly accessed by CPU. This is responsible for keeping track
and allocation of memory. In case of multiprogramming, the operating system is liable
for deciding which process will be provided with memory and for how long this will
occur. Processor Management: In this case, OS is responsible for deciding which process will
be provided with processor and for how long (Ahmadi and et. al., 2018). This function is
referred to as process scheduling. Track processor along with status of process will be
maintained. The program is liable for carrying out this task, and this is known as traffic
controller.
1
Device Management: OS manage the communication through respective drivers by
keeping track of all the devices. This will also ensure that devices are allocated in an
effective manner. The program is liable for tracking all devices which is known as input
output controller.
File management: This will make sure that all the directories are organised in an
adequate manner for easy usage and navigation for tracking information, status, use and
many other aspects. The collective facilities are referred to as file system. This also
manage allocation as well as deallocation of resources.
The other essential activities carried out by OS are to make sure security, control over
performance of system, error detection, job detection and coordination among other software's
and users.
TASK 3
P5. Explain the relationships between hardware and network addresses including their use with
regards to networking devices and components
Network communication technology include ICT network which consider explanation of
various technologies like intranet, internet and extranet. For this, it leads to include various
network protocols that deliver reliable and fast communication over large distances. As computer
system relies on the networks on the repeatable operations in terms of maintaining network
integrity for executing transfer protocol models that forces information to adhere to primary
rules. Few network protocols are mentioned below:
TCP/IP Protocol: This protocol represents the significant activities that are used as the
protocol stack as by resembling the OSI, TCP/IP work on its own particular manner. In terms of
this, IP refers to the internet protocol of data transmission in which data is separated into units of
data and also sent over the routing information that direct to the destination (Dickerson and
Mavris, 2016). Along with this, TCP depicts the transmission control protocol that develop
significant connections and send data concerning the receipt of information and the receiver
notifies the sender regarding the information that remain intact.
UDP: It refers to the User Datagram protocol which is used as the transport layer and the
application developers use UDP at the place of TCP. It is the scaled down economy model and it
does not offer prominent bells and signal of TCP as it does a very good job for transporting
2
keeping track of all the devices. This will also ensure that devices are allocated in an
effective manner. The program is liable for tracking all devices which is known as input
output controller.
File management: This will make sure that all the directories are organised in an
adequate manner for easy usage and navigation for tracking information, status, use and
many other aspects. The collective facilities are referred to as file system. This also
manage allocation as well as deallocation of resources.
The other essential activities carried out by OS are to make sure security, control over
performance of system, error detection, job detection and coordination among other software's
and users.
TASK 3
P5. Explain the relationships between hardware and network addresses including their use with
regards to networking devices and components
Network communication technology include ICT network which consider explanation of
various technologies like intranet, internet and extranet. For this, it leads to include various
network protocols that deliver reliable and fast communication over large distances. As computer
system relies on the networks on the repeatable operations in terms of maintaining network
integrity for executing transfer protocol models that forces information to adhere to primary
rules. Few network protocols are mentioned below:
TCP/IP Protocol: This protocol represents the significant activities that are used as the
protocol stack as by resembling the OSI, TCP/IP work on its own particular manner. In terms of
this, IP refers to the internet protocol of data transmission in which data is separated into units of
data and also sent over the routing information that direct to the destination (Dickerson and
Mavris, 2016). Along with this, TCP depicts the transmission control protocol that develop
significant connections and send data concerning the receipt of information and the receiver
notifies the sender regarding the information that remain intact.
UDP: It refers to the User Datagram protocol which is used as the transport layer and the
application developers use UDP at the place of TCP. It is the scaled down economy model and it
does not offer prominent bells and signal of TCP as it does a very good job for transporting
2
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
information which does not need reliable delivery and also use far fewer network resources. It is
also undertaken as the unreliable transport protocol that sends segments over the network and
also forget about other networks and also permit for the acknowledgement of safe arrival.
OSI Protocol task: This model of network data moves from one computer to another in
terms of succeeding the layers of computer software. Moreover, this model set up the prominent
system of layers including physical layer of wires and electricity at the lowermost section. In
terms of this, when an individual send data over the network, it moves down to the heap by each
layer acquiring several data headers, address the information and security checking devices at
every level before reaching over the physical medium (Hwang and Jotwani, 2016).
ICMP: It refers to the Internet Control Message Protocol that leads to support protocol
for the internet suite and also used by network devices considering routers to send fault messages
and other operational information that indicate towards the success and failure in terms of
communicating with another IP address. It differs from the transport protocols including TCP
and UDP which is not used to exchange information and data among systems and also regularly
employed by end user network applications.
Relationship between Hardware and network address
An IP address is the unique set of numbers that leads to examine the device which is
connected to the internet in order to understand that from where the address come and also
understand that how it works. It is a bunch of various networks that are connected together and
also work together in terms of purchasing a services from an ISP as it connect ISP network from
all other networks (Firouzi and et. al., 2018). On the other hand, MAC address examines the
unique network interface within the device as the IP addresses are delegated by the ISPs that can
be re-assigned to other devices that connect and disconnect to its addresses and tied to the
physical adapter. Moreover, both of these work together and interlinked with each other for the
effective use of transport data from one to another network by using prominent TCP/IP protocol
and MAC deliver data to the significant devices on the network.
Network devices and components
Router: It is undertaken as the hardware device which is useful in terms of connecting to
LAN with the internet connection and also used to receive, identify and forward the incoming
packets to other networks. It works as the network layer which include 3 layers of the OSI model
and also forward on the basis of information which is available in routing table. It also determine
3
also undertaken as the unreliable transport protocol that sends segments over the network and
also forget about other networks and also permit for the acknowledgement of safe arrival.
OSI Protocol task: This model of network data moves from one computer to another in
terms of succeeding the layers of computer software. Moreover, this model set up the prominent
system of layers including physical layer of wires and electricity at the lowermost section. In
terms of this, when an individual send data over the network, it moves down to the heap by each
layer acquiring several data headers, address the information and security checking devices at
every level before reaching over the physical medium (Hwang and Jotwani, 2016).
ICMP: It refers to the Internet Control Message Protocol that leads to support protocol
for the internet suite and also used by network devices considering routers to send fault messages
and other operational information that indicate towards the success and failure in terms of
communicating with another IP address. It differs from the transport protocols including TCP
and UDP which is not used to exchange information and data among systems and also regularly
employed by end user network applications.
Relationship between Hardware and network address
An IP address is the unique set of numbers that leads to examine the device which is
connected to the internet in order to understand that from where the address come and also
understand that how it works. It is a bunch of various networks that are connected together and
also work together in terms of purchasing a services from an ISP as it connect ISP network from
all other networks (Firouzi and et. al., 2018). On the other hand, MAC address examines the
unique network interface within the device as the IP addresses are delegated by the ISPs that can
be re-assigned to other devices that connect and disconnect to its addresses and tied to the
physical adapter. Moreover, both of these work together and interlinked with each other for the
effective use of transport data from one to another network by using prominent TCP/IP protocol
and MAC deliver data to the significant devices on the network.
Network devices and components
Router: It is undertaken as the hardware device which is useful in terms of connecting to
LAN with the internet connection and also used to receive, identify and forward the incoming
packets to other networks. It works as the network layer which include 3 layers of the OSI model
and also forward on the basis of information which is available in routing table. It also determine
3
the best suited path from the available paths for the effective transmission of bundle. Router is
more secure, reliable, enhances the overall performance for the network and also has effective
network range.
Switch: It is the hardware devices that connects with various devices and contain
advanced features instead of Hub. It contain the updated table the leads to decide about the data
is transmitted or not (Sharma and Park, 2018). It delivers about the message for the correct
destination which is based on physical address that present at the incoming message. It does not
broadcast the message to the entire network just like Hub. Switch leads to determine the device
regarding the message which is to be transmitted.
P6. Setup, configure and document appropriate hardware and software systems to establish
computer based network connectivity
Computer network is the group of computer that leads to use the set of common
communication protocol over digital interconnections for the purpose of sharing resources that
are offered by the network nodes. Moreover, topology refers to the structure of network
regarding its components that are interconnected with each other. Various topologies are
mentioned below:
Bus: It is designed by considering all the stations that are connected by the single cable
which is known as the backbone cable as its each node is directly connected to the backbone
cable. As each node wants to send message over the network and put message over the network
that leads to receive the message (Wells and Wells, 2017). It is prominently used in 802.3
standard networks and the configuration for the bus topology is quite simple as compared to
other topologies. It is also undertaken as the single lane in which the message is broadcast to all
its stations.
4
more secure, reliable, enhances the overall performance for the network and also has effective
network range.
Switch: It is the hardware devices that connects with various devices and contain
advanced features instead of Hub. It contain the updated table the leads to decide about the data
is transmitted or not (Sharma and Park, 2018). It delivers about the message for the correct
destination which is based on physical address that present at the incoming message. It does not
broadcast the message to the entire network just like Hub. Switch leads to determine the device
regarding the message which is to be transmitted.
P6. Setup, configure and document appropriate hardware and software systems to establish
computer based network connectivity
Computer network is the group of computer that leads to use the set of common
communication protocol over digital interconnections for the purpose of sharing resources that
are offered by the network nodes. Moreover, topology refers to the structure of network
regarding its components that are interconnected with each other. Various topologies are
mentioned below:
Bus: It is designed by considering all the stations that are connected by the single cable
which is known as the backbone cable as its each node is directly connected to the backbone
cable. As each node wants to send message over the network and put message over the network
that leads to receive the message (Wells and Wells, 2017). It is prominently used in 802.3
standard networks and the configuration for the bus topology is quite simple as compared to
other topologies. It is also undertaken as the single lane in which the message is broadcast to all
its stations.
4
(Source: What is Topology?, 2018)
Star: It refers to the arrangement of networks in which every node is linked with central
hub or central computer as it is also termed as the server undertaking the peripheral devices that
are attached to server that are known as clients. It depicts the prominent cable which is used to
connect the computers as switches are prominently used as the connection devices for the
physical star topology as it is most popular topology for network execution. In this, troubleshoot
is quite efficient as compared to bus topology and its network control is quite complex
concerning its features that can be easily executed as any changes made in star topology are
significantly accommodated.
(Source: What is Topology?, 2018)
5
Illustration 1: What is Topology?
Illustration 2: What is Topology?
Star: It refers to the arrangement of networks in which every node is linked with central
hub or central computer as it is also termed as the server undertaking the peripheral devices that
are attached to server that are known as clients. It depicts the prominent cable which is used to
connect the computers as switches are prominently used as the connection devices for the
physical star topology as it is most popular topology for network execution. In this, troubleshoot
is quite efficient as compared to bus topology and its network control is quite complex
concerning its features that can be easily executed as any changes made in star topology are
significantly accommodated.
(Source: What is Topology?, 2018)
5
Illustration 1: What is Topology?
Illustration 2: What is Topology?
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Ring: It is just like bus topology but in this it connects with the ends and its node receives
the information from the previous computer that retransmit to the next node (Ahmadi and et. al.,
2018). In this, data flows one direction which is unidirectional as information flows in a single
loop that continuously termed as the endless loop as it is not terminated ends as every node is
linked with other node and does not have any termination point.
Mesh: It refers to the arrangement of network in which computers are interlinked with
each other through several redundant connections as there are various paths the connect one
computer to another computer. Moreover, it leads to contain hub or any central computer that act
as the central point of communication. It is used as the wireless networks and can be formed with
the help of significant formula.
Develop secure computer based network connectivity
6
the information from the previous computer that retransmit to the next node (Ahmadi and et. al.,
2018). In this, data flows one direction which is unidirectional as information flows in a single
loop that continuously termed as the endless loop as it is not terminated ends as every node is
linked with other node and does not have any termination point.
Mesh: It refers to the arrangement of network in which computers are interlinked with
each other through several redundant connections as there are various paths the connect one
computer to another computer. Moreover, it leads to contain hub or any central computer that act
as the central point of communication. It is used as the wireless networks and can be formed with
the help of significant formula.
Develop secure computer based network connectivity
6
In relation with developing secure computer based network connectivity, effective audit
and mapping for the network should be performed for the prominent understanding of entire
network infrastructure which is basic configuration of firewall. After the audit, network should
be keep up to date and check software updates for the network infrastructure components. At that
time, they also need to make sure about effective developing security plan and also try to prevent
from the outsiders. In terms of this, the whole network should be encrypt undertaking the
capability of client which natively supported by windows as well.
Steps to set up LAN network
Equipment: In order to develop LAN network, firstly significant equipments are required
which include router, Ethernet cables for every devices in which an individual want to connect, a
computer system, devices and the broadband connection which include modem and router.
Connect the first computer: If the router is new then it is important to set up the
computer first and connect it to the router with the help of Ethernet cable. For this, windows PC
need to be prominently prompt in terms of developing wizard for the first connection and also
find it in the network and sharing centre in the control panel.
Set up Wi-Fi: The automatic setup wizard tends to take step by step development by the
effective process as by this people can have the prominent internet speed. It also tends to depict
the working of Wi-Fi and the devices that are connected to the Ethernet cables.
Connect to the internet: It depicts that every single devices tends to connect with the
LAN requirements and also set up with effective passcode in terms of connecting successfully to
7
and mapping for the network should be performed for the prominent understanding of entire
network infrastructure which is basic configuration of firewall. After the audit, network should
be keep up to date and check software updates for the network infrastructure components. At that
time, they also need to make sure about effective developing security plan and also try to prevent
from the outsiders. In terms of this, the whole network should be encrypt undertaking the
capability of client which natively supported by windows as well.
Steps to set up LAN network
Equipment: In order to develop LAN network, firstly significant equipments are required
which include router, Ethernet cables for every devices in which an individual want to connect, a
computer system, devices and the broadband connection which include modem and router.
Connect the first computer: If the router is new then it is important to set up the
computer first and connect it to the router with the help of Ethernet cable. For this, windows PC
need to be prominently prompt in terms of developing wizard for the first connection and also
find it in the network and sharing centre in the control panel.
Set up Wi-Fi: The automatic setup wizard tends to take step by step development by the
effective process as by this people can have the prominent internet speed. It also tends to depict
the working of Wi-Fi and the devices that are connected to the Ethernet cables.
Connect to the internet: It depicts that every single devices tends to connect with the
LAN requirements and also set up with effective passcode in terms of connecting successfully to
7
the internet. For this, it should be make sure that the password should be protected and must have
the right firewalls that run for the safety.
Connect the remaining devices: It represent that it tends to connect with the remaining
devices such as printers and mobile devices that need significant internet connection in terms of
connecting with LAN and also able to use it more effectively. Therefore, it bring additional help
and also tends to make sure that this procedure run on smooth basis.
TASK 4
P7. Use information gathering methods to assess, troubleshoot and document solutions to a
number of different technical hardware, software and networking issues
Troubleshooting is the network which is quite difficult at the best time but also try to do
this with limited data as it makes it more hard. A try to troubleshoot the network without
prominent information leads to cause the wrong problem. It also depicts various components in
terms of considering to be the part of problem (Siewiorek and Swarz, 2017). For instance,
understand about the hardware, software or connectivity problem as most of the times computer
users have patience in order to resolve technical problems, prominently undertaking the tight
scheduling and lack of downtime. In terms of this, following steps are mentioned as under:
Identify the issues: It include the prominent identification of problem as it is not possible
to find a prominent solution without considering the exact issue which is occurred in network. In
terms of this, there are various ways to analyse the issue including information gathering with the
help of questionnaires, survey and also identify the symptoms (Jiang, 2018).
Develop a theory of probable cause: For effectively solving issues it is important to
undertake prominent changes regarding effective development and try to solve prominent issues
that leads to cause suitable improvement. In this, it is important to effectively identify the
problem considering the various circumstances. Furthermore, more and more details are gathered
with the aim of eliminating variables and also consider error messages, event logs, diagnostic
outcome and effective monitoring (Bondar and et. al., 2017).
Attempt a fix based on findings: For this, effective focused experimentation is important
as to fix the problem root cause is essential. For this, individual can try tweaking changes
settings that are concerned with the problem and swapping out of the faulty parts, update drivers
and software and so on until the problem gets solve.
8
the right firewalls that run for the safety.
Connect the remaining devices: It represent that it tends to connect with the remaining
devices such as printers and mobile devices that need significant internet connection in terms of
connecting with LAN and also able to use it more effectively. Therefore, it bring additional help
and also tends to make sure that this procedure run on smooth basis.
TASK 4
P7. Use information gathering methods to assess, troubleshoot and document solutions to a
number of different technical hardware, software and networking issues
Troubleshooting is the network which is quite difficult at the best time but also try to do
this with limited data as it makes it more hard. A try to troubleshoot the network without
prominent information leads to cause the wrong problem. It also depicts various components in
terms of considering to be the part of problem (Siewiorek and Swarz, 2017). For instance,
understand about the hardware, software or connectivity problem as most of the times computer
users have patience in order to resolve technical problems, prominently undertaking the tight
scheduling and lack of downtime. In terms of this, following steps are mentioned as under:
Identify the issues: It include the prominent identification of problem as it is not possible
to find a prominent solution without considering the exact issue which is occurred in network. In
terms of this, there are various ways to analyse the issue including information gathering with the
help of questionnaires, survey and also identify the symptoms (Jiang, 2018).
Develop a theory of probable cause: For effectively solving issues it is important to
undertake prominent changes regarding effective development and try to solve prominent issues
that leads to cause suitable improvement. In this, it is important to effectively identify the
problem considering the various circumstances. Furthermore, more and more details are gathered
with the aim of eliminating variables and also consider error messages, event logs, diagnostic
outcome and effective monitoring (Bondar and et. al., 2017).
Attempt a fix based on findings: For this, effective focused experimentation is important
as to fix the problem root cause is essential. For this, individual can try tweaking changes
settings that are concerned with the problem and swapping out of the faulty parts, update drivers
and software and so on until the problem gets solve.
8
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Identify troubleshooting guide that include hardware, software and networking
Check hardware: It represent that check all the hardware connections in order to make
sure the connection properly and turn it on for effective working. It could become the prominent
problem behind the networking issues as there is no point to go through with the process of
troubleshooting network issues and also make sure the prominent switches that are at correct
position.
Use ipconfig: It is undertaken as the terminal and the default gateway for the IP address
of the next number as for this, computer is not receiving the valid IP address and it starts with
other things that is 169 and the computer is being allocated with valid IP address from the router.
Use ping and tracert: This stage depicts that the router is working fine and must have an
effective IP address that start with something like 169 and the problem is significantly located
among the router and the internet itself.
Perform a DNS check: In regard of this, company need to use tools and other command
which is “nslookup” in order to determine that the problem with the server is trying to connect or
not and also depict the response from the server.
Contact the ISP: From all the problems, it is effective to try and contact with the internet
service provider and see with the concerning issues. In terms of this, it is important to look up for
the outage maps and concerning information on the smartphones undertaking the same issues.
Check on malware and virus protection: It is also important to make sure about the virus
and malware techniques that run and also have flagged that tends to affect the prominent part of
network and also stop functioning.
9
Check hardware: It represent that check all the hardware connections in order to make
sure the connection properly and turn it on for effective working. It could become the prominent
problem behind the networking issues as there is no point to go through with the process of
troubleshooting network issues and also make sure the prominent switches that are at correct
position.
Use ipconfig: It is undertaken as the terminal and the default gateway for the IP address
of the next number as for this, computer is not receiving the valid IP address and it starts with
other things that is 169 and the computer is being allocated with valid IP address from the router.
Use ping and tracert: This stage depicts that the router is working fine and must have an
effective IP address that start with something like 169 and the problem is significantly located
among the router and the internet itself.
Perform a DNS check: In regard of this, company need to use tools and other command
which is “nslookup” in order to determine that the problem with the server is trying to connect or
not and also depict the response from the server.
Contact the ISP: From all the problems, it is effective to try and contact with the internet
service provider and see with the concerning issues. In terms of this, it is important to look up for
the outage maps and concerning information on the smartphones undertaking the same issues.
Check on malware and virus protection: It is also important to make sure about the virus
and malware techniques that run and also have flagged that tends to affect the prominent part of
network and also stop functioning.
9
Review database logs: Lastly, it is important to review the database logs to ensure the
effective functioning of data to match its expectations and consider the network performance.
P8. Conduct and document a range of maintenance activities with regards to computer hardware
and software
The effective management of hardware and software become more complex for the
corporate running for small number of applications. It depicts the complexity which leads to
increase the number of corporate users working on the road and remote areas for effective
management system. Moreover, it include the effective diagnostic and troubleshooting skills that
describe various ways for improvement like availability of heuristic which contains thinking for
the actual cause, confirmation bias that cause response for time metric for the evidence of
problem and so on. In terms of improving the troubleshooting skills, it is important to aware, get
feedback, practice, consider data and also identify what is happening. For this, an individual need
to consider data, identify and aware about the biases and other challenges for troubleshooting in
order to get problem solve much faster with better accuracy. Moreover, the future of IT
troubleshooting is based on analytical approaches.
Information gathering methods and techniques
System document: It depicts the system which is used in terms of receiving, tracking,
managing and storing documents for the elimination of paper. In terms of this, it is quite capable
in terms of keeping record for several versions that are created and modified by various users.
For this, the digital documents of management is based on computer programs (Benhlima, 2018).
As this term has some overlap with the prominent concept of content management system. It is
also viewed as the component of enterprise content management which is related with digital
asset management, document imagining, effective workflow system and recording management
systems.
User information: It include significant user related information which is duplication of
IP addresses for quickly fixing the issues and taking preventive measures. Exhaustion of IP
address as it use ipconfig command for the troubleshoot problem and other factors (Madhavan
and et. al., 2018). For this, at the time of network troubleshooting it is important to undertake
various informations for effective networking field which is important for the number of tools as
it is used for troubleshoot for the variety of several network conditions. In terms of this, specific
10
effective functioning of data to match its expectations and consider the network performance.
P8. Conduct and document a range of maintenance activities with regards to computer hardware
and software
The effective management of hardware and software become more complex for the
corporate running for small number of applications. It depicts the complexity which leads to
increase the number of corporate users working on the road and remote areas for effective
management system. Moreover, it include the effective diagnostic and troubleshooting skills that
describe various ways for improvement like availability of heuristic which contains thinking for
the actual cause, confirmation bias that cause response for time metric for the evidence of
problem and so on. In terms of improving the troubleshooting skills, it is important to aware, get
feedback, practice, consider data and also identify what is happening. For this, an individual need
to consider data, identify and aware about the biases and other challenges for troubleshooting in
order to get problem solve much faster with better accuracy. Moreover, the future of IT
troubleshooting is based on analytical approaches.
Information gathering methods and techniques
System document: It depicts the system which is used in terms of receiving, tracking,
managing and storing documents for the elimination of paper. In terms of this, it is quite capable
in terms of keeping record for several versions that are created and modified by various users.
For this, the digital documents of management is based on computer programs (Benhlima, 2018).
As this term has some overlap with the prominent concept of content management system. It is
also viewed as the component of enterprise content management which is related with digital
asset management, document imagining, effective workflow system and recording management
systems.
User information: It include significant user related information which is duplication of
IP addresses for quickly fixing the issues and taking preventive measures. Exhaustion of IP
address as it use ipconfig command for the troubleshoot problem and other factors (Madhavan
and et. al., 2018). For this, at the time of network troubleshooting it is important to undertake
various informations for effective networking field which is important for the number of tools as
it is used for troubleshoot for the variety of several network conditions. In terms of this, specific
10
tools are useful that are subjective and discretion for the effective selection of tools as it based on
generality and common use.
Error codes: At the time of doing computer programming an error code is occur in the
numbered or alphanumeric code as it is determined as the nature of the error and why it is
occurred. In C programming, it is mostly seen as many error codes are defined under the header
file shown as <error.h>. Moreover, it is also found in consumer electronics and other devices for
the effective attempt to do something (Xu, Lin and Yu, 2017). They also passed off to the error
handlers as it leads to determine about the actions that should be taken.
Error messages: It is undertaken as the message for the information display and it occurs
at the time of unforeseen problem occurs. These messages are used when the user intervention is
needed for the effective indication to desired operation and also relay on important warnings.
These messages are widely seen throughout computing and also a part of every operating system.
Computer maintenance checklist
It include various steps for the effective implementation and also try to improve the
overall performance of computer and its steps are as follows:
Update the anti-virus that depend on the program which run on the screen and also clear
regarding the prominent instructions.
Undertake anti-virus programs as there are various options for the spyware and the
removal of software undertaking super antispyware and malware bytes pro.
It is also important to empty the recycle bin and it is effectively done with the Ccleaner.
Scan the significant disk and running application for the software clean up in order to
remove unwanted data that tends to occur error messages and codes.
Again defragment the program in order to free up the windows with the help of disk clean
up.
Configure the system and start up that tends to run automatically when you switch the
computer on.
Regularly check the windows and its updates and plug in for the basic applications.
Check file and its back up plan in order to create system recovery disk as if it is
applicable.
Clean the internal function of computer and its parts in order to maintain its temperature.
11
generality and common use.
Error codes: At the time of doing computer programming an error code is occur in the
numbered or alphanumeric code as it is determined as the nature of the error and why it is
occurred. In C programming, it is mostly seen as many error codes are defined under the header
file shown as <error.h>. Moreover, it is also found in consumer electronics and other devices for
the effective attempt to do something (Xu, Lin and Yu, 2017). They also passed off to the error
handlers as it leads to determine about the actions that should be taken.
Error messages: It is undertaken as the message for the information display and it occurs
at the time of unforeseen problem occurs. These messages are used when the user intervention is
needed for the effective indication to desired operation and also relay on important warnings.
These messages are widely seen throughout computing and also a part of every operating system.
Computer maintenance checklist
It include various steps for the effective implementation and also try to improve the
overall performance of computer and its steps are as follows:
Update the anti-virus that depend on the program which run on the screen and also clear
regarding the prominent instructions.
Undertake anti-virus programs as there are various options for the spyware and the
removal of software undertaking super antispyware and malware bytes pro.
It is also important to empty the recycle bin and it is effectively done with the Ccleaner.
Scan the significant disk and running application for the software clean up in order to
remove unwanted data that tends to occur error messages and codes.
Again defragment the program in order to free up the windows with the help of disk clean
up.
Configure the system and start up that tends to run automatically when you switch the
computer on.
Regularly check the windows and its updates and plug in for the basic applications.
Check file and its back up plan in order to create system recovery disk as if it is
applicable.
Clean the internal function of computer and its parts in order to maintain its temperature.
11
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
CONCLUSION
From the preceding information, it is analysed that computer system is prominently a
machine that leads to simplify the complicated task. Moreover, it leads to increase the overall
performance and leads to eliminate cost for the effective power consumption. In the above
report, various protocols and effective network devices are discussed. It also depicts the
significant topologies and represent the effective use of information gathering methods. Lastly, it
represent the information gathering techniques and methods that are used at the time of
troubleshooting.
12
From the preceding information, it is analysed that computer system is prominently a
machine that leads to simplify the complicated task. Moreover, it leads to increase the overall
performance and leads to eliminate cost for the effective power consumption. In the above
report, various protocols and effective network devices are discussed. It also depicts the
significant topologies and represent the effective use of information gathering methods. Lastly, it
represent the information gathering techniques and methods that are used at the time of
troubleshooting.
12
REFERENCES
Books and Journals
Ahmadi, A and et. al., 2018, June. Evolution of 3C cyber-physical systems architecture for
industry 4.0. In International Workshop on Service Orientation in Holonic and Multi-
Agent Manufacturing (pp. 448-459). Springer, Cham.
Benhlima, L., 2018. Big data management for healthcare systems: architecture, requirements,
and implementation. Advances in bioinformatics, 2018.
Bondar, S and et. al., 2017. Agile digital transformation of System-of-Systems architecture
models using Zachman framework. Journal of Industrial Information Integration, 7,
pp.33-43.
Dickerson, C. and Mavris, D.N., 2016. Architecture and principles of systems engineering. CRC
Press.
Firouzi, F and et. al., 2018. Internet-of-Things and big data for smarter healthcare: From device
to architecture, applications and analytics.
Hwang, K. and Jotwani, N., 2016. Advanced computer architecture, 3e. McGraw-Hill
Education.
Jiang, J.R., 2018. An improved cyber-physical systems architecture for Industry 4.0 smart
factories. Advances in Mechanical Engineering, 10(6), p.1687814018784192.
Lao, L and et. al., 2020. A survey of IoT applications in blockchain systems: Architecture,
consensus, and traffic modeling. ACM Computing Surveys (CSUR), 53(1), pp.1-32.
Madhavan, G and et. al., 2018. Vision for a systems architecture to integrate and transform
population health. Proceedings of the National Academy of Sciences, 115(50),
pp.12595-12602.
Sharma, P.K. and Park, J.H., 2018. Blockchain based hybrid network architecture for the smart
city. Future Generation Computer Systems, 86, pp.650-655.
Siewiorek, D. and Swarz, R., 2017. Reliable computer systems: design and evaluatuion. Digital
Press.
Wells, C.C. and Wells, K., Tornaditech LLC, 2017. Multimedia teleconference streaming
architecture between heterogeneous computer systems. U.S. Patent Application
14/833,141.
Xu, H., Lin, J. and Yu, W., 2017. Smart Transportation Systems: Architecture, Enabling
Technologies, and Open Issues. In Secure and Trustworthy Transportation Cyber-
Physical Systems (pp. 23-49). Springer, Singapore.
13
Books and Journals
Ahmadi, A and et. al., 2018, June. Evolution of 3C cyber-physical systems architecture for
industry 4.0. In International Workshop on Service Orientation in Holonic and Multi-
Agent Manufacturing (pp. 448-459). Springer, Cham.
Benhlima, L., 2018. Big data management for healthcare systems: architecture, requirements,
and implementation. Advances in bioinformatics, 2018.
Bondar, S and et. al., 2017. Agile digital transformation of System-of-Systems architecture
models using Zachman framework. Journal of Industrial Information Integration, 7,
pp.33-43.
Dickerson, C. and Mavris, D.N., 2016. Architecture and principles of systems engineering. CRC
Press.
Firouzi, F and et. al., 2018. Internet-of-Things and big data for smarter healthcare: From device
to architecture, applications and analytics.
Hwang, K. and Jotwani, N., 2016. Advanced computer architecture, 3e. McGraw-Hill
Education.
Jiang, J.R., 2018. An improved cyber-physical systems architecture for Industry 4.0 smart
factories. Advances in Mechanical Engineering, 10(6), p.1687814018784192.
Lao, L and et. al., 2020. A survey of IoT applications in blockchain systems: Architecture,
consensus, and traffic modeling. ACM Computing Surveys (CSUR), 53(1), pp.1-32.
Madhavan, G and et. al., 2018. Vision for a systems architecture to integrate and transform
population health. Proceedings of the National Academy of Sciences, 115(50),
pp.12595-12602.
Sharma, P.K. and Park, J.H., 2018. Blockchain based hybrid network architecture for the smart
city. Future Generation Computer Systems, 86, pp.650-655.
Siewiorek, D. and Swarz, R., 2017. Reliable computer systems: design and evaluatuion. Digital
Press.
Wells, C.C. and Wells, K., Tornaditech LLC, 2017. Multimedia teleconference streaming
architecture between heterogeneous computer systems. U.S. Patent Application
14/833,141.
Xu, H., Lin, J. and Yu, W., 2017. Smart Transportation Systems: Architecture, Enabling
Technologies, and Open Issues. In Secure and Trustworthy Transportation Cyber-
Physical Systems (pp. 23-49). Springer, Singapore.
13
1 out of 15
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.