Individual Assessment Coversheet To be attached to the front of the assessment. Campus: ___Pretoria_______________________________________________________________________ Faculty: _____IT_____________________________________________________________________ Module Code: _____ITCNA112___________________________________________________________________ Group: ____1______________________________________________________________________ Lecturer’s Name: ____Mr. Kadiebwe M______________________________________________________________________ Student Full Name: _____Adivhaho Khakhu _____________________________________________________________________ Student Number: ____EDUV 4832147 ______________________________________________________________________ Indicate Yes Plagiarism report attached YAES No Declaration: I declare that this assessment is my own original work except for source material explicitly acknowledged. I also declare that this assessment or any other of my original work related to it has not been previously, or is not being simultaneously, submitted for this or any other course. I am aware of the AI policy and acknowledge that I have not used any AI technology to generate or manipulate data, other than as permitted by the assessment instructions. I also declare that I am aware of the Institution’s policy and regulations on honesty in academic work as set out in the Conditions of Enrolment, and of the disciplinary guidelines applicable to breaches of such policy and regulations. Signature Date 01-04-2025 X Lecturer’s Comments: 1 Marks Awarded: Signature % Date Eduvos (Pty) Ltd. (formerly Pearson Institute of Higher Education) is registered with the Department of Higher Education and Training as a private higher education institution under the Higher Education Act, 101, of 1997. Registration Certificate number: 2001/HE07/008 2 Table of Contents Contents Question 1..................................................................................................................................................................... 4 Question 2..................................................................................................................................................................... 5 Question 3..................................................................................................................................................................... 6 Question 4................................................................................................................................................................... 10 Question 5................................................................................................................................................................... 11 Difference of Inkjet Printers and Laser Printers ............................................................................................ 11 3 Question 1 1.1. 1. Find the problem: Computer does not boot up, there is no display on the monitor and no beep codes. Find out if there have been environmental or infrastructure changes where the client works. 2. Come up with a theory for the cause and ask questions: Is the computer plugged into a socket? 3. Inspect the theory to find a cause: The computer is plugged in. a. New theory: There is no Beep. This would mean that power is not going to the motherboard, or the central processing unit or power supply unit is acting badly. 4. Plan of action and its solution: Inspect the power connections, make sure that the power supply unit is working, and the central processing unit is installed. 5. Confirm the functioning of the full system and, if necessary, put some preventative measures. 6. Note down what is the found, the actions took, and what came out of it: The computer was plugged into a socket, the motherboard was receiving power meaning that the CPU was malfunctioning. The CPU was then installed. 1.2. The BIOS battery is the one that that keeps BIOS settings when the computer is not plugged and brings free working of the hardware clock that is built-in. If the battery is exhausted, when the motherboard has no power, BIOS does not store the settings and they are reset, like the date and time. If the computer is old, there is a chance the battery is dead. Recommended to get another battery. This does not need any engineering skills. If getting another battery does not help, inspect the condition of the jumper that was used to reset BIOS settings. (Jumper-> close to the battery->marked as CMOS / CLEAR / RESET). There is a chance that someone left it in the RESET position. So, whenever when the motherboard is put power, the BIOS settings are restart. The next choice is improving the BIOS firmware which belongs to the motherboard. The instructions to do it are on the website of the hardware vendor. The latest firmware has different bugs placed. If the date/time settings in Windows are always changing, look at the current time zone settings and instructions of time adjusting with the outside time. In Windows 10->current time settings>Control Panel ->Clock and Region ->Date and Time. 1.3. Key BIOS Settings for Optimal Performance o CPU Settings (Overclocking): One main reason to dive into the BIOS is to overclock the CPU. Overclocking includes spiking the CPU’s clock speed over its factory settings to have better performance. Overclock the CPU: by fixing the voltage. o RAM Settings (Memory Timings and Frequency): Fixing memory timings and frequency can adjust the system for the best performance, usually in gaming and multitasking. Adjust the ram timings: by adjusting the frequency timing. o Fan and Cooling Control (Fan Speed Control): Perfect cooling is needed for a highperformance PC. Most BIOS/UEFI interfaces let you manually control fan speeds for 4 great airflow and temperature management. Adjust Fan Settings: by locating the fan Control or Q-Fan control section. Changing BIOS settings can help: o Better performance by improving memory, CPU, and storage settings. o Better stability for overclocked elements. o Save energy by fixing power managing options. o Better hardware to suit specific needs, such as gaming or content creation. Common Mistakes to Avoid When Modifying Overclocking Too Aggressively: Pushing the CPU or RAM over its limits can end with crashes, data corruption, and damage to the hardware. Ignoring Cooling: When overclocking, always make sure the cooling system is able to handle more heat. Skipping Stability Tests: Always run stress tests (like Prime95, AIDA64) after fixing to achieve stability. Ignoring BIOS Updates: Out of date BIOS versions can lead to compatibility problems with new hardware. Question 2 2.1.A. A MAC address is a software element. It connects people to the web and takes data to devices. The purpose of a MAC address in a network is: give a specific identifier for every device. to recognize devices in a local network better communication in the local network make sure data goes to the right device. 2.1.B. MAC addresses are always 12-digit numbers. The numbers are divided every two digits using a colon or hyphen. Once data from the web gets to a router, it must send the data to the correct device on its network. It uses MAC addresses to do so, giving a private IP address to each device connected to the network basing it on that device's MAC address. The router does data tracking requests. Once the data gets back, it gives the correct private IP to the data, then transfer it to the device's MAC address matching that private IP. 2.1.C. The Tool, Settings- The internet & Network - The Settings(network)- The connection properties and Hardware 5 2.2. In simple words, Collison Domain is a network part where a device can give data at a time to one device. If more than one device tries to send data at the same time, a collision happens, and data can be lost. Collisions lessen the improvement and conducting of a network, as gadgets wait and send their data again after a random period. Hubs: Hubs put out data to all connected devices, making huge domains. There is only one domain, which heightens the risks of collisions. Switches: Switches divide collision domains into many parts, where each device will have a separate domain. Only machines connected to the same port will clash. This reduces the chances of collisions. 2.3. Unmanaged switches are made to plug in and work, with no settings to sort out. They are good for small networks with simple needs. Can be used for surveillance cameras. Managed switches are fully arrangeable, can be customized, and give much data on performance. They are more perfect for bigger networks and networks supporting important chores. Such networks power universities and healthcare organizations. Question 3 3.1. 6 Cloud Computing Virtualization Cloud Computing is storing the data and programs on servers hosted on the internet instead of a computer’s hard drive. Virtualization is for efficient use of physical computer hardware and is the foundation of cloud computing. Exists in 5 classes: desktop, application, server, storage and network virtualization. For giving resources that can be accessed any time. For making a lot of simulated spaces using a hardware setup. Complicated to setup. Easy to setup. Highly scalable. Low scalable. Very flexible. Less flexible. Relies on multiple devices, in case a disaster happens. Relies on one device. Less workload. Big workload. Total price is more than virtualization. Total price is less than cloud computing. Gives unlimited storage space. Storage space is based on physical server space. Enterprise cloud computing is using virtual IT resources like servers from outside, processing power, data placing, databases, developer tools, and networking infrastructure by companies. Cloud computing can benefit an enterprise by: Separating their data, applications, and resources. Getting business scalability. Lessening infrastructure prices. Answering flexibly to changes in the market. Improving customer service quality. 7 Virtualization can benefit an enterprise by: Getting more efficiency Lessening prices Keeping privacy and security Promoting change. 3.2. Server virtualization is something that makes and uses many virtual instances on a single server. Computer hardware and software designs used to use single applications. The costs, storage, power, fan and connections pushed data centres to their limits. Server virtualization redefined this. Hypervisor: A part of software of virtualization. The software layer that starts virtualization by managing and running virtual machines. Virtualization changes physical resources into virtual, logical, equivalents. Virtual Machines (VMs): The individual instances of virtualized servers. The hypervisor handles the computer's virtualized resources, making them into logical instances called virtual machines. Virtual Machine Monitors (VMMs): The software components that manage VMs. Improved Hardware Utilization: Focuses on resource utilization. Virtualization managed by hypervisors can run many Virtual Machines made from the computer's resources. This reduces server counts, increases the IT flexibility and lowers cost of IT tasks for the company. Abstracted Infrastructure Layer: Virtualization on the server sees underlying infrastructure components such as networking, storage, and compute. The main advantage of a hypervisor is not abstraction, but the use of its resources. A hypervisor makes use of virtualized resources to make sense of computers, or Virtual Machines. V2 Cloud Solution V2 Cloud is a virtualization place for remote desktop and application allowing for small businesses. V2 Cloud’s fast, easily changeable, budget-friendly platform makes it the number one choice among businesses. Businesses can enter cloud-hosted desktops and applications safely from anywhere, on any device. Key Features Great cloud security: Has biggest level of data protection with security measures, desktops and applications are protected against increasing cyber threats and unauthorized access. Scalability & Reliability: Allows businesses to sustain different workloads without affecting things badly. Users can, at once, run many times on the same application on the same device without potential clashes. User-friendly management: Different ease of use with its spontaneous and easy-to-use management console. 8 Automated backups: Controls the backup process, making sure of the safety and availability of important business data, giving peace of mind and fast recovery options in case of unexpected incidents. Multi-factor authentication: Improves the security of virtual spaces with multi-factor authentication (MFA), putting another layer of protection to stop unauthorized access. 3.3. Organizations face the following Cloud Security challenges: 1. Cyberattacks. Cloud spaces face similar attacks that premises environments face. Attacks like DoS, ransomware, phishing and others. These cyberattacks can result in customers introducing data loss, malware, and more without knowing. Steps for preventing cloud cyber-attacks: Protect all data in the cloud. Watch how employee’s use the cloud. Make backups of cloud work and data. Use technologies that prevent data loss. 2. Data breach. They are a top cloud security issue - A data breach will possibly bring an enterprise to its knees, leading to harm that’s irreversible, costly problems due to results, legal problems and decreased value in the market. Steps for preventing a data breach: Do data tasks for possible risks. Protecting data with encryption. Keep up a plan for responding with incidents. Make policies for secure data removal and disposal. 3. Compliance. Keeping up with cloud compliance regulations like HIPAA is a responsibility of both the customers and cloud service providers. Noncompliance can lead to legal action, costs, disruptions of the business and breach/loss of data. Steps for maintaining compliance: Explain strong access points. Do an audit for compliance. 9 Do a cloud security policy. Frequently update and patch systems. 4. Identity, key management, access and credential. Some threats are not proper protection of credentials, lack of automated cryptographic key, scalability problems and password hygiene. Steps for preventing identity security issues: Use of multi-factor authentication. Regularly be aware of who uses the accounts. Take off unnecessary credentials and their access. Follow best practices of passwords. Question 4 4.1.a. Slow network speed- There could be a network overload, where it is too busy, so it causes delays in accessing the shared files. Network security- Some security settings on the network could be interfering with her computer’s ability to maintain a connection, making it intermittently disconnect from the network. IP Address conflicts- More than one device on the same network can cause inability of devices to communicate, resulting in frequent interruptions during VoIP calls. 4.1.b. 1-Do network performance and network connectivity monitoring: Use an application like OBKIO (looks at end-to-end network performance and network connectivity with fake traffic using Network Monitoring Agents. The Agents use traffic to weigh network statistics, between each other, find network issues and take the information to help the troubleshoot). 2. Monitor Network Metrics Related to Network Connectivity Issues: Once the agents start working, they will count the metrics (latency, bandwidth, packet loss, jitter) to find if the network is experiencing performance or connectivity issues. Recommended time is at least 3 hours. 3. Remove the Network Connectivity Issue: To start troubleshooting the issue, it needs to be caught first. This means seeing where the issue is happening in the network, and if it’s a network issue at all. To do this, compare the monitoring times between the two Public Monitoring Agents used. 4. Monitor Network Devices That May Be Causing Network Connectivity Issues: If a network connectivity issue is happening on both network sessions, use Obkio’s Device Monitoring tool for comparing the data to see if the network problem is happening on Sarah’s 10 end, or over the Internet, in the Service Provider’s network. Watch the performance of devices like routers, switches, firewalls and more. 4.1.c. The next steps will start on the type of issue and its cause, but here are some basic steps to take depending on the network connectivity issue: 1. Find the extent of the problem: find out if the issue is on one or more devices or just an application, website or service. 2. Inspect physical connections: Make sure cables are well connected and not in need of repair. Verify that switches, routers, and access points are on and working. 3. Reboot devices: Boot the ones with the problem again. Sometimes a restart can fix connectivity issues. 4. Inspect the network Indicator: Check for the LED lights on the devices to for connectivity issues. The colours or patterns can show the issue. 5. Examine other Devices: Look to see if other devices can connect. It could be an issue on one device. 6. Find Professional Help: If all the troubleshooting options are done and the issue is still there, contact a professional network technician or IT support for help. Question 5 Difference of Inkjet Printers and Laser Printers Inkjet Printers Laser Printers Cheap to purchase. Expansive compared to inkjets. Has a nozzle that sprays onto the paper, and it gets printed. They have no nozzle. Ink is a liquid, which means it dries if not in use. Ink is a toner (powder), so it can’t dry up if not in use. Ink needs to be refilled quickly, which makes it costly. Ink lasts a while, so refilling the bar over and over is not necessary. Purchasing these printers is not costly but using it over time is. Purchasing these printers is costly in the beginning but using it costs less. 11 Inkjet Printers Laser Printers It’s a preference to print projects, assignments or coloured pictures. It’s preferred to print text documents, normal pages or PDFs. Advantages (Inkjet Printers) Good Print Quality: They give great print quality, usually for photographs and variety of pictures, with smooth degrees and energetic tones. Reasonable Cost: They are normally less expensive to buy than laser printers, making them a good enough choice for home clients or private ventures with light printing needs. Minimized and Lightweight: Inkjet printers are easier to store and lighter than laser printers, making them great for little spaces or workspaces. Disadvantages (Inkjet Printers) High Cost of Ink: Cartridge for inkjet printers is expensive. They are used more so the cost of one page is higher. Slower Printing Speed: They are slower, like when it comes to printing many documents. Too much maintenance: This is different with other printer brands where problems, like blocked prints heads in inkjet printers need cleaning, which is sometimes not good. Advantages (Laser Printers) Speed Printing: Laser printers are fast and more suitable for large organizations and printing needs. Lower Cost Per Page: laser printers are more cost-effective than inkjet printers in the long run, even with a higher cost because of the longer usability of the toner cartridge plus small maintenance need. Durability and Longevity: Laser printers are last more compared to inkjets, and they can work for extended hours, making them perfect for businesses in the long run. Disadvantages (Laser Printers) Higher Beginning Expense: Laser printers are extra expensive than inkjet printers, making them less of a choice for clients with a specific budget. Restricted Photograph Quality: Laser printers are not great for great photograph printing because of their lower variety and less lively product contrasted with inkjet printers. Massive and Weighty: Laser printers are normally bigger and heavier than inkjet printers, needing more space, which might be a disadvantage in more modest work areas or homes. In Closing: Choosing between inkjet printers and laser printers is dependent on printing needs and the budget. 12 So, the Laser Printer is best for meeting the growing needs of the company, because they need a fast printer as printing is an important part of their operations and it’ll prevent the long queues. Laser printers meet the cost-efficiency as they have a lower cost per page. The ink lasts a while, so it will not be necessary to refill the bar repeatedly, which will enhance employee satisfaction. 13 References Coversheet (EDUVOS my LMS website->under my Documents-> Academic Documentation>Individual Assessment Coversheet) Bogna, J. (2021, November 16). What Is a MAC Address, and How Does It Work? How To Geek. What Is a MAC Address, and How Does It Work? Gillis, AS. (n.d.). What is Server Virtualization? The ultimate guide. Retrieved 22 March 2025. from What is Server Virtualization? Indeed, Editorial Team. (2024, August 16). 7 Virtualization Types That Businesses Use (Plus Benefits). Indeed. 7 Virtualization Types That Businesses Use (Plus Benefits) | Indeed.com Lamberti, A. (2024, June 24). How To Troubleshoot Network Connectivity Issues: The Great Network Escape. Obkio. How to Troubleshoot Network Connectivity Issues - Obkio Shea, S. (2024, April 29) Top 11 cloud security challenges and how to combat them. Tech Target. Top 11 cloud security challenges and how to combat them | TechTarget Difference between Inkjet printer and Laser printer. (2024, September 16). GeeksforGeeks. Difference between Inkjet printer and Laser printer - GeeksforGeeks Difference between Cloud Computing and Virtualization. (2024, September 03). GeeksforGeeks. Difference between Cloud Computing and Virtualization - GeeksforGeeks Enterprise Cloud Computing: A Complete Guide. (2025, February 24). Brain Hub. Enterprise Cloud Computing: A Complete Guide [2024] Fix: Clock Reverts to Wrong Time After Computer (Server) Reboot. (2024, March 12). Windows OS Hub. Fix: Clock Reverts to Wrong Time After Computer (Server) Reboot | Windows OS Hub Gigabyte Motherboard Beep Codes: Understanding and Troubleshooting. (2024). OneSDR – A Technology Blog. Gigabyte Motherboard Beep Codes: Understanding and Troubleshooting [2024] - OneSDR - A Technology Blog Guide to BIOS Settings: Tweaking Your Motherboard for Performance. (2024, October 25). CSS exam! Guide to BIOS Settings: Tweaking Your Motherboard for Performance Managed Switches Versus Unmanaged Switches. Cisco. Managed Versus Unmanaged Switches - Cisco Managed vs. Unmanaged Switches: Are They Really that Different? Top 5 Virtualization Platforms for Businesses in 2025. (2024, December 2). V2 Cloud. Top 5 Virtualization Platforms for Businesses in 2025 | V2 Cloud What is the role of a MAC address in a network? Tutor Chase. What is the role of a MAC address in a network? | Tutor Chase What is Collision Domain in Networking? (2024, December 6). PyNetLabs. What is Collision Domain in Networking? - PyNet Labs 14 Anon., 2024. Top 5 Virtualization Platforms for Businesses in 2025. [Online] Available at: https://v2cloud.com/blog/top-5-virtualization-platforms [Accessed 22 March 2025]. Blog, O.-. A. T., 2024. Gigabyte Motherboard Beep Codes: Understanding and Troubleshooting. [Online] Available at: https://www.onesdr.com/gigabyte-motherboard-beepcodes/#:~:text=No%20Beep%201%20Meaning%3A%20The%20motherboard%20is%20not,and %20confirm%20that%20the%20CPU%20is%20correctly%20installed. [Accessed 22 March 2025]. Bogna, J., 2021. What Is a MAC Address, and how Does It Work?. [Online] Available at: https://www.howtogeek.com/764868/what-is-a-mac-address-and-how-does-it-work/ [Accessed 03 March 2025]. Chase, T., n.d. What is the role of a MAC address in a network?. [Online] Available at: https://www.tutorchase.com/answers/a-level/computer-science/what-is-the-role-ofa-mac-address-in-a-network [Accessed 22 March 2025]. Cisco, n.d. Managed Switches Versus Unmanaged Switches. [Online] Available at: https://www.cisco.com/c/en/us/products/switches/what-is-a-managed-switch.html [Accessed 22 March 2025]. exam!, C., 2024. Guide to BIOS Settings: Tweaking Your Motherboard for Performance. [Online] Available at: https://cssexam.net/technology/guide-to-bios-settings-tweaking-your-motherboardfor-performance/ [Accessed 22 March 2025]. Geeks, G. f., 2024. Difference between Cloud computing and Virtualization. [Online] Available at: https://www.geeksforgeeks.org/difference-between-cloud-computing-andvirtualization/ [Accessed 22 March 2025]. Geeks, G. f., 2024. Difference betwwen Inkjet printer and Laser printer. [Online] Available at: https://www.geeksforgeeks.org/difference-between-inkjet-printer-and-laser-printer/ [Accessed 22 March 2025]. Gillis, A. S., n.d. What is server vitrulization? The ultimate guide. [Online] Available at: https://www.techtarget.com/searchitoperations/definition/What-is-servervirtualization-The-ultimate-guide [Accessed 22 March 2025]. Hub, B., 2025. Enterprise Cloud Computing: A Complete Guide. [Online] Available at: https://brainhub.eu/library/enterprise-cloudcomputing#:~:text=Enterprise%20cloud%20computing%20enables%20businesses%20to%201 %20Centralize,to%20market%20changes.%206%20Improve%20customer%20service%20qualit y. [Accessed 22 March 2025]. 15 HUb, W. O., 2024. Fix: Clock Reverts to Wrong Time After Computer (Server) Reboot. [Online] Available at: https://woshub.com/windows-date-time-changes-after-restart/ [Accessed 22 March 2025]. Lamberti, A., 2024. How to Troubleshoot Network Connectivity Issues: The Great Network Escape. [Online] Available at: https://obkio.com/blog/how-to-troubleshoot-network-connectivity-issues/#5-mostcommon-network-connectivity-issues-their-causes [Accessed 22 March 2025]. PyNetLabs, 2024. What is Collision Domain in Networking?. [Online] Available at: https://www.pynetlabs.com/what-is-collisiondomain/#:~:text=How%20do%20different%20devices%20handle%20Collision%20Domains%3F %201,multiple%20broadcast%20domains.%20This%20ensures%20efficient%20data%20flow. [Accessed 22 March 2025]. Shea, S., 2024. Top 11 cloud security challenges and how to comabt them. [Online] Available at: https://www.techtarget.com/searchsecurity/tip/Top-11-cloud-security-challengesand-how-to-combat-them [Accessed 22 March 2025]. Team, I. E., 2024. 7 Virtulization Types That Businesses Use( Plus Benefits). [Online] Available at: https://www.indeed.com/career-advice/career-development/virtualization-types [Accessed 22 March 2025]. 16
0
You can add this document to your study collection(s)
Sign in Available only to authorized usersYou can add this document to your saved list
Sign in Available only to authorized users(For complaints, use another form )