The document outlines plans by an IT consultant to develop IT systems for a food company. The consultant will:
1. Create a secure ecommerce website and links between departments to improve online ordering and sales.
2. Train 8 staff members on using the new systems over 8 months through cooperative training.
3. Purchase necessary equipment like computers, servers, and security systems within the £50,000 budget.
The document describes the installation and configuration of various software on a Windows 10 and Linux operating system.
For Windows 10, it discusses installing the OS, setting up device drivers, installing antivirus software, office software, and a password manager application. The key stages of installation are outlined for each along with any issues encountered.
For Linux, it describes installing Ubuntu GNOME, partitioning the disk, identifying required drivers, setting up user accounts and networking. Installation of additional applications is also covered.
A test plan is proposed to validate the Linux system installation including checking installation, first boot, devices, networking, and the system administrator.
Elite Sports is facing declining performance due to mismanagement and lack of online presence. The document evaluates Elite Sports' strategic direction using the SWOT and BCG matrix models. It is suggested that Elite Sports improve its strategic plan by 1) using SWOT to leverage strengths, address weaknesses by developing e-commerce, capitalize on opportunities, and be aware of threats and 2) introducing e-commerce using the BCG matrix to increase its global reach and reduce costs. The decision-making process can help Elite Sports address its lack of online presence by identifying the problem, gathering information, developing solutions, selecting the best solution, implementing it, and evaluating the results.
1) The document describes the installation processes of Windows 10, Linux Ubuntu 15.04, antivirus software Kaspersky, and office software Microsoft Office 2010 on a computer system.
2) Details are provided on partitioning disks and setting up user accounts during the Linux installation. Network setup and installation of the Skype application are also documented.
3) Test plans are outlined to check the identification of distributions, device drivers, user account configuration, network connectivity, and software installation. Screenshots confirm the successful completion of tests.
4) Common faults identified on four PCs include non-working USB ports, faulty Wi-Fi connectivity, random restarting, and malfunctioning keyboard keys. Steps taken to diagnose
The document outlines plans by an IT consultant to develop IT systems for a food company. The consultant will:
1. Create a secure ecommerce website and links between departments to improve online ordering and sales.
2. Train 8 staff members on using the new systems over 8 months through cooperative training.
3. Purchase necessary equipment like computers, servers, and security systems within the £50,000 budget.
The document describes the installation and configuration of various software on a Windows 10 and Linux operating system.
For Windows 10, it discusses installing the OS, setting up device drivers, installing antivirus software, office software, and a password manager application. The key stages of installation are outlined for each along with any issues encountered.
For Linux, it describes installing Ubuntu GNOME, partitioning the disk, identifying required drivers, setting up user accounts and networking. Installation of additional applications is also covered.
A test plan is proposed to validate the Linux system installation including checking installation, first boot, devices, networking, and the system administrator.
Elite Sports is facing declining performance due to mismanagement and lack of online presence. The document evaluates Elite Sports' strategic direction using the SWOT and BCG matrix models. It is suggested that Elite Sports improve its strategic plan by 1) using SWOT to leverage strengths, address weaknesses by developing e-commerce, capitalize on opportunities, and be aware of threats and 2) introducing e-commerce using the BCG matrix to increase its global reach and reduce costs. The decision-making process can help Elite Sports address its lack of online presence by identifying the problem, gathering information, developing solutions, selecting the best solution, implementing it, and evaluating the results.
1) The document describes the installation processes of Windows 10, Linux Ubuntu 15.04, antivirus software Kaspersky, and office software Microsoft Office 2010 on a computer system.
2) Details are provided on partitioning disks and setting up user accounts during the Linux installation. Network setup and installation of the Skype application are also documented.
3) Test plans are outlined to check the identification of distributions, device drivers, user account configuration, network connectivity, and software installation. Screenshots confirm the successful completion of tests.
4) Common faults identified on four PCs include non-working USB ports, faulty Wi-Fi connectivity, random restarting, and malfunctioning keyboard keys. Steps taken to diagnose
1. The document is an assignment front sheet for a qualification in computing and systems development. It outlines the learning outcomes and assessment criteria for a computer systems assignment.
2. The assignment requires the student to understand computer system functions, design a system to meet client needs, build and configure a computer system, and perform routine maintenance tasks.
3. For each learning outcome, the student must complete tasks demonstrating their knowledge, and provide evidence and page references in a written report. Their work will be assessed against criteria such as explaining concepts, justifying designs, and applying appropriate methods.
The document discusses designing a database for an exhibition services company. It includes:
1. Creating an entity relationship diagram that is normalized to 3rd normal form to eliminate data redundancy. Primary and foreign keys are identified.
2. A data dictionary is produced showing attributes and data types for each table.
3. SQL scripts are written to create tables based on the design. Data is entered for exhibitions, customers, staff and their assignments.
4. Queries are written to select, update, count and delete data as specified in the tasks.
The tasks demonstrate how to design a database according to requirements, normalize data to eliminate redundancy, and enter and manipulate data using SQL.
The document is a student assignment submission form for a programme/qualification. It includes sections for the student to provide their student ID/registration number, name, centre name, module name, module leader, number of words, and signature. The student must confirm that the work is their own and has not been plagiarized. They also acknowledge the assessment criteria and pass mark. The due date is also to be provided.
This document is a dissertation submitted by Myint Oo in partial fulfillment of the requirements for a BSc (Hons) in Business Information Technology from the University of Greenwich. It presents the development of a website for Unique, an online shopping and auction site. The dissertation contains 9 chapters that cover all aspects of analyzing the requirements, designing, developing, and delivering the project. Methodologies like DSDM and UML modeling are used to manage the project development. PHP and MySQL are selected as the programming language and database to create the dynamic website.
Network Security and Cryptography module. I started with Risk assessment in Task 1, explaining Risk Control in Task 2, Task 3 is a Network Diagram and Maintaining Security in Task 4 as well as Reflective commentary in Task 5.
The document discusses the development of a new management information system (MIS) for Children Support Agency (CSA). CSA currently faces issues with its outdated information system, including inconsistent data collection and a lack of reporting capabilities. The new MIS aims to address these issues by standardizing data entry, producing reports, and allowing authorized access to financial and project data. An agile development method called DSDM is proposed for building the MIS in increments. High-level requirements focus on collecting accurate data, generating management reports, and including performance indicators to measure projects. Stakeholder interviews helped identify additional key requirements.
Nhận viết luận văn Đại học , thạc sĩ - Zalo: 0917.193.864
Tham khảo bảng giá dịch vụ viết bài tại: vietbaocaothuctap.net
Download luận văn thạc sĩ ngành kĩ thuật điện tử với đề tài: Nghiên cứu hệ thống giám sát trên nền Camera IP, cho các bạn làm luận văn tham khảo
The document provides a summary of a project documentation for a university coursework lifecycle management system developed using agile scrum methodology. It includes sections on agile scrum documentation covering roles, tools, meetings, product and sprint backlogs, and a burn down chart. It also includes design documentation with use case diagrams, database design, and website design. Implementation details such as files created and screenshots are presented. Finally, it outlines the testing plan and approach for the system.
Microsoft Office 2010 provides new productivity capabilities that allow users to work from virtually anywhere on multiple devices. It offers enhanced collaboration tools, improved security features, and increased manageability for IT. Key new features include Office Web Apps for viewing and editing documents from a browser, co-authoring for simultaneous document editing, and integration with social networks and communications tools. Office 2010 aims to help users be more productive while providing IT with a manageable platform.
báo cáo quản lý cửa hàng máy tính . Tài liệu này giúp các bạn hiểu rõ hơn về quy trình của 1 cửa hàng làm việc thế nào, phân tích chức năng usecase. Dựa trên tài liệu này các bạn sẽ làm được nhiều báo cáo khác về môn học phân tích thiết kế dữ liệu và lập trình website. Ngoài ra các bạn có thể download tại website http://www.thuvienso.net. rất nhiều tài liệu trên website này.
Nhận viết luận văn Đại học , thạc sĩ - Zalo: 0917.193.864
Tham khảo bảng giá dịch vụ viết bài tại: vietbaocaothuctap.net
Download luận văn đồ án tốt nghiệp ngành công nghệ thông tin với đề tài: Nghiên cứu kỹ thuật tấn công mạng LAN và xây dựng giải pháp đảm bảo an toàn mạng LAN, cho các bạn làm luận văn tham khảo
Download luận văn đồ án tốt nghiệp ngành công nghệ thông tin với đề tài: Tìm hiểu một số bài toán An toàn thông tin trong Bỏ phiếu điện tử, cho các bạn tham khảo làm đề tài nghiên cứu
Agentless Monitoring with AdRem Software's NetCrunch 7Hamza Lazaar
This internship report details work at AdRem Software to expand the monitoring capabilities of their network management software NetCrunch. The intern created new agentless monitoring packs for NetCrunch that check systems and databases without installing software. This allows monitoring of key indicators like available disk space, active antivirus software and database query response times. The report provides technical details on how the monitoring was implemented using protocols like SNMP and WMI to retrieve data from remote unagented systems.
The document provides instructions for installing the Oxygen GMX Graphics Accelerator, noting that some topics like installing hardware may not apply since the card comes pre-installed in Gateway systems; it directs the user to disregard these sections and instead use the Gateway System Restoration CD if needing to reinstall drivers or software; and it provides the primary technical support website for Gateway customers.
1. The document is an assignment front sheet for a qualification in computing and systems development. It outlines the learning outcomes and assessment criteria for a computer systems assignment.
2. The assignment requires the student to understand computer system functions, design a system to meet client needs, build and configure a computer system, and perform routine maintenance tasks.
3. For each learning outcome, the student must complete tasks demonstrating their knowledge, and provide evidence and page references in a written report. Their work will be assessed against criteria such as explaining concepts, justifying designs, and applying appropriate methods.
The document discusses designing a database for an exhibition services company. It includes:
1. Creating an entity relationship diagram that is normalized to 3rd normal form to eliminate data redundancy. Primary and foreign keys are identified.
2. A data dictionary is produced showing attributes and data types for each table.
3. SQL scripts are written to create tables based on the design. Data is entered for exhibitions, customers, staff and their assignments.
4. Queries are written to select, update, count and delete data as specified in the tasks.
The tasks demonstrate how to design a database according to requirements, normalize data to eliminate redundancy, and enter and manipulate data using SQL.
The document is a student assignment submission form for a programme/qualification. It includes sections for the student to provide their student ID/registration number, name, centre name, module name, module leader, number of words, and signature. The student must confirm that the work is their own and has not been plagiarized. They also acknowledge the assessment criteria and pass mark. The due date is also to be provided.
This document is a dissertation submitted by Myint Oo in partial fulfillment of the requirements for a BSc (Hons) in Business Information Technology from the University of Greenwich. It presents the development of a website for Unique, an online shopping and auction site. The dissertation contains 9 chapters that cover all aspects of analyzing the requirements, designing, developing, and delivering the project. Methodologies like DSDM and UML modeling are used to manage the project development. PHP and MySQL are selected as the programming language and database to create the dynamic website.
Network Security and Cryptography module. I started with Risk assessment in Task 1, explaining Risk Control in Task 2, Task 3 is a Network Diagram and Maintaining Security in Task 4 as well as Reflective commentary in Task 5.
The document discusses the development of a new management information system (MIS) for Children Support Agency (CSA). CSA currently faces issues with its outdated information system, including inconsistent data collection and a lack of reporting capabilities. The new MIS aims to address these issues by standardizing data entry, producing reports, and allowing authorized access to financial and project data. An agile development method called DSDM is proposed for building the MIS in increments. High-level requirements focus on collecting accurate data, generating management reports, and including performance indicators to measure projects. Stakeholder interviews helped identify additional key requirements.
Nhận viết luận văn Đại học , thạc sĩ - Zalo: 0917.193.864
Tham khảo bảng giá dịch vụ viết bài tại: vietbaocaothuctap.net
Download luận văn thạc sĩ ngành kĩ thuật điện tử với đề tài: Nghiên cứu hệ thống giám sát trên nền Camera IP, cho các bạn làm luận văn tham khảo
The document provides a summary of a project documentation for a university coursework lifecycle management system developed using agile scrum methodology. It includes sections on agile scrum documentation covering roles, tools, meetings, product and sprint backlogs, and a burn down chart. It also includes design documentation with use case diagrams, database design, and website design. Implementation details such as files created and screenshots are presented. Finally, it outlines the testing plan and approach for the system.
Microsoft Office 2010 provides new productivity capabilities that allow users to work from virtually anywhere on multiple devices. It offers enhanced collaboration tools, improved security features, and increased manageability for IT. Key new features include Office Web Apps for viewing and editing documents from a browser, co-authoring for simultaneous document editing, and integration with social networks and communications tools. Office 2010 aims to help users be more productive while providing IT with a manageable platform.
báo cáo quản lý cửa hàng máy tính . Tài liệu này giúp các bạn hiểu rõ hơn về quy trình của 1 cửa hàng làm việc thế nào, phân tích chức năng usecase. Dựa trên tài liệu này các bạn sẽ làm được nhiều báo cáo khác về môn học phân tích thiết kế dữ liệu và lập trình website. Ngoài ra các bạn có thể download tại website http://www.thuvienso.net. rất nhiều tài liệu trên website này.
Nhận viết luận văn Đại học , thạc sĩ - Zalo: 0917.193.864
Tham khảo bảng giá dịch vụ viết bài tại: vietbaocaothuctap.net
Download luận văn đồ án tốt nghiệp ngành công nghệ thông tin với đề tài: Nghiên cứu kỹ thuật tấn công mạng LAN và xây dựng giải pháp đảm bảo an toàn mạng LAN, cho các bạn làm luận văn tham khảo
Download luận văn đồ án tốt nghiệp ngành công nghệ thông tin với đề tài: Tìm hiểu một số bài toán An toàn thông tin trong Bỏ phiếu điện tử, cho các bạn tham khảo làm đề tài nghiên cứu
Agentless Monitoring with AdRem Software's NetCrunch 7Hamza Lazaar
This internship report details work at AdRem Software to expand the monitoring capabilities of their network management software NetCrunch. The intern created new agentless monitoring packs for NetCrunch that check systems and databases without installing software. This allows monitoring of key indicators like available disk space, active antivirus software and database query response times. The report provides technical details on how the monitoring was implemented using protocols like SNMP and WMI to retrieve data from remote unagented systems.
The document provides instructions for installing the Oxygen GMX Graphics Accelerator, noting that some topics like installing hardware may not apply since the card comes pre-installed in Gateway systems; it directs the user to disregard these sections and instead use the Gateway System Restoration CD if needing to reinstall drivers or software; and it provides the primary technical support website for Gateway customers.
This document provides instructions for installing IBM Informix Client Software Development Kit (Client SDK) and IBM Informix Connect on UNIX, Linux, Mac OS X, and Windows systems. It describes preparing for installation, running the installation program in different modes, and post-installation configuration. The document also covers uninstalling the client products and distributing them with custom applications.
This document provides instructions for using the CenterONE software to configure a motor control center (MCC). It discusses installing the CenterONE software, starting a new MCC workup, and completing various tabs in the MCC setup sheet to specify information about the customer, wiring, enclosure, incoming power, and other details of the MCC configuration. Safety notes and warnings are provided throughout.
This document provides an overview of Call Detail Recording (CDR) solutions from AltiGen Communications, including how call data is created, recorded, collected, and reported. It discusses the differences between real-time monitoring (RTM) records, which take periodic snapshots of call center statistics, and call detail recording, which tracks every individual call. It also covers how CDR data can be configured for storage, either internally or externally, and how this data can then be accessed and analyzed through the CDR Search tool.
This document provides instructions and guidelines for configuring authentication and authorization on a Citrix NetScaler appliance. It describes how to configure user accounts and groups, command policies to control user permissions, and how to bind command policies to users and groups. The document includes details on using both the NetScaler command line and configuration utility to manage authentication and authorization settings.
This document provides an overview of Citrix XenApp 5 and the XenApp 5 Feature Pack. It discusses the different product editions, new features in XenApp 5, and enhanced capabilities in the Feature Pack. Key areas covered include application delivery, streaming, Receiver, XenServer virtualization, load testing, provisioning, profiles, monitoring, security, optimization, and voice services. It also provides guidance on deploying XenApp 5 farms and getting started with application management.
This document provides an introduction to eHealth Service Availability, which is a plug-in module for the eHealth SystemEDGE agent that monitors the response time and availability of critical network services and Internet applications. It can monitor services on a single system or across multiple systems. The SystemEDGE agent provides configuration and reporting for Service Availability through SNMP. Service Availability stores test information in the Service Availability table and the svcrsp.cf configuration file. Tests can be created manually or using the svcwatch utility, SystemEDGE, or AdvantEDGE View.
This 3 sentence summary provides the high level information about the document:
The document is a user manual for the Si-3000 camera that describes how to install the software and drivers, use the camera software XLiCap, and includes troubleshooting information. It outlines the system requirements, package contents, step-by-step instructions for installing the drivers and software, an overview of the main features and controls of the XLiCap software, and contact information for support. The manual provides all the essential information needed to set up and start using the Si-3000 camera.
This document provides instructions for installing and using Global Drive Control (GDC) software. GDC allows users to commission and set parameters for Lenze 8200 and 9300 series controllers. The document covers installing GDC, starting up in online or offline mode, finding controllers connected via serial port, and navigating the GDC user interface. Short examples of commissioning workflows are also provided.
SysInfoTools OpenOffice Draw Recovery Software helps users repair their corrupt ODG files of OpenOffice Draw. It enables users to recover all types of graphics, images, logos and diagrams from corrupt ODG files. Users can see the preview of recovered data before saving them. The software is very easy-to-use since it contains a friendly and intuitive user interface. Any technical and non-technical users can use it.
The document provides instructions for installing MATLAB and Simulink software. It discusses downloading and running the installer, accepting the license agreement, selecting installation options like installation type and folder, and completing the installation process. The document also covers activating installations, installing without an internet connection, uninstalling products, and system requirements.
This document outlines an assignment for designing a computer system for Callink, a company that facilitates online conferences. It discusses different types of computer systems based on their intended use, including personal computers, meeting room computers, server computers, and an IT admin's computer. It also compares the hardware, software, and peripheral components of these systems. The tasks are to explain the roles and components of different computer systems, provide a design specification for Callink including diagrams, and evaluate the proposed design considering factors like performance, cost, and compatibility. The document provides learning outcomes, grading criteria, and a contents section to structure the response.
This document provides a user's guide for a Gateway desktop computer. It begins with instructions for starting up the computer for the first time and registering the product. It then covers computer basics like safety, ergonomics for setting up the work area, and connecting peripherals. The guide also explains how to use the computer's features like powering on/off and the optical drive. It concludes with sections on software, internet use, help resources, and regulatory information.
This document provides a user's guide for a Gateway desktop computer. It covers starting up the computer for the first time, registering the product, installing software, creating recovery discs, basic computer use and safety, setting up the work area, using peripheral devices, connecting to the internet and troubleshooting. Safety precautions for computer use include keeping it away from direct sunlight, sources of heat, magnetic fields and water. Ergonomic guidelines are also provided for adjusting the chair, positioning the computer, monitor, keyboard and mouse.
The document provides instructions for setting up and using a Gateway desktop computer. It discusses connecting the mouse, keyboard, monitor, and power cable. It also covers turning the computer on and off, inserting discs into the optical drive, and basic safety guidelines for comfortable use of the computer. The summary provides high-level information about connecting peripherals and basic computer operation.
This document provides a user's guide for a Gateway desktop computer. It covers starting up the computer, registering the product, installing software, performing recovery, basic computer use, setting up the work area ergonomically, using peripheral devices, connecting to the internet and troubleshooting. Safety precautions for computer and electrical use are also outlined.
This document provides a project report on developing a bike sharing Android application. It includes an introduction describing the motivation for the project, a literature survey reviewing papers on related topics like bike and public transport integration, a software requirements specification outlining the requirements, a system design section with diagrams, and plans for system implementation and testing. The report was submitted by students to fulfill the requirements for a degree in computer engineering.
A- LES CONCEPTS
Comprehension du bim.
Travailler dans différentes vues.
Classement et hierarchie des éléments dans Revit.
B-L'ENVIRONNEMENT DE TRAVAIL
Page des fichiers rescents et grand R.
Le ruban.
Fenêtre des propriétés.
Explorateur du projet.
Navigation dans un modèle.(zoom, rotation et panoramique).
Selection des objets, et verouillage.
C-DEMARRAGE D'UN PROJET.
Les gabarits.
Travail collaboratif.
Configuration d'un nouveau projet.
Manipulation des niveaux.
Manipulation des files de projet.
Utilisation des cotes temporaires.
C- MODELISATION PAR OBJETS:
Ajout des murs.
Propriété et type de murs.
Utilisation des accroches.
Ajouts de poteaux et poutres.
Ajout de portes et fenêtres.
Ajout d'élements de plomberie et d'électricité.
Utilisation de la jonction entre murs.
Utilisation des contraintes.
D- LIENS, IMPORTS ET GROUPES:
Lier fichiers DWG/DXF/SKP
Création de topogrpahie d'un site à partir d'un fichier.
Création et gestion des groupes.
Création et gestion des liens Revit.
Utilisation du partage d'emplacement.
E- MODELISATION PAR ESQUISSE:
Sols., toits et plafonds.
Toit par extrusion.
Ouvertures.
F-ESCALIERS.
Edition avancée d'escalier.
Edition avancée de gardes corps.
G- EDITION AVANCEE DES MURS:
Création d'un nouveau type de murs..
Création et gestion des murs empilés.
Création et gestion des murs rideaux.
.
H- GESTION DES GRAPHISMES:
Gestion du style des objets.
Gestion du remplacement de la visibilité et du graphisme des éléments.
Création et application des gabarits de vue.
Cacher et isoler les éléments.
Cadrage de la vue.
Plage de vue et entendues.
Vue isométrique d'une selection.
Option d'affichage des graphismes.
I- PIECES:
Création et gestion des pièces.
J- NOMENCLATURE ET ETIQUETTES:
Gestion des étiquettes.
Création et gestion des nomenclatures.
Modification des nomenclatures.
Enrichissement des VCCTP par les nomenclatures.
K-ANNOTATIONS.
Textes.
Dimensions
Symboles.
Légendes.
Détails.
Définir ses annotations.
L- PARAMETRIQUE ET FAMILLES
Utilisation des paramètres en mode projet.
Concept de famille.
Création d'une famille.
Utilisation des contraintes.
Utilisation des formes solides.
M- FEUILLE, IMPRESSION, PUBLICATION:
Création d'une feuille d'impression.
Export CAO.
Publication.
Impression PDF.
N- TRUCS ET ASTUCES.
A découvrir en formation.
Ensuring Distributed Accountability in the CloudSuraj Mehta
Ensuring distributed accountability for data sharing in the cloud is in short nothing
but a novel highly decentralized information accountability framework to keep track
of the actual usage of the users' data in the cloud. Cloud computing enables highly
ecient services that are easily consumed over the internet.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
1. Statement and Confirmation of Own Work
Student Declaration
I have read and understood NCC Education’s Policy on Academic Dishonesty
and Plagiarism.
I can confirm the following details:
Programme/QualificationName:
StudentID/Registration number:
Name:
Centre Name:
Module Name:
Module Leader:
Number of words:
I confirm that this is my own work and that I have not plagiarised any part of it. I
have also noted the assessment criteria and pass mark for assignments.
Due Date:
Student Signature:
Submitted Date:
2. Suraj Rimal 00169957 Computer System
Page 2 of 32
Contents
Introduction............................................................................................................................................3
Task 1: Windows Installation ................................................................................................................3
1. Installation of Windows..................................................................................................................3
a) Key stages and identification of windows installation ............................................................3
b) Identification and description of required device drivers and their source locations.............8
c) Identification and description of unresolved issues...............................................................9
2. Installation of Anti Virus Software............................................................................................ 11
a) Identification of product used. .............................................................................................. 11
b) Identification and description of key stages in installation ................................................... 11
c) Identification and description of problems and unresolved issues ......................................14
d) Outline of the update process for the antivirus software ..................................................... 14
3. Installation of office software....................................................................................................15
a) Identification of product used. .............................................................................................. 15
b) Identification and description of key stages in installation ................................................... 15
c) Identification and description of problem or unresolved issues........................................... 17
4. Installation of free utility............................................................................................................ 17
a) Identification of utility, outline of what it does and reason why you-choose this................. 17
b) Identification and description of key stages in installation ................................................... 18
c) Identification and description of problems or unresolved issues......................................... 19
Task 2: Linux-Installation .................................................................................................................... 20
1. Installation of Linux ......................................................................................................................... 20
a) Identification of distribution...................................................................................................20
b) Description of disk partitioning ............................................................................................. 20
c) Identification and description of required device drivers and their source locations........... 21
d) Description of setting up administration and standard user ................................................ 24
e) Description of Network set up .............................................................................................. 25
f) Identification and description of installation process for one application ............................ 26
2. Testing of Linux system............................................................................................................... 28
Task 3 Faulty PC ............................................................................................................................ 29
Conclusion....................................................................................................................................... 30
References ......................................................................................................................................31
3. Suraj Rimal 00169957 Computer System
Page 3 of 32
Introduction
Microsoft is the multinational computer technology corporation. The history of Microsoft began on
April 4. Windows Is the closed source operating system manufactured and distributed by Microsoft
Corporation. The current latest version of windows is Windows 10. In this Assignment, we are using
Windows 8.1 pro 32bit because it doesn’t demand high resources and it’s idle for virtual
installation. Windows 1.0 was first Graphical user interface operating system released by Microsoft.
In this project, we are using VMware Workstation which can be downloaded from official website.
(www.vmware.com, 2017)
Task 1: Windows Installation
1. Installation of Windows
a) Key stages and identification of windows installation
The important steps for installing Windows 8.1 pro 32bit are:
1. I started installation by creating a new virtual machine. Windows 8.1 was downloaded from
manufacturer’s trusted website. (www.Microsoft.com, 2017)
2. Select language, time and currency format, keyboard input method and click next.
Screenshot: Choosing language and time
4. Suraj Rimal 00169957 Computer System
Page 4 of 32
3. Click install now, for repairing existing windows click repair your computer.
Screenshot: Installing windows
4. ClickI acceptlicense termandclicknext.
Screenshot: Accepting license terms
5. Suraj Rimal 00169957 Computer System
Page 5 of 32
5. In the type of installation click custom which will install fresh copy of windows.
Screenshot: Type of installation
6. In the drive selection part if you want to create extra drive for personal data then drive
options and input desired size and click next. Here we made 30GB for personal storage and
30GB for windows installation.
Screenshot: Disk partition
7. After clicking next window will expand its installation files.
6. Suraj Rimal 00169957 Computer System
Page 6 of 32
Screenshot: Windows installing
8. After installing files setup will ask us to personalize our pc, choose an appropriate color and
pc name and click next.
Screenshot: Personalization menu
7. Suraj Rimal 00169957 Computer System
Page 7 of 32
9. Now select use express settings as express does everything automatically for us.
Screenshot: Setting up necessaryitems
10. After setting up window will present us with our desktop.
Screenshot: Desktop screenshot
8. Suraj Rimal 00169957 Computer System
Page 8 of 32
b) Identification and description of required device drivers and their source
locations
Driver is a software component which acts as a bridge between hardware and software.
The PC worked flawlessly after the installation of Windows 8.1. The drivers installed were
located inside windows/system32/drivers.
1. Microsoft Display driver = Microsoft Basic Display Adapter is software that's built
into Windows that provides display and graphics capabilities when software from
your hardware manufacturer isn't installed. (Support.microsoft.com, 2017)
Location: C:WindowsSystem32driversBasicDriver.sys
Screenshot: Driver location of Microsoft display driver
2. NECVMWar VMware IDE CDR10 ATA device = It is the CD/DVD driver which contains
necessary files for operating system to identify and communicate to the CD/DVD device.
Location: C:WindowsSystem32driverscdrom.sys
C:WindowsSystem32driversedevmon.sys
9. Suraj Rimal 00169957 Computer System
Page 9 of 32
Screenshot: Driver location of NECVMWar VMware IDE CDR10 ATA device
c) Identification and description of unresolved issues
1. After installing windows 8.1 pro 32bit, I noted that several device drivers were missing
like audio and Ethernet.
10. Suraj Rimal 00169957 Computer System
Page 10 of 32
Screenshot: Driver status before
2. The device driver were downloaded and installed from manufacture trusted website.
Screenshot: Driver status after installing driver
11. Suraj Rimal 00169957 Computer System
Page 11 of 32
2. Installation of Anti Virus Software
a) Identification of product used.
I selected ESET Nod32 ANTIVIRUS 10 32bit (www.eset.com, 2017)
because:
It has most advanced virus scanning engines.
Installation is straightforward without any hassle.
It requires less resources to run.
It works as an internet security as well.
b) Identification and description of key stages in installation
The procedure of installation are shown below:
1. To install antivirus double click the setup file and click continue.
Screenshot: first step of installing antivirus
2. Now click I Accept.
12. Suraj Rimal 00169957 Computer System
Page 12 of 32
Screenshot: Accepting terms
3. Now click install to complete installation.
Screenshot: Additional install options
4. After completing installation click continue.
13. Suraj Rimal 00169957 Computer System
Page 13 of 32
Screenshot: Installation successful
5. After lunching antivirus it will look like this.
Screenshot: Antivirus default screen
14. Suraj Rimal 00169957 Computer System
Page 14 of 32
c) Identification and description of problems and unresolved issues
No major issues were raised at the time of installation however few issues could arise.
Here are some possible issue: -
Problem: Setup closes due to low hard disk space.
Solution: Make sure you have sufficient space available in c: drive.
Problem: Antivirus refuse to install.
Solution: Make sure to completely remove previous installed antivirus.
Problem: Setup file doesn’t open.
Solution: Make sure that the file is downloaded properly.
d) Outline of the update process for the antivirus software
Auto update
While doing automatic update antivirus software automatically downloads database
signature when necessary. Process of automatic update is shown below:
Screenshot: Auto update started
15. Suraj Rimal 00169957 Computer System
Page 15 of 32
Screenshot: Auto update completed
Manual update
In this type of update, we have to download the latest database signature by visiting
the antivirus software website.
3. Installation of office software
a) Identification of product used.
I choose WPS Office 2016 because it is free of cost and it occupies low space on
computer. (www.wps.com/office-free ,2017) It is less in size and freely available to
most of the operating system including Android.
b) Identification and description of key stages in installation
1. Run the downloaded file and provide administrator privileges then click on the
next button.
16. Suraj Rimal 00169957 Computer System
Page 16 of 32
Screenshot: WPS Office setup
2. Uncheck I agree to install 360 Total Security because we have already installed
antivirus and click install.
Screenshot: Uncheck 360 Security
3. Now setup will install WPS office after installing office we can lunch it through start
menu.
17. Suraj Rimal 00169957 Computer System
Page 17 of 32
Screenshot: WPS Office Writer
c) Identification and description of problem or unresolved issues
No major issues were raised at the time of installation however few issues could arise.
Here are some possible issues: -
Problem: Setup closes due to low hard disk space.
Solution: Make sure you have sufficient space available in c: drive.
Problem: Setup file doesn’t open.
Solution: Make sure that the file is downloaded properly.
Problem: Setup requires .net framework 4.5 which is missing.
Solution: Install .net framework 4.5 before installing WPS Office
4. Installation of free utility
a) Identification of utility, outline of what it does and reason why you-choose
this
I choosed CCleaner v5.26 32bit for the following reason: (www.piriform.com, 2017)
It cleans all junk without any hassle.
It cleans broken registry as well as broken shortcuts.
Automatically cleans temporary files, DNS cache, Memory Dumps etc.
It doesn’t contain any spyware or adware.
18. Suraj Rimal 00169957 Computer System
Page 18 of 32
b) Identification and description of key stages in installation
1. Run the downloaded file and provide administrator privileges then click on the next.
2. Then, click install as shown below.
Screenshot: Utility software install wizard
3. After completing installation click Run CCleaner.
Screenshot: Utility software setup completed
19. Suraj Rimal 00169957 Computer System
Page 19 of 32
4. Now CCleaner will lunch and will look like this.
Screenshot: Utility software default screen
c) Identification and description of problems or unresolved issues
No major issues were raised at the time of installation however few issues could arise. Here
are some possible issues: -
Problem: Setup closes due to low hard disk space.
Solution: Make sure you have sufficient space available in c: drive.
Problem: Setup file doesn’t open.
Solution: Make sure that the file is downloaded properly.
Problem: Windows installer is currently busy.
Solution: Make sure to complete other installation and try again.
20. Suraj Rimal 00169957 Computer System
Page 20 of 32
Task 2: Linux-Installation
1. Installation of Linux
a) Identification of distribution
For this assignment, I’m choosing Linux lite 3.2 32bit. Linux lite is the flavor of Linux which is
easy to use and is based on Debian and Ubuntu. Lite is suitable for individuals who are new to
Linux.
It requires less resources to run and can be installed on old hardware Despite the fact that lite is
a lightweight distribution; it permits us to run all to applications that other distributions are
currently offering.
b) Description of disk partitioning
After booting linux it will ask us to partition the disk click something else after that we have to
manually partition everything including like swap, home etc. I gave 150GB for Linux.
Figure 1 Hierarchy of Linux file system
/ = (8% of total storage i.e. 12287MB) - Used to run the system.
/swap = (1.5 times the total RAM i.e. 1535MB) - Acts as a virtual memory.
/boot = (5% of total storage i.e. 7679MB) - Used in booting a system.
/home = (37% of total storage i.e. 45860MB) - All user file is created inside it.
/usr = (9% of total storage i.e. 18430MB) - Decides for access of user to the files
/var = (11% of total storage i.e. 23039MB) - Root files/backup of installation are stored here.
/srv = (8% of total storage i.e. 15358MB) - Contains server specific services related data.
/opt = (8% of total storage i.e. 15358MB) - Contains add-on applications from individual
vendors.
/user/local = (8% of total storage i.e. 15358MB) - Used for system administrator.
/tmp = (4% of total storage i.e. 1499MB) - Used to save temporary documents.
21. Suraj Rimal 00169957 Computer System
Page 21 of 32
Figure 2 Partition of Linux
Figure 3 Partition of Linux 2
c) Identification and description of required device drivers and their source
locations
Linux Lite by default provides most of the required drivers to run operating system smoothly.
However, drivers or devices information can be viewed by running the command ‘lspci’ in
command line as shown in figure.
22. Suraj Rimal 00169957 Computer System
Page 22 of 32
Screenshot: Required device drivers
Screenshot: Required device drivers 2
’modinfo_module_name’ command shows various information and location as mentioned
below.
23. Suraj Rimal 00169957 Computer System
Page 23 of 32
Screenshot: Information and source location of PCI Bridge
Above figure shows details about driver “PCI Bridge” which is situated inside the
/lib/modules/4.4.O.45- generic/kernel/net/bridge/bridge.ko
Screenshot: Information and location of Host Bridge
Above figure shows details about device “Host Bridge” which is situated inside
/lib/modules/4.4.O.45- generic/kernel/net/bridge/bridge.ko
24. Suraj Rimal 00169957 Computer System
Page 24 of 32
Screenshot: Size of drivers’ modules
d) Description of setting up administration and standard user
Admin account is created at the installation phase as shown below.
Screenshot: Administrator account
25. Suraj Rimal 00169957 Computer System
Page 25 of 32
Standard user can be created using terminal command ‘sudo adduser username’
Screenshot: Creating standard user through terminal
e) Description of Network set up
Network can be configured with two different ways for this project I’m selecting manual way.
Address– 192.168.24.25
Netmask – 255.255.255.0
Gateway – 192.168.1.1
Screenshot: Setting up internet
26. Suraj Rimal 00169957 Computer System
Page 26 of 32
f) Identification and description of installation process for one application
Drop box software which is trusted cloud backup software. I installed Drop Box 2.11.13
32bit using command ‘sudo apt-get install dropbox’ and pressed ‘y’ to confirm.
Information about sudo can be found here.
Screenshot: Installing software drop box
27. Suraj Rimal 00169957 Computer System
Page 27 of 32
Screenshot: Installing software drop box 2
After installing Dropbox ran well without any issue
Screenshot: Dropbox software
28. Suraj Rimal 00169957 Computer System
Page 28 of 32
2. Testingof Linux system
a. Identification-of test-plan-for-system
After completing installation of Linux lite I ran following test to to ensure its functining
properly.
a. Linux system Installation
b. Initial boot and harddisk recognication
c. Devices and driver installation
d. Network discovery and setup
e. Application store and application installation
f. Media playback
b. Record of how system perform against test plan
Testing of Linux
lite
Expected result Actual result Description of
result
Description of
action
Linux system
installation
Fully functional
GUI installer
should be
provided
Fully working
GUI for
installation was
provided
No action taken GUI installation
method was
provided
Initial boot and
harddisk
recognition
All the partitions
and attacted
storage device
should be
detected
Not all drives
were detected
Partition should
be manually
mounted
After mounting
partition
manually it
displayed all
partitions
Devices and
driver installation
By default all the
devices should
be detected
GPU drivers
were missing
causing display
flickering
Had to turn on
propritery
drivers from
settings
After turning on
GPU started
working
Network
discovery and
setup
By default
network should
be working
Network were
working fine by
default
No action taken Internet was
working without
additional
configuration
Application store
and application
installation
Application store
should be
provided by
default
Software center
were provided
for application
installation
No action taken Software center
was provided to
install
additional
applications
29. Suraj Rimal 00169957 Computer System
Page 29 of 32
Media playback All the common
format media
files should play
Most of the
propritery
playback format
were missing
(codec)
Downloaded
media playback
additional pack
After insalling
additional pack
all format of
media started
working
Table: Test plan
Task 3 Faulty PC
1. Wi-Fi constantly droppingon windows.
i. Identification-of-problem
After updating to windows 8.1, I noticed that Wi-Fi was dropping constantly and
browsing was too slow compared to windows 8.
ii. Cause
After researching I found out that the problem was arising because of mismatch Wi-
Fi driver which was installed during system update.
iii. Remedy
I opened the Device manager by pressing windows + x shortcut key, expanded
network adapter and clicked on wireless network adapter and uninstalled
QUALCOMM driver.
iv. Success/failures
After uninstalling and rebooting of system Wi-Fi dropping issue was gone. So, it’s
success.
2. Disk drive not showing in my computer.
i. Identification-of-problem
I found out that my E: and D: drives were missing in my computer.
ii. Cause
After searching I found out that there were no mount path set for E: and D: drives.
iii. Remedy
I opened Disk management by pressing windows + x shortcut key and right
clicked on drive D: and choose change drive letter and path.
iv. Success/failures
After choosing drive letter both drives appeared again in my computer. So, it’s
success.
3. Shutdownprocessis too slow.
i. Identification-of-problem
I persistently restarted the laptop to check whether the issue is only for one time but
it occurred most of the time I shut down my laptop.
ii. Cause
Bunches of software’s and services were running constantly which took longer time
for laptop to shutdown properly.
iii. Remedy
30. Suraj Rimal 00169957 Computer System
Page 30 of 32
I closed all other non-Microsoft services which were constantly running by lunching
system configuration by pressing windows + X key.
iv. Success/failures
Indeed, even after applying remedy, the laptop didn't close down regularly.
So, it was a failure.
4. PC is deliveringa considerable amountof noise.
1. Identification-of-problem
I opened different programs on my PC at a once, not long after that the case warm
up noticeably hot and it began producing strange noise.
2. Cause
I opened the case to know what’s going on then found out that a lot of dust particles
were covering sensitive part of heat sink.
3. Remedy
After opening outer case I used soft cloth to remove dusts and other junk. Then I
closed the case properly.
4. Success/Failures
After that when I again ran different software on my PC, however it ended up
noticeably hot yet it didn't produced any strange sounds. So, it was a success.
5. Computerproduces beepsound and won’tturn on.
1. Identification-of-problem
After turning computer, it produced 3 short beep sounds and screen went black.
2. Cause
After searching and consulting technician I found out that there was issue with the
RAM.
3. Remedy
I took out the case and I swapped preinstalled with new one.
4. Success/Failures
After changing RAM the computer didn’t produce any sound and windows start
booting. So, it was a success.
Conclusion
As a conclusion, we installed different software including Windows 8.1 pro, and other software
including CCleaner, Eset Nod32 and WPS office 15 were installed. However, Linux lite 32bit
operating system was installed and the testing was done of Linux Lite.
In the final topic, different type of computer fault like hardware and software fault with cause,
remedy and success or failure were done.
31. Suraj Rimal 00169957 Computer System
Page 31 of 32
References
VMware, 2016. VMware Workstation. [Online]
Available at:
https://my.vmware.com/web/vmware/info?slug=desktop_end_user_computing/vmware_workstation
/11_0
[Accessed 26 March 2017].
Microsoft, 2017. Download Windows 8.1 [online]
Available at: https://www.microsoft.com/en-us/software-download/windows8
[Accessed 26 March 2017]
Microsoft,2017, Support.microsoft.com [online]
Available at: https://support.microsoft.com/en-us/instantanswers/a38b3227-8c64-8634-fa10-
966267e87b5b/microsoft-basic-display-adapter-on-windows-10
[Accessed 26 March 2017].
Eset , 2017. ESET Nod32 ANTIVIRUS 10. [Online]
Available at: https://www.eset.com/us/home/antivirus/download/
[Accessed 26 March 2017].
WPS, 2016. WPS Office 2016. [Online]
Available at: https://www.wps.com/office-free
[Accessed 26 March 2017].
Piriform, 2017. CCleaner standard. [Online]
Available at: www.piriform.com/ccleaner/download/standard
[Accessed 26 March 2017].
Linux Lite Free Operating System,2017. Linux lite [Online]
Available at: www.linuxliteos.com/download.php
[Accessed 26 March 2017].
Introduction to sudo, 2017. The Linux Foundation [online]
Available at: www.linux.com/learn/linux-101-introduction-sudo
[Accessed 26 March 2017]
Index
Sudo - Sudo stands for either "substitute user do" or "super user do”. Sudo allows a user to run a
program as another user. Creating account or other sensitive work requires root permission. (Linux
101: Introduction to sudo, 2017)
Total word count – 2939