COLLEGE OF IT
Department of web development and Database
COURSE TITLE: Maintain Inventories of Hardware and
software and Documentation
COURSE CODE: EIS WDDBA1 M09 0322
                     GROUP ASSIGNMENT
NO   NAME                    ID NO
1.   ASRES   H/ MARIYAM    WD&DA-EXT-V-013/17
2.   ASTER   GIRMA        WD&DA-EXT-V-065/17
3.   LEUL    BESUFKAD     WD&DA-EXT-V-064/17
4.   LIELNA GETACHEW      WD&DA-EXT-V-041/17
5.   MESERET BELAYHUN     WD&DA-EXT-V-044GE/17
6.   GELILA ASHEMAFI      WD&DA-EXT-V-/17
                       Submitted to: YOHANS
               Submission date: MAY 4/2025
1. List environment for IT hardware and software storage
               Lockable
               Dust-free
               Static-resistant
               Safe from water and humidity
               Well-ventilated and light
               At a constant temperature
                Separated from other perishable stores
     .
2. What is the need of technical documentation inventories of hardware and software?
               To help users easily find the information they need.
               Record licensing.
               To track and manage the user of hardware and software.
               Trouble shooting.
3. List the kinds of valuable original documents, possibly held in a protected place under
   the care of IT.
               legal or historical papers
               signed forms
               Tender documents
               Contracts
               Agreements
               Warranties and licenses.
4. Explain the difference between confidentiality, Integrity & Availability in a document
    security.
    In the context of document security, the concepts of Confidentiality, Integrity, and
    Availability (often referred to as the CIA triad) are fundamental principles that guide the
    protection of sensitive information. Each component addresses a specific aspect of
    information security:
   1. Confidentiality: Confidentiality refers to the protection of information from
       unauthorized access and disclosure. It ensures that sensitive data is only accessible to
       those who are authorized to view it.
   2. Integrity: Integrity involves ensuring that information remains accurate, complete, and
       unaltered during storage, transmission, and processing. It protects data from
       unauthorized modification or destruction.
   3. Availability: Availability ensures that information and resources are accessible and
       usable when needed by authorized users. It focuses on maintaining system uptime and
       preventing disruptions.
  Organizations must balance these three principles to create a comprehensive security
  strategy that effectively protects their documents and sensitive data.
5. What kind of IT equipment’s can be stored in the stock?
   When managing an IT stock or inventory, a variety of equipment can be stored to support
   the organization's technology needs. Here’s a list of common types of IT equipment that
   can be stored in stock:
     1. Computers and Laptops
     2. Networking Equipment
     3. Storage Devices
     4. Peripherals
6. Create a table on MS-Word or Excel and fill at least 5 Hardware inventory
        information which are connected with your computer?
     Item Name         Type              Manufacturer     Model             Serial Number
                                                          Number
   Monitor           Display          Dell                P2419H            ABCD123456
   Keyboard          Input Device     Logitech            K120              XYZ987654
   Mouse             Input Device     Razer               Death Adder       MNO123456789
                                                          V2
   Hard Drive        Storage Device Seagate               Barracuda 2TB HD123456789
   Motherboard       System Board ASUS                    ROG Strix         MB987654321
                                                          B550-F
7. Create a table on MS-Word or Excel and fill at least 5 Software inventory
   information which are installed on your computer?
     Software          Version            License Type       Installation   Vendor
     Name                                                    Date
     Microsoft         2021               Volume             2021-05-15     Microsoft
     Office                               License
     Adobe             2023               Subscription       2022-01-10     Adobe Systems
     Photoshop
     Google Chrome     116.0.5845.96      Free               2023-03-20     Google
     VLC Media         3.0.17             Free               2022-11-05     Video LAN
     Player
     Visual Studio     1.70.2             Free               2023-02-18     Microsoft
     Code
8. What is the use of finalizing product against workplace?
     Finalizing a product against the workplace refers to the process of ensuring that a
       product meets the necessary standards, requirements, and specifications before it is
       released for use or sale within a work environment. This process is crucial for
       several reasons:
1. Quality Assurance
   • Ensures that the product meets quality standards and is free from defects.
   • Helps maintain consistency in product performance, leading to customer satisfaction.
2. Compliance with Standards
      • Ensures that the product complies with industry regulations, safety standards, and
    legal requirements.
      • Reduces the risk of liability and potential legal issues.
 3. Operational Efficiency
      • Finalizing products ensures they are ready for integration into existing workflows or
    systems.
      • Helps identify any operational challenges or inefficiencies that need to be addressed
    before full deployment.
 4. Cost Management
      • Identifying issues before finalization can prevent costly recalls or rework later.
      • Helps in budgeting by providing accurate cost assessments based on finalized product
    specifications.
    failures.
9. What are the five instructions using appropriate measuring instruments?
    When using measuring instruments, it’s essential to follow specific instructions to ensure
    accuracy and reliability. Here are five general instructions that can be applied across
    various measuring contexts, along with examples of appropriate measuring instruments:
          1. Calibrate the Instrument
      • Instruction: Before taking any measurements, ensure that the measuring instrument is
    properly calibrated according to the manufacturer’s specifications.
          2. Select the Appropriate Measurement Range
      • Instruction: Choose the correct measurement range on the instrument to ensure that
    the readings are within its operational limits.
          3. Ensure Proper Positioning
      • Instruction: Position the instrument correctly relative to the object being measured to
    avoid parallax errors and ensure accurate reading
          4. Take Multiple Readings
      • Instruction: For more reliable results, take multiple measurements and calculate the
    average to minimize errors and account for variability.
          5. Record Measurements Accurately
      • Instruction: Document all measurements clearly and accurately, including any relevant
    conditions (e.g., temperature, humidity) that might affect the results.
10. How do you identify the potential Failure on power supply?
      Visual Inspection
      Listen for Unusual Noises
      Check Input Voltage
      Measure Output Voltage
11. How do you identify the potential Failure on cable? Visual Inspection
    1. Check for Shor
    2. Cable Length and Routing
12.
      Computer name               DESKTOP-TFKOPRT
      Computer model              OptiPlex 7020
      Computer Manufacturer       | Dell Inc
      Computer serial Number
      OS                          Microsoft Windows 10 Pro
      OS Manufacturer             Microsoft Corporation
      OS Version                  10.0.19045 Build 19045
      OS Installed date
      CPU information             Intel(R) Core (TM) i3-4160 CPU @
                                  3.60GHz
      CPU speed                   3.60 GHz
      Computer Generation         4th Generation (i3-4xxx series)
      Computer RAM
      Computer Architecture       x64-based PC
      Graphics Card
      Available Physical Memory   1.50 GB
      User Name                   DESKTOP-TFKOPRT-Admin