...Course (Graduate) CERTIFICATION T.E.S.D.A NC-II (Computer Hardware Servicing) Valid till May 2015 WORK EXPERIENCE January 12 2013 – March 22 2014 Computer Technician/ Computer Attendant OPIN@ DOT NET PDS Ave. BCDA Taguig City JOB DESCRIPTION * Repairs/ Maintains Computer Desktops and Internet Devices * Monitors Computer Desktops and Server * Troubleshoot Internet Connection Problems * Installs Operating Systems and Software Drivers * Assist Customer’s on Technical problems * Install and configures internet devices and connections October 27 2012 - November 22 2012 Computer Technician (OJT) Armed Forces of the Philippines Procurement Services Information System Branch of ACPS for CEIS, PS6 JOB DESCRIPTION * Repairs / Maintains Computer Desktops * Troubleshoot basic printer problems * Troubleshoot Network connection problems * Install new internet peripherals such as routers, switch, bridge, etc. * Install new desktop computers and printers * Install operating systems and software’s * Give technical teachings to staff personnel’s on how to use new computer equipment’s SEMINAR ATTENDED * “2ND STUDENT CONGRESS TECHNO INVENTION” PSITE (Philippine Society of IT Educators NCR Chapter) (February 7, 2014 – Fleur-de-Lis Theater, St. Paul University –Manila) PERSONAL BACKGROUND Born: 06 June 1991 at Makati City Civil Status: Single Age: 22 Years old Sex:...
Words: 291 - Pages: 2
...mobile devices, broadband routers and modems are assigned an IP address. However, these modems and routers are assigned private addressed instead of public ones. The difference between public and private IP addresses is that, public IPs are designated to a device so that it may be located by a public network like the internet, while private ones are designated so that they can only be seen by other devices that are specifically using that network. Private IP address also server the purpose of helping to establish connections between the devices in that network, like between a computer and router, for example. The private IP address 192.168.1.254 is used by a variety of modem and router brands such as Motorola, 2Wire, SparkLAN, Netopia, and more. If you received your router directly from the IP provider, look on the modem itself, or the information guide provided by your ISP. At&t and CenturyLink are 2 ISPs known to supply routers and modems that use 192.168.1.254....
Words: 470 - Pages: 2
...IT331-CNS Capstone 6/28/12 OSI Model 1. Explain in detail the functions of each layer of the 7-layer OSI model. a. Layer 1 – Physical Layer – To establish and terminate the connection to a media source, it also does the conversions of data from one form to another. b. Layer 2 – Data-Link Layer – Transmits data from one point to another. c. Layer 3 – Network Layer – Transmits data from one host to another on another network. d. Layer 4 – Transport Layer – Controls the end-to-end connections, reliability, flow control of data in a network. e. Layer 5 – Session Layer – Controls connections between computers and manages application sessions in a network. f. Layer 6 – Presentation layer – This layer controls data representation and the encryption and decryption of data in a network. g. Layer 7 – Application Layer – This layer interacts with software applications that implement a communicating component. The application layer decides whether sufficient network or the requested communication exists. 2. Using the OSI model as a reference, describe how you would troubleshoot connectivity problems. h. To troubleshoot connectivity problems using the OSI model you should answer the following questions: i. Is your network cable plugged in? ii. Is there a link light on the Ethernet switch and Ethernet NIC? iii. Do you have an IP address? iv. Can you ping your default gateway? ...
Words: 693 - Pages: 3
...| Current vacancy: IT Administrator Summary: | | | Organisation | : | WildTeam | Basic Salary | : | Current vacancy: IT AdministratorSummary: Organisation : WildTeamBasic Salary : NegotiableOther benefits: : 35% of basic as housing allowance + monthly medical allowance + 2 festival bonuses + employer contributed provident fund + monthly mobile allowanceLocation : Dhaka, BangladeshContract type : Full timeEmployment type : PaidClosing date : 26 October 2015Website : www.wild-team.orgAbout WildTeamWildTeam is a conservation organisation working to save endangered wildlife and their habitats. The team has a current focus on tigers in the Bangladesh Sundarbans. It is a registered non-profit and non-government organisation in Bangladesh. WildTeam is currently implementing a project called “USAID’s Bengal Tiger Conservation Activity”. All of our work is guided by four core values which are as below:We believe in peopleWildTeam believes people are the solution because we see evidence of it every day. Human beings are innovative, adaptable and passionate; every single one of us can be a game changer.We celebrate natureWildTeam have a passion for nature and we share it with others, because we believe the best way to protect nature is to celebrate it. We nurture people’s innate love for nature and channel that love into successful conservation.We are grounded in realityWe rely on thorough research to guide our strategy and all our interventions. We listen to people...
Words: 1366 - Pages: 6
...1 | IT 105 – Computer Hardware Servicing 1/Network Design & Mngt. Laboratory Exercises Republic of the Philippines MINDORO STATE COLLEGE OF AGRICULTURE AND TECHNOLOGY Main Campus Alcate, Victoria, Oriental Mindoro Name: ______________________________ Course & Year: _____________ Laboratory Exercises No. 1 Identifying Parts/Components of Personal Computers Objectives: o o o o o o Identify the components of a PC Identify the desktop components Explain the PC Start up processes Familiarize with the computer Identify the elements of the computer system Identify the first tasks to be performed while troubleshooting PCs Date: _____________ Score:____________ General Directions Read and understand each statement carefully. Write the questions and your answers on your activity sheet. Avoid unnecessary erasures. Use black or blue pen only. Answer the following: 1. What is computer? Give its characteristics, capabilities, and limitations? _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ ...
Words: 12098 - Pages: 49
...Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Describe how digital devices store data. * Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): * Respond to the multiple-choice questions. * Complete the List the Words inside Acronyms table. Required Resources * Odom textbook * Computer with word processing software * Internet access * Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they are applied to various types of enterprises. * Draw the four major physical network topologies: bus, star, ring, and mesh. Assignment Requirements Using the Topology Worksheet provided by the instructor, complete the topology name, logical characteristics, and physical characteristics for...
Words: 16043 - Pages: 65
...Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Describe how digital devices store data. * Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): * Respond to the multiple-choice questions. * Complete the List the Words inside Acronyms table. Required Resources * Odom textbook * Computer with word processing software * Internet access * Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they are applied to various types of enterprises. * Draw the four major physical network topologies: bus, star, ring, and mesh. Assignment Requirements Using the Topology Worksheet provided by the instructor, complete the topology name, logical characteristics, and physical characteristics for...
Words: 16043 - Pages: 65
...analysis and design? Implement new software and hardware. Assessing whether a system is appropriate for the need or not. Programming needs. Anaylse how servers are used for a medium enterprise such as Vitachem Industries. Fix servers for workstations. Data connection is also regularly updated, they either use globe or pldt internet. Also I upgrade the software and hardware, especially when they need new features. Usually, CPUS only run 5 years to avoid disturbances and breakdown of CPUS and servers. So in Vitachem, what sort of software and servers do you use? They have 3 servers: email server, file server, firewall server. Different servers use different systems to operate. Email and firewall servers use Linux OS. They address the need of which OS by need. For example, Windows can’t read a Linux file, but Linux can read a Windows file. Do you also keep databases? What do you record? Do you follow the steps in the systems development life cycle? Mainly maintenance. You have to keep everything running 1 Run Diagnostics 2 Inform users to shut down so you can run a diagnostic test. (usually for antivirus) What challenges and problems do you face? What were the solutions? What are your achievements? What makes up a good systems analyst in your opinion? Achievements: 1. Able to solve, troubleshoot, diagnose a problem of 2 servers in 1 day 2. Entore server of SM San Pablo went down. There was no wifi. They...
Words: 411 - Pages: 2
...different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes Identify the major needs and major stakeholders for computer networks and network applications. Describe how digital devices store data. Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): Respond to the multiple-choice questions. Complete the List the Words inside Acronyms table. Required Resources Odom textbook Computer with word processing software Internet access Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they are applied to various types of enterprises. * Draw the four major physical network topologies: bus, star, ring, and mesh. Assignment Requirements Using the Topology Worksheet provided by the instructor, complete the topology name, logical characteristics, and physical characteristics for each topology diagram...
Words: 16182 - Pages: 65
...data to or from a computer. Typical I/O devices are printers, hard disks, keyboards, and mouses. 2. You typed “abcd”, but the local printer prints garbled text. How do you resolve this issue? You have the wrong printer driver. For the printer you are using. Delete the current printer configuration and install the right driver. If you don’t have the disk with the driver go online and download the correct driver. 3. What is the OSI model? (Open Systems Interconnection) is a model that characterizes the internal funcions of a communication system by partitioning it into abstraction layers. It helps provide error-free communications across a network and provide a path needed by applications. The seven layers are 1. Physical, 2. Data link, 3.network, 4.transport, 5.session, 6. Presentation, 7. Application, 4. Use the OSI model to explain how an email message from you gets read by the recipient on his/her computer?They physical layer conveys the bit stream through the network at the electrical and mechanical level. The data-link layer provides synchronization for the physical level and does bit-stuffing for strings of 1’s in excess of 5. 5. A user reports that they cannot download a file from the Internet. Using the OSI model, what are some of the questions a network administrator may ask to troubleshoot this problem? Check your tcp/ip configuration, ping the loopback address, clear the address resolution protocol (ARP) cache. 6. Describe popular broadband solutions available...
Words: 951 - Pages: 4
...exact LSA type you can see in different areas E. How OSPF establishes neighboor relation, what the stages are F. If OSPF router is stucked in each stage what the problem is and how to troubleshoot it G. OSPF hierarchy in the single or multi areas. Cool OSPF behavior in broadcast and non broadcast H. Draw the diagram of typical OSPF network and explain generally how it works, DR, BDR, election, ASBR, ABR, route redistribution and summarization STP A. How it works and the purpose B. Diff types (SSTP, MSTP, RSTP) Cisco - PVST/PVST+ C. root election D. Diff. port stages and timing for convergence E. Draw the typical diagram and explain how diff types of STP work F. What ports are blocking or forwarding G. How it works if there are topology changes ACLs A. What are they B. Diff types C. Write an example if you want to allow and to deny… D. Well-known port numbers (DNS - 53 and etc…) QOS A. What is that B. What is the diff b/w L2 and L3 QoS C. How it works Network: A. Draw the typical network diagram you have to deal with B. explain how it works C. What part of it you are responsible D. firewall, what is that, how it works, how it is diff from ACLs E. What problems with the network you had had and how you solved it. F. What are the ways to troubleshoot the network, techniques, commands G. network security, ways to achieve it Switching A. VLANs B. STP C. How a L2 switch works with broadcast, unicast, multicast...
Words: 2138 - Pages: 9
...Section 1ElementK Tutorial, How to use vLabs Lab - 10 Points | 10 | After reading the reading the ElementK iLab Tutorial, answer the related questions. | Section 2Using Windows Applications as Network Tools - 15 Points * Task 1, Step 3 * Related explanation or response * Task 1, Step 7 * Related explanation or response * Task 1, Step 19 * Related explanation or response * Task 1, Step 22 * Related explanation or response * Summary Paragraph | .625.625.625.625.625.625.625.62510 | Required ScreenshotAnswer the question or provide the required observation when requested.In your own words, summarize what you have learned concerning network commands available within the Windows operating system. | Section 3Troubleshooting TCP/IP Problems Lab - 15 Points * Task 1, Step 1 * Related explanation or response * Task 2, Step 2 * Related explanation or response * Task 2, Step 3 * Related explanation or response * Task 3, Step 1 * Related explanation or response * Summary Paragraph | .625.625.625.625.625.625.625.62510 | Required ScreenshotAnswer the question or provide the required observation when requested.In your own words, summarize what you have learned about the Network Monitor. | Total | 40 | | ------------------------------------------------- Name: Date: Professor: ------------------------------------------------- ElementK Tutorial, How to use vLabs Lab (10 points) ...
Words: 1280 - Pages: 6
...– The TCP/IP Model The OSI model isn’t the only model in town. In this video, you’ll learn about the TCP/IP model and how real-world applications are associated with each layer. CompTIA Network+ N10-005: 1.2 – The OSI Model in the Real World The OSI model is a useful reference, but how does it really work in the real world? In this video, we’ll investigate how the OSI model maps into an encrypted email conversation with Google Mail. CompTIA Network+ N10-005: 1.3a – Binary Math Calculating in binary is an important skill for any network professional. In this video, you’ll learn the fundamentals for converting between decimal and binary numbers. CompTIA Network+ N10-005: 1.3b – IP Classes The history of TCP/IP includes numerous changes in network technologies and subnetting. In this video, you’ll learn how the IP class-based numbering system was used in the past and how it’s used today. CompTIA Network+ N10-005: 1.3c – Classless Inter-Domain Routing CIDR-block addressing has added new flexibility to IP subnetting. In this video, you’ll learn about classless inter-domain routing and the notation used to designate a CIDR-block address. CompTIA Network+ N10-005: 1.3d – IPv4 and IPv6 Both IPv4 addressing and IPv6 addressing have their own unique characteristics. In this video, you’ll learn how IPv4 and IPv6 addressing works, and you’ll learn how to use shortcuts to abbreviate IPv6 addresses. CompTIA Network+ N10-005: 1.3e – MAC Address Formats The Media Access...
Words: 4714 - Pages: 19
...VSAT – Size of dish, manufacturers? Very Small Aperture Terminal is a satellite communications system that serves home and business users. A VSAT end user needs a box that interfaces between the user's computer and an outside antenna with a transceiver. The tranceiver receives or sends a signal to a satellite transponder Cabling – Crossover, RJ 45, CAT 5/6? Do you know color codes? Wo o wg b wb g wb b Routing/Switching – Explain command levels operator, guest, administrator How to set speed and duplex? Login to router select port set speed • The 10/100/1000 ports operate in either half- or full-duplex mode when they are set to 10 or 100 Mbps, but when set to 1000 Mbps, they only operate in full-duplex mode. Desktop – Type of troubleshooting? Steps to fix internet connectivity? Make sure cat5 is plugged in and everything is powered. Test cat5 cable -Networking – IP Subnetting, C subnet, 29 bit mask, first/last unusable address in a subnet A subnet mask separates the IP address into the network and host addresses 192.168.0.1 - 192.168.0.6 6 hosts Backup/Ghost – Reimaged computers/laptops? Boot from floppyor cd to get connected to multicast server select image and let it copy to destination partion -Example of good customer service. -Example of dealing with difficult customer….difficult co-worker Working with the military can be difficult at times but once I was able to start learning their lingo and working with them more I found to love it. I...
Words: 776 - Pages: 4
...and replace the motherboard, if necessary. Step 5. Power on computer after installation of updated BIOS, or the Expansion Card, or the replaced motherboard. Step 6. Ensure to document all processes with outcomes before during and after installation of each program. Phoenix BIOS is manufactured by Phoenix Technologies.The beep codes from a Phoenix-based BIOS may be exactly the same as the true Phoenix beep codes and they may vary. A 1-3-1-3 beep code pattern means that the 8742 keyboard controller test has failed. This usually means that there is a problem with the currently connected keyboard but it could also indicate a motherboard issue. Step 1. 1-3-1-3 beep pattern, it means that ther is a problem with the keyboard or motherboard issue. Step 2. 8742 keyboard controller. Issue with keyboard or a motherboard issue. Step 3. Determine Power on or restart computer and listen to beeps. Step 4. Replace keyboard/controller. Troubleshoot motherboard. Step 5. Start the computer listen for beeps if any. Verify computer is working properly. Step 6. Ensure to document all processes with outcomes before during and after installation of each program. Task 2. A user boots...
Words: 521 - Pages: 3