Comprehensive Report on Computer Systems: Design and Maintenance
VerifiedAdded on 2024/05/23
|40
|4341
|439
Report
AI Summary
This report provides a comprehensive overview of computer systems, covering their roles in various environments like hospitals, education, transport, gaming, and hotels. It details the hardware, software, and peripheral components of a computer system, including the CPU, storage devices, operating systems, application programs, and input/output devices. A comparison of different types of computer systems, such as microcomputers, minicomputers, mainframe computers, and supercomputers, is presented. The report also includes a system design specification tailored to a client's needs, along with an evaluation of its suitability. Furthermore, it describes the process of building and configuring a computer system to meet a specific design, including safety precautions, component installation, and software setup. The report concludes with routine maintenance tasks, such as physical cleaning, data backup, disk defragmentation, web history clearing, antivirus updates, and system service management, as well as hardware and software upgrades for performance enhancement. This document is available on Desklib, a platform offering AI-powered study tools and a wide array of student resources.

Computer System
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

TABLE OF CONTENTS
Introduction......................................................................................................................................1
LO1..................................................................................................................................................2
1.1 explain the role of computer systems in different environments......................................2
1.2 explain the hardware, software and peripheral components of a computer system..........5
1.3 compare different types of computer systems.....................................................................11
LO2................................................................................................................................................13
2.1 produce a system design specification to meet a client’s needs..........................................13
2.2 evaluate the suitability of a system design specification.....................................................14
LO3................................................................................................................................................15
3.1 build and configure a computer system to meet a design specification..............................15
3.2 test and document a computer system.................................................................................24
LO4................................................................................................................................................27
4.1 perform routine maintenance tasks on a computer system..................................................27
4.2 upgrade the hardware and software on a computer system.................................................33
Conclusion.....................................................................................................................................34
References......................................................................................................................................35
Introduction......................................................................................................................................1
LO1..................................................................................................................................................2
1.1 explain the role of computer systems in different environments......................................2
1.2 explain the hardware, software and peripheral components of a computer system..........5
1.3 compare different types of computer systems.....................................................................11
LO2................................................................................................................................................13
2.1 produce a system design specification to meet a client’s needs..........................................13
2.2 evaluate the suitability of a system design specification.....................................................14
LO3................................................................................................................................................15
3.1 build and configure a computer system to meet a design specification..............................15
3.2 test and document a computer system.................................................................................24
LO4................................................................................................................................................27
4.1 perform routine maintenance tasks on a computer system..................................................27
4.2 upgrade the hardware and software on a computer system.................................................33
Conclusion.....................................................................................................................................34
References......................................................................................................................................35

LIST OF TABLES
Table 1: Comparison between different computer system............................................................11
Table 2: Computer specifications..................................................................................................13
Table 3: Common component in all the computer systems...........................................................13
Table 3: Test result........................................................................................................................24
Table 1: Comparison between different computer system............................................................11
Table 2: Computer specifications..................................................................................................13
Table 3: Common component in all the computer systems...........................................................13
Table 3: Test result........................................................................................................................24
You're viewing a preview
Unlock full access by subscribing today!

LIST OF FIGURES
Figure 1 : Computer System used in hospitals................................................................................2
Figure 2: Computer used in schools................................................................................................3
Figure 3: Oyster Card used for various purposes............................................................................3
Figure 4: Computer used for playing games....................................................................................4
Figure 5: Computers for hotel management....................................................................................4
Figure 6:Intel core i7 processor.......................................................................................................5
Figure 7: Different storage devices in computer.............................................................................6
Figure 8: NIC (wireless adapter).....................................................................................................6
Figure 9: Common operating system...............................................................................................7
Figure 10: Various application programs........................................................................................8
Figure 11: Common Utility software...............................................................................................8
Figure 12: Manual input devices.....................................................................................................9
Figure 13:Output devices...............................................................................................................10
Figure 14: Different types of computer systems............................................................................11
Figure 15: Price of various computer systems...............................................................................12
Figure 16: Antistatic mat and wrist straps.....................................................................................15
Figure 17: Installing motherboard.................................................................................................16
Figure 18: Installing the processor.............................................................................................16
Figure 19: Installing the fan and heat sink.....................................................................................17
Figure 17: Installation of hard disk................................................................................................17
Figure 20: Filling the time, currency and language.......................................................................18
Figure 21: Product key for Windows 10........................................................................................19
Figure 22: License is accepted.......................................................................................................19
Figure 23: Installation type............................................................................................................20
Figure 24: The driver is installed...................................................................................................20
Figure 25: Status showing windows installation...........................................................................21
Figure 26: The narrator and magnifier are set...............................................................................21
Figure 27: Customize setting.........................................................................................................22
Figure 28: Owner Specification....................................................................................................22
Figure 29: Verification and authentication...................................................................................23
Figure 1 : Computer System used in hospitals................................................................................2
Figure 2: Computer used in schools................................................................................................3
Figure 3: Oyster Card used for various purposes............................................................................3
Figure 4: Computer used for playing games....................................................................................4
Figure 5: Computers for hotel management....................................................................................4
Figure 6:Intel core i7 processor.......................................................................................................5
Figure 7: Different storage devices in computer.............................................................................6
Figure 8: NIC (wireless adapter).....................................................................................................6
Figure 9: Common operating system...............................................................................................7
Figure 10: Various application programs........................................................................................8
Figure 11: Common Utility software...............................................................................................8
Figure 12: Manual input devices.....................................................................................................9
Figure 13:Output devices...............................................................................................................10
Figure 14: Different types of computer systems............................................................................11
Figure 15: Price of various computer systems...............................................................................12
Figure 16: Antistatic mat and wrist straps.....................................................................................15
Figure 17: Installing motherboard.................................................................................................16
Figure 18: Installing the processor.............................................................................................16
Figure 19: Installing the fan and heat sink.....................................................................................17
Figure 17: Installation of hard disk................................................................................................17
Figure 20: Filling the time, currency and language.......................................................................18
Figure 21: Product key for Windows 10........................................................................................19
Figure 22: License is accepted.......................................................................................................19
Figure 23: Installation type............................................................................................................20
Figure 24: The driver is installed...................................................................................................20
Figure 25: Status showing windows installation...........................................................................21
Figure 26: The narrator and magnifier are set...............................................................................21
Figure 27: Customize setting.........................................................................................................22
Figure 28: Owner Specification....................................................................................................22
Figure 29: Verification and authentication...................................................................................23
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Figure 30: Default app selection....................................................................................................23
Figure 31: Physical cleaning..........................................................................................................27
Figure 32: Cloud as backup...........................................................................................................28
Figure 33: Defragment and optimized drive option......................................................................28
Figure 34: Select and analyze hard drive.......................................................................................29
Figure 35: Optimize the hard drive................................................................................................29
Figure 36: Option to clear all web history.....................................................................................30
Figure 37: Select the type of web browser history to delete..........................................................30
Figure 38: Antivirus update...........................................................................................................31
Figure 39: Enabling and disabling various system services..........................................................32
Figure 31: Physical cleaning..........................................................................................................27
Figure 32: Cloud as backup...........................................................................................................28
Figure 33: Defragment and optimized drive option......................................................................28
Figure 34: Select and analyze hard drive.......................................................................................29
Figure 35: Optimize the hard drive................................................................................................29
Figure 36: Option to clear all web history.....................................................................................30
Figure 37: Select the type of web browser history to delete..........................................................30
Figure 38: Antivirus update...........................................................................................................31
Figure 39: Enabling and disabling various system services..........................................................32

Introduction
Computer are significant elements of present world. In this present report fundamentals of
computer system are studied including different environments such as home, education, business
where computers are highly used. Main purpose of using computers in any organization is to
attain efficiency, accuracy and reducing user’s workload. In this report studies are done about
role and function that computer system performs in various organization. Computer is composed
of various components which can be broadly classified as Hardware, software and peripheral
devices which will be discussed in the current report. The report will provide a comparison
between different type of computers that are for serving different purpose at different fields.
Design is provided in the report together with system specification for all the user in the network.
Configuration and installation of Computer system is illustrated below with various images.
Lastly, this report will discuss about routine maintenance task that is to be done along with
system upgrading for performance enhancement.
1
Computer are significant elements of present world. In this present report fundamentals of
computer system are studied including different environments such as home, education, business
where computers are highly used. Main purpose of using computers in any organization is to
attain efficiency, accuracy and reducing user’s workload. In this report studies are done about
role and function that computer system performs in various organization. Computer is composed
of various components which can be broadly classified as Hardware, software and peripheral
devices which will be discussed in the current report. The report will provide a comparison
between different type of computers that are for serving different purpose at different fields.
Design is provided in the report together with system specification for all the user in the network.
Configuration and installation of Computer system is illustrated below with various images.
Lastly, this report will discuss about routine maintenance task that is to be done along with
system upgrading for performance enhancement.
1
You're viewing a preview
Unlock full access by subscribing today!

LO1
1.1 explain the role of computer systems in different environments
Personal Computer Systems are typically used for routine work because of their various
advantages, such as accurate data handling, consistent work, and higher performance ability.
They help in storing, managing, compiling and processing different kinds of data, with a higher
level of efficiency. They enhance human accuracy for various tasks, and also provide various
platforms for different environments as under:
Hospitals: Systematic records are kept for the patients availing the hospital facility, and can be
typically accessed at the front desk itself. They also help with different surgical operations, by
giving a visual presentation of the patient’s condition, such as EGC Operation (Anderson and
Jay, 2012). Most of the hospitals’ managerial tasks can also be done on the systems, thus
increasing efficiency
Figure 1 : Computer System used in hospitals
(Source: https://www.shutterstock.com, ecg-monitor-patient-s-condition-in-operating-room-
close-up-heartbeat-on-screen-heart-rate-blood.html)
Education: These systems also help students and teachers both, by maintaining efficient records,
and offering the potential of technological learning to the students by means of visual aids.
Students can search for any desired information in Internet Search Engines from their library
computer systems, and gain the requisite information. The systems also assist the students with
their projects.
2
1.1 explain the role of computer systems in different environments
Personal Computer Systems are typically used for routine work because of their various
advantages, such as accurate data handling, consistent work, and higher performance ability.
They help in storing, managing, compiling and processing different kinds of data, with a higher
level of efficiency. They enhance human accuracy for various tasks, and also provide various
platforms for different environments as under:
Hospitals: Systematic records are kept for the patients availing the hospital facility, and can be
typically accessed at the front desk itself. They also help with different surgical operations, by
giving a visual presentation of the patient’s condition, such as EGC Operation (Anderson and
Jay, 2012). Most of the hospitals’ managerial tasks can also be done on the systems, thus
increasing efficiency
Figure 1 : Computer System used in hospitals
(Source: https://www.shutterstock.com, ecg-monitor-patient-s-condition-in-operating-room-
close-up-heartbeat-on-screen-heart-rate-blood.html)
Education: These systems also help students and teachers both, by maintaining efficient records,
and offering the potential of technological learning to the students by means of visual aids.
Students can search for any desired information in Internet Search Engines from their library
computer systems, and gain the requisite information. The systems also assist the students with
their projects.
2
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Figure 2: Computer used in schools
(https://ace.iafor.org/, 2018)
Transport: Computer systems enhance the functioning of transport systems, by assisting in
booking tickets, reservations, and keeping passenger records. For instance, the Oyster Card in the
UK is used to give tickets to passengers on credit, which can be utilized to avail any means of
transportation to their needed location.
Figure 3: Oyster Card used for various purposes
(Source: https://www.shutterstock.com, 2018)
Gaming: Gamers are increasingly using computer systems due to the greater amount of
graphical and visual effects provided by these systems, which make the user feel as if he/she is in
a virtual arena with realistic looking objects and scenarios.
3
(https://ace.iafor.org/, 2018)
Transport: Computer systems enhance the functioning of transport systems, by assisting in
booking tickets, reservations, and keeping passenger records. For instance, the Oyster Card in the
UK is used to give tickets to passengers on credit, which can be utilized to avail any means of
transportation to their needed location.
Figure 3: Oyster Card used for various purposes
(Source: https://www.shutterstock.com, 2018)
Gaming: Gamers are increasingly using computer systems due to the greater amount of
graphical and visual effects provided by these systems, which make the user feel as if he/she is in
a virtual arena with realistic looking objects and scenarios.
3

Figure 4: Computer used for playing games
(Source: https://en.softonic.com, 2018)
Hotels: Customer data, worker data as well as other stakeholder data can be recorded in the
computer systems, and this facility is being increasingly used by hotels. Hotel managers also
utilize these systems to input the requisite data, and record it, so that the complex manual
procedures involved in clerical tasks can be avoided. Using these systems, decisions can be made
quickly, and client behaviour can also be routinely assessed.
Figure 5: Computers for hotel management
(Source: https://www.hospitalitynet.org/opinion/4080523.html, 2018)
4
(Source: https://en.softonic.com, 2018)
Hotels: Customer data, worker data as well as other stakeholder data can be recorded in the
computer systems, and this facility is being increasingly used by hotels. Hotel managers also
utilize these systems to input the requisite data, and record it, so that the complex manual
procedures involved in clerical tasks can be avoided. Using these systems, decisions can be made
quickly, and client behaviour can also be routinely assessed.
Figure 5: Computers for hotel management
(Source: https://www.hospitalitynet.org/opinion/4080523.html, 2018)
4
You're viewing a preview
Unlock full access by subscribing today!

1.2 explain the hardware, software and peripheral components of a computer system
Components of a computer system is broadly classified as hardware and software.
Hardware Components
Computer Hardware is the physical components or machineries that makes a computer system.
The common hardware is the memory, Central processing unit, storage device and Network
Interface Card.
Central processing Unit is the heart of the computer. CPU performs all the vital operations of the
computer including all the arithmetic and logical calculations. It is responsible for receiving
input data, executes commands given, and then processes the information by communicating
with all the Input and Output devices (Wolf, 2012).
Figure 6:Intel core i7 processor
(Source: https://www.zdnet.com/, 20018
Storage devices are used for storing various information in the computer. Hard disk is used for
permanently or temporarily data storage which cab be recovered as necessity. In computer
system, Memory is also referred as RAM or Random-Access Memory, which holds data for
supporting the processor to perform various function.
5
Components of a computer system is broadly classified as hardware and software.
Hardware Components
Computer Hardware is the physical components or machineries that makes a computer system.
The common hardware is the memory, Central processing unit, storage device and Network
Interface Card.
Central processing Unit is the heart of the computer. CPU performs all the vital operations of the
computer including all the arithmetic and logical calculations. It is responsible for receiving
input data, executes commands given, and then processes the information by communicating
with all the Input and Output devices (Wolf, 2012).
Figure 6:Intel core i7 processor
(Source: https://www.zdnet.com/, 20018
Storage devices are used for storing various information in the computer. Hard disk is used for
permanently or temporarily data storage which cab be recovered as necessity. In computer
system, Memory is also referred as RAM or Random-Access Memory, which holds data for
supporting the processor to perform various function.
5
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Figure 7: Different storage devices in computer
(Source: http://howprices.com/storage-devices/, 2018)
Network interface cards or NIC is an electronic circuit which is responsible for connecting the
computing devices to its Internet services provider to access internet.
Figure 8: NIC (wireless adapter)
(Source: https://www.rebeltech.co.za/, 2018)
6
(Source: http://howprices.com/storage-devices/, 2018)
Network interface cards or NIC is an electronic circuit which is responsible for connecting the
computing devices to its Internet services provider to access internet.
Figure 8: NIC (wireless adapter)
(Source: https://www.rebeltech.co.za/, 2018)
6

Software Components
Software are basically logical program that are used for monitoring, controlling and executing
various computer function. Software can be categorized into three types including
Operating system
Application software
Utility software.
Operating system: it is referred to a low-level software, it is responsible for managing all the
hardware and other software resources present in the computer system. The entire computer
system depends on the operating system for it running. OS forms an interface between the
computer hardware and user. Elementary responsibilities of OS are memory management, file
management, process management, and controlling peripheral devices and handling input and
output devices. IOS and Windows are two common OS (Lajoie and Derry, 2013).).
Figure 9: Common operating system
(Source: http://stmaryscc.com/getting-know-operating-system-computer/, 2018)
Application programs: these are software that are designed for performing of synchronized tasks
or operation. It takes help of the operating system services for the benefit of the computer user.
For an instance, database programs, games.
7
Software are basically logical program that are used for monitoring, controlling and executing
various computer function. Software can be categorized into three types including
Operating system
Application software
Utility software.
Operating system: it is referred to a low-level software, it is responsible for managing all the
hardware and other software resources present in the computer system. The entire computer
system depends on the operating system for it running. OS forms an interface between the
computer hardware and user. Elementary responsibilities of OS are memory management, file
management, process management, and controlling peripheral devices and handling input and
output devices. IOS and Windows are two common OS (Lajoie and Derry, 2013).).
Figure 9: Common operating system
(Source: http://stmaryscc.com/getting-know-operating-system-computer/, 2018)
Application programs: these are software that are designed for performing of synchronized tasks
or operation. It takes help of the operating system services for the benefit of the computer user.
For an instance, database programs, games.
7
You're viewing a preview
Unlock full access by subscribing today!

Figure 10: Various application programs
(Source: https://www.megapixl.com/computer-applications, 2018)
Utility software: This software is used along with OS to manage, control, organize, examine, and
optimize computer resources. For example, backup tools, junk cleaner, antivirus and disk
managers.
Figure 11: Common Utility software
(Source: https://toledocomputerrepair.com/top-rated-utility-software-programs, 2018)
Peripherals Components
8
(Source: https://www.megapixl.com/computer-applications, 2018)
Utility software: This software is used along with OS to manage, control, organize, examine, and
optimize computer resources. For example, backup tools, junk cleaner, antivirus and disk
managers.
Figure 11: Common Utility software
(Source: https://toledocomputerrepair.com/top-rated-utility-software-programs, 2018)
Peripherals Components
8
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Peripherals components are referred to those devices which are connected with the computer for
sending and receiving data from the user.
Input devices: These are machine that are helpful for feeding various information to the computer
system, either in form image, number, text, video or audio. Input devices in a computer translates
data in form of binary code that can be read and processed by the computer. For example,
keyboard, joystick, mouse, scanner etc (Han-da, et al 2013).
Figure 12: Manual input devices
Output devices: Output devices is referred to device that are used mainly for sending data from a
computing device to other or to the user in form of video or audio. Examples of output device
includes projector, monitors, projectors, printer and headphones.
9
sending and receiving data from the user.
Input devices: These are machine that are helpful for feeding various information to the computer
system, either in form image, number, text, video or audio. Input devices in a computer translates
data in form of binary code that can be read and processed by the computer. For example,
keyboard, joystick, mouse, scanner etc (Han-da, et al 2013).
Figure 12: Manual input devices
Output devices: Output devices is referred to device that are used mainly for sending data from a
computing device to other or to the user in form of video or audio. Examples of output device
includes projector, monitors, projectors, printer and headphones.
9

Figure 13:Output devices
10
10
You're viewing a preview
Unlock full access by subscribing today!

1.3 compare different types of computer systems
Computer system can be classified into micro, mini, mainframe, supercomputers. These
classification is based on shape, size and processing capability.
Figure 14: Different types of computer systems
Table 1: Comparison between different computer system
Types Microcomputer Minicomputers Mainframe
computers
Supercomputers
Size Small Small Large Very large
Expense Cheapest Less expensive Expensive Very expensive
Uses personal use and
business
application(Abraham,
et al 2015)
Data
computerization,
scientific research,
telephone
switches.
Universities, stock
exchanges,
insurance, banking
institutions.
quantum mechanics,
physical simulation
spaceship and
aerodynamics
Speed Microsecond Under 100
nanoseconds
Under 70
nanoseconds
Under 15
nanoseconds
Number of
user
1 10-100 100-500 500-thousand
Example Personal computers Honeywell 200
IBM System/3
TI-990
System z9
IBM zSeries
System z10
servers
Trinity by Cray
Inc
IBM Roadrunner
IBM Sequoia
11
Mini computer Micro computer Mainframe
computer
Supercomputer
Computer system can be classified into micro, mini, mainframe, supercomputers. These
classification is based on shape, size and processing capability.
Figure 14: Different types of computer systems
Table 1: Comparison between different computer system
Types Microcomputer Minicomputers Mainframe
computers
Supercomputers
Size Small Small Large Very large
Expense Cheapest Less expensive Expensive Very expensive
Uses personal use and
business
application(Abraham,
et al 2015)
Data
computerization,
scientific research,
telephone
switches.
Universities, stock
exchanges,
insurance, banking
institutions.
quantum mechanics,
physical simulation
spaceship and
aerodynamics
Speed Microsecond Under 100
nanoseconds
Under 70
nanoseconds
Under 15
nanoseconds
Number of
user
1 10-100 100-500 500-thousand
Example Personal computers Honeywell 200
IBM System/3
TI-990
System z9
IBM zSeries
System z10
servers
Trinity by Cray
Inc
IBM Roadrunner
IBM Sequoia
11
Mini computer Micro computer Mainframe
computer
Supercomputer
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Figure 15: Price of various computer systems
12
12

LO2
2.1 produce a system design specification to meet a client’s needs
Computer specifications as per the need of the organization
Table 2: Computer specifications
Specification Recruitment
consultant
Recruitment
manager
Secretary/
receptionist
Client Administrator
Cost $ 875 $ 750 $750 $750 $ 1200
Processor used Intel i5 Intel i5 Intel i5 Intel i5 Intel i7
Operating
System
Windows 10 Windows 10 Windows 10 Windows 10 Windows
server 2012
Motherboard Intel DH87RL Intel DH87RL Intel DH87RL Intel DH87RL GA-H97M-
D3H
motherboard
(Eastman,
2018)
Primary memory 6GB 4GB 2GB 4GB 6GB
Hard disk 2TB 1TB 2TB 1TB 4TB
Table 3: Common component in all the computer systems
Component Specification
Display 16:9 screen (HP)
Printer HP LaserJet printer
Keyboard Logitech k400 plus keyboard
Mouse HP Wireless Mouse x4000
13
2.1 produce a system design specification to meet a client’s needs
Computer specifications as per the need of the organization
Table 2: Computer specifications
Specification Recruitment
consultant
Recruitment
manager
Secretary/
receptionist
Client Administrator
Cost $ 875 $ 750 $750 $750 $ 1200
Processor used Intel i5 Intel i5 Intel i5 Intel i5 Intel i7
Operating
System
Windows 10 Windows 10 Windows 10 Windows 10 Windows
server 2012
Motherboard Intel DH87RL Intel DH87RL Intel DH87RL Intel DH87RL GA-H97M-
D3H
motherboard
(Eastman,
2018)
Primary memory 6GB 4GB 2GB 4GB 6GB
Hard disk 2TB 1TB 2TB 1TB 4TB
Table 3: Common component in all the computer systems
Component Specification
Display 16:9 screen (HP)
Printer HP LaserJet printer
Keyboard Logitech k400 plus keyboard
Mouse HP Wireless Mouse x4000
13
You're viewing a preview
Unlock full access by subscribing today!

2.2 evaluate the suitability of a system design specification
The present computer system for all the user in the Synergy is effective in fulfilling the
organizational network requirements. Computers systems is provided with different primary
memory ranging from 4GB to 6GB according to the need and requirement of the user.
Secretaries and receptionist does not need mush memory so a memory of 2GB is provided to
them. However, memory of 4GB is offered to recruitment manager and client. And 6GB to
administrator and recruitment consultant for supporting complex application.
hard disk a secondary memory is provided to all the system depending upon their file storage
requirement and accessing the files. These secondary storages provide local storage to quicker
data accessibility.
Server is provided with i7 processor for attaining high performance and for reducing length of
instruction cycle. To support parallel processing for managing all other computers in the
network. Processor is capable offering real time operation even for complex operations.
Motherboard in the computer system is a significant element they are responsible for defining all
the components in the system and their interaction with each other to perform a particular task.
Motherboard provided by Intel is very powerful offering high performance and functionality by
integrating various components via their ports. This port connects different elements like primary
memory or hard disk.
14
The present computer system for all the user in the Synergy is effective in fulfilling the
organizational network requirements. Computers systems is provided with different primary
memory ranging from 4GB to 6GB according to the need and requirement of the user.
Secretaries and receptionist does not need mush memory so a memory of 2GB is provided to
them. However, memory of 4GB is offered to recruitment manager and client. And 6GB to
administrator and recruitment consultant for supporting complex application.
hard disk a secondary memory is provided to all the system depending upon their file storage
requirement and accessing the files. These secondary storages provide local storage to quicker
data accessibility.
Server is provided with i7 processor for attaining high performance and for reducing length of
instruction cycle. To support parallel processing for managing all other computers in the
network. Processor is capable offering real time operation even for complex operations.
Motherboard in the computer system is a significant element they are responsible for defining all
the components in the system and their interaction with each other to perform a particular task.
Motherboard provided by Intel is very powerful offering high performance and functionality by
integrating various components via their ports. This port connects different elements like primary
memory or hard disk.
14
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

LO3
3.1 build and configure a computer system to meet a design specification
Safety precautions
Antistatic mat and wrist straps
Figure 16: Antistatic mat and wrist straps
Before system installation, it is suggested that the user must use an Antistatic mat and wrist strap
for carefully handling the motherboard and processor (Antistatic wrap, 2018). As these
components are very delicate and even minute shock or static can damage the whole processor.
System installation
Motherboard
Motherboard is the backbone of computer system. All the important hardware component in the
computer is mostly plugged with or installed in the motherboard.
15
3.1 build and configure a computer system to meet a design specification
Safety precautions
Antistatic mat and wrist straps
Figure 16: Antistatic mat and wrist straps
Before system installation, it is suggested that the user must use an Antistatic mat and wrist strap
for carefully handling the motherboard and processor (Antistatic wrap, 2018). As these
components are very delicate and even minute shock or static can damage the whole processor.
System installation
Motherboard
Motherboard is the backbone of computer system. All the important hardware component in the
computer is mostly plugged with or installed in the motherboard.
15

Figure 17: Installing motherboard
Installing the processor
Processor is placed in the motherboard socket provided for installing it. The socket lever is lifted
and the CPU is sited in the location in a way that all its corner matches accurately with the in-
built location provided.
Figure 18: Installing the processor
Installing fan and heat sink
To control the temperature of the processor and motherboard a fan and heatsink are insatled in
the motherboard by fixing them to it.
16
Installing the processor
Processor is placed in the motherboard socket provided for installing it. The socket lever is lifted
and the CPU is sited in the location in a way that all its corner matches accurately with the in-
built location provided.
Figure 18: Installing the processor
Installing fan and heat sink
To control the temperature of the processor and motherboard a fan and heatsink are insatled in
the motherboard by fixing them to it.
16
You're viewing a preview
Unlock full access by subscribing today!

Figure 19: Installing the fan and heat sink
Installing the hard disk
Information are stored in the hard disk. Using proper cable configuration, a hard disk is
efficiently installed in computer system.
Figure 20: Installation of hard disk
Stepwise installation of windows 10 for the computer systems in the network:
1. A USB flash drive is used for installing Windows 10 in the computer system.
17
Installing the hard disk
Information are stored in the hard disk. Using proper cable configuration, a hard disk is
efficiently installed in computer system.
Figure 20: Installation of hard disk
Stepwise installation of windows 10 for the computer systems in the network:
1. A USB flash drive is used for installing Windows 10 in the computer system.
17
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

2. Language, time and currency need to be filled for proceeding further.
Figure 21: Filling the time, currency and language
3. Installation process beings
4. Enter the product key for authentication.
18
Figure 21: Filling the time, currency and language
3. Installation process beings
4. Enter the product key for authentication.
18

Figure 22: Product key for Windows 10
5. Accepting the license term provided by Microsoft after reading all terms an condition
related to the OS.
Figure 23: License is accepted
19
5. Accepting the license term provided by Microsoft after reading all terms an condition
related to the OS.
Figure 23: License is accepted
19
You're viewing a preview
Unlock full access by subscribing today!

6. Chose the type of insatllation.
Figure 24: Installation type
7. Formatting of the drive.
Figure 25: The driver is installed
20
Figure 24: Installation type
7. Formatting of the drive.
Figure 25: The driver is installed
20
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Figure 26: Status showing windows installation
8. Next step includes personalizing setting providing location, protection and browser.
Figure 27: The narrator and magnifier are set
21
8. Next step includes personalizing setting providing location, protection and browser.
Figure 27: The narrator and magnifier are set
21

Figure 28: Customize setting
Figure 29: Owner Specification
22
Figure 29: Owner Specification
22
You're viewing a preview
Unlock full access by subscribing today!

Figure 30: Verification and authentication
Figure 31: Default app selection
9. Installation of Operating System is complete.
23
Figure 31: Default app selection
9. Installation of Operating System is complete.
23
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

3.2 test and document a computer system
Table 4: Test result
Parameters Explanation Result
Expected
Result Obtained Success or
Failure
Operating
System
The organization
must frequently
keep on updating
the operating
system installed
in the computer
systems of the
network.
Operating
system should be
updated at
regular interval
without
involvement of
manual process.
In the network,
Operating systems
installed in the
computer were
updated
automatically
without effecting
system or data.
Success
Applications Applications are
Installation in
the network as
per the need of
user.
Installation of
the application
must be done
without error.
applications in the
systems are
successfully
installed
Success
Drivers Testing of driver
is effective to
monitor and
control done
functionality and
connectivity.
All the devices
in network must
be working and
functioning
appropriately.
Device drivers are
used in the network
for diverse
purposes such
display or audio
working.
Success
Power test The power
button is pressed
for checking the
flow of
System boots
normally. If
there is any
error, beeps are
The Computer
system boots in its
booting time.
Success
24
Table 4: Test result
Parameters Explanation Result
Expected
Result Obtained Success or
Failure
Operating
System
The organization
must frequently
keep on updating
the operating
system installed
in the computer
systems of the
network.
Operating
system should be
updated at
regular interval
without
involvement of
manual process.
In the network,
Operating systems
installed in the
computer were
updated
automatically
without effecting
system or data.
Success
Applications Applications are
Installation in
the network as
per the need of
user.
Installation of
the application
must be done
without error.
applications in the
systems are
successfully
installed
Success
Drivers Testing of driver
is effective to
monitor and
control done
functionality and
connectivity.
All the devices
in network must
be working and
functioning
appropriately.
Device drivers are
used in the network
for diverse
purposes such
display or audio
working.
Success
Power test The power
button is pressed
for checking the
flow of
System boots
normally. If
there is any
error, beeps are
The Computer
system boots in its
booting time.
Success
24

electricity. created.
Primary
Memory
Even the
computer is
running and
installing a large
application, the
performance of
the entire system
must not be
affected.
Primary memory
in a system helps
in suitable and
proper resource
utilization and
space
availability
While loading and
execution of
application, the
computer was
accurately
performing having
residual memory
for other functions.
Success
Sound Checking is
done for clarity
and functionality
and the speakers
present with the
computer
system.
The speaker
must have
audible and clear
sound.
Both the Speakers
are working
accurately and its
can be and control
by the computer
user.
Success
Post Post are used for
testing the
connectivity
between various
peripheral
devices in the
network,
post is check at
the time of
system boot. It
checks the
connectivity of
devices
POST is applied in
the network. it is
found all the
devices ae linked
with one another
quite effectively.
Success
Test result from the above table gives a clear idea that all the system in the network and their
peripheral devices are properly function as per the need and requirement of the user. Computer in
the network are installed and configured accordingly. Therefore, it can be concluded that the
25
Primary
Memory
Even the
computer is
running and
installing a large
application, the
performance of
the entire system
must not be
affected.
Primary memory
in a system helps
in suitable and
proper resource
utilization and
space
availability
While loading and
execution of
application, the
computer was
accurately
performing having
residual memory
for other functions.
Success
Sound Checking is
done for clarity
and functionality
and the speakers
present with the
computer
system.
The speaker
must have
audible and clear
sound.
Both the Speakers
are working
accurately and its
can be and control
by the computer
user.
Success
Post Post are used for
testing the
connectivity
between various
peripheral
devices in the
network,
post is check at
the time of
system boot. It
checks the
connectivity of
devices
POST is applied in
the network. it is
found all the
devices ae linked
with one another
quite effectively.
Success
Test result from the above table gives a clear idea that all the system in the network and their
peripheral devices are properly function as per the need and requirement of the user. Computer in
the network are installed and configured accordingly. Therefore, it can be concluded that the
25
You're viewing a preview
Unlock full access by subscribing today!

devices are capable of attaining high performance, reliability and most importantly security with
proper connectivity.
26
proper connectivity.
26
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

LO4
4.1 perform routine maintenance tasks on a computer system
For maintaining the efficiency of the computer system, it is recommended that routine
maintenance must be followed by the user to keep the system away from any kind of damage.
Physical maintenance
Physically the system must be cleaned frequently either by Air blow or by wet wipes for
removing dust and debris from the systems. Existence of dust in the will increase motherboard
and processors heat that will adversely effect the computer system as a whole.
Figure 32: Physical cleaning
Data Backup
It is highly recommended that system and data back need to be maintained in any network. This
back up are very helpful in case of data loss and system crashes. All the vital and sensitive data
should be stored in the backup system. Clouds and hard drive profs to be the most effectual
backup system.
27
4.1 perform routine maintenance tasks on a computer system
For maintaining the efficiency of the computer system, it is recommended that routine
maintenance must be followed by the user to keep the system away from any kind of damage.
Physical maintenance
Physically the system must be cleaned frequently either by Air blow or by wet wipes for
removing dust and debris from the systems. Existence of dust in the will increase motherboard
and processors heat that will adversely effect the computer system as a whole.
Figure 32: Physical cleaning
Data Backup
It is highly recommended that system and data back need to be maintained in any network. This
back up are very helpful in case of data loss and system crashes. All the vital and sensitive data
should be stored in the backup system. Clouds and hard drive profs to be the most effectual
backup system.
27

Figure 33: Cloud as backup
Defragmentation
With time, the hard drive of the computer system gets fragmented that lowers the computer’s
performance speed as it need to check various places in the drive. In windows defragment tool is
in-built that defragments the system automatically. It is recommended that the user must check
the percentage of fragmentation to reduce the load (Disk Defragmentation , 2018).
Steps for checking fragmentation and fixing it:
1. The disk optimizing tool is opened
Figure 34: Defragment and optimized drive option
28
Defragmentation
With time, the hard drive of the computer system gets fragmented that lowers the computer’s
performance speed as it need to check various places in the drive. In windows defragment tool is
in-built that defragments the system automatically. It is recommended that the user must check
the percentage of fragmentation to reduce the load (Disk Defragmentation , 2018).
Steps for checking fragmentation and fixing it:
1. The disk optimizing tool is opened
Figure 34: Defragment and optimized drive option
28
You're viewing a preview
Unlock full access by subscribing today!

2. Then the hard drive is selected and the analyses option is clicked.
Figure 35: Select and analyze hard drive
3. Percentage of fragmented file is checked.
4. For defragmentation Optimize option is clicked.
Figure 36: Optimize the hard drive
29
Figure 35: Select and analyze hard drive
3. Percentage of fragmented file is checked.
4. For defragmentation Optimize option is clicked.
Figure 36: Optimize the hard drive
29
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Cleaning the browser history
Windows 10 has the latest web browser of the Microsoft Edge. To maintain data privacy and
security it is suggested that the browsing history, cookies,downloaded file of the browser must be
cleared in a frequent interval. Microsoft Edge has a Hub button that includes a history icon
which contain the recent web history of the sytem (browser history, 2018).
Figure 37: Option to clear all web history
Figure 38: Select the type of web browser history to delete
30
Windows 10 has the latest web browser of the Microsoft Edge. To maintain data privacy and
security it is suggested that the browsing history, cookies,downloaded file of the browser must be
cleared in a frequent interval. Microsoft Edge has a Hub button that includes a history icon
which contain the recent web history of the sytem (browser history, 2018).
Figure 37: Option to clear all web history
Figure 38: Select the type of web browser history to delete
30

Antivirus update
Antivirus is a software helps the system to stay protected for any kind of outside threats like
malware, worm and viruses. This software must be kept updated frequently to cope any kind of
threats in the system.
Figure 39: Antivirus update
Disabling unused service
Whenever a new application is installed in a computer system it generated many different
unwanted service to get activated in the system that causes lowering of the performance and
increasing the booting time. Hence, it is started that all these unused and unnecessary services
should be disabled.
31
Antivirus is a software helps the system to stay protected for any kind of outside threats like
malware, worm and viruses. This software must be kept updated frequently to cope any kind of
threats in the system.
Figure 39: Antivirus update
Disabling unused service
Whenever a new application is installed in a computer system it generated many different
unwanted service to get activated in the system that causes lowering of the performance and
increasing the booting time. Hence, it is started that all these unused and unnecessary services
should be disabled.
31
You're viewing a preview
Unlock full access by subscribing today!

Figure 40: Enabling and disabling various system services
32
32
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4.2 upgrade the hardware and software on a computer system
All the computer systems in Synergy are very operative and are proficient to achieve the
objectives of the organization. Yet, it has been suggested that frequent updating and upgrading
should be done for enhancing the functionality and productivity along with security. It is
recommended that a new Graphic card need to be installed for upgrading the system for the
system for administrator by eradicating the present card so that display quality is improved.
For improving the system performance, the present Operating System should be updated to its
latest version present in the market. For this purpose, Custom installation option is used for
upgrading the operating system installed in the computer.
It is the responsibility of the organization to provide proper training to all its stuff members for
improving their skills regarding the computer systems and other application installed in the
organization. Efficiency of the employees must be checked to avoid work delay.
33
All the computer systems in Synergy are very operative and are proficient to achieve the
objectives of the organization. Yet, it has been suggested that frequent updating and upgrading
should be done for enhancing the functionality and productivity along with security. It is
recommended that a new Graphic card need to be installed for upgrading the system for the
system for administrator by eradicating the present card so that display quality is improved.
For improving the system performance, the present Operating System should be updated to its
latest version present in the market. For this purpose, Custom installation option is used for
upgrading the operating system installed in the computer.
It is the responsibility of the organization to provide proper training to all its stuff members for
improving their skills regarding the computer systems and other application installed in the
organization. Efficiency of the employees must be checked to avoid work delay.
33

Conclusion
The report discusses about various roles and operation of computer system in different
environments. The components of computer system are classified as hardware and software and
brief studies are done to understand all the computer component that constitute a computer. In
the above report, evaluates about computer installation along with system maintenance. The
computer components must be upgraded and updated in a regular interval for enhancing the
performance. Moreover, the repost provides a maintenance task that can be applied by the
organization monitoring and managing data, software and hardware present in the network. It
can be concluded the present computer system for Synergy is effective in attaining its goals but
with potential upgradation the system can be enhanced further.
34
The report discusses about various roles and operation of computer system in different
environments. The components of computer system are classified as hardware and software and
brief studies are done to understand all the computer component that constitute a computer. In
the above report, evaluates about computer installation along with system maintenance. The
computer components must be upgraded and updated in a regular interval for enhancing the
performance. Moreover, the repost provides a maintenance task that can be applied by the
organization monitoring and managing data, software and hardware present in the network. It
can be concluded the present computer system for Synergy is effective in attaining its goals but
with potential upgradation the system can be enhanced further.
34
You're viewing a preview
Unlock full access by subscribing today!

References
Books and Journals
Abraham, M.J., Murtola, T., Schulz, R., Páll, S., Smith, J.C., Hess, B. and Lindahl, E., 2015.
GROMACS: High performance molecular simulations through multi-level parallelism from
laptops to supercomputers. SoftwareX, 1, pp.19-25.
Anderson, J.G. and Jay, S.J. eds., 2012. Use and impact of computers in clinical medicine.
Springer Science & Business Media.
Eastman, C.M., 2018. Building product models: computer environments, supporting design and
construction. CRC press.
Han-da, M.A. and Ke-jin, B.A.O., 2013. Reform and Practice of Experimental Teaching of
Computer Hardware. Research and Exploration in Laboratory, 10, p.104.
Lajoie, S.P. and Derry, S.J. eds., 2013. Computers as cognitive tools. Routledge.
Wolf, M., 2012. Computers as components: principles of embedded computing system design.
Elsevier.
Online References
Antistatic straps, 2018 [Online][Accessed
through]<https://www.techopedia.com/definition/27301/anti-static-wrist-strap> [accessed on:
27th April, 2018]
Browser historty, 2018 [Online][Accessed through]<
https://support.google.com/chrome/answer/95589?co=GENIE.Platform%3DDesktop&hl=en >
[accessed on: 27th April, 2018]
Disk Defragmentation , 2018[Online][Accessed through]<
https://support.microsoft.com/en-in/help/4026701/windows-defragment-your-windows-10-pc >
[accessed on: 27th April, 2018]
35
Books and Journals
Abraham, M.J., Murtola, T., Schulz, R., Páll, S., Smith, J.C., Hess, B. and Lindahl, E., 2015.
GROMACS: High performance molecular simulations through multi-level parallelism from
laptops to supercomputers. SoftwareX, 1, pp.19-25.
Anderson, J.G. and Jay, S.J. eds., 2012. Use and impact of computers in clinical medicine.
Springer Science & Business Media.
Eastman, C.M., 2018. Building product models: computer environments, supporting design and
construction. CRC press.
Han-da, M.A. and Ke-jin, B.A.O., 2013. Reform and Practice of Experimental Teaching of
Computer Hardware. Research and Exploration in Laboratory, 10, p.104.
Lajoie, S.P. and Derry, S.J. eds., 2013. Computers as cognitive tools. Routledge.
Wolf, M., 2012. Computers as components: principles of embedded computing system design.
Elsevier.
Online References
Antistatic straps, 2018 [Online][Accessed
through]<https://www.techopedia.com/definition/27301/anti-static-wrist-strap> [accessed on:
27th April, 2018]
Browser historty, 2018 [Online][Accessed through]<
https://support.google.com/chrome/answer/95589?co=GENIE.Platform%3DDesktop&hl=en >
[accessed on: 27th April, 2018]
Disk Defragmentation , 2018[Online][Accessed through]<
https://support.microsoft.com/en-in/help/4026701/windows-defragment-your-windows-10-pc >
[accessed on: 27th April, 2018]
35
1 out of 40
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.