Friday, 21 March 2014

Unit 2: Task one P5 - 2.2

                                               

Witness statement
Learner name
Shahnaz Chaudhury
Qualification
BTEC National 1st certificate in IT
Unit number and title
Unit 2.2
Assignment
Set up and manage a computer system

Description of activity undertaken (please be as specific as possible)
After making a successful start in your role as an IT trainer for the IT Support Department of RS Components, you have been have been asked to prepare training material of a more advanced and practical kind.
Before you are allowed to do this you are required to prove your abilities in hardware and software upgrades.

Task
Achieved
Date achieved
Connect a monitor to a computer
Yes
Friday 21st March 2014
Connect a keyboard to a computer
Yes
Friday 21st March 2014
Connect a mouse to a computer
Yes
Friday 21st March 2014
Demonstrate where the graphics card is installed
Yes
Friday 21st March 2014
Install MS Office 2003
Yes
Friday 21st March 2014
Install MS security essentials
Yes
Friday 21st March 2014
Create a user account
Yes
Friday 21st March 2014
Configure system software, application software and documents
Yes
Friday 21st March 2014



Assessment and grading criteria
P5 set up a standalone computer system, installing hardware and software components [SM3]

For P5, learners must install at least one hardware and one software component in a stand-alone system.
This is best evidenced with a witness statement or observation record and screen shots. Learners must use suitable safety equipment/tools and pay due regard to health and safety issues.

How the activity meets the requirements of the assessment and grading criteria,
including how and where the activity took place
I witnessed Shahnaz connect the monitor, keyboard and the mouse directly to the computer. The graphics card was shown clearly as to where it was installed. Shahnaz successfully installed MS Office 2003 along with the MS security essentials and also the device driver for a printer. The following were created: User account and configuration, system software, application software and documents. This was all undertaken in IV5.

Witness name
Lauren Corrigan
Job role
 Student




Witness signature
L.C
Date
21/03/14








Assessor name
Chris Sumpter





Assessor signature
Date
21/03/14

Thursday, 20 March 2014

Unit 2: Task five D1 - 2.1




Unit 2: Task four M1 - 2.1







Unit 2: Task three - 2.1

The purpose of different software utilities.
Security virus protection
The main purpose of antivirus software is to protect the computer from getting a virus. It does this by scanning downloads and attachments for viruses and then it also runs in the background when the service user is using the internet. If a virus was to approach the program then the computer would alert the service user and give options of getting rid of it before it spreads across the computer files.


Defragmentation
The purpose of defragmentation is when a computer locates all lost files, it gathers them all and organises the files that have been fragmented -(when a file has originally been saved into the incorrect place). This is a useful device because it allows the computer database to become more organised and it increases the processing speed overall improving performance.


Drive formatting

This completely wipes the hard drive overall restoring the computer to the default settings. This is done when the computer is crashed by a virus or if the hard drive is cluttered with unnecessary files. This can also improve performance as it allows the system to run faster without risk of virus attacks.


Unit 2: Task two - 2.1





Unit 2: Task one - 2.1






Unit 30: Task eight

File format
File format allows you to save various file types with data. Some files are larger than other files and this tend to affect the quality of some of the files. Video files will be larger than documents. Therefore there is a difference in size and the formats will be saved differently. Some of the types of files include .wmv – which is for low quality windows media player videos. Another would be.ppt for PowerPoint files and .raw for unaltered video frames. The higher the quality of the files, the larger the file size will be.


Compression techniques.
There are two types of image compression. Lossy compression is one of them. It has the smallest file size therefore it can cause unwanted distortions in the image. The other type of compression is lossless compression which is the opposite of lossy compression. This has a larger file size and gives a better quality of the image. Lossy image compression techniques could include reducing the colour space to the most common colours in the image. Lossless compression might include entropy encoding or deflation.


Image resolution.
The higher the image resolution is, then the better the quality of the image. Better image resolution does mean an increased file size however this might be unsuitable for websites. For example, with Photoshop files as soon as you export an image you can select the quality of the image from 1-12. The higher number means a larger fie size.

Colour depth.
The greater the colour depth, the more pixels are used to represent the colour of an image in a bitmap image. The average levels of colour depth range from 8-bit to 48-bit. The greater the colour depth, the better the quality of the image’s colour and the definition of the image but the file size would once again be larger due to the complexity of the file.


Unit 30: Task six

There are many legal issues when it comes to graphic design. One of the biggest issues is copyright. This is an issue because there are several logo’s available for various companies which they practically own – in other words they are copyrighted. Therefore if there are any similarities to this logo, made by another organisation then they could be at risk of a lawsuit.

It is however possible to get permission to use various copyrighted logos for commercial purposes. For example these purposes could be for a film or for purposes of parody, however the process is time consuming and complicated with an uncertain outcome. Also, depending on how big the company that owns the logo is, they could demand a high price for the use of it.

Another issue is intellectual property laws. If a product from a company is found to violate another person or company’s intellectual property, they would be at risk of a large fine or possibly even a class action lawsuit if the recipient has made a significant sum of money from the theft of intellectual property.


Another issue would be the problem of obscene publications. Any graphics that could be found to be offensive to anyone; whether it be because of religion, violent, sexual content etc. without the appropriate disclaimers and warnings could be the recipient of a lawsuit or a fine.