Monday 15 September 2014

Unit 2 Task 3 P3

Unit 2 Task 3 P3

Explain the Purpose of different software utilities

The purpose of having different software utilities on your computer is so that the computer can run as fast as possible and be used to its full potential. Security software utilities include firewalls and virus protection. Firewalls are used to monitor incoming and outgoing data on a computer system connected to a network. The firewall checks if the data is coming from a trusted source and if the source isn’t trusted the firewall blocks it. Firewalls are good because they prevent viruses and trojans getting installed onto your computer. Virus protection software is used to scan the computer system and stop computer worms, trojans and viruses. Viruses can corrupt your computer system and enable hacker to take over. The hacker could then steal your important documents and personal data; this is why you should install anti-virus software such as AVAST!. This will protect your computer from viruses and you should configure it to scan your computer system regularly. Updates should also be done regularly on your anti-virus software as hackers are finding new ways to get into your personal computer and new viruses are being made constantly.

Clean up tools are essential in order to improve a computer's performance. Clean up tools delete unwanted files and ensure your hard drive is organised. Most operating systems already have clean up tools built in such as ‘Windows Disk Cleanup’. This is used to remove cookies which have been downloaded when the computer user accesses certain websites such as ‘Kerboodle’. By removing cookies, the operating system can run faster as more space has been made. You can also delete your internet history which will free up disk space and improve the overall performance of your computer. Another clean up tool is the recycle bin. Again most computers have this built in. The recycle bin is used to permanently remove program files and delete items from your hard drive. To keep your computers performance at a high standard you should perform scheduled defragmentation on a regular basis. By defragmenting your hard drive after deleting all unnecessary and unwanted files, it will arrange files on your hard drive so that they are easier to access.






Drive formatting;
Drive formatting is used to get rid of all data on the hard drive. There are different levels of formatting as sometimes the data can be retrieved again. However this is only used for sensitive information and a military level formatting is used to ensure that the data can be obtained. Disk formatting tools can also be used to part drives into different areas so that they can be formatted into different file formats such as NTFS.

Unit 2 Task 2 P2

Purpose of operating Systems


The purpose of operating systems is to allow the computer to communicate with the hard drive. The computers operating system communicates with the peripherals through the software drivers and devices. The computers operating system controls peripherals such as keyboards and mouses. It also controls the whole machine and all of the components inside it. An example of an operating system is Windows XP. This has been very successful and updated as times have changed. Another operating system is Mac OS, this is used on apple mac devices.

Machine and Peripheral Management;
Peripheral management controls the computers peripheral devices by sending commands in the computer's own language. The software routine that deals with each device is called the driver. When a new peripheral is added, the devices driver is installed into the computer's operating system .


Security;
Every computer system must be protected against unauthorised users. This is because if an unauthorised user has access to your computer, they could cause serious damage and you could lose important documents. Operating systems have the responsibility to create protection systems to ensure that the user running a specific program is authorised to do so. The operating system identifies if a user is unauthorised or not by asking for a username, password, a fingerprint or a user card/ key. These passwords can be either random numbers or letters. Also passwords usually contain an unusual character such as !ӣ$ so that the passwords cannot be guessed easily and are unrelated to your personal life.
If an unauthorised user tries to access your personal computer, threats are sent to the computer programs which then can disable the computer program. Programs can also be installed onto your computer to prevent some websites causing viruses. These include AVAST and McaFee.


File management;
A file management system is a system that the operating systems or programs use to organise files into folders and to keep track of files. Windows software operating systems use a simple but effective system which allows the users to save items as documents. These documents can then be put into folders so that you can easily find the documents/files you are looking for. The files can be edited and saved continuously. When you click on folders, it will open however many files are in that folder. You can then click on the file that you want to access the document you have previously made.
Device Drivers;
Device drivers are tiny pieces of software that give the operating system easier access to the hard drive. It is a program that tells the computer how it will communicate with a peripheral device. For example software such as Windows to communicate with the hardware.


Tuesday 9 September 2014

Unit 2 Task 1 P1

Unit 2 Task 1 P1

Processor;
The processor (central processing unit) interprets the instructions given by the computer user and carries out the data. The processor is the brains of the computer and carries out all the instructions needed in order for the computer to work. It is a small chip located on the motherboard.

Motherboard;
The motherboard is the backbone of the computer and holds components together. The motherboard holds the CPU, input/output systems, the power supply unit (PSU), interface, audio networking and some graphic subsystems. The motherboard also is responsible for the settings such as time and dates.

BIOS;
The basic input/output system (BIOS) is the first thing the computer loads. The BIOS instructs the computer user on what to do when the computer is turned on. The BIOS software is stored on a ROM chip on the motherboard.




Power Supply;
The power supply unit (PSU) converts mains AC to low voltage for the internal components in the computer. The PSU supplies power to various components and uses the specific voltage needed.

Fan and Heatsink or cooling;
The heatsink carries heat away from the CPU to stop it from overheating. The fan blows cool air into the CPU and other components to keeps them cool. This stops the computer from overheating and breaking. The cooling fans bring cool air into the computer and draw hot air out. This works with the heatsink to prevent the computer from overheating.
Hard drive configuration and controllers SATA, IDE or EIDE;
Most computers have an SATA which reads all the data in the computer. It is a disk inside a box and reads everything that is processed or put into the computer.





Ports USB and/or parallel and/or Serial;
USB (universal serial bus)  ports are standard cable connection interfaces on computers and allow stand alone electronic devices to be connected to the computer. You can connect most devices using a USB to import photos from a phone or create more memory on your computer by using a memory stick.









Internal memory RAM, ROM and cache;
RAM is random access memory, it is really fast and used to store data and programs.RAM loses the contents when switched off. ROM is read only memory. However the data stored cannot be changed. Cache memory is inside of the processor. Cache is used by the processor to avoid slowing down the speed of the RAM.








Specialised cards network and/or graphic cards;
Specialised cards can be added to the computer system if they are not already built in. Graphics cards are responsible for generating all text and pictures displayed on screen. Most computers these days have graphic cards built in however there is a slot on the motherboard where better graphics cards can be replaced.











Peripherals;

printers; Printers are additional outputs you can add to your computer in order to print documents, images or anything you have created on the computer. The printer is connected to the computer through the USB ports and documents are sent to the printer to print. You can various different types of printers such as inkjet printers and laser printers.


Scanner; Scanners scan documents and capture images and photographic prints. Scanners are also additional outputs and are available in different varieties.
Twisted pair cabling; Twisted pair cabling is a cable that consists of two insulated individual wires twisted around one another. These cables help reduce electromagnetic induction. The cables are inside the computer to help reduce crosstalk too.

Backing storage;

Pen drive; A pen drive is a USB flash drive. It is used to transfer files such as audio, data and video files. This is an input and output device.

Hard drive; The hard drive is the computers main storage device that stores all data immediately on the computer. The hard drive stores everything that is saved on the computer but also things that are imported onto the computer.