• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Unit 2 Computer Systems

Extracts from this document...

Introduction

Computer Systems: Software Utilities and Hardware Installation Task 1: Benefits of Software Utilities Software Utility What it is? Benefit to the user Defragmenter This is a program designed to make access speed faster by rearranging files that are stored on a disk to fill up the empty spaces in between. The main principle is to decrease the time it takes to read and write files to and from the disk by increasing the transfer rate and decreasing the head travel time. The more memory you use up on your computer the slower the computer will respond therefore disk defragmenter will create space for you by reordering the data in continues sections then pushing all free space to the end, this is a very long process so it is ideal to do this when you are not in need of the computer and also by doing this procedure, you will experience faster data access and won't be disappointed. This software will increase computer speed, increase memory space; this software also increases computers reliability by stopping crash-inducing fragmentation of critical system files. ...read more.

Middle

gradually wear out and the sectors may get worse, this could mean that the hardware may need changing, Checkdisk is a good defence tool for the computer. The benefits if having a Checkdisk software are: * You can specify the drive you want checking * You can specify the file you want checking only for fragmentation * Fixes errors on the disk * Checkdisk shows the full path and name of every file which is on the disk * Repairs readable data * Locates bad sectors * Displays current size and changes the log file size to what you want Task 2: Types of Software Utilities Software Utility Anti Virus Name of Utility McAfee(r) VirusScan(r) Plus Supplier/ Manufacturer McAfee Web Security and Maintenance Services Price (�) �31.99 (1 Year Subscription) Features of the Utility * Protect personal details from identity theft * Automatic updates, which allows the software to remove even the latest threats * Prevent your computer from dangerous virus attacks * McAfee Virtual Technician, designed to make you understand alerts better * McAfee uses less memory and CPU and uses half as many processors * ...read more.

Conclusion

* Enhanced privacy protection to protect personal details and other private data * Protect your applications by restoring settings for applications such as MS Word, iTunes * Try & Decide, this gives you the ability to test other software before the end of the session then you can decide whether to discard or keep. Software Utility Defragmenter Name of Utility Diskeeper(r) 2008 Professional Edition Supplier/ Manufacturer Diskeeper Corporation Price (�) �47.60 (1 Year License) Features of the Utility * InvisiTasking, this feature is the foundation for the Diskeeper to completely wipe out fragmentation in real time without causing any harm to system resources * Full file & free space defragmentation * Fragshield 2.0, this feature enhances reliability of the system and boosts performance * For current customers, upgrade is easy and you get to keep all your settings * Low free space defragmentation, defragments even when only 2% free space left * Easy to use interface, which means its flexible and easy configuration, intuitive controls also reports on disk status ?? ?? ?? ?? BTEC NATIONAL (CERT) FOT ICT PRACTITIONERS UNIT 2 1 MUKID MIAH COMPUTER SYSTEMS ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    Street Address, Town, County, Nationality, Sex, Postcode, Telephone Number, Mobile Number, E-mail Address, Date of Birth, Age, Date of Membership, Date of last Rental. Data collection: - The customer's details will be collected from the customer when they want to rent their first vehicle.

  2. Marked by a teacher

    Application Software

    The database in question is the search engines catalogue of the entire internet. At the time of writing, the Google search engine accounts for more searches than all other search engines combined. Although search engines usually return useful results immediately, most include a number of features that can be used to refine results.

  1. Data Processing Task. Mr Peters, the man who runs this particular Samsung store ...

    Down BT323NB Northern Ireland Dear "Title" "Forename" "Surname" On behalf of Samsung, we are delighted that you chose us for your electrical goods. The details of your order are Order Number - "OrderID" Products Ordered - "Name" Amount Ordered - "Quantity" = �Total" �"Total Price" Inc VAT We hope the products have reached you in perfect condition.

  2. Information: G061 - Systems and Communication

    levels - have links to order databases to automatically order stock - predict stock requirements based on previous sales Booking systems: - allow users to select times and dates - check availability of certain events - confirmation and payment Online training systems: - use of video clips as demonstrations -

  1. Analysis Tools

    Perfect Pie and Data Flow Diagrams Data flow diagrams can be used within the Perfect Pie Scenario because it will easily allow the analyst and system-users to visualize how the new system will operate. It will allow them to ensure the system accomplishes what they need and want.

  2. Assignment 2 Set up a Computer System

    Once this instruction has been complete, the following page should be displayed. The User must the double "Click" on the "Scheduled Tasks" Icon. (See image 2.2) Image 2.2 Once the user has "Clicked" "Scheduled Tasks" a new window will open.

  1. Free essay

    System and Upgrades

    Circuit-Level Gateway: Circuit-level Gateway applies mechanisms when a TCP connection is established. Once the connection is made packets can flow between hosts without further checking. Proxy Server : This technique is used to intercept all messages entering and leaving the network.

  2. Communication & Employability Skills for IT. OCR Cambridge Technicals Unit 1 LO1-P1

    employer intrusts an employee in many ways such as giving them extra tasks which could get them promoted or putting in their trust so that they will complete the work on time. Reliable- Here the employer will put in their trust when they expect you to do the work and they know that the employee will complete it.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work