Build a computer using a list of unique specifications

Assignment Help Computer Network Security
Reference no: EM13889732

Need assistance with PC Build and Manual assignment.

Assignment must the meet the requirements outlined in the Deliverables, Computer Requirements and Manual Sections.

Assignment: PC Build and Manual

You have been recently hired as a computer technician at a local computer sales and repair shop. The shop offers a variety of services that range from installing new applications and fixing computers to recovering lost or deleted data. One service provided by this company is the opportunity for customers to have a computer built to their personal specifications. As a technician, it is your responsibility to capture the customer's unique requests.

As part of the training process, your manager would like to evaluate how effective you are at this task, so he asked that you complete a two-part project:

Build a computer using a list of unique specifications and troubleshoot any problems that may come up during the building process.

Create a user manual that documents how to build the computer.

When you are finished, you will submit the user manual to your manager for review. It will ultimately be used to train new computer technicians at the shop.

OVERVIEW

"Drag the motherboard from the shelf to the motherboard plate in the system case."

"After properly grounding yourself, pick up the motherboard and place it inside the area where the motherboard will sit in the case. Align the screw holes on the motherboard with the screw holes on the case. Use appropriate screws to mount the motherboard inside the case, making sure not to scratch the surface of the motherboard."

You will provide a comprehensive and detailed manual documenting the step-by-step process for building a computer using the components provided in LabSim 14.1: "Build a Computer from Scratch." The manual will be used by entry-level technicians, so it should be clear, concise, and formatted using the IEEE citation style, with screenshots of each step from LabSim 14.1. Your manual should be similar to step-by-step instructions on How to Change the Oil in Your Car. In this example, not only is each step described in detail, but also there is a visual representation of each step. Keep in mind that your manual will be used as a guide for new technicians.

The manual should not document how to complete a LabSim section; rather, it should provide detailed instructions on how to build an actual computer for a potential customer:

To learn how you will be assessed on this assignment, please take a moment to review the rubric.

COMPUTER REQUIREMENTS

• motherboard with Socket 1366

• power supply that supports the specified motherboard

• fastest processor possible (available on the shelf and compatible with the motherboard)

• maximum memory possible

• fastest hard drive possible

• CD-DVD drive with fastest connection to the motherboard best video card available (available on the shelf and compatible with the motherboard)

MANUAL SECTIONS

In addition to including the sections listed below, your manual should

• address the environment in which the computer build will take place. For example, what are the best practices when working in a carpeted room?

• not use computer jargon. Although the manual will be used to train new technicians, it may also be used by someone with limited computer knowledge, so the manual must be easy to understand.

• include explanations on methodology. For example, why is it important to use an antistatic grounding bracelet when working with the computer? Or why is it important to install memory sticks in pairs?

1 Workspace Preparation (LabSim 1.0)

2 Installing Motherboard (LabSim 3.3)

3 Installing Power Supply (LabSim 3.2)

4 Installing CPU (LabSim 3.4 and 3.10)

5 Installing RAM (LabSim 3.5)

6 Installing Hard Drive (LabSim 5.4)

7 Installing Optical Drive (LabSim 5.6)

8 Installing Video Card (LabSim 3.8)

9 Connecting Monitors, Keyboard, and Mouse (LabSim 4.0)

10 BIOS Configuration (LabSim 3.6)

11 Installing Windows 7 (LabSim 10.3)

Configuring Critical Windows Features (LabSim 9.0 and 10.0)

Reference no: EM13889732

Questions Cloud

Prepare several reasons in support of understandability : Columbus Corporation is considering adopting the standard costing method to enhance the understandability and comparability of accounting information. Prepare several reasons in support of why understandability and comparability will be enhanced.
The demand variation : 20 items. The demand variation (σd) is 2.5 items. The firm wants to maintain a 95% customer service level (z = 1.96). The firm needs to find the best suppliers from three supply companies to comply with JIT-lean perspective in order to keep inventory..
Management and standards : What is the relationship between configuration management and standards?
Why does use of standard costing analysis in management : Why does the use of standard costing and variance analysis in the management process reinforce the concepts of comparability and understandability to better business performance?
Build a computer using a list of unique specifications : Build a computer using a list of unique specifications and troubleshoot any problems that may come up during the building process.
Summary of this given introduction part : Summary and analysis- Summary of this introduction part-
Find discount or premium using the straight-line method : On January 1, 2012, Hampton, Inc. issues $3,000,000 of 5-year, 10% bonds with interest payable on July 1 and January 1. Hampton prepares financial statements on December 31 and amortizes any discount or premium using the straight-line method.
Describe successful egocentric thinking : Describe egocentric thinking, successful egocentric thinking
Why does four-step process of variance analysis enhance cost : Why does the four-step process of variance analysis enhance a cost center's ability to control costs? What should be included in a management report to further understandability and comparability when evaluating a cost center?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Identify the three different kinds of access control

Identify the three different kinds of access control, which one most resembles a Windows OS environment, military. What are the three authentication factors. Provide an example for each one.

  Write paper about stuxnet virus

Select a research topic from the list below. After selecting your topic, research the incident using news articles, magazine articles (trade press), journal articles, and/or technical reports from government and industry. Write paper about Stuxnet..

  Strategies and recommendations to the cio

Explain in detail why you believe the risk management, control identification, and selection processes are so important, specifically in this organization and draft a one page Executive Summary that details your strategies and recommendations to t..

  What are some future technology initiatives

Mobile Manufacturing Company includes all the aspects like collecting requirements, designing and manufacturing of various mobiles. What are some future technology initiatives? Does the organization tend to make, buy, or both? Why? How does the orga..

  Decrypt the ciphertext message lfdph lvdzl frqtx huhg which

decrypt the ciphertext message lfdph lvdzl frqtx huhg which has been encryptedusing the caesar cipher. encrypt the

  Recognize all the potential security threats on a personal

computer security is not an issue for organizations alone. anyone whose personal computer is connected to a network or

  Corporate governance and a company''s cybersecurity posture

Analyze the connection between corporate governance and a company's cybersecurity posture. Provide at least three (3) points to justify whether or not there is an impactful relationship between corporate governance and a company's cybersecurity po..

  Problems related to e commerce

Question 1: What are some elements of securing online transactions? Question 2: What are some elements of administering an e-commerce site?

  Cost-of-use issues are of client-dominant local area network

What technology and cost-of-use issues are associated with a client-dominant local area network? Think about what happens as the network grows in size.

  Discuss the security of the network

Discuss the security of the network and suggested best practices for securing the business network.

  Address the possible security requirements

Prepare a 3- to 5-page paper describing the considerations necessary to address the possible security requirements and the possible risks associated with the Benefits Elections Systems being requested by the Service Request, SR-HT-001 for Huffman ..

  Describing the some of the issues you might face

Assignment: Write a 3-to 4-page paper describing the some of the issues you might face when maintaining security in a company that has offices in multiple countries

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd