Category Archives: 1. Computer Systems

Computer Systems – Assessment Task

  • Download the image above.
  • Convert it to a GIF and JPG and save these in separate appropriately named folders on your network area.
  • Compare the file sizes of each with evidence.
    • The evidence should be a single page word document with screen grabs of the folders and files with the full path name showing as well as the size of the files. Print this out and give it to me.
  • Zip the entire thing up and post it in the drop box with your name as the file name.

Departmental Area

OK here is are the links from there, so far.

Topic 2 – Computer Structure
Topic 4 – Peripherals
Topic 5 – Networks
Topic 6 – Using Network
Topic 7 – Computer Software

Computer Software – Malware

Today was all about malware, we covered the following section of the arrangements document using the Scholar notes and these PowerPoints.

  • Classification of viruses by type of file infected:
    • file virus
    • boot sector virus
    • macro virus
  • Description of the following virus code actions:
    • replication
    • camouflage
    • watching
    • delivery
  • Distinction between
    • a virus
    • a worm
    • a trojan horse
  • Description of anti-virus software detection techniques:
    • use of checksum
    • searching for virus signature
    • heuristic detection
    • memory resident monitoring

You can find the revision note here and there are links at the side of the page.

Building a computer from scratch

Quite a few people have been asking about self building a PC. Its a good way to get more bang for your buck. There are a number of websites and articles. I liked this article, it covers all the main points well. The only piece of advice I would give you, if you plan to build a machine is to set a budget and stick to it. Five or ten pounds here and there adds up to hundreds of pounds of over spend.

Also before you turn it on, check everything again (esp the graphics & CPU coolers) and look out for loose screws that might have dropped into the case. Lesson 3 in the article has some tests you can run if you can’t get life into your system.

Description of a suitable selection of software to support typical tasks

Here are some common solutions and suitable software that an IT professional may have to create. The links take you to examples of the software used.

Utility Programs

Definition of a utility  program

Utility programs are those programs that are used to enhance the operating system. The Format utility is a good example of a utility program that we use often.

Description of virus checker

This will be covered in next weeks lesson.

Description of disk editor

This piece of software allows the user to access data on a disk at a very low level. This allows the user to see the RAW data and even “deleted” files.

Description of defragmenter

Hard drives can often become fragmented due to usage. Contiguous file storage helps improve the performance of the computer.

Operating Systems

The last couple of lessons have looked at operating systems. You can find revision notes here.

Description of the function of a bootstrap loader

The bootstrap loader is a small piece of the operating system that is stored in ROM. It is the first piece of software to be loaded after the computer is powered. It checks for an OS which can be located on Hard Drive, Floppy disk, Network, CD-ROM or even a USB flash drive.  It then loads this into RAM where the OS takes over.

Description and exemplification of the main functions of a single user operating system :

The operating system once loaded into RAM has 6 main functions, which allow it to manage the computer and allows the user to communicate with the hard ware.

Interpreting users commands

This is the area of the operating system that the user is most familiar with. The user controls the OS using a keyboard, mouse or other input device. These inputs are then passed to the correct part of the OS. Example clicking the save icon.

File management

The OS controls access to the backing storage devices, it maintains an index of the physical location on the backing storage of all the files. It controls access to these files on network operating systems. hierarchical filing systems can store files in Directories.

Memory  management

Each program can only be executed while in RAM. This part of the OS is responsible for making sure there is enough RAM  to store the program.  It also makes sure that programs do not use the same part of RAM. Areas of the hard drive are often used for virtual memory, this would be controlled by this and the I/O management.

Input/output management

This uses device drivers to allow communication with each device attached to the computer. It is responsible for the actual transfer of data and issues the appropriate control signals to the devices.

Resource allocation

Two processes can not use the same device at the same time. This section of the OS allows competing processes access to devices once they become available.

Managing processes

By allowing processes to share processor time, the OS can give the impression of multitasking. The state of each process is known and processor time can be give processes that require it.