SlideShare a Scribd company logo
1 of 16
Computer
  Platforms –
  Assessment
                           Muhammad Farooq Siddiqui
                           This document covers different components of computer
                           systems along with their functions, different operating
                           systems, along with features of Windows 7, health and
                           safety requirements and security policies.




           NICON Systems

  Dubai Plaza, 6th Road,
              Rawalpindi

       +92 321 536 3600

7/2/2012
Table of Contents


COMPONENTS OF A COMPUTER SYSTEM                         -4-


MOTHERBOARD:                                            -4-
CENTRAL PROCESSING UNIT (CPU):                          -4-
MEMORY:                                                 -4-
RAM (RANDOM ACCESS MEMORY):                             -4-
- SRAM                                                  -4-
- DRAM                                                  -4-
- SDRAM                                                 -4-
- DDR SDRAM                                             -4-
- RDRAM                                                 -4-
HARD-DISKS:                                             -4-
VIDEO AND SOUND CARD                                    -4-
PRINTER:                                                -4-
MONITORS:                                               -5-
CRT:                                                    -5-
LCD/TFT:                                                -5-
PLASMA DISPLAY:                                         -5-
OLED:                                                   -5-
DVD WRITER                                              -5-


OPERATING SYSTEM                                        -5-


DEFINITION:                                             -5-
FUNCTION OF OPERATING SYSTEMS                           -5-
USER INTERFACE:                                         -5-
DEVICE CONFIGURATION:                                   -5-
FILE MANAGEMENT:                                        -5-
SECURITY                                                -5-
FEATURES OF OPERATING SYSTEM                            -6-
MULTITASKING                                            -6-
MULTIPLE USERS                                          -6-
MULTIPROCESSING                                         -6-
DIFFERENT TYPES OF OPERATING SYSTEMS:                   -6-
APPLE MAC OS X                                          -6-
WINDOWS 7                                               -6-
COMPARISON OF MAC OS X AND WINDOWS 7:                   -6-


RECOMMENDED COMPUTER SYSTEM FOR THE INTELLITECH INC.:   -7-



-2-|Page
USER GUIDE:                      -8-


USER ACCOUNTS:                    -8-
DISK DEFRAGMENT:                  -8-
DISC CLEANUP:                     -9-
DATE AND TIME:                  - 10 -
REGION AND LANGUAGE SETTINGS:   - 11 -
REGIONAL OPTIONS SETTINGS       - 11 -
LANGUAGE SETTINGS               - 11 -
ADVANCED SETTINGS               - 12 -
PROGRAMS AND FEATURES:          - 12 -


SECURITY AND USER POLICY:       - 13 -


MAINTENANCE PLAN:               - 15 -


WEEKLY:                         - 15 -
MONTHLY:                        - 15 -
PERFORM A DISK CLEANUP:         - 15 -
UPDATE ANTI-VIRUS:              - 15 -
RUN A DISK DEFRAGMENTER:        - 16 -




-3-|Page
Intellitech Inc. is upgrading their whole computer systems. Firstly we need to find out a new computer
system for Intellitech Inc. . So we need to describe all the components of the computer system and then
we need to choose out the specific components of the computer that fulfil the requirements of the client.



Components of a Computer System

Motherboard: mother-board is a circuit board situated in the system unit. Mother-board controls all
standard peripheral devices like hard drive, memory, CPU, and other device cards such as wireless card,
sound card a nd graphic card etc. Mother board also controls some external devices such as monitor,
printer, mouse, keyboards and USB drives.

Central Processing Unit (CPU): It is the most important section in the whole computer system. It can be
called brain or heart of the computer system. We can calculate computer s power by the clock speed of
any computer. The clock speed can be measured in Gigahertz (GHz) or Megahertz (MHz). If the clock
speed is higher the more processes the CPU can do per seconds. There are many kinds of processors in
use like dual core, quad core, core i3, core i7 etc. core i7 is the fastest processor in the latest technology
for desktop computers and laptops. We can choose the best processors by calculating its clock speed.

Memory: Memory is as important component for any computer. It is as important as processor. Memory
manipulates the real speed of the computer. We can have better performance if we use higher memory
and less powerful processor, than we use less memory and powerful processor. Memory is available in
variety of packages . There are varieties of memory packages in use.

RAM (Random Access Memory): Random Access Memory is as important as processor. RAM is used
to store up and operate the data for short time. It is a volatile memory because the data stored on RAM is
erased when the computer is turns off.

- SRAM (Static Random Access Memory): SRAM is type of semiconductor memory. SRAM uses bistable
latching circuitry to store the each bit of data.

- DRAM (Dynamic Random Access Memory): DRAM is stores each bit of data in a separate capacitor
within an integrated circuit.

- SDRAM (Synchronous Dynamic RAM): SDRAM is new memory package offered in PC. This memory
provides single channel memory and this memory is available on mainstream and desktop systems.

- DDR SDRAM (Double Data rate SDRAM): this RAM has all the features of SDRAM. In advance it gives
double data rate than SDRAM. On motherboard s 66 MHz bus this memory gives 1.066 gigabyte transfer
rate.

- RDRAM (Rambus dynamic RAM): this memory can create a new stream of data before the completion
of the previous stream. This results in faster processes. This memory can transfer data at 533Mb/s per
channel.

Hard-disks: Hard-disk is a non-volatile storage device for digital data.

Hard disks are used to store the data and application on permanent basis. There are two kinds of hard-
disks in use and those are internal and external hard-drive. The capacity of the hard drive depends on
how many applications do you want to use. The more hard-drive capacity is the more data you can store
on it.

Video and sound card : A video card lets the computer play the videos and display the pictures.
Multimedia users can use the higher capacity cards to get the best graphics and sound output.

Printer: Printer is used to publish hard copies of document and photographs as well. There are many

-4-|Page
choices available on market to choose from like laser printer, colour printer etc. 3 in 1 laser printer is latest
in today s technology, that can print coloured documents and images and it also can scan .

Monitors: Monitor is a output device that is used to enable the user to get the GUI. There are many kinds
of monitors in use today.

 CRT: they are the older type monitors with curved screen. This display can be nice due to size and it is
popular due to less prize.

LCD/TFT: these displays are flat screen display so they require a less desk space. They can also be
mounted on wall or shelf. They require less power to run, more environment friendly.

Plasma display: in this display the lights are creates by neutrons. So the colours looks like true. It has a
got a good quality picture than LCD.

OLED: it is an organic light-emitting diode. They are much thinner and brighter than LCD or plasma.

DVD Writer : DVD writer is used to create the data CD s and DVD s. to write the DVD or CD the
computer needs to loaded with some special kind of software which provides the facility to burn the CD s
and DVD s.


Operating System


Definition: Operating system is system software that controls the execution of computer programs and
may provide various services.

This system software manages all the computer hardware. OS offers establishment to all application
programs and operates as a connection between computer hardware and user. User can interact with the
OS using any user interface or using GUI. OS are designed that easy way; Users can execute any
program or applications very easily.

Function of Operating systems


User Interface: User Interface is the most useful function of OS User can have advantage of making the
tasks easy with the use of User interface. They don t require remembering and writing long commands
prompts to do certain task. They can do hundreds of task with just single or double clicks of mouse.

Device configuration: device configuration is also one of the important function users can use by OS.
User can configure any external device manually for their easiness or they can just configure any device
automatically by recommended settings of OS. They can easily install and uninstall any device drivers.

File management: OS also directs and categorizes all the data that the user stores on computer. Os
keeps the track of each and every bit of data in the computer. Users are able to search files and folders or
application in search box which is placed in start menu. All the operating system provides their own type
of file management system. Hierarchical management is one of the main examples of the file
management system o f OS. Hierarchical management system uses directories to categorize files.

Security: security of the data is the biggest issue for all users. Some new operating systems come with
the inbuilt firewall, so the unauthorized and unwanted application cannot access the computer
automatically. Firewall also protects the computers form malwares and viruses. User can set passwords
and biometric characteristics to secure their data and their computer accessed by unauthorised persons.


-5-|Page
Features of operating system


Multitasking: when the computer is using two or more tasks at the same time that can be called as
multitasking. OS can determines the order of the process which should be done while multitasking. With
the help of OS user can load a webpage while executing an application in background and typing
something in MS-Word. In short we can say that user can have access to many programmes at a same
time.

Multiple users: this system provides the facility to login multiple users to access their sessions while
keeping another user logged on the same machine. Some operating systems have facility to allow
hundreds of user to make their sessions.

Multiprocessing: Multiprocessing is a task where user computer can run different type of programmes in
different processors. Different jobs are processed on the different processors.

Different types of Operating systems:


Apple Mac OS X


Mac OS X is the latest Operating system produced by Apple. Mac OS X is the world s most advanced
operating system. In this OS all the tasks are made much easier to learn and to perform and users find
fun to do the work. OS X provides the highest graphics quality can be found on any latest technology. It
has got the most striking feature of user interface; it is also integrated with advance graphical processors.
User can have preview of any file/folder by using quick look function. This is a very new feature of this
OS. User can have very high resolution previews so they can actually read the text in preview itself.

User can upgrade the software of this OS. OS X can only run the software manufactured by apple. On
important thing is this OS can only be used in apple computers or laptops. This OS is very suitable for
entertainment because it has got the best graphics feature.

Windows 7


Windows is the latest OS made by Windows Corporation. This is also a very good OS. It has got many
new features that make it easy for the user to work on certain task. Windows 7 supports the full 64-bit
PCs; so it has got the new desktop standard. Windows search has been made easier and quicker on
windows 7. It has also got some features that simplify the everyday tasks.

Windows 7 can be upgraded with the latest updates. User can run thousands of software on this OS.
Windows 7 is not a virus free OS but it has got a features like windows firewall and defender; which
makes the computer safe from the attacks of malware and virus.

Comparison of Mac OS X and Windows 7:


1. Mac finder and windows explorer both have got very impressive user interface to access the files. Both
of the operating systems have got their own feature like Mac OS X has sidebar in finder and libraries in
windows 7.




-6-|Page
2. Both of the OS has got a newer way to get quick look of any file or folder. In OS X there is a quick look
feature which gives the file preview in high definition so user can easily read the text in preview. In
windows 7 the preview is very small to understand or have quick look of the document. So OS X s quick
look feature is better than windows preview.

3. Windows task bar and Mac dock are also one of the new features in both of the OS. Windows task bar
is the best improvement interface. In OS X the Mac dock gives just the simple feature of access the task
while taskbar has got such new features like pin program to task bar or recent and frequent tasks etc. so
windows taskbar is better than Mac dock.

4. In OS X the Mac menu bar is always fixed to the top of the screen and the programmes attaches there
with users permission or need. In windows 7 system tray you can customize the programmes that you
want to keep there for quick launch. User can also have access to one click calendar.

5. If we look at the backup utility in windows not too much has changed. It is the old wizard that asks you
to choose the backup drive. Whereas, in the OS X there is easy and really funny utility of time machine.
Time machine is dead simple setup and over animated.


Recommended computer system for the Intellitech Inc.:


I have chosen the certain kind of computer system depending upon the requirements of the client.

For the best use of computer system for the company employers I have chosen the core i3 processor with
the processor clock speed of 2.24GHz. That is the very good processor to meet the requirements of the
chair person. If we place 3 GB of RAM with one 1 GB SDRAM and the other 2 GB SDRAM will be good
for the use of company employers. The other important component for any computer is hard drive. The
company employers will use the computer to save their projects and designs for the new business ideas.
So 260GB of HDD will be the best match for the computer system.

I will recommend the 17 Plasma monitors for the company s new computer system. The company
employers can design their projects and designs with great colour and clarity.

Windows 7 is the best OS to install in the company’s new computer system. It is 64-bit operating system.
There are thousands of applications and software compatible with windows 7. The user interface of this
operating system is easy to learn and use. The employers can e asily get used to with this system.

Company chair person can install 3 in 1 laser printer which comes with inbuilt Bluetooth and wireless
facility so the employers can use it easily, that is very user friendly.

For additional devices, we can install video and sound card that are used for basic purpose of image and
video watching. We can also install a DVD -writer so that the employers will able to burn the data disks.

We need to design centralized help desk for all the users of the company so that they will be able to use
the new computer system easily.

Computer with following specification is proposed for Intellitech Inc.

Hardware:

        Core 2 DUO Processor (Intel)
        4 GB DDR 2 RAM


-7-|Page
320 GB HDD
       256 MB VGA
       DVD ± RW

User Guide:

User Accounts:
Start > Control panel > User Accounts >




With user accounts users can change or remove their account passwords. User administrator can
manage more than one account.


Disk Defragment:


Computer > Right click on drive > properties > Tools > Defragment Now




-8-|Page
Disk defragmentation describes the process of consolidating fragmented files on your computer's hard
disk. Fragmentation happens to a hard disk over time as you save, change, or delete files. The changes
that you save to a file are often stored at a location on the hard disk that's different from the original file.
Additional changes are saved to even more locations. Over time, both the file and the hard disk itself
become fragmented, and your computer slows down as it has to look in many different places to open a
file.

Disk Defragmenter is a tool that rearranges the data on your hard disk and reunites fragmented files so
your computer can run more efficiently. In this version of Windows, Disk Defragmenter runs on a schedule
so you don't have to remember to run it, although you can still run it manually or change the schedule it
uses.

Disc Cleanup:


The Disk Cleanup tool helps you free up space on your hard disk by searching your disk for files that you
can safely delete. You can choose to delete some or all of the files. Use Disk Cleanup to perform any of
the following tasks to free up space on your hard disk:

        Remove temporary Internet files.
        Remove downloaded program files. For example, ActiveX controls and Java applets that are
        downloaded from the Internet.


-9-|Page
Empty the Recycle Bin.
       Remove Windows temporary files.
       Remove optional Windows components that you are not using.
       Remove installed programs that you no longer use.
You can start Disk Cleanup, by doing any of the following:
       Click Start, and then click Run. In the Open box, type cleanmgr, and then click OK.

         -or-
         Click Start, point to All Programs, point to Accessories, point to System Tools, and then
         click Disk Cleanup.

          -or-
         In Windows Explorer or My Computer, right-click the disk in which you want to free up space,
          click Properties, click the General tab, and then click Disk Cleanup.




Date and Time:


Start > Control panel > Date and time (Clock, Language and Region)




- 10 - | P a g e
Users can change date, time, and time zone in this program.



Region and Language Settings:
Start > Control panel > Regional and language (Clock, Language and region)

Regional options settings
The Regional Options tab contains the following settings:

         Standards and formats
         These are user-specific settings and are stored as part of the user profile.
         Location
         This is a user-specific setting and is stored as part of the user profile.

Language settings
The Languages tab contains the following settings:

       Default input language
        This is a user-specific setting and is stored as part of the user profile.
       Installed services
        This is a computer-wide setting.
Note To access these language settings, click Details in Text services and input languages.



- 11 - | P a g e
Advanced settings
The Advanced tab contains the following settings:

         Language for non-Unicode programs
         This is a computer-wide setting.
         Default user account settings
         Click to select the Apply all settings to the current user account and to the default user
         profile check box to apply changes to the default user profile.




Programs and Features:
Start > Control Panel > Program and Features

You can uninstall a program from your computer if you no longer use it or if you want to free up space on
your hard disk. You can use Programs and Features to uninstall programs or to change the program's
configuration by adding or removing certain options.



- 12 - | P a g e
1. Open Programs and Features by clicking the Start button  , clicking Control Panel,
      clicking Programs, and then clicking Programs and Features.

   2. Select a program, and then click Uninstall. Some programs include the option to change or repair
      the program in addition to uninstalling it. but many simply offer the option to uninstall. To change a
      program, click Change or Repair.        If you are prompted for an administrator password or
      confirmation, type the password or provide confirmation.




Security and User Policy:


1. Networked systems shall update regularly with the latest vendor patches for all software executed on
Workstations and Servers.

2. Users shall select passwords that cannot be found in a dictionary and that are of sufficient length that
the probability of determining the password over a network shall take at least 160 hours. Currently, this is
at least 8 characters but shall be automatically increased as technology allows.

- 13 - | P a g e
3. All users passwords attached to a network wherein a compromise has occurred or is suspect shall be
changed immediately.

4. Enable client operating system user profiles so that specific users and groups have their own security
settings that reflect their level of trust in the network.

5. Force password changes often. Passwords should be valid for no longer than 30 days.

6. Train users to prevent mishaps, by doing things such as turning off a workstation that holds shared
data when it is not required.

7. Execute a virus scanner automatically whenever a user logs onto the computer.

8. Use workstation user accounts and system policies to prevent individual users from controlling the
security of their workstations.

9. Disable password caching so passwords do not accumulate on client computers.

10. Client computers shall be restricted such that their network settings may not be modified by non
administrative personnel. Implement the following specific policies:

* Disable the network control panel for all users except administrator and trusted knowledgeable users.

* Disable the registry editing tools for all users except system administrators.

* Enable the shell restrictions for accounts that serve a particular purpose, such as public e-mail
accounts, public word-processing accounts, process control, etc.

* Hide the general and details pages for printers in the network, disable deletion of printers,and disable
the addition of printers.

* Hide the remote administration page and the user profiles page for all users except administrators.



11. Disable booting the A: drive in the BIOS and apply a password to the BIOS to keep the user from
using a DOS boot floppy.

12. Hide the display settings page from everyone except administrators.

13. Limit the rights of default Administrators group, and create a separate group with full access.

14. Provide periodic security training for new and established employees alike. A periodic refresher keeps
users aware of security problems.

15. Require alphanumeric passwords so that a hacker cannot quickly determine the password to a user
account simply by performing a “dictionary scan.”

16. Modify the client operating system to boot directly to the allowed application or a menu restricted to
allowed applications.

17. All users of workstation and pc’s are to ensure that their screens are blank when not to be used




- 14 - | P a g e
18. Approving Login procedures must be strictly observed a users leaving their screen unattended must
firstly lock access to their workstation because may be unauthorized systems may be gained via a valid
user is and password.

19. Managing user access must be authorized by the owner of the system and such access, including the
appropriate access rights or privileges must be recorded in an access control list. Such records are to be
regarded as high confidential documents.


Maintenance Plan:

Part of any successful business is keeping your equipment in good working order. For most businesses,
computers are integral to day-to-day operations. Fact is, slow-running computers, computer crashes and
other computer problems can take valuable time away from other pressing tasks. For best results, we
recommend performing the following maintenance each week or month.


Weekly:
Back up your e-mail program. Don’t lose important e-mails from clients and co-workers because of a
malfunctioning e-mail program. When backing up your e-mail program, it is a good idea to also have this
backup on a different drive on which your computer your e-mail is located. If you can’t back-up your e-
mail on another drive, then just back it up to a CD. This way, if your computer fails, you will still have your
full e-mail intact (or at least most of it).

If you use Outlook as your e-mail program, you’ll want to do the following to back up your Outlook. First,
open Outlook and click on File. Then, select Import and Export and choose Export a File and click Next.
Next, select Personal Folder File (.pst) and then click Next. After that, click personal file folders, check the
box that says Include Subfolders, and then click Next. The program will then ask you for a location. We
recommend naming a new folder on your computer something easy to remember such as Outlook
Backup. After naming your back-up folder, click browse in this panel in Outlook and chose the Outlook
backup folder. We suggest that you check Replace Duplicates with Items Exported. Finally, click Finish. It
might take quite sometime if your outlook is too large, so you might want to do this at the end of your day.
Once the back-up process starts, do not open Outlook until the back-up process is complete.

Also, if you use Outlook as a filing cabinet for important docs, have your IT professional create archives
for Outlook to reduce the size of your e-mail file. In the event of a crash, smaller Outlook files are much
easier to retrieve than larger Outlook files.

Monthly:


Perform a disk cleanup:

 The disk cleanup tool on your computer helps you free up space on your hard disk for maximum
computing speed. In order to perform a disk cleanup on a Windows-based PC, go to the Start button on
your desktop. Click All Programs and then select Accessories from the drop-down menu. From
Accessories, select System Tools and then Disk Cleanup. Select C: Drive and click OK. After the scan is
completed (it will take about two to three minutes), delete all Temporary files, Recycle Bin and Temporary
Internet Files.

Update Anti-Virus:




- 15 - | P a g e
Make sure your data files from your virus protection software are completely up-to-date. Your virus
protection software is your first line of defense against debilitating computer viruses, so it’s important to
ensure that it is up to snuff. Your virus protection software should be set to update itself automatically, but
if you have to download the latest DAT files, be sure to run a full or complete scan of your computer. We
recommend that, if you haven’t already, install both Super Anti-Spyware and Malware Bytes on your
computer. For optimal protection, buy full versions of both programs.

Run a disk defragmenter:

On a Windows computer, the purpose of your disk defragmenter is decrease the time it takes to read and
write files by rearranging files stored on your computer. (Note: you should always run this after everything
else above is completed.) To run your disk defragmenter, click on the START button on your desktop.
Then click All Programs and select Accessories. From Accessories, go to System Tools and choose Disk
Defragmenter. (Note: you should always run this after everything else above is completed.)


Also, it is a GREAT idea to make sure all important documents on your computer are backed up at an
offsite location. This way, you lose nothing if your computer crashes. We recommend that your IT
professional creates an emergency plan in case of fire so that you also have a full backup of all your data
off location. Believe us, you DO NOT want to wait until an emergency situation to get a plan in action.

When you depend on a computer for your livelihood, doesn’t it make sense to make sure your computer
is healthy? Keep your computer in tip-top condition by keeping on a regular maintenance schedule.




- 16 - | P a g e

More Related Content

What's hot

How To Build A Computer
How To Build A ComputerHow To Build A Computer
How To Build A Computer
iamsoccer17
 
Introduction to Embedded Systems
Introduction to Embedded SystemsIntroduction to Embedded Systems
Introduction to Embedded Systems
WalaaMohamed
 

What's hot (20)

Types of Memory, ram, rom and storage
Types of Memory, ram, rom and storageTypes of Memory, ram, rom and storage
Types of Memory, ram, rom and storage
 
Bios ( Basic Input Output System )
Bios ( Basic Input Output System )Bios ( Basic Input Output System )
Bios ( Basic Input Output System )
 
Expansion slot report
Expansion slot reportExpansion slot report
Expansion slot report
 
Hard drive partitions
Hard drive partitionsHard drive partitions
Hard drive partitions
 
Primary Memory: RAM, ROM and their Types
Primary Memory: RAM, ROM and their TypesPrimary Memory: RAM, ROM and their Types
Primary Memory: RAM, ROM and their Types
 
computer memory and memory module
computer memory and memory modulecomputer memory and memory module
computer memory and memory module
 
Serial Data Communication
Serial Data CommunicationSerial Data Communication
Serial Data Communication
 
DDR
DDRDDR
DDR
 
11. operating-systems-part-1
11. operating-systems-part-111. operating-systems-part-1
11. operating-systems-part-1
 
How To Build A Computer
How To Build A ComputerHow To Build A Computer
How To Build A Computer
 
Bios vs uefi
Bios vs uefiBios vs uefi
Bios vs uefi
 
Audio Drivers
Audio DriversAudio Drivers
Audio Drivers
 
Embedded system-Introduction to development cycle and development tool
Embedded system-Introduction to development cycle and development  toolEmbedded system-Introduction to development cycle and development  tool
Embedded system-Introduction to development cycle and development tool
 
COMPUTER COMPONENTS
COMPUTER COMPONENTSCOMPUTER COMPONENTS
COMPUTER COMPONENTS
 
Bios
BiosBios
Bios
 
DDR SDRAM : Notes
DDR SDRAM : NotesDDR SDRAM : Notes
DDR SDRAM : Notes
 
Introduction to Embedded Systems
Introduction to Embedded SystemsIntroduction to Embedded Systems
Introduction to Embedded Systems
 
Kernel Recipes 2018 - Overview of SD/eMMC, their high speed modes and Linux s...
Kernel Recipes 2018 - Overview of SD/eMMC, their high speed modes and Linux s...Kernel Recipes 2018 - Overview of SD/eMMC, their high speed modes and Linux s...
Kernel Recipes 2018 - Overview of SD/eMMC, their high speed modes and Linux s...
 
input output ports
input output portsinput output ports
input output ports
 
Bootloaders
BootloadersBootloaders
Bootloaders
 

Similar to Computer Platform

Add sale davinci
Add sale davinciAdd sale davinci
Add sale davinci
Akash Sahoo
 
System Client Details
System Client DetailsSystem Client Details
System Client Details
SyAM Software
 

Similar to Computer Platform (20)

Add sale davinci
Add sale davinciAdd sale davinci
Add sale davinci
 
Basics of computer by Mudasir Amin from Durpora Zainapora Shopian.
Basics of computer by Mudasir Amin from Durpora Zainapora Shopian.Basics of computer by Mudasir Amin from Durpora Zainapora Shopian.
Basics of computer by Mudasir Amin from Durpora Zainapora Shopian.
 
Computer specifications
Computer specificationsComputer specifications
Computer specifications
 
System Client Details
System Client DetailsSystem Client Details
System Client Details
 
HW and SW components.pptx
HW and SW components.pptxHW and SW components.pptx
HW and SW components.pptx
 
Lec9chap8f04
Lec9chap8f04Lec9chap8f04
Lec9chap8f04
 
5_6097975312522412493.pptx
5_6097975312522412493.pptx5_6097975312522412493.pptx
5_6097975312522412493.pptx
 
Introduction to Computers
Introduction to ComputersIntroduction to Computers
Introduction to Computers
 
NVDIMM block drivers with NFIT
NVDIMM block drivers with NFITNVDIMM block drivers with NFIT
NVDIMM block drivers with NFIT
 
Chap08
Chap08Chap08
Chap08
 
Presentation on Computer Peripheral by Atharva Jawalkar
Presentation on Computer Peripheral by Atharva JawalkarPresentation on Computer Peripheral by Atharva Jawalkar
Presentation on Computer Peripheral by Atharva Jawalkar
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
System Software ( Os )
System Software ( Os )System Software ( Os )
System Software ( Os )
 
Systems and Applications.pptx
Systems and Applications.pptxSystems and Applications.pptx
Systems and Applications.pptx
 
Windows 10 Upgrade: The best bad idea you never had…
Windows 10 Upgrade: The best bad idea you never had…Windows 10 Upgrade: The best bad idea you never had…
Windows 10 Upgrade: The best bad idea you never had…
 
建構嵌入式Linux系統於SD Card
建構嵌入式Linux系統於SD Card建構嵌入式Linux系統於SD Card
建構嵌入式Linux系統於SD Card
 
PC hardware components ppt slide_week2.ppt
PC hardware components ppt slide_week2.pptPC hardware components ppt slide_week2.ppt
PC hardware components ppt slide_week2.ppt
 
Uc13.chapter.05
Uc13.chapter.05Uc13.chapter.05
Uc13.chapter.05
 
Bringing up Android on your favorite X86 Workstation or VM (AnDevCon Boston, ...
Bringing up Android on your favorite X86 Workstation or VM (AnDevCon Boston, ...Bringing up Android on your favorite X86 Workstation or VM (AnDevCon Boston, ...
Bringing up Android on your favorite X86 Workstation or VM (AnDevCon Boston, ...
 
Windows Debugging Tools - JavaOne 2013
Windows Debugging Tools - JavaOne 2013Windows Debugging Tools - JavaOne 2013
Windows Debugging Tools - JavaOne 2013
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Computer Platform

  • 1. Computer Platforms – Assessment Muhammad Farooq Siddiqui This document covers different components of computer systems along with their functions, different operating systems, along with features of Windows 7, health and safety requirements and security policies. NICON Systems Dubai Plaza, 6th Road, Rawalpindi +92 321 536 3600 7/2/2012
  • 2. Table of Contents COMPONENTS OF A COMPUTER SYSTEM -4- MOTHERBOARD: -4- CENTRAL PROCESSING UNIT (CPU): -4- MEMORY: -4- RAM (RANDOM ACCESS MEMORY): -4- - SRAM -4- - DRAM -4- - SDRAM -4- - DDR SDRAM -4- - RDRAM -4- HARD-DISKS: -4- VIDEO AND SOUND CARD -4- PRINTER: -4- MONITORS: -5- CRT: -5- LCD/TFT: -5- PLASMA DISPLAY: -5- OLED: -5- DVD WRITER -5- OPERATING SYSTEM -5- DEFINITION: -5- FUNCTION OF OPERATING SYSTEMS -5- USER INTERFACE: -5- DEVICE CONFIGURATION: -5- FILE MANAGEMENT: -5- SECURITY -5- FEATURES OF OPERATING SYSTEM -6- MULTITASKING -6- MULTIPLE USERS -6- MULTIPROCESSING -6- DIFFERENT TYPES OF OPERATING SYSTEMS: -6- APPLE MAC OS X -6- WINDOWS 7 -6- COMPARISON OF MAC OS X AND WINDOWS 7: -6- RECOMMENDED COMPUTER SYSTEM FOR THE INTELLITECH INC.: -7- -2-|Page
  • 3. USER GUIDE: -8- USER ACCOUNTS: -8- DISK DEFRAGMENT: -8- DISC CLEANUP: -9- DATE AND TIME: - 10 - REGION AND LANGUAGE SETTINGS: - 11 - REGIONAL OPTIONS SETTINGS - 11 - LANGUAGE SETTINGS - 11 - ADVANCED SETTINGS - 12 - PROGRAMS AND FEATURES: - 12 - SECURITY AND USER POLICY: - 13 - MAINTENANCE PLAN: - 15 - WEEKLY: - 15 - MONTHLY: - 15 - PERFORM A DISK CLEANUP: - 15 - UPDATE ANTI-VIRUS: - 15 - RUN A DISK DEFRAGMENTER: - 16 - -3-|Page
  • 4. Intellitech Inc. is upgrading their whole computer systems. Firstly we need to find out a new computer system for Intellitech Inc. . So we need to describe all the components of the computer system and then we need to choose out the specific components of the computer that fulfil the requirements of the client. Components of a Computer System Motherboard: mother-board is a circuit board situated in the system unit. Mother-board controls all standard peripheral devices like hard drive, memory, CPU, and other device cards such as wireless card, sound card a nd graphic card etc. Mother board also controls some external devices such as monitor, printer, mouse, keyboards and USB drives. Central Processing Unit (CPU): It is the most important section in the whole computer system. It can be called brain or heart of the computer system. We can calculate computer s power by the clock speed of any computer. The clock speed can be measured in Gigahertz (GHz) or Megahertz (MHz). If the clock speed is higher the more processes the CPU can do per seconds. There are many kinds of processors in use like dual core, quad core, core i3, core i7 etc. core i7 is the fastest processor in the latest technology for desktop computers and laptops. We can choose the best processors by calculating its clock speed. Memory: Memory is as important component for any computer. It is as important as processor. Memory manipulates the real speed of the computer. We can have better performance if we use higher memory and less powerful processor, than we use less memory and powerful processor. Memory is available in variety of packages . There are varieties of memory packages in use. RAM (Random Access Memory): Random Access Memory is as important as processor. RAM is used to store up and operate the data for short time. It is a volatile memory because the data stored on RAM is erased when the computer is turns off. - SRAM (Static Random Access Memory): SRAM is type of semiconductor memory. SRAM uses bistable latching circuitry to store the each bit of data. - DRAM (Dynamic Random Access Memory): DRAM is stores each bit of data in a separate capacitor within an integrated circuit. - SDRAM (Synchronous Dynamic RAM): SDRAM is new memory package offered in PC. This memory provides single channel memory and this memory is available on mainstream and desktop systems. - DDR SDRAM (Double Data rate SDRAM): this RAM has all the features of SDRAM. In advance it gives double data rate than SDRAM. On motherboard s 66 MHz bus this memory gives 1.066 gigabyte transfer rate. - RDRAM (Rambus dynamic RAM): this memory can create a new stream of data before the completion of the previous stream. This results in faster processes. This memory can transfer data at 533Mb/s per channel. Hard-disks: Hard-disk is a non-volatile storage device for digital data. Hard disks are used to store the data and application on permanent basis. There are two kinds of hard- disks in use and those are internal and external hard-drive. The capacity of the hard drive depends on how many applications do you want to use. The more hard-drive capacity is the more data you can store on it. Video and sound card : A video card lets the computer play the videos and display the pictures. Multimedia users can use the higher capacity cards to get the best graphics and sound output. Printer: Printer is used to publish hard copies of document and photographs as well. There are many -4-|Page
  • 5. choices available on market to choose from like laser printer, colour printer etc. 3 in 1 laser printer is latest in today s technology, that can print coloured documents and images and it also can scan . Monitors: Monitor is a output device that is used to enable the user to get the GUI. There are many kinds of monitors in use today. CRT: they are the older type monitors with curved screen. This display can be nice due to size and it is popular due to less prize. LCD/TFT: these displays are flat screen display so they require a less desk space. They can also be mounted on wall or shelf. They require less power to run, more environment friendly. Plasma display: in this display the lights are creates by neutrons. So the colours looks like true. It has a got a good quality picture than LCD. OLED: it is an organic light-emitting diode. They are much thinner and brighter than LCD or plasma. DVD Writer : DVD writer is used to create the data CD s and DVD s. to write the DVD or CD the computer needs to loaded with some special kind of software which provides the facility to burn the CD s and DVD s. Operating System Definition: Operating system is system software that controls the execution of computer programs and may provide various services. This system software manages all the computer hardware. OS offers establishment to all application programs and operates as a connection between computer hardware and user. User can interact with the OS using any user interface or using GUI. OS are designed that easy way; Users can execute any program or applications very easily. Function of Operating systems User Interface: User Interface is the most useful function of OS User can have advantage of making the tasks easy with the use of User interface. They don t require remembering and writing long commands prompts to do certain task. They can do hundreds of task with just single or double clicks of mouse. Device configuration: device configuration is also one of the important function users can use by OS. User can configure any external device manually for their easiness or they can just configure any device automatically by recommended settings of OS. They can easily install and uninstall any device drivers. File management: OS also directs and categorizes all the data that the user stores on computer. Os keeps the track of each and every bit of data in the computer. Users are able to search files and folders or application in search box which is placed in start menu. All the operating system provides their own type of file management system. Hierarchical management is one of the main examples of the file management system o f OS. Hierarchical management system uses directories to categorize files. Security: security of the data is the biggest issue for all users. Some new operating systems come with the inbuilt firewall, so the unauthorized and unwanted application cannot access the computer automatically. Firewall also protects the computers form malwares and viruses. User can set passwords and biometric characteristics to secure their data and their computer accessed by unauthorised persons. -5-|Page
  • 6. Features of operating system Multitasking: when the computer is using two or more tasks at the same time that can be called as multitasking. OS can determines the order of the process which should be done while multitasking. With the help of OS user can load a webpage while executing an application in background and typing something in MS-Word. In short we can say that user can have access to many programmes at a same time. Multiple users: this system provides the facility to login multiple users to access their sessions while keeping another user logged on the same machine. Some operating systems have facility to allow hundreds of user to make their sessions. Multiprocessing: Multiprocessing is a task where user computer can run different type of programmes in different processors. Different jobs are processed on the different processors. Different types of Operating systems: Apple Mac OS X Mac OS X is the latest Operating system produced by Apple. Mac OS X is the world s most advanced operating system. In this OS all the tasks are made much easier to learn and to perform and users find fun to do the work. OS X provides the highest graphics quality can be found on any latest technology. It has got the most striking feature of user interface; it is also integrated with advance graphical processors. User can have preview of any file/folder by using quick look function. This is a very new feature of this OS. User can have very high resolution previews so they can actually read the text in preview itself. User can upgrade the software of this OS. OS X can only run the software manufactured by apple. On important thing is this OS can only be used in apple computers or laptops. This OS is very suitable for entertainment because it has got the best graphics feature. Windows 7 Windows is the latest OS made by Windows Corporation. This is also a very good OS. It has got many new features that make it easy for the user to work on certain task. Windows 7 supports the full 64-bit PCs; so it has got the new desktop standard. Windows search has been made easier and quicker on windows 7. It has also got some features that simplify the everyday tasks. Windows 7 can be upgraded with the latest updates. User can run thousands of software on this OS. Windows 7 is not a virus free OS but it has got a features like windows firewall and defender; which makes the computer safe from the attacks of malware and virus. Comparison of Mac OS X and Windows 7: 1. Mac finder and windows explorer both have got very impressive user interface to access the files. Both of the operating systems have got their own feature like Mac OS X has sidebar in finder and libraries in windows 7. -6-|Page
  • 7. 2. Both of the OS has got a newer way to get quick look of any file or folder. In OS X there is a quick look feature which gives the file preview in high definition so user can easily read the text in preview. In windows 7 the preview is very small to understand or have quick look of the document. So OS X s quick look feature is better than windows preview. 3. Windows task bar and Mac dock are also one of the new features in both of the OS. Windows task bar is the best improvement interface. In OS X the Mac dock gives just the simple feature of access the task while taskbar has got such new features like pin program to task bar or recent and frequent tasks etc. so windows taskbar is better than Mac dock. 4. In OS X the Mac menu bar is always fixed to the top of the screen and the programmes attaches there with users permission or need. In windows 7 system tray you can customize the programmes that you want to keep there for quick launch. User can also have access to one click calendar. 5. If we look at the backup utility in windows not too much has changed. It is the old wizard that asks you to choose the backup drive. Whereas, in the OS X there is easy and really funny utility of time machine. Time machine is dead simple setup and over animated. Recommended computer system for the Intellitech Inc.: I have chosen the certain kind of computer system depending upon the requirements of the client. For the best use of computer system for the company employers I have chosen the core i3 processor with the processor clock speed of 2.24GHz. That is the very good processor to meet the requirements of the chair person. If we place 3 GB of RAM with one 1 GB SDRAM and the other 2 GB SDRAM will be good for the use of company employers. The other important component for any computer is hard drive. The company employers will use the computer to save their projects and designs for the new business ideas. So 260GB of HDD will be the best match for the computer system. I will recommend the 17 Plasma monitors for the company s new computer system. The company employers can design their projects and designs with great colour and clarity. Windows 7 is the best OS to install in the company’s new computer system. It is 64-bit operating system. There are thousands of applications and software compatible with windows 7. The user interface of this operating system is easy to learn and use. The employers can e asily get used to with this system. Company chair person can install 3 in 1 laser printer which comes with inbuilt Bluetooth and wireless facility so the employers can use it easily, that is very user friendly. For additional devices, we can install video and sound card that are used for basic purpose of image and video watching. We can also install a DVD -writer so that the employers will able to burn the data disks. We need to design centralized help desk for all the users of the company so that they will be able to use the new computer system easily. Computer with following specification is proposed for Intellitech Inc. Hardware: Core 2 DUO Processor (Intel) 4 GB DDR 2 RAM -7-|Page
  • 8. 320 GB HDD 256 MB VGA DVD ± RW User Guide: User Accounts: Start > Control panel > User Accounts > With user accounts users can change or remove their account passwords. User administrator can manage more than one account. Disk Defragment: Computer > Right click on drive > properties > Tools > Defragment Now -8-|Page
  • 9. Disk defragmentation describes the process of consolidating fragmented files on your computer's hard disk. Fragmentation happens to a hard disk over time as you save, change, or delete files. The changes that you save to a file are often stored at a location on the hard disk that's different from the original file. Additional changes are saved to even more locations. Over time, both the file and the hard disk itself become fragmented, and your computer slows down as it has to look in many different places to open a file. Disk Defragmenter is a tool that rearranges the data on your hard disk and reunites fragmented files so your computer can run more efficiently. In this version of Windows, Disk Defragmenter runs on a schedule so you don't have to remember to run it, although you can still run it manually or change the schedule it uses. Disc Cleanup: The Disk Cleanup tool helps you free up space on your hard disk by searching your disk for files that you can safely delete. You can choose to delete some or all of the files. Use Disk Cleanup to perform any of the following tasks to free up space on your hard disk: Remove temporary Internet files. Remove downloaded program files. For example, ActiveX controls and Java applets that are downloaded from the Internet. -9-|Page
  • 10. Empty the Recycle Bin. Remove Windows temporary files. Remove optional Windows components that you are not using. Remove installed programs that you no longer use. You can start Disk Cleanup, by doing any of the following: Click Start, and then click Run. In the Open box, type cleanmgr, and then click OK. -or- Click Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Cleanup. -or- In Windows Explorer or My Computer, right-click the disk in which you want to free up space, click Properties, click the General tab, and then click Disk Cleanup. Date and Time: Start > Control panel > Date and time (Clock, Language and Region) - 10 - | P a g e
  • 11. Users can change date, time, and time zone in this program. Region and Language Settings: Start > Control panel > Regional and language (Clock, Language and region) Regional options settings The Regional Options tab contains the following settings: Standards and formats These are user-specific settings and are stored as part of the user profile. Location This is a user-specific setting and is stored as part of the user profile. Language settings The Languages tab contains the following settings: Default input language This is a user-specific setting and is stored as part of the user profile. Installed services This is a computer-wide setting. Note To access these language settings, click Details in Text services and input languages. - 11 - | P a g e
  • 12. Advanced settings The Advanced tab contains the following settings: Language for non-Unicode programs This is a computer-wide setting. Default user account settings Click to select the Apply all settings to the current user account and to the default user profile check box to apply changes to the default user profile. Programs and Features: Start > Control Panel > Program and Features You can uninstall a program from your computer if you no longer use it or if you want to free up space on your hard disk. You can use Programs and Features to uninstall programs or to change the program's configuration by adding or removing certain options. - 12 - | P a g e
  • 13. 1. Open Programs and Features by clicking the Start button , clicking Control Panel, clicking Programs, and then clicking Programs and Features. 2. Select a program, and then click Uninstall. Some programs include the option to change or repair the program in addition to uninstalling it. but many simply offer the option to uninstall. To change a program, click Change or Repair. If you are prompted for an administrator password or confirmation, type the password or provide confirmation. Security and User Policy: 1. Networked systems shall update regularly with the latest vendor patches for all software executed on Workstations and Servers. 2. Users shall select passwords that cannot be found in a dictionary and that are of sufficient length that the probability of determining the password over a network shall take at least 160 hours. Currently, this is at least 8 characters but shall be automatically increased as technology allows. - 13 - | P a g e
  • 14. 3. All users passwords attached to a network wherein a compromise has occurred or is suspect shall be changed immediately. 4. Enable client operating system user profiles so that specific users and groups have their own security settings that reflect their level of trust in the network. 5. Force password changes often. Passwords should be valid for no longer than 30 days. 6. Train users to prevent mishaps, by doing things such as turning off a workstation that holds shared data when it is not required. 7. Execute a virus scanner automatically whenever a user logs onto the computer. 8. Use workstation user accounts and system policies to prevent individual users from controlling the security of their workstations. 9. Disable password caching so passwords do not accumulate on client computers. 10. Client computers shall be restricted such that their network settings may not be modified by non administrative personnel. Implement the following specific policies: * Disable the network control panel for all users except administrator and trusted knowledgeable users. * Disable the registry editing tools for all users except system administrators. * Enable the shell restrictions for accounts that serve a particular purpose, such as public e-mail accounts, public word-processing accounts, process control, etc. * Hide the general and details pages for printers in the network, disable deletion of printers,and disable the addition of printers. * Hide the remote administration page and the user profiles page for all users except administrators. 11. Disable booting the A: drive in the BIOS and apply a password to the BIOS to keep the user from using a DOS boot floppy. 12. Hide the display settings page from everyone except administrators. 13. Limit the rights of default Administrators group, and create a separate group with full access. 14. Provide periodic security training for new and established employees alike. A periodic refresher keeps users aware of security problems. 15. Require alphanumeric passwords so that a hacker cannot quickly determine the password to a user account simply by performing a “dictionary scan.” 16. Modify the client operating system to boot directly to the allowed application or a menu restricted to allowed applications. 17. All users of workstation and pc’s are to ensure that their screens are blank when not to be used - 14 - | P a g e
  • 15. 18. Approving Login procedures must be strictly observed a users leaving their screen unattended must firstly lock access to their workstation because may be unauthorized systems may be gained via a valid user is and password. 19. Managing user access must be authorized by the owner of the system and such access, including the appropriate access rights or privileges must be recorded in an access control list. Such records are to be regarded as high confidential documents. Maintenance Plan: Part of any successful business is keeping your equipment in good working order. For most businesses, computers are integral to day-to-day operations. Fact is, slow-running computers, computer crashes and other computer problems can take valuable time away from other pressing tasks. For best results, we recommend performing the following maintenance each week or month. Weekly: Back up your e-mail program. Don’t lose important e-mails from clients and co-workers because of a malfunctioning e-mail program. When backing up your e-mail program, it is a good idea to also have this backup on a different drive on which your computer your e-mail is located. If you can’t back-up your e- mail on another drive, then just back it up to a CD. This way, if your computer fails, you will still have your full e-mail intact (or at least most of it). If you use Outlook as your e-mail program, you’ll want to do the following to back up your Outlook. First, open Outlook and click on File. Then, select Import and Export and choose Export a File and click Next. Next, select Personal Folder File (.pst) and then click Next. After that, click personal file folders, check the box that says Include Subfolders, and then click Next. The program will then ask you for a location. We recommend naming a new folder on your computer something easy to remember such as Outlook Backup. After naming your back-up folder, click browse in this panel in Outlook and chose the Outlook backup folder. We suggest that you check Replace Duplicates with Items Exported. Finally, click Finish. It might take quite sometime if your outlook is too large, so you might want to do this at the end of your day. Once the back-up process starts, do not open Outlook until the back-up process is complete. Also, if you use Outlook as a filing cabinet for important docs, have your IT professional create archives for Outlook to reduce the size of your e-mail file. In the event of a crash, smaller Outlook files are much easier to retrieve than larger Outlook files. Monthly: Perform a disk cleanup: The disk cleanup tool on your computer helps you free up space on your hard disk for maximum computing speed. In order to perform a disk cleanup on a Windows-based PC, go to the Start button on your desktop. Click All Programs and then select Accessories from the drop-down menu. From Accessories, select System Tools and then Disk Cleanup. Select C: Drive and click OK. After the scan is completed (it will take about two to three minutes), delete all Temporary files, Recycle Bin and Temporary Internet Files. Update Anti-Virus: - 15 - | P a g e
  • 16. Make sure your data files from your virus protection software are completely up-to-date. Your virus protection software is your first line of defense against debilitating computer viruses, so it’s important to ensure that it is up to snuff. Your virus protection software should be set to update itself automatically, but if you have to download the latest DAT files, be sure to run a full or complete scan of your computer. We recommend that, if you haven’t already, install both Super Anti-Spyware and Malware Bytes on your computer. For optimal protection, buy full versions of both programs. Run a disk defragmenter: On a Windows computer, the purpose of your disk defragmenter is decrease the time it takes to read and write files by rearranging files stored on your computer. (Note: you should always run this after everything else above is completed.) To run your disk defragmenter, click on the START button on your desktop. Then click All Programs and select Accessories. From Accessories, go to System Tools and choose Disk Defragmenter. (Note: you should always run this after everything else above is completed.) Also, it is a GREAT idea to make sure all important documents on your computer are backed up at an offsite location. This way, you lose nothing if your computer crashes. We recommend that your IT professional creates an emergency plan in case of fire so that you also have a full backup of all your data off location. Believe us, you DO NOT want to wait until an emergency situation to get a plan in action. When you depend on a computer for your livelihood, doesn’t it make sense to make sure your computer is healthy? Keep your computer in tip-top condition by keeping on a regular maintenance schedule. - 16 - | P a g e