Witness
statement
|
|||||||||||||||||||||||||||||||
Learner name
|
Lauren
Corrigan
|
||||||||||||||||||||||||||||||
Qualification
|
BTEC
National 1st certificate in IT
|
||||||||||||||||||||||||||||||
Unit number and title
|
Unit
2.2 computer systems.
|
||||||||||||||||||||||||||||||
Assignment
|
P5 set up a
standalone computer system, installing hardware and software components [SM3]
|
||||||||||||||||||||||||||||||
Description
of activity undertaken (please be as specific as possible)
|
|||||||||||||||||||||||||||||||
After
making a successful start in your role as an IT trainer for the IT Support
Department of RS Components, you have been have been asked to prepare
training material of a more advanced and practical kind.
Before
you are allowed to do this you are required to prove your abilities in
hardware and software upgrades.
|
|||||||||||||||||||||||||||||||
Assessment
and grading criteria
|
|||||||||||||||||||||||||||||||
P5 set up a
standalone computer system, installing hardware and software components [SM3]
For
P5, learners must install at least
one hardware and one software component in a stand-alone system.
This
is best evidenced with a witness statement or observation record and screen
shots. Learners must use suitable safety equipment/tools and pay due regard
to health and safety issues.
|
|||||||||||||||||||||||||||||||
How
the activity meets the requirements of the assessment and grading criteria,
including how and where the activity took place |
|||||||||||||||||||||||||||||||
I
witnessed Lauren connect the monitor, keyboard and mouse to the computer. She
was able to clearly demonstrate where the graphic card is installed. She managed to install the MS Office 2003,
the MS security essentials and the device driver for a printer. She created a user account and configured
the system software, application software and documents. This all took place
in IV5.
|
|||||||||||||||||||||||||||||||
Witness
name
|
Rosey Sellars
|
Job
role
|
witness
|
||||||||||||||||||||||||||||
Witness
signature
|
R.Sellars
|
Date
|
18/05/14
|
||||||||||||||||||||||||||||
Assessor
name
|
Phil
Wilkinson
|
||||||||||||||||||||||||||||||
Assessor
signature
|
P.Wilkinson
|
Date
|
18/05/14
|
||||||||||||||||||||||||||||
Friday, 23 May 2014
Unit 2: P5
Unit 2: D1
Task 5
Clean
up tools for removal of cookies: cookies from being on certain websites are used by
companies to know information about you e.g. the sites that you regularly visit.
When this happens all the data is stored up on the computer and can slow the
whole system down. The cleanup tools allow the user to remove these cookies to
help to speed up the computer system, so the system can be used more effectively.
Drive
formatting: this
helps the performance of the computer system and in terms of storage data as
the hard drive can be formatted; enabling all data to be erased and a new copy
of the operating system can be re-installed back onto the computer, so it runs
faster and smoother.
Security
virus protection: if your computer has a virus, the operating system will slow down.
Installing protection enables the viruses to be removed so the system works at
a faster speed. Although time can be wasted when viruses are on your computer, files
may be deleted and then need to be replaced. So if the viruses are removed a
lot of time is saved. This improves the performance of the computer system, meaning
the information on the computer is safe, so you do not have to worry about
losing any work or having any of your personal information stolen e.g.
passwords to bank accounts etc.
Unit 2: M1
|
Window XP
|
Mac OS
|
|
Functions:
|
|
|
Security
|
|
|
It uses firewall software which helps to protect
the computer from viruses. There is also user accounts passwords protection
as well to help protect personal information. Microsoft provides security
essentials, which helps to protect the computer from threats. Although many
computers have these, many are still hacked, creating a privacy problem.
|
Mac OS uses Gatekeeper, which makes the
installation of apps much safer. They have security updates to help improve
the computers security system. Time machine is a backup system that allows
the user to go back to a version of a document even though it may have been
edited. There is also ‘find my Mac’ which allows you to locate your device on a map
if it is lost or stolen. Although there are all of these different software’s
available to help to protect the computer, like windows many people’s
computers are still being hacked.
|
|
Machine and peripheral management
|
|
|
The operating systems can control the computer,
components and it also controls the peripherals e.g. keyboard and the mouse.
An example of this is windows control the monitor by changing the resolution;
this can be done, by setting the click speed using the mouse.
|
The peripherals in
Macs are made specifically, so they have the advantage that they can do more.
An example would be the keyboard and how it allows access to many features
such as brightness and volume.
|
|
File management
|
|
|
This has its own programme called explorer.exe to
help file management and allows the user to create, view, delete or edit
files. Making it easier to organise the files.
|
Mac OS use finder, this has an icon for each file
type and these files can be managed by the tree navigation system etc. Cover
flow is also used allowing the user to see small thumbnails of the different
documents. Mac OS is much more user friendly than windows.
|
|
Device drivers
|
|
|
A device driver which controls all programmes on
the computer. However without this the programmes would be very difficult to
install, and also allows communication with peripheral devices.
|
These device drivers are similar to the windows
device drivers. Every time a new peripheral device is added, a new driver for
the Mac must be installed first as there are no updates to change the
programmes etc.
|
|
Features:
|
|
|
Ability to customize
|
|
|
You are able to easily change the backgrounds
etc., this can be done by right clicking on the desk top to personalise the
background with colours, images and own photos. This allows people to
individualise their desktop, this can even help people to express themselves.
|
Similarly to Windows the desktop can be
personalised on a Mac, however the Mac allows you to change the colours and
font of folders on a Mac. This can allow people to make it easier to differentiate
the information.
|
|
Support for connectivity of portable media
|
|
|
Once there is a new device is plugged in, options
are provided on whether you want to import the files etc. on windows. This
occurs each time a device is plugged in, the same options are provided.
|
When a device .g. a phone is plugged in, photos
or music etc. are already imported and put into the appropriate files. Making
it easier to arrange the files on the Mac.
|
Friday, 16 May 2014
Unit 2: task 3
Task 3
Different software
utilities have different purposes, to help to keep the whole system running
smoothly. Although if these software utilities were not there then problems may
occur on the computer, therefore they are essential.
Friday, 2 May 2014
unit 2: P2
An operating system is piece of software that manages the computer hardware resources and provides communication services for computer programs to run efficiently, e.g. windows, Linux and Mac common desktop operating systems.
Security: this is to protect the data etc that is on the computer. This also prevents unauthorised access to the computer, allowing the computer to detect viruses on websites. The security operating systems then remove the virus before it effects the computer files, otherwise this could be a problem for the computer.
File management: this handles the filing system, which consists of two parts:
- a set of files - these are saved on a secondary storage, these can be accessed directly or sequentially. The files have names, locations, size, type, time and date of creation.
- a directory structure - these provided information about the files stored on the secondary storage, this has information about what each file contains.
Device drivers: in an operating system these are pieces of technology that you are able to connect to your computer e.g. mobile phones and cameras etc. A software may have to be downloaded for the device to function properly when it has plugged into the computer, once this has been completed you will be able to connect the device anytime you wanted
and this allows you to transfer pictures and videos etc. with ease.
Subscribe to:
Comments (Atom)