...Task 1: Identify the Ports Procedure 1. Look at the front and back of a desktop or notebook computer for the following bus connectors: RS232, USB, FireWire, and infrared. How many of each type of connector did you find? 12 2. Label the appropriate names to the ports and adaptors given below. PS/2 keyboard port PS/2 keyboard port Parallel port Parallel port Ethernet Ethernet USB ports USB ports Serial port Serial port USB mini jack USB mini jack Audio ports Audio ports USB ports USB ports Task 2: Identify Memory Slots Procedure 1. Using the Internet, locate a diagram or photo of these types of memory slots on a desktop or notebook computer: Memory Stick (MS), Micro Drive (MD), Compact Flash (CF), and Secure Digital (SD). 2. Explain the diagram or photo(s) with the name of each type of memory slot. USB 1 USB 1 Memory card slot Memory card slot Examples: USB 3.0 ports USB 3.0 ports Audio port microphone and earphone jacks Audio port microphone and earphone jacks IEEE 1394 port IEEE 1394 port E sata port E sata port Sd mini slot Sd mini slot Micro sd slot Micro sd slot USB 2.0 PORT USB 2.0 PORT Compact flash Compact flash Dual slot Dual slot Task 3: Identify the Configuration Procedure 1. Identify the following configuration. 2. Define a SCSI and the need to use a SCSI Controller. ------------------------------------------------- SCSI is a set of parallel interface standard used to attach...
Words: 403 - Pages: 2
...Elizabeth Romero Computer and Logic Week 2 Lab Task 1: Identify the Ports Procedure 1. Look at the front and back of a desktop or notebook computer for the following bus connectors: RS232, USB, FireWire, and infrared. How many of each type of connector did you find? I found all four of them. 2. Label the appropriate names to the ports and adaptors given below. Ps/ 2 port USB ports Serial port VGA port Speakers Line in Microphone Ethernet port Pt 1 printer port Game port Task 2: Identify Memory Slots Procedure 1. Using the Internet, locate a diagram or photo of these types of memory slots on a desktop or notebook computer: Memory Stick (MS), Micro Drive (MD), Compact Flash (CF), and Secure Digital (SD). Memory Stick Slot Micro Drive Slot Compact Flash Slot Secure Digital Slot 1. Explain the diagram or photo(s) with the name of each type of memory slot. Memory Stick – is a removable flash memory card format. Electronic flash memory data storage device. Micro Drive- is an extremely small hard disk that can fit in a compact card memory slot. Compact flash- is a flash memory mass storage device used mainly in portable electronic devices. Secure digital- is a non-volatile memory card used extensively in portable devices. Task 3: Identify the Configuration Procedure 1. Identify the following configuration. When a SCSI host adapter card with internal and external connection is used, the SCSI daisy chain can extend through the card. The...
Words: 392 - Pages: 2
...Task 1: Identify the Ports Procedure 1. Look at the front and back of a desktop or notebook computer for the following bus connectors: RS232, USB, FireWire, and infrared. How many of each type of connector did you find? Desktop: RS232= 02 USB= 04 FireWire= 02 Infrared=00 2. Label the appropriate names to the ports and adaptors given below. Audio Ports 15-Pin VGA Female Port USB Port Type 1.0 PS/2 Keyboard/Mouse Port Parallel Port RJ-45 Ethernet LAN Port HDMI Port USB Port Type 1.0 Task 2: Identify Memory Slots Procedure 1. Using the Internet, locate a diagram or photo of these types of memory slots on a desktop or notebook computer: Memory Stick (MS), Micro Drive (MD), Compact Flash (CF), and Secure Digital (SD). [http://images10.newegg.com/NeweggImage/productimage/A24P_1302690737661335787nIu3iEbNe.jpg] 2. Explain the diagram or photo(s) with the name of each type of memory slot. Task 3: Identify the Configuration Procedure 1. Identify the following configuration. Identified as Multiple Device Support with SCSI Host Adapters - this configuration is also known as Daisy Chaining. It allows multiple devices to work on a single SCSI Host Adapter. 2. Define a SCSI and the need to use a SCSI Controller. ------------------------------------------------- Small Computer System Interface that works as an intermediary bus host adapter to accommodate connections with hard disks (mass storage) and other peripheral devices. The...
Words: 378 - Pages: 2
...This assessment is about the identification of I/O ports and devices linked to a computer. It is easy to accidentally unplug an I/O device. If you do, knowledge of the ports and the devices that connect to them will help you correctly reconnect the device. Required Setup and Tools In this laboratory, you need to: * Look at the outside of a desktop or notebook computer. * Access to the Internet for research. Recommended Procedures Task 1: Identify the Ports Procedure 1. Look at the front and back of a desktop or notebook computer for the following bus connectors: RS232, USB, FireWire, and infrared. How many of each type of connector did you find? I found on my desktop a total of five USB ports, 2. Label the appropriate names to the ports and adaptors given below. PS/2 mouse/keyboard port PS/2 mouse/keyboard port Parallel port Parallel port Ethernet port Ethernet port USB Mini-B socket USB Mini-B socket Serial port Serial port USB Micro-B socket USB Micro-B socket 1/8inch mini jack audio port 1/8inch mini jack audio port USB ports USB ports A memory stick is a removable flash drive. It can store images from digital cameras, camcorders, or other kinds of electronics. It was introduced in 1998 by Sony, which can describe it in the whole memory stick family. There are many types Memory stick Pro, Memory stick Duo, Memory stick Duo Pro, Memory stick Micro, and Memory Stick Pro-HG. The memory stick pro allows maximum...
Words: 711 - Pages: 3
...3 SYSTEM UNIT Curriculum Development Centre Ministry of Education Malaysia 1 ICTL For Secondary School - Computer Hardware Module 1. Name of Module : System Unit 2. Learning Outcomes: The students should be able to: • • • identify the components of a system unit state the functions of the main components of a system unit state the functions of cpu, ram, rom and expansions slots found on the motherboard 3. Knowledge and Skills: • main components in the computer system 4. Module Summary: • • • At the end of the module, a student is able to : identify main components of system unit and motherboard state the functions of main components of system unit state the functions of CPU, RAM, ROM and expansion slot This module contains 2 activities: Activity 1 : Identify the components of a system unit Activity 2 : Identify the components of a motherboard As you are doing this module, use the computer in the lab to identify the components in the system unit. 2 ICTL For Secondary School - Computer Hardware Module Notes: What is system unit? Box-like case that contains computer’s electronic components Sometimes called the chassis Figure 1 Examples of System Unit 3 ICTL For Secondary School - Computer Hardware Module Activity 1 : Identify the components of a system unit Inside view of system unit Figure 2 Inside view of System Unit 4 ICTL For Secondary School - Computer Hardware Module Front layer of a system unit DVD-ROM drive CD-ROM/CD-RW drive Zip drive Empty...
Words: 1581 - Pages: 7
...GENERAL OBJECTIVES At the end of this course, students should be able to : 1. Identify key elements of the global environment. 2. Discuss how environmental elements interact locally and globally in predictable and unpredictable ways. 3. Describe the impact of human activities on the global environment. 4. Discuss issues relating to sustainable development. 5. Identify international and Caribbean regional environmental challenges 6. Identify biotic and abiotic components of ecosystems and some of their possible interactions. 7. Describe physical, chemical and biological characteristics of the oceans. 8. Identify the principal marine pollutants and the threat they represent. 9. Assess the impact on the marine environment of oil pollution from the oil industry and the shipping industry. 10. Identify requirements to maintain healthy ports and harbours, and current programs to rehabilitate Caribbean ports. 11. Identify organizations and regulatory structures concerned with oceans management and costal zone management in general and within the Caribbean region, including the UNEP regional seas programme. 12. Discuss national and international marine law; the use of civil and criminal law in regulating the environment and the conflict between private property rights and environmental regulation. 13. Identify the main features of UNCLOS, MARPOL, and the London Dumping, Civil Liability, ...
Words: 727 - Pages: 3
...manageable pieces, packaging and addressing them so they will arrive at their proper destination and then reassembling the pieces into the original signal or stream. This paper will observe the part the Transport layer plays in application data encapsulating for use by the Network layer; how it allows simultaneous communication of multiple applications on a single host device while ensuring reliable data delivery to the right application correcting errors if required. The Transport layer is layer 4 in the Open Systems Interconnection (OSI) Model and layer 2 in the Transmission Control Protocol/Internet Protocol (TCP/IP) Model. The Transport layer is needed to track individual conversations, segment, manage and reassemble data packets, identify sending and receiving applications, perform flow control between end users, enable error recovery and initiate and terminate sessions. Any one host may have several applications that are using the network to communicate at one time. The Transport layer’s responsibility is to keep track of and maintain the communication streams that are taking place with each of these applications. Each application creates a stream of data that it uses to communicate with another application using the network. Most of these streams...
Words: 1829 - Pages: 8
...Nalapatla 3884252 What is a Port Number A port number is a way to identify a specific process to which an internet or other network message is to be forwarded when it arrives at a server. For the transmission control protocol and the user Datagram protocol, a port number is a 16 bit integer that is put the header appended to a message unit. This port number is passed logically between the client and the server transport layers and physically between the transport layer and the Internet Protocol layer and it will forward it on to the other layers. For an example, a request from a client to a server on the internet may request a file to transfer from the host File Transport Protocol (FTP) server. In order to pass that request which is passed by us to the FTP in the remote server, the Transmission Control Protocol (TCP) identifies the port number which is of 16 bit length, then that port will forward the request to the FTP Server. FTP and the FTP Port Number The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files from one host to the other host over a TCP – based network, for an example Internet. FTP is a Client – server architecture and uses a separate control and the data connections between the client and the server. The model of the FTP is shown below. Fig 1: File Transport Protocol Model Executing an FTP port connection through a client is two – stage process requiring the use of two different ports. Once the user enter the...
Words: 1400 - Pages: 6
...CCNA 1 Chapter 4 V4.0 Answers Posted in CCNA 1 - Network Fundamentals (V4.0) - 5 March 2010 - 1 comment - 188,626 views 1 Refer to the exhibit. What two pieces of information can be determined from the output that is shown? (Choose two.) The local host is using three client sessions. The local host is using web sessions to a remote server. The local host is listening for TCP connections using public addresses. The local host is using well-known port numbers to identify the source ports. The local host is performing the three-way handshake with 192.168.1.101:1037. 2. After a web browser makes a request to a web server that is listening to the standard port, what will be the source port number in the TCP header of the response from the server? 13 53 80 1024 1728 3. Which information is found in both the TCP and UDP header information? sequencing flow control acknowledgments source and destination 4. Which is an important characteristic of UDP? acknowledgement of data delivery minimal delays in data delivery high reliability of data delivery same order data delivery 5. Refer to the exhibit. Host A is using FTP to download a large file from Server 1. During the download process, Server 1 does not receive an acknowledgment from Host A for several bytes of transferred data. What action will Server 1 take as a result? create a Layer 1 jam signal reach a timeout and resend the data...
Words: 973 - Pages: 4
...1. [pic] ccna 1 chapter 4 answers 100% 2011 Refer to the exhibit. What two pieces of information can be determined from the output that is shown? (Choose two.) The local host is using three client sessions. The local host is using web sessions to a remote server. The local host is listening for TCP connections using public addresses. The local host is using well-known port numbers to identify the source ports. The local host is performing the three-way handshake with 192.168.1.101:1037. 2. After a web browser makes a request to a web server that is listening to the standard port, what will be the source port number in the TCP header of the response from the server? 13 53 80 1024 1728 3. Which information is found in both the TCP and UDP header information? sequencing flow control acknowledgments source and destination 4. Which is an important characteristic of UDP? acknowledgement of data delivery minimal delays in data delivery high reliability of data delivery same order data delivery 5. [pic] ccna 1 chapter 4 answers 100% 2011 Refer to the exhibit. Host A is using FTP to download a large file from Server 1. During the download process, Server 1 does not receive an acknowledgment from Host A for several bytes of transferred data. What action will Server 1 take as a result? create a Layer 1 jam signal reach a timeout and resend the data that needs to be acknowledged send a RESET bit to the host change the window size in the Layer 4 header 6. ...
Words: 1109 - Pages: 5
... Virtual Circuit The OSI Model As you study this section, answer the following questions: What is the OSI model and why is it important in understanding networking? How does the third OSI model layer relate to administering routers? Which OSI model layer is concerned with MAC addresses? What protocols correspond to the Presentation and Session layers? What is the difference between the TCP and UDP protocols? What is the EIA/TIA 232 protocol concerned with? This section covers the following exam objectives: 103. Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network 105. Describe the purpose and basic operation of the protocols in the OSI and TCP models 110. Identify and correct common network problems at layers 1, 2, 3 and 7 using a layered model approach OSI Model Facts The OSI model classifies and organizes the tasks that hosts perform to prepare data for transport across the network. You should be familiar with the OSI model because it is the most widely used method for understanding and talking about network communications. However, remember that it is only a theoretical model that defines standards for programmers and network...
Words: 73801 - Pages: 296
...to the network are called: A. supercomputers. B. mainframe computers. C. servers. D. embedded computers. Answer: C Reference: Objective 2: Identify the Different Types of Computers Difficulty: Moderate The computer and any equipment that connects to it are called the: E. hardware. F. software. G. motherboard. H. control unit Answer: A Reference: Objective 3: Describe Hardware Devices and Their Uses Difficulty: Easy The nonvolatile, permanent memory that remains in the computer even when it is turned off is called: I. CPU. J. ALU. K. RAM. L. ROM. Answer: D Reference: Objective 3: Describe Hardware Devices and Their Uses Difficulty: Easy Input, process, output, and storage are the four basic computer functions known as the: M. central processing system. N. information processing cycle. O. memory processing. P. logical data processing. Answer: B Reference: Objective 1: Define Computer and Identify the Four Basic Computing Functions Difficulty: Moderate A(n) ____________ computer is one that is capable of running more than one operating system. Q. open-source R. wide area network S. local area network T. dual-boot Answer: D Reference: Objective 4: Identify Types of Software and Their Uses Difficulty: Challenging Connecting one computer to another creates a(n): U. network. V. control unit. W. sector. ...
Words: 769 - Pages: 4
...Unit 3 Assignment 1 Choosing Port Scanning Software NT2670, James Fairchild 1. What is Port Scanning? Is a software application designed to probe a server or host for open ports. This is often used by administrators to verify security policies of their networks and by attackers to identify running services on a host with the view to compromise it. 2. What is the goal of Port Scanning? The results of a scan on a port is usually generalized into one of three categories, Open or accepted: The host sent a reply indicating that a service is listening on the port. Closed or denied or not listening: the host sent a reply indicating that connections will be denied to a port. Filtered, dropped or blocked no reply from the host. Open ports present two vulnerabilities of which administrators must be wary, Security and stability concerns associated with the programs responsible for delivering the service- open ports. Security and stability concerns associated with the operating system that is running on the host. Open or closed ports. 3. Would you prefer an open source or proprietary port scanning software? Depending on who you ask? Many people in business prefer to use proprietary software instead of open source software, due to the misconception that proprietary software is better supported than open source. After several years of supporting both open source and proprietary software it becomes clearly evident that just because you pay for proprietary software does not mean...
Words: 454 - Pages: 2
...PCs using MS Word Table, MS Access, and MS PowerPoint Case Study – Using MS Office 2010 / 2013 / 365 Please use the document “READ FIRST - Case Study Instructions – Director’s Requirements” for each of the parts described below. Part 1: Specifications Table (MS Word) Use the project description HERE to complete this activity. For a review of the complete rubric used in grading this exercise, click on the Assignments tab, then on the title Case Study Part 1 - PC Specs (Word)– click on Show Rubrics if the rubric is not already displayed. For the case study provided to you, create MS Word tables that identify and contain the hardware and software requirements to meet the director's requirements. The MS Word document in its final form will include 6 MS Word tables. It will include a two-paragraph narrative summary that classifies the user type and identifies the PC category that will be recommended. The specific instructions are found in the table at the end of this file. Students are expected to conduct external research to adequately address all aspects of the assignment requirements. It is suggested that students use a computer manufacturer's site (i.e., Apple, Dell, Toshiba) to help in identifying all the components needed to meet the director's requirements. Remember, although there are 5 computers to be purchased, you are required to configure only one, as the same one may be purchased for all 5 employees. Any outside sources should be correctly cited in...
Words: 2182 - Pages: 9
...MARA 416 PORT PROJECT 1 Prepare (1) a written report including a list of references (3-4 pages, not including the title page) and (2) a Power Point presentation (between 4 and 6 minutes) on your assigned port. Be prepared to make your presentation orally to the class if you are invited to do so. Include the following information: 1. Background information about the port: Location, geographical type, functional type, primary cargo(s) handled, description of sea approaches and inland transport connections, description of board or form of governance. 2. Identify the Port Authority (organization in charge.) Identify the port’s mission, vision, or strategic goals (this may take some digging but can usually be found.) 3. SWOT Analysis (Strengths, Weaknesses, Opportunities, and Threats) in relation to the port’s mission or strategic goals. a. What are the internal Strengths of the port? b. What are the internal Weaknesses of the port? c. What Opportunities exist for the port in the marketplace? d. What Threats does the port face in terms of competition? Format and Standards Written work will conform to APA format, with inline citations. Times New Roman 12-point font, double-spaced No additional spaces between paragraphs. Paragraphs will be indented (first line) Margins: Top/Bottom 1.0” Left/Right 1.25” Student name and page number in upper right-hand corner (e.g. Donelan 1) Carefully stapled in the upper left-hand corner. Writing Center session...
Words: 480 - Pages: 2