Premium Essay

Computer Lab Protocol

In:

Submitted By pdavis11930
Words 392
Pages 2
Computer Lab Protocol

- The use of the computer lab is a privilege. Treat equipment and each other with respect at all times.
- Wait for instructions when entering the computer lab.
- If you have technical problems check with an adult. Do not touch any wires.
- Stay in your seat. If you need help raise your hand.
- Be sure to save your work often while working.
- You must have permission to print. When you have permission to print press print only once. If the printer is not working an adult will solve the problem.
- before you leave the lab save your work and close all programs.
- Please leave the lab neat and clean for the next class. Push in your chair. Leave the computer station in good order. • - Take all of your things with you. • - Computers are for school projects and assignments only. • - No food, chewing gum or drinks are allowed at the computers. • - Leave backpacks at the door…only take necessary materials to the computer workstation. • Remain in your seat at all times unless instructed to get up. • NO talking without permission from the teacher. • Do not change any of the software settings used on the computers. • Work only with the computer that is assigned to you. • Do not download software from the Internet onto the computers in the lab unless authorized to do so. • Surfing the web and checking personal e-mail is prohibited. • Only print work that is related to your assignments. • You must have permission each time you wish to print an assignment! • Any changes or damages to the computer are to be reported to the teacher immediately. • Notify the teacher if anything has been altered or is missing from the computer. • Log off at the end of the session. • Keep the lab clean and tidy. Put things back when you are finished with them, including keyboards, mice, and

Similar Documents

Free Essay

It113 Project Scope

...that the company obtains a high performance network for a reasonable price. Project description MK Institute of Higher Learning is purposing a project with the description to network a classroom based floor. This floor will consist of three wings. Each wing accommodates one distribution closet, which must be interconnected to one another. Each wing also has eight classrooms and one computer lab. Classrooms will need 2 drops and the computer labs will need 44 drops, resulting in 60 drops in all per wing. The ISP connection will be entering from the north wing’s distribution room. The institute will also be requiring that a wireless access coverage to the central lobby area, allowing 100 users simultaneously, to be made possible. Also noting that the central lobby area consists of three solid supports, holding a 25’ ceiling. Major Deliverables * The networking of the MK Institute of Higher Learning. * Placing needed hardware. * Wiring the hardware and network. * Interconnecting distribution rooms. * 3 wings, each consisting of 8 classrooms = 16 drops, one computer lab = 44, and one distribution room. * Wireless central lobby allowing 100+ users simultaneously. * Fully functional Networking...

Words: 607 - Pages: 3

Premium Essay

Information Centre

...Computer Lab Rules & Regulations Swinburne University computing facilities may only be used by current Swinburne students and staff. Swinburne identity card must be presented upon request. The computing facilities should only be used for educational and research purposes. The following rules and regulations apply to all lab computers on campus. Lab Rules & Regulations 1. The computer lab provided by the University is solely for educational and research activities. Students are prohibited from using the lab for any other reasons. 2. Students must have a valid student ID card to use the computer labs. 3. Students must abide by all rules and regulations, such as those shown on booking sheets, computer screens, and notices near the computers or on the wall. 4. Two-hour Usage Rule: When the lab is full and students are waiting for a vacant computer, the two-hour rule will apply. Students will be limited to 2 hours on the computer per session. 5. All users must abide by the license requirements of any software or resources being used on the computer. 6. The downloading of non-coursework related materials is strictly prohibited on the campus network as it uses much of the network bandwidth, thus slowing down all internet access. 7. All personal data must be saved on a floppy disk, handy drive or on your Home drive. Do not save personal data on the computer hard drive. 8. Please be reminded to scan your handy...

Words: 484 - Pages: 2

Premium Essay

Rules

...Lab Rules & Regulations 1. The computer lab provided by the University is solely for educational and research activities. Students are prohibited from using the lab for any other reasons. 2. Students must have a valid student ID card to use the computer labs. 3. Students must abide by all rules and regulations, such as those shown on booking sheets, computer screens, and notices near the computers or on the wall. 4. Two-hour Usage Rule: When the lab is full and students are waiting for a vacant computer, the two-hour rule will apply. Students will be limited to 2 hours on the computer per session. 5. All users must abide by the license requirements of any software or resources being used on the computer. 6. The downloading of non-coursework related materials is strictly prohibited on the campus network as it uses much of the network bandwidth, thus slowing down all internet access. 7. All personal data must be saved on a floppy disk, handy drive or on your Home drive. Do not save personal data on the computer hard drive. 8. Please be reminded to scan your handy drive before use to reduce the risk of any virus outbreak. 9. The Management is not responsible for any loss of data or personal belongings regardless of the cause. 10. No moving or unplugging of any equipment in the labs. 11. No pornographic and offensive images & videos. 12. No games (both computer and physical). 13. No...

Words: 413 - Pages: 2

Free Essay

Transmittal Letter

...college of business were our focal point. Surveys were given to students with questions regarding financial hardships caused by laptop requirement and their opinions of the policy among others. Faculty was interviewed on their thoughts and how the policy helped with the classroom. Administration helped with the reasoning behind implementing the policy and some hints to phase outs of the computer labs located in the college of business. We found that students believed that the policy is not effective, but should be enforced. For faculty, some believe that the policy is helpful for learning and welcome laptops in the classroom while others feel that laptops can be a distraction to everyone. The administration implemented the policy because they want students to have the ability to work anywhere at any time with the specialized tools/software needed for courses taken. They also feel laptops are necessary for non-traditional students who may be full time professionals and have the option to complete courses online. Rumors that the laptop requirement was put into place because of possible computer lab phase outs are false, null, and void. To improve the effectiveness of the laptop requirement in the college of business, we recommend the following: * Making sure students/faculty are aware of the laptop requirement * Enforcing consequences for those who don’t have a laptop Thank you for welcoming our concerns and suggestions through this project. We learned a great deal and...

Words: 314 - Pages: 2

Free Essay

Man U

... | - First Come First Serve basis (PJ Campus- 300 students) - First Come First Serve basis (Gombak Campus- 100 students) (EXAMINATION WILL BE HELD IN THE MIDDLE OF THE YEAR 2012) DATE OF M.U.E.T REGISTRATION AS FOLLOWS: |DATE |DAY |TIME |VENUE | |22/03/2012 |Thursday |8:30 AM - 12:30 NOON 2:00 PM - 3:30 PM |MULTI PURPOSE LAB A | | | | |(PJ campus) | |23/03/2012 |Friday |8:30 AM - 12:00 PM | | | | |2:45 PM – 3:30 PM | | |DATE |DAY |TIME ...

Words: 577 - Pages: 3

Premium Essay

Police Abuse Essay

...GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Describe how digital devices store data. * Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): * Respond to the multiple-choice questions. * Complete the List the Words inside Acronyms table. Required Resources * Odom textbook * Computer with word processing software * Internet access * Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they are applied to various types of enterprises...

Words: 16043 - Pages: 65

Premium Essay

Unit 1 Labs

...Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes Identify the major needs and major stakeholders for computer networks and network applications. Describe how digital devices store data. Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): Respond to the multiple-choice questions. Complete the List the Words inside Acronyms table. Required Resources Odom textbook Computer with word processing software Internet access Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they are applied to various types of enterprises. * Draw the four...

Words: 16182 - Pages: 65

Premium Essay

Introduction to Networking

...GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Describe how digital devices store data. * Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): * Respond to the multiple-choice questions. * Complete the List the Words inside Acronyms table. Required Resources * Odom textbook * Computer with word processing software * Internet access * Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they are applied to various types of enterprises...

Words: 16043 - Pages: 65

Premium Essay

Lab Network+

...Lesson 2 Lab Worksheet Lab Exercises Lab 1 How TCP/IP Protocols Work through the TCP/IP Model The purpose of this lab is to familiarize the students with the TCP/IP Model and some of the protocols that are used in it. This lab is important to the student because it takes the student through a thought experiment about how data would pass thorough the TCP/IP Model down from the computer and up through the destination computer. By doing this thought experiment the student will come to better understand how different protocols work together to accomplish a specific task. Materials • Word processing document • Textbook Do the Lab Follow Protocols through the Layers of the TCP/IP Model 1. Read though the section of this lesson titled “How the Layers Work Together.” 2. Carefully study Figure 2-11. [pic] 3. In a word processing document, list the layers of the TCP/IP Model and then the protocols that the discussion you read says are used on each layer to move the data from one location on the network to another. The following is what your answer should look like: • Application layer: HTTP • Transport layer: TCP • Internet layer: IP • Network Interface layer: Ethernet 4. List the protocols as they correspond to the TCP/IP Model...

Words: 791 - Pages: 4

Free Essay

Computer Network Lab Manual

...CN LAB REPORT Dept. of ISE, BVBCET Department of Information Science & Engineering, BVBCET Hubballi COMPUTER NETWORKING LAB Mahantesh Patil 2BV14IS410 Mahantesh Patil 2BV14IS410 CN LAB REPORT Dept. of ISE, BVBCET LAB-01 List the hardware components 1) Difference between switch and Hub: 2) Difference between SWITCH and ROUTER 3) Differences between Router and Gateway 4) What is the Difference between Subnetting and Supernetting? HARDWARE COMPONENTS Cables: 1|Page Mahantesh Patil 2BV14IS410 CN LAB REPORT Dept. of ISE, BVBCET Cables: which are used to connect one or more devices to computer or network. Different types of network cables are available market they are Coaxial cable, Optical fiber cable, Twisted pair cable. RJ-45 The most common UTP connector is RJ45 (RJ stands for registered Jack), as shown in Figure. The RJ45 is a keyed connector, meaning the connector, meaning the connector can be inserted in only one way. 2|Page Mahantesh Patil 2BV14IS410 CN LAB REPORT Dept. of ISE, BVBCET SWITCHES: Switches contain many ports to connect different network segments. They are similar to hubs, but offer greater performance. When a network contains a large number of devices, switches are needed instead of hubs to make sure the communications between devices does not slow down. Contrary to hubs, switches send the data it receives only to specific ports. NIC(NETWORK INTERFACE CARD) A network card, network...

Words: 3647 - Pages: 15

Premium Essay

Nt 1210

... Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical...

Words: 4400 - Pages: 18

Premium Essay

Nt1210 Introduction to Networking Onsite Course

... Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical...

Words: 4400 - Pages: 18

Free Essay

Beamforming

...| One’s understanding of network protocols can often be greatly deepened by “seeing protocols in action” and by “playing around with protocols” – observing the sequence of messages exchanged between two protocol entities, delving down into the details of protocol operation, and causing protocols to perform certain actions and then observing these actions and their consequences. This can be done in simulated scenarios or in a “real” network environment such as the Internet. In the Wireshark labs you’ll be doing in this course, you’ll be running various network applications in different scenarios using your own computer (or you can borrow a friends; let me know if you don’t have access to a computer where you can install/run Wireshark). You’ll observe the network protocols in your computer “in action,” interacting and exchanging messages with protocol entities executing elsewhere in the Internet. Thus, you and your computer will be an integral part of these “live” labs. You’ll observe, and you’ll learn, by doing. In this first Wireshark lab, you’ll get acquainted with Wireshark, and make some simple packet captures and observations. The basic tool for observing the messages exchanged between executing protocol entities is called a packet sniffer. As the name suggests, a packet sniffer captures (“sniffs”) messages being sent/received from/by your computer; it will also typically store and/or display the contents of the various protocol fields in these captured messages. A...

Words: 2509 - Pages: 11

Premium Essay

Jon Jons

...regularly uses Google Earth to emphasize where a news story has occurred. At the time of writing this activity, there are three versions of Google Earth. The version that fits most needs is Google's free version, Google Earth. A Google Earth Plus version includes GPS support, a spreadsheet importer, and other support features. The Google Earth Pro version is for professional and commercial use. The URL http://earth.google.com/product_comparison.html contains a description of the versions. Use this link to answer the following questions: Which versions support Tilt and 3D rotation? __________________________ Which Google Earth version supports the highest resolution? __________________________ To use Google Earth, version 4, minimum computer hardware requirements must be met: Operating System CPU System Memory (RAM) Hard Disk Network Speed Graphics Card Screen Microsoft...

Words: 60675 - Pages: 243

Free Essay

Cis 534 - Lab Manual

...Contents Toolwire Lab 1:Analyzing IP Protocols with Wireshark ........................................................................ 6 Introduction ............................................................................................................................................. 6 Learning Objectives ................................................................................................................................ 6 Tools and Software ................................................................................................................................. 7 Deliverables ............................................................................................................................................. 7 Evaluation Criteria and Rubrics ........................................................................................................... 7 Hands-On Steps ....................................................................................................................................... 8 Part 1: Exploring Wireshark ............................................................................................................... 8 Part 2: Analyzing Wireshark Capture Information .......................................................................... 12 Lab #1 - Assessment Worksheet .............................................................................................................. 19 Analyzing IP Protocols with Wireshark .....

Words: 48147 - Pages: 193