foo | bar |
Monday 13 April 2009
Explaing software utilities. P3
Disk cleanup is a maintenance utility which is designed to free disk space on the computer’s hard drive.
How it works?
The cleanup process firstly involves searching and analyzing the hard drive for files which are no longer of use. It then proceeds to remove the unnecessary files, which is how it frees the space on the hard drive. Disk cleanup targets at many different file categories when performing the initial disk analysis and gives you the opportunity to choose which files you do not want to delete.
· Compression of old files – Compressed files doesn’t delete files from the drive. It compresses files which the user has not gone on for a specific time. However next time they are accessed they will be decompressed.
· Temporary internet files – These are the internet cache of web pages which are stored on the hard drive for quick access.
· Temporary windows file
· Downloaded program files – These are files which are stored in the downloaded programs file folder; these files are the ActiveX controls and Java applets which are downloaded from web sites.
· Recycle bin – These are files which have been selected and deleted.
· Offline files – These are files which are available offline, however it can contain outdated information and many more
Why use disk cleanup?
Disk cleanup is used so the computer can free space of unnecessary wanted files which are on the computer system and are no longer needed.
How it works?
Virus protection is used to identify and remove viruses. Many of the anti-virus software’s uses signatures, identifying piece of code found in a virus. However, instead of attempting to try to relate a virus with a signature, heuristic technologies may look at a programs code or actions for potential damaging code or even actions. However, sometimes an anti virus may not be able to track the virus as it may have not been updated.
There are other ways in which identification of virus can be done such as:
Signature based detection which is the common method to identify viruses and other malware. It compares the contents of a file to a dictionary of virus signatures, this is because viruses can embed themselves in existing files, the entire file is searched and not just as a whole but also in pieces.
Malicious activity detection is also another way to identify malware. This system monitors the system for suspicious program behaviour. If any suspicious behaviours is detected, the program will then be investigated more further using other methods to make sure it is something to be worried about.
File Analysis is the process of searching a suspected file for a virus like instruction. However the downside to this is that it needs to analyse every single file.
Why use Virus Protection:
Virus protection is used to identify and remove a virus as well as other types of harmful computer software, which can corrupt the system and the data.
Describe and compare the features and the functions of two different operating systems. P2
This is for use on personal computers such as home or business desktops, notebooks and computers.
The image shows the skin for the Windows XP.
Windows XP was designed to make these processes easy for any newcomers while still being flexible to satisfy power users.
A frequent used function for the XP operating system is Disk Defragmenter, which is a computer program, which is designed to increase access speed and sometimes increase the amount of usable space. This is done by rearranging files, which are stored on the disk and divert them to the nearby storage locations.
This is designed to free up the disk on the computers hard drive. The cleanup process involves searching and analysing the hard drive for files, which are no longer of any use, it then processed to remove the unnecessary files, which frees up the disk space on the hard drive.
Temporary internet files
Temporary windows files
Recycle bin
Offline files
Microsoft commercializes this operating system. This was the most common used member of the DOS family of operating systems and was the main operating system for computers back in the 1980s.
This image is of the MS-DOS screen.
This could be an answer if the command asked was a question or it can be a summary of the operation took place.
Purpose of MS-DOS:
The user needs to type this in the black MS-DOS screen.
DIR- lists the directory contents such as files and folders
TREE- shows files and folder in tree diagram
FORMAT- formats a disk to accept DOS files
Conclusion
Overall, between the two operating systems, I think that Windows XP is more efficient due to it having special features and functions, which can improve the quality of the computer, the programs are easy to search for and you do not need to remember any codes to change specific details for the files or folders. The programs are arranged by category and apathetical order.
The colours and background can be changed which helps the user if they have some problem or if they do not like it, this makes the operating friendly to the user.
Also, if any folders of files need to be changed they can be right clicked on and changed whereas on MS-DOS you will need to change it in the black screen without viewing the folder, the user may forget that they done this.
Friday 3 April 2009
Specialised Cards
Network Card:
A network card is a interface card which is a piece of computer hardware designed to allow computers to communicate over a computer network, as it provides physical access to a networking medium and provides a low-key system.
Video Card:
A video card is a hardware component whose function is to generate and output images to display.
How the network card communicate with the computer?
The network card usually has two indicator lights (LEDS)
The green light shows that the card is receiving electricity and the orange or red light indicates that the network Is in activity (eg sending or receiving data), as you can see in the image.
To prepare that data to be sent to the network card, it uses a transceiver, which transforms parallel data into serial data. Each card has a unique address, called a MAC address, which is assigned by the cards manufacturer, which lets the card have unique identification in all the network cards in the world.
To ensure that the computer and network are capable the card must be suitable for the computers data bus architecture, and have the appropriate type of socket for the cable. Each card is designed to work with a certain kind of cable. some cards include multiple interface connectors.
How the video card communicate with the computer?
The video card or Graphical Processing Unit (GPU) is the spirit of the graphics card. The graphics card usually processes images before they are base on the computer screen.
This GPU is a specialized processor which has advanced image processor capabilities, especially for 3D graphics. This is because of the high temperature of the graphics card processor can reach; the fan can be mounted on to it. The job of the video memory is to store images processed by the GPU before they are displayed on the monitor.
The larger the memory of the video the better the graphics card can handle textures when displaying 3D scenes.
BIOS
In computing the BOIS stands for Basic Input Output System, this refers to the firmware code which is run by the computer when it is first powered on; this is a type of boot loader.
The functions of the BIOS are used to identify and initialize the system components, such as the hardware devices including video display card, hard disk and floppy disk.
This is to prepare the machine into a known low capability slate, so that the other software programs stored on various media can be loaded and executed.
The BIOS machines can also be said to be a coded program embedded on a chip that recognizes and controls devices which make up the computer, and control the peripherals.
Hardware Configuration
An IDE normally consists of source code editor, compiler and sometimes a interpreter tools.
How IDE communicates with the computer?
The IDE communicates with the computer through the motherboard; all new motherboards are made with IDE connectors.
A 40-pin ribbon cable is connected to the hard disk drive to the host adapter on the motherboard. A connector at one end which is usually labelled blue, this is connected to the hard drives, the grey connector attaches to the slave device, while the black connector attaches to the primary master drive. Each cable contains wires, which are laid side by side, each wire, called pins is responsible for a particular functions.
Heat Sink
Heat sinks are used in a wide range of applications such as computers, lasers, refrigeration and heat engines.
How the Fan communicates with the computer?
This heat absorbent device is use to get rid of the heat which is generated by a component in the computer casing, this includes a flexible tubular conduit and a fan unit. The tubular conduit is adapted to be disposed in the computer casing, the first end is adapted to the computer casing which filters the heat.