We Have Numbers Of Free Samples
For Each Subject To Make A Difference In Your Grade
Communication for Engineers
Total Views 707
Table of content
- Question 1
- Question 2
- Question 3
- Question 4
- Question 5
- Question 6
- Question 7
- Question 8
- Question 9
- Question 10
- Reference list
Question 1:
In this circuit diagram, there are three elements namely the cell battery, lamp, one controller and it is an open circuit. The electronic symbol in the given diagram depicts the electronic and electrical components. The electronic elements present in this circuit comprised of wires, batteries, resistors and transistors. The energy source plays an essential role along with the conductor and a load.
Question 2:

Figure: electronic circuit diagram
(Source: created by author)
Question 3:
Computer security presentation
With the introduction of advanced technology, there is an increase in software and hardware application. It is important to check the damage continuously in order to protect the computer from further harm. In order to secure the personal computer, it is important to set a password and it has utmost importance to protect the system form viruses. As commented by Zisi et al. (2018), when any applications or unknown file is downloaded from the internet, it may cause a huge problem if it turns out to be malware or virus. It has been evidenced that viruses comprise of the computer codes which can destroy and damage the data and information of the computer. In order to prevent the computer form those viruses, an individual must follow these steps:
- It is essential to visit in approved sites
- Do not install or download the application from unknown sites
- Do not share personal information with other people online
- Do not misuse the internet services
- Use anti-virus and malware eliminating applications
Question 4:
| Question | How do you conduct the maintenance for these computers? | Can you tell me the process to enhance the skills of staffs and installation? | What are the features of these computers? | 
| Manager 1 | I conduct the maintenance for these computers by regularly checking the updates and avoiding the viruses from attacking the online sites. | For staff training, I organize a one-day training program for enhancing the knowledge of the staffs in order to increase computer security. The installation charges are lower than that of training costs. | Mhz processor is about 533megahartz. The main memory comprised of 64 MB. | 
| Manager 2 | According to me, it is important to not share the crucial information on online sites. | In order to install the systems in my workplace, I prefer technicians to set the systems and training programs are conducted by the higher authority. | The disk size is about 6.2 GB to store the information and data. The width of the data bus is about 32 bit. | 
Date: 10 April 2019
Day: Wednesday
Australian Cyber Security Centre
Form the above questions, it was evaluated that the computers are maintained regularly using advanced application software and they did not share personal information online in order to enhance the security. By using antivirus packages and malware software one can easily protect the system from virus attack.

Question 5:
Maintenances of desktop computer schedule
| Tasks | Time | Schedule | 
| Task 1 | 10 minutes | Clean or remove the unnecessary and unwanted files, defragmentation tools and monitoring the CPU temperature | 
| Task 2 | 20 minutes | Visiting the approved sites and avoiding the unwanted sites, disk space analysis | 
| Task 3 | 30 minutes | Installing the virus protection application software | 
| Task 4 | 5-10 minutes | Checking the applications and if any error is encountered in between working it is essential to consult with the technician. | 
Question 6:
The lists of things which are used for the maintenance purpose are as follows:
- For the quality performance, PC cleaning tools have been used to delete the junk files (CCleaner tool is used for cleaning the junk)
- Defragmentation tool is used to arrange the data and information in sequential order which aid to fast operation.
- Antivirus and malware programs are implemented in order to free the application from antivirus.
- The CPU temperature is observed in order to monitor the proper working of the system.
In the maintenance procedure, a disk space analysis has been used to evaluate the data types which have been used in the system. As per the view of Harris (2019), it is essential to protect the hard drive health to save the data.
Question 7:
The written communication method is categorised as the essential method and most effective for business interaction. Written communication is of different forms such as memos, reports, bulletins, emails, and instant messages.
The written communication procedures can be improved by writing short sentences and short paragraphs which will help the individuals to understand quickly. It has the utmost importance to be clear and concise for increasing the quality of communication and providing a complete response to other’s message is essential for achieving quality communication.
Question 8:
While studying this unit, a desktop system is been used in order to depict the information and data regarding the unit. In various sections, there is a calculation part along with the pictorial representation for which Microsoft excel is been used. Microsoft Excel helps to calculate the numerical part easily. With the help of Microsoft office PowerPoint application, the individual can easily prepare PowerPoint slides for representing the information in the catchy format in order to attract and engage the audience. E-system is used for better communication; software packages and IT hardware-software were used effectively.
Question 9:
During a presentation, Microsoft office excels is being used to represent the graphs, pie chart and other pictorial representation of the data and information. This software package is considered as a effective tool in which one can calculate the complex sums within seconds. As stated by Goodrich and Tamassia (2018), it has the ability to organize huge scale data into sequential manner.
Question 10:
Information and communication technology (ICT) method is been used for accomplishing the presentation, which comprises of presentation software applications. It also helps in adding animations and images in order to make the presentation more attractive and interactive.
Reference List
Goodrich, M. and Tamassia, R., (2018). Introduction to computer security. London: Pearson.
Harris, A.S., Osirium Ltd, (2019). Password maintenance in computer networks. U.S. Patent Application 16/069,502.
Zisi, C., Mangipa, A., Boutou, E. and Pappa-Louisi, A., (2018). Separation Optimization of a Mixture of Ionized and Non-Ionized Solutes under Isocratic and Gradient Conditions in Reversed-Phase HPLC by Means of Microsoft Excel Spreadsheets. Separations, 5(1), p.19.
Engineering students in UK often look for computer network assignment help service to complete their assignments successfully. BookMyEssay provides all sorts of academic assignment help in every stream that is really a great assistance for the students who want to save time, and obtain high scores in the assignments.
Download
505
Size
140.91 KB
File Type
[contact-form-7 404 "Not Found"]