Muirfield High School
Transcript of Muirfield High School
SOFTWARE UPGRADE RECOMMENDATION REPORT
Author: Ronald Yuwono
22/02/2015
Table of Contents:
1. Introduction – Page 3
2. Software – Page 4
‐ Operating Systems – Page 5
‐ Operating System Requirements – Page 6
3. Hardware – Page 7
‐ Purpose of Hardware Audit – Page 8
‐ Hardware Register Audit – Page 9
4. Client Needs – Page 9
Recommendation – Page 9
1: Introduction
The purpose of this report is to give the end user some new information and insight on
software and hardware and how they cooperate with each other, as well as some
information about their system, an audit of their system, and some recommendations to
improve the users experience with their computer. This report will also show in‐depth
information about software, operating systems and their requirements, along with
hardware information such as; the purpose of hardware audits, and an included hardware
register audit.
Details include:
The generalisation of software and the different types of software that are
established, such as; application software, system software and malicious software
or “malware”.
Operating systems and their function, purpose, and their requirements. This includes
exploring the different types of operating systems
Generalisation of hardware and how they function in conjunction to software.
Different types of components are explored throughout the section and their
purpose stated.
Hardware audits and their purpose. How the audits are an important part of PC
maintenance and other
An audit of the user’s computer system and some recommendations on how to
improve the user experience.
Applications downloaded on to the user’s computer to further help the users
productivity and provide basic and general tasks (e.g. documentation programs)
2: Software
Software in general terms means the computer instructions or data. Anything that can be digitally
and electronically stored is considered to be software. It is any type of instructions that can be read
by a computer processor (read section 3 for hardware information) to perform specific operations.
Software contrasts with hardware, where as hardware has a tangible form which carries out the
task, the software gives the hardware the instructions to do the said tasks. An analogy of this can be
defined by music, where hardware is the musical instrument, and the software are the notes being
played.
Computer software can include programs, libraries and documentation that are associated with
them. The term “software” is usually used in a narrow sense, meaning application software only.
Software is stored within the computer and is intangible. There are various types of software that
are on virtually all computer platforms and can be grouped in a few broad categories.
Application software ‐ Uses the computer system to perform functions or
provide functions beyond basic operations of the computer itself. The term
“application software” is so broad because the range of tasks can be performed
by a modern computer is so large.
System software – Designed to directly operate the computer’s hardware to
provide basic functionality needed by the user and the program. System
software also provides a platform for running application software. These
include; operating systems, device drivers, and utilities.
Malicious software or “malware” – Computer programs that are designed to
harm and disrupt computers. Malware is undesirable to the general consumer,
though there are programs to terminate unwanted software such as; anti‐virus,
internet security (for safe web browsing), and registry cleaners.
Computer software and programs must be “loaded” into the computers storage system (e.g. hard
drive or memory). Once the software has loaded, the computer is able to execute the software
through a set of instructions made by the program.
2.1: Operating Systems
An operating system is a program or software that manages the computer hardware and software. It
provides common services for the programs. The operating system (or OS) is an essential component
of the system software category in a computer system. Applications and other programs usually
require an operating system to function on a computer.
There are various types of operating systems, these include:
Single‐ / multi‐tasking – A single‐tasking system can only run one program at one time,
where a multi‐tasking system is the contrary, being able to run multiple programs in
concurrency (running simultaneously).
Single‐ / multi‐user – Single‐user operating systems have no facilities to distinguish between
each users, but allow multiple programs to run in concurrency. Multi‐user systems are the
contrary, where it extends the basic concept of multi‐tasking with facilities that identify
processes and resources, letting the system permit multiple users to interact with the
system at the same time.
Distributed ‐ Manages a group of distinct computers and makes them appear as a single
computer.
Templated ‐ Creates a single virtual machine image as a guest operating system, then saves
it as a tool for multiple running virtual machines.
Embedded – Designed to be used in embedded computer systems. They are made to
operate on small machines (e.g. PDAs) with less autonomy. These systems are very compact
and extremely efficient although are incredibly restrictive.
Operating systems can come in a large array of types for different devices and systems. Examples for
modern operating systems include Android, BSD, iOS, Linux, OS X, QNX, Microsoft Windows,
Windows Phone, and Blackberry OS. All these operating systems share roots in UNIX (a family of
multi‐tasking, multi‐user computer operating system).
2.2: Operating System Requirements
These are the operating system requirements that the hardware must meet (only popular modern
operating systems shown):
Operating System Name
Proprietary/Open source*
Hardware Requirements
Windows 8/8.1
Proprietary
1GHz Processor (Intel or AMD based chip)
1GB (32‐bit) or 2GB (64‐bit) RAM
25GB Hard Disk Space
Linux Peppermint 14 Open Source
512MHz Processor 1GB RAM
4GB Hard Disk Space
Apple Mavericks OS X
Proprietary
1.5GHz Processor (Intel or AMD based chip)
2GB RAM Mountain Lion OS X
Preinstalled On System *Proprietary – Computer software licensed under exclusive legal right of the copyright holder with the intent
that the licensee is given the right to use the software under certain conditions. Must be purchased with
money.
*Open Source – Promotes a universal access via a free license to the products design or blueprint, and also has
universal distribution of the design and blueprint. The user is also allowed to make any modifications to the
software provided.
Operating systems can only operate under certain types of hardware for it to be able to function as
intended to. Of course, this means that, the better the hardware specifications on the computer, the
faster the programs and operating system will run, and vice versa.
3: Hardware
Computer hardware (or simply called “hardware”) are the physical parts of a computer. This includes
the peripherals of a computer such as the monitor, mouse and keyboard. Other parts of the
computer are the; motherboard (or simply “board”), hard disk drive (HDD), the central processing
unit (CPU), the graphical processing unit (GPU) and random access memory cards (RAM). In contrast
to software (see section 2 for software information), hardware is tangible and must be run by
software through the instructions that the programs gives to the hardware.
There are many variables in computer hardware which will be explored below:
Case – The computer case is a plastic or metal enclosure that houses almost all of the
computer components.
Power Supply Unit (PSU) – Converts alternating current (AC) electric power to low‐voltage
DC power for the internal components of the computer.
Motherboard – The main component of the computer. It is a large rectangular circuit board
that connects the other parts of the computer together. These parts are the:
Central processing unit (CPU) – performs most of the calculations which
enables the computer to function.
Chipset – mediates communication between the CPU and other computer
components.
Random‐access memory (RAM) – stores code and data that are being
actively assessed by the CPU.
Read‐only memory (ROM) – stores the BIOS (Basic Input/Output System)
that runs every time the computer is powered on.
Buses – connects the CPU to various internal components and to expansion
cards (e.g. USBs, SD/Micro SD cards, PCI Express slots) for graphics and
sound.
CMOS battery – a battery attached to the motherboard which powers the
memory for date and time in the BIOS chip.
Fixed/Removable Media ‐ fixed media are data storage systems such as hard disks (HDD) and
solid state drives (SSD) to store data created on the computer. Removable media acts the
same as fixed media, but tend to have a slower transfer rate, and had a much smaller
capacity (e.g. USBs, optical disks or CDs, SD cards)
Input/Output peripherals – Input devices allows the user to enter information into the
computer, or control operations. These include; mice, keyboard, microphones, controllers
and webcams. Output devices display information in a readable for humans to understand
such as; monitors, speakers, printers, or Braille embossers.
3.1: Purpose of Hardware Audit
Hardware audits are the most important part of PC maintenance routines. A hardware audit
generates a list of hardware components of the computer, its peripheral devices, and network
equipment. Each item then gets equipped with a list of details that describes the component.
Hardware audits are rarely performed manually, by writing down each component on paper.
Instead, many use specialised software able to not only carry out this task, but also solve problems
the problems that persist within the computer as well, such as registry errors, or if a component is
not properly installed.
Examples of hardware audit programs are:
Asset Tracker for Networks
Belarc Advisor
E‐Z Audit
EMCO Network Inventory
CPU‐Z / GPU‐Z
And etc.
With some network‐based hardware audit programs, such as Asset Tracker, you can set up the
program to automatically re‐scan the network on a regular basis, so not only you can have the most
recent information about hardware components on your network and their settings, but also have
the hardware components change history for each individual device, since after each scan, the
program compares the recent configuration of each device with the previous one and writes down
the changes in a separate table.
Asset Management is a part of hardware audits. It is the combination of management, financial,
economic, engineering, and other practices applied to the physical assets with the objective of
providing the required level of service in the most cost effective manner.
There are many benefits that can be taken account of from hardware audits, some of which are:
Tax – Is paid on all company assets, having an up‐to‐date database will allow you to save
money by not paying for items that do not exist
Location – All hardware will be located and logged
Redundant items – Can save money and be used for alternative scenarios. Good for budget
management and resource management
Asset Value – A complete list of hardware assets contributes to the overall asset value of an
organisation
Time and Money – Hardware auditing is cost effective and time consuming, especially in
large organisations. Professional service can ultimately save money in the long term.
3.2: Hardware Register Audit
This is your hardware register audit.
Location: Mr Carpenter’s Room
Serial No: LR‐BDEY Brand: Lenovo Model: 3507 ‐ All Mini 10
General Description: Dark blue, laptop based computer, small form factor, thick, plastic body
Central Processing Unit (CPU): Intel Atom N450
Processor Speed (Hz): 1.6GHz
Memory (RAM) amount (GB): 2GB
Hard Disk (HDD) size (GB/TB): 300 GB / 0.3 TB
Boot Sequence Order: 1. Boot up / start up 2. Enter user password 3. Home desktop of
computer
Other (if applicable): 10” screen 2 USB ports Ethernet Port (RJ45 Port)
4: Client Needs
Basic Applications has been installed, such as basic word documentation programs, device drivers for
the computer components, media player, web browser, and flash player for playing video and audio
during web browsing. The computer does not need any anti‐virus as Linux is renowned for its safety
and natural anti‐virus capabilities. Scheduled dates and times for automatic software updates for all
the applications, device drivers, and operating system have been made for the ease of the user, as
well as keeping the system up to date, further boosts the computer performance.
5: Recommendations
Tutorials and training – This would be optimal for the user, considering the new operating
system layout. Especially if they have come from other mainstream or popular operating
systems such as Windows or Mac OS X and are unfamiliar with the Linux Peppermint user
interface.
Upgrading hardware – considering it is a laptop for factor, upgrading hardware is restricted.
However, memory (RAM) upgrades are not, even in basic computers. This upgrade is
recommended to further boost performance of the computer to create a better
environment for the user to work in.
Backups and restore points – Create backups of the computer regularly, roughly once a week
to once a day, to keep the files and documentation that are important to the user safe from
being corrupted, deleted or lost. Restore points can be created via the operating system
settings, to return to a previous point of the computer if anything unexpected happens or
anything unwanted appears and is difficult to remove (e.g. malware). Although Malware is
rare in Linux, it is still best to have a safety measure if anything does happen to enter your
system.
Business Plan
BLVDE® Business Plan
BLVDE®
Statement
Our company, BLVDE®, aims to fix broken down old unused laptops and refurbish them like they are
brand new. We primarily target DER (Digital Education Revolution) laptops from students that are
leaving their senior years of high school, giving younger students whom unfortunately did no partake
in the laptop rollout program, the opportunity to have practical and perfectly functional laptops that
they can use for their school work and/or assignments. In addition, these students can also
experience the same thing that the previous years did with the laptop rollout program, except
without actually partaking in it! Everybody wins! (Especially the government. The government ALWAYS wins.)
Goals and Achievements
How we will achieve our goals and achievements are classified, however the general line it that we
will be searching for all the students to return their unused DER laptops to the school for
refurbishment and optimisation for the freshly installed operating system. We will be following the
guidelines of the PC ’R MR (Personal Computers ‘R Master Race) as it is the bible of the holy worlds
of computers and anything related to computers.
Funds and Costs
Benefits! Benefits! And more benefits! (Not for us…)
Since we are a non‐profit company, costs are minimal for the end users and funding is supported by
the Department of Education. These costs include; time and labour, food catering, janitorial services,
and accommodation.
Equipment
Software And Programs
Operating System Linux Peppermint 14
Internet Browser Chromium
Mozilla Firefox
Word Processing Software LibreOffice
Hardware
Laptop Model Lenovo 3507 – All Mini 10
Method
1. Install the operating system (Linux Peppermint 14)
2. System integrity verification (installed drivers, computer hardware, etc.) and network setting
configurations (wireless setup, proxy, etc.)
3. Install the listed programs (see the table above for reference)
4. Assure that the laptop functions properly and correctly in terms of general use and the
programs installed. Setting up scheduled dates for computer updates are also provided for
optimum ease of use for the end user.
5. Once the laptops are tested and approved by the user and our team, the laptops will be
distributed.
Business Plan
BLVDE® Business Plan
BLVDE®
C Computer Optimisation ‐ Report
RONALD YUWONO ‐ 2015
HARDWARE SPECIFICATIONS
Hardware Model/Make Specifications
CPU Intel Core i5 4200U Haswell ULT 1.6GHz – 2.3GHz, Dual Core Hyperthreading, x64‐based
RAM Samsung 1.35V OEM M471B5173DB0 DDR3, 1600MHz, 4GB (3980MB), Single Channel, SODIMM
GPU Integrated: Intel HD Graphics 4000Dedicated: NVidia GeForce GT740M
Integrated: 2048MB VRAM, 997MHzDedicated: 2053MB VRAM,
Motherboard/BIOS Motherboard: ASUSTeK Computer Inc. X550LB BIOS: American Megatrends Inc. X550LB.402
V1.0, Bus clocked 100MHz, Intel Haswell‐ULT chipset, Intel ID94C3 Southbridge
Hard Drive Toshiba MQ01ABD075 NFTS, 750.16 GB, Drive 0, PartitionedC: (NTFS on Drive 0) 299.59GB D: (NTFS on Drive 0) 427.22GB
SOFTWARE SPECIFICATIONS
Software Software Installed Specifications
Anti‐virus Trend Micro Titanium Maximum Security Version 7.0
Operating System Windows 8.1 Professional 64‐bit, Build 9600
Web Browser Google Chrome Version 40.0.2214.115 m
Internet Explorer Version 11.0.9600.17631
Mozilla Firefox Version 35.0.1
Graphics Driver NVidia Graphics Driver Version 347.52
ERGONOMICS
Description Setup Suggestions
Seat/Chair ‐ 5 spoke wheel setup‐ Adjustable seat height ‐ Seating adjusted comfortably
N/A
Keyboard ‐ Integrated into laptop‐ Palm rests comfortably ‐ Adequate size with tactile keys
N/A
Desk/Table ‐ Correct height for arms to be bent on a 90 degree angle
‐ Printer on table takes up large amount of space
Move the printer to another spotto make room
Lighting ‐ Almost underneath lamp‐ Near window ‐ Adequate amount of light from lamp and
window
N/A
Cables ‐ Adequate cable management ‐ Mouse cable does tend to get in the way along
with the power cable
Move or route the cables another way
Monitor ‐ 15.6”, comfortable size for viewing pleasure‐ Can get bright during night time, when it is
dark, can cause eye strain for a long period of time
‐ Requires person to look down at the screen, could cause neck pain
Turn down the screen brightness, place computer on a higher platform (e.g. a stack of books) to reach optimum eye level
C Computer Optimisation ‐ Report
RONALD YUWONO ‐ 2015
TASKS COMPLETED AND DESCRIPTION
Backing Up files
Backing up all the essential files for the client on to an external hard drive.
Full Virus and Malware System Scan
A complete scan of the computer’s hard disk drive, along with other drives attached to it to terminate
any unwanted malicious software. This helps clean the system from slowing down and prevents it
from failing in the future. There were not any viruses or malware other than some typical
advertisement cache from web browsing that can easily be removed. The program used to do the
system scan was Malwarebytes Anti‐Malware.
Definition Updated For Antivirus
Definition updates were installed to keep the system invulnerable to any unwanted malware or
viruses. Fortunately, the computer only had one definition update, meaning the definitions were up
to date.
Registry Clean Up
The computers registry was scanned and fixed to prevent any further damage to the system files and
logs. There were only a couple of registry errors and invalid entries that were not harmful to the
computer and was easily fixed with a third party program.
Graphical Driver Updates
Unfortunately the drivers were out of date, however it was easily fixed with an update from the
NVidia GeForce Experience program from NVidia. It is recommended to keep checking for updates to
further optimise the computer for fluid use.
Defragmentation of Hard Disk Drives and Other Drives Installed
Defragmenting the hard drive further optimises the computer by fixing errors and corrupt files and
programs. By doing this, not only does it make the computer run more efficiently, but also frees up
space on the hard disk that’s was previously taken up by unwanted files or errors. Fortunately, the
most fragmentation found was 1% on a USB flash drive that was plugged in to the computer, but
other than that, all the drives were fine.
Setting Schedule Dates
Setting up schedule dates make it easier for the client to automatically check for updates without
having to do it manually. This was done for checking virus definitions and driver updates for anything
that has regular updates.
Configuring The Ergonomics of The Environment
Configuration of the environment for the client was needed to reduce injuries and stress. Fortunately,
there was not much to change.
C Computer Optimisation ‐ Report
RONALD YUWONO ‐ 2015
INVOICE
Client: Jennifer Yuwono
System Description
Make ASUS
Model Number F550LB‐XO144H
Serial Number E1N0CV29348403F
SYSTEM SPECIFICATIONS
Hardware Model/Make Specifications
CPU Intel Core i5 4200U Haswell ULT 1.6GHz – 2.3GHz, Dual Core Hyperthreading, x64‐based
RAM Samsung 1.35V OEM M471B5173DB0 DDR3, 1600MHz, 4GB (3980MB), Single Channel, SODIMM
GPU Integrated: Intel HD Graphics 4000Dedicated: NVidia GeForce GT740M
Integrated: 2048MB VRAM, 997MHz Dedicated: 2053MB VRAM,
Motherboard/BIOS Motherboard: ASUSTeK Computer Inc. X550LB BIOS: American Megatrends Inc. X550LB.402
V1.0, Bus clocked 100MHz, Intel Haswell‐ULT chipset, Intel ID94C3 Southbridge
Hard Drive Toshiba MQ01ABD075 NFTS, 750.16 GB, Drive 0, Partitioned C: (NTFS on Drive 0) 299.59GB D: (NTFS on Drive 0) 427.22GB
TASKS ($2.50 PER ½ HOUR)
Task Time Taken Total Cost
Backing Up Files 30 Minutes $2.50
System Scan 3 Hours $15.00
Definition Updates 10 Minutes $0.33
Registry Clean Up 5 Minutes $0.16
Driver Updates 30 Minutes $2.50
Defragmenting Drives 1 Hour $5.00
Setting Schedule Dates 5 Minutes $0.16
Configuring Ergonomics 15 Minutes $1.25
Total 335 Minutes/5.58 Hours $26.90