Order For Similar Custom Papers & Assignment Help Services

Fill the order form details - writing instructions guides, and get your paper done.

Posted: August 5th, 2022

Fundamentals of Computer Hardware

Fundamentals of Computer Hardware
By Name

Course
Institution
City/State
Date

Fundamentals of Computer Hardware
Task 1
Basic Input Output System (BIOS) is a software that is relevant to a computer’s booting system as it runs in the background to ensure utility functions are up and running (Matrosov, Rodionov, & Bratus 2016: 2024 – Do my homework – Help write my assignment online, Ch. 5). The HP BIOS is comprised of the following menus and options:

File Storage Security Power
System Information
About
System Log

Set Time and Date
Default Setup
Apply Defaults and Exit
Ignore Changes and Exit
Save Changes and Exit

Figure 1: BIOS Menus and File Options
The file menu has system information that tells more of the hardware components of the computer while the about and system log options describe the BIOS setup utility and log updates. Set the time and date as well as default setups enable users to restore system settings through the assistance of the apply, ignore, and save options.
The storage menu has device configuration, storage options, and boot order that enable users to select and change storage information while deciding on the order of booting devices.
For the security menu, the first category allows users to determine the passwords for altering the BIOS utility as well as turning on the device. The second category of options enable users to determine availability of utility devices, enable or disable USB ports/slots/Network boot features respectively. The third category enables users to change security settings and select a secure boot key type.
The power menu enables or disables power settings options while monitoring the speed of the fan. Finally, the advanced settings enable users to control computer POST test and when the power of the device goes off. One can also select when the computer can turn on automatically through the BIOS Power-On option. The bus options allow users to enable or disable bus options while the device option changes device options.

2.
A boot sequence is defined as the order in which computer devices should check for boot files in the operating system. The booting sequence often occurs after the POST takes place and assures that the requirements and availability of devices in the computer are functioning properly (Soper, 2004). It is only then that the boot sequence initializes. The OS, hardware and BIOS should work in sync for a successful boot process. The system clock initialized the CPU to check into the BIOS instructions and run the POST from a predetermined location in memory. The BIOS then looks for an OS to load by looking at the complementary metal oxide semiconductor (CMOS) which gives the location of the OS. This process of looking at the CMOS for an OS location is what is referred to as the boot sequence.
There are various types of boot sequence, but hard drive and USB boot types are the most common.
Hard Drive USB
Most commonly used as it is the default bootable disk. Used as an Alternative to the Hard Drive when the HDD fails or cannot be found (Thompson & Thompson 2014: 2024 – Essay Writing Service. Custom Essay Services Cheap, p.30).
The BIOS automatically looks at the HDD to give the location of the OS bootable files. The computer has to support booting from a USB by including a USB Protocol Stack within the BIOS firmware

Figure 2: Comparison of Hard Drive and USB boot sequence

Task 2
An operating system is a low-level software that manages the applications and hardware on a computer. Hardware in this case include the physical entities of a computer that are essential to its functions.
The relationship between the hardware and OS is complex since both entities rely on each other to function. The OS helps in hardware functionality to give users the end goal. The OS manipulates the drivers, memory management, Fans and Cooling, and is in charge of CPU Control (Docter, Dulaney, & Skandier 2007, p.183). Through the use of drivers, the OS benefits from the ability to communicate with computer devices such as USB peripherals, sound cards, networking cards, and graphics cards. These drivers give the OS the capability to control the functionality of hardware. The OS also controls memory to determine how much storage can be accessed by the applications. To strengthen this relationship, the OS communicates with the CPU to control the activities taking place within a computer. Furthermore, the OS communicates with the cooling systems and the CPU to ensure the device remains cool since heat can damage the system.
The main aim of the OS is to ensure the hardware environment remains functional for the device to perform its tasks (Docter, Dulaney, & Skandier 2007, p.185). Android and iOS are two heavily debated upon operating systems. While Android relates well with batteries and aids them to last longer, iOS tends to run heavily and drain battery life. However, iOS also has an advantage in that it relates with applications on a highly advanced level to offer reliable security measures, while android easily attacked by viruses.
Task 3
At this time and era, information security is crucial due to the rampant increase in cyber-crimes. There is need to protect the OS as a computer resource as it stores critical information to the functioning of the computer as well as personal data. It is vital to ensure the confidentiality, integrity, and authenticity of the OS remains intact.
Some of the mechanisms to protect one’s device from malicious attacks include installing anti-virus programs, setting up firewalls, enforcing two-factor authentications, and performing computer backups. Antivirus software are important for all devices since each stand-alone device could be a target. They act in real-time to ensure the computer remains protected (Vacca 2014: 2024 – Essay Writing Service. Custom Essay Services Cheap, p.898). Firewalls are another mechanism and most computers have an inbuilt one. However, there is need to ensure it is enabled. Two-factor authentications are a becoming popular as they allow users to type passwords then confirm their presence through online prompts to prove authorization (Ginter 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers, p.155). Backing up information is another technique that should be practiced ever so often to ensure there is a fall back option in case of compromise.

References
Docter, Q., Dulaney, E. and Skandier, T., 2007. CompTIA A+ Complete Study Guide: Exams 220-601/602/603/604. John Wiley & Sons.
Ginter, A., 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers. SCADA Security-What’s broken and how to fix it. Lulu. com.
Matrosov, A., Rodionov, E. and Bratus, S., 2016: 2024 – Do my homework – Help write my assignment online. Rootkits and Bootkits. Reversing Modern Malware and Next Generation Threats. ISBN: 978-1-59327-716-1. pp. 304
Soper, M.E., 2004. Absolute Beginner’s Guide to A+ Certification. Que Publishing.
Thompson, R. B., & Thompson, B. F. (2010 – Essay Writing Service: Write My Essay by Top-Notch Writer). Building the perfect PC. O’Reilly Media, Inc.
Vacca, J.R., 2014: 2024 – Essay Writing Service. Custom Essay Services Cheap. Computer and information security handbook. Newnes.

Order | Check Discount

Paper Writing Help For You!

Special Offer! Get 20-25% Off On your Order!

Why choose us

You Want Quality and That’s What We Deliver

Professional Writers

We assemble our team by selectively choosing highly skilled writers, each boasting specialized knowledge in specific subject areas and a robust background in academic writing

Discounted Prices

Our service is committed to delivering the finest writers at the most competitive rates, ensuring that affordability is balanced with uncompromising quality. Our pricing strategy is designed to be both fair and reasonable, standing out favorably against other writing services in the market.

AI & Plagiarism-Free

Rest assured, you'll never receive a product tainted by plagiarism or AI-generated content. Each paper is research-written by human writers, followed by a rigorous scanning process of the final draft before it's delivered to you, ensuring the content is entirely original and maintaining our unwavering commitment to providing plagiarism-free work.

How it works

When you decide to place an order with Nurscola, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.