Free Essay

Lab Assignment 3

In:

Submitted By leroydavis12
Words 286
Pages 2
Week 3 - Lab 3: Exploring Busses (computer and paper) Requirements
1. Label each type of port in the picture below: P/S 2 Ethernet Parallel Port HDMI Port IEEE
Mouse Port Port 1394a Port P/S 2 Keyboard USB Ports Serial Port VGA Port Speakers Line In Microphone
Port

2. Locate and print a picture of a:
a. Secure Digital (SD) card or card reader
b. Compact Flash (CF) card or card reader
c. Micro Drive or reader
d. Memory Stick or reader
3. Be sure to label each picture, and a flash drive is not the same as any of these devices.

A. Secure Digital (SD) card

B. Compact Flash (CF) card

C. Micro Drive D. Memory Stick

https://www.google.com/search?q=secure+digital+card&biw=1301&bih=641&source=lnms&tbm=isch&sa=X&ei=jXs1VJrDKsWeyATV6oLwAQ&sqi=2&ved=0CAcQ_AUoAg#facrc=_&imgdii=_&imgrc=PdVae9LUkmkmEM%253A%3Bf2GFIdsvyv7qkM%3Bhttp%253A%252F%252Fwww.advancetec.co.uk%252Fmedia%252Fcatalog%252Fproduct%252Fcache%252F1%252Fimage%252F1250x1250%252Fb65b7106e6199ae52d7f08f5a5033ae0%252Ft%252Fr%252Ftranscend_64gb_secure_digital_xc_card_with_exfat_file_system_class_10_-_ts64gsdxc10.jpg%3Bhttp%253A%252F%252Fwww.advancetec.co.uk%252F64gb-transcend-secure-digital-xc-card-with-exfat-file-system-class-10-ts64gsdxc10.html%3B1250%3B1250

https://www.google.com/search?q=secure+digital+card&biw=1301&bih=641&source=lnms&tbm=isch&sa=X&ei=jXs1VJrDKsWeyATV6oLwAQ&sqi=2&ved=0CAcQ_AUoAg#tbm=isch&q=Compact+flash+card&imgdii=_

https://www.google.com/search?q=secure+digital+card&biw=1301&bih=641&source=lnms&tbm=isch&sa=X&ei=jXs1VJrDKsWeyATV6oLwAQ&sqi=2&ved=0CAcQ_AUoAg#tbm=isch&q=Micro+drive&imgdii=_

https://www.google.com/search?q=secure+digital+card&biw=1301&bih=641&source=lnms&tbm=isch&sa=X&ei=jXs1VJrDKsWeyATV6oLwAQ&sqi=2&ved=0CAcQ_AUoAg#tbm=isch&q=memory+stick&imgdii=_

Similar Documents

Premium Essay

Week 3 Lab Assignment

...PEACHTREE COMPLETE ACCOUNTING 2010 ®: The Winery At Chateau Americana LEARNING OBJECTIVES After completing and discussing this assignment, you should be able to: • Recognize the managerial and technological issues associated with the implementation of a general ledger package • Complete sample transactions • Understand the implications of the design of the user interface • Recognize and evaluate the strengths and weaknesses of controls embedded in a general ledger package • Compare and contrast a general ledger package with a manual accounting information system BACKGROUND As the winery has grown, Rob Breeden, the chief financial officer, has realized that management does not have timely information about the financial condition of the company. This has resulted in several instances in which the decisions made were not optimal. Therefore, he has determined that it is time to convert the current system to a general ledger package. After investigating the possibilities, he has decided to utilize Peachtree Complete Accounting 2010®. Chateau Americana has hired you to convert the system. REQUIREMENTS Using the Peachtree Complete Accounting 2010® software program contained in your CAST package or in your school computer lab, you are to convert Chateau Americana from a manual system to a general ledger software package. If you are working on this assignment on your home computer, load the software following the instructions contained on the CD envelope. As with any other computer...

Words: 3080 - Pages: 13

Premium Essay

Nt2580 Unit 3 Assignment & Lab

...NT2580 Unit 3 Assignment & Lab Unit 3. Assignment 1 - Remote Access Control Policy Definition There are three key parts I will have to take into account while designing a Remote Access Control Policy for Richman Investments. These three parts (Identification, Authentication and Authorization) will not be all for the Remote Access Control Policy, I will need to include the appropriate access controls for systems, applications and data access. I will also need to include my justification for using the selected access controls for systems, applications and data access. The first part I need to implement for this Remote Access Control Policy is Identification, which is defined in this sense as: physical keys or cards, smart cards, and other physical devices that might be used to gain access to something. What needs to be done for the Remote Access Control Policy is a group member policy needs to be setup which uniquely identifies each user. Users should be identified by rank with higher ranking users requiring more authentication. Each individual user should be assigned to a group based on rank with special permissions. Using this system for Identification will make our company more secure in day to day operations. The second part I need to implement for this remote access control policy is Authentication, which is defined as: what you know or passwords, numeric keys, PIN numbers, secret questions and answers. For remote access, there must be...

Words: 477 - Pages: 2

Premium Essay

Bsop 330 Week 3 Lab Assignments Chapter 13 Problems 13.3, 13.5, 13.9, 13.21

...BSOP 330 Week 3 Lab Assignments Chapter 13 problems 13.3, 13.5, 13.9, 13.21 To Buy This material Click below link http://www.uoptutors.com/bsop-330-devry/bsop-330-week-3-lab-assignments-chapter-13-problems-13.3-13.5-13.9-13.21 Chapter 13 problems 13.3: The president of Hill Enterprises, Terri Hill, projects the firm’s aggregate demand requirements over the next 8 months as follows: Her operations manager is considering a new plan, which begins in January with 200 units on hand. Stockout cost of lost sales is $100 per unit. Inventory holding cost is $20 per unit per month. Ignore any idle-time costs. The plan is called plan A. Plan A: Vary the workforce level to execute a “chase” strategy by producing the quantity demanded in the prior month. The December demand and rate of production are both 1,600 units per month. The cost of hiring additional workers is $5,000 per 100 units. The cost of laying off workers is $7,500 per 100 units. Evaluate this plan. Chapter 13 problems 13.5: Hill is now considering plan C. Beginning inventory, stockout costs, and holding costs are provided in Problem 13.3: a)    Plan C: Keep a stable workforce by maintaining a constant production rate equal to the average requirements and allow varying inventory levels. b)    Plot the demand with a graph that also shows average requirements. Conduct your analysis for January through August.   Chapter 13 problems 13.9: Mary Rhodes, operations manager at Kansas Furniture, has received the following...

Words: 681 - Pages: 3

Free Essay

Cis 175 Complete Course Cis175 Complete Course

...com/q/cis-175-complete-course-cis175-complete-course/12262 Discussions CIS 175 Week 1 Discussion "Topologies"  Please respond to the following: Per the text, network topologies are defined both physically and logically. Suppose you had to implement either a full-mesh topology or start topology network on a university campus that has ten (10) buildings. Determine the topology that would you select. Provide two (2) reasons for your choice.    Imagine that you work for a small company with one hundred (100) computers that are not on a network. Your boss comes to you for advice on whether he should implement either a peer-to-peer or client / server network. Recommend one (1) solution for your boss. Justify your recommendation with at least three (3) advantages that your choice would afford over the network that you did not choose. Click below link for Answer http://workbank247.com/q/cis-175-complete-course-cis175-complete-course/12262 CIS 175 Week 2 Discussion "Working with the OSI Model"  Please respond to the following: Industry professionals use mnemonics in order to remember the layers of the OSI model. The most popular mnemonic is "Please Do Not Throw Sausage Pizza Away," with each capital letter representing the word of the OSI, i.e., Please (Physical), Do (Data Link) and so on. Create your own unique sentence that would help you to remember the OSI model. Provide a rationale for your response.  Consider the seven (7) layers on the OSI model. Determine the layer that you would...

Words: 6200 - Pages: 25

Free Essay

Network

...cover the course objectives for this unit. Assignment 1.1: Textbook/Workbook Assignments • Complete the following exercises and questions from Routers and Routing Basics: CCNA 3 Labs and Study Guide: Vocabulary Exercise: Matching on page 3 VLSM Subnetting a Subnet Exercises on pages 9-11 VLSM Addressing Design Scenarios 1-6 on pages 15-20 Summary Route Exercises on pages 21-24 Concept Questions on pages 25-27 VLSM Case Study on page 27 Internet Research on page 29 (Use the ITT Tech Virtual Library.) • Complete Chapter 9 Review Questions 2-7, 10, 14, 20-22 on pages 258-259 of Introduction to Telecommunications. Submit your written answers to your instructor at the beginning of Unit 2. . Assignment 1.2: Virtual Labs • Complete Virtual Labs 6, 7, and 8 from the CCNA 640-802 CCNA Simulator, which you can find by clicking through these paths: ICND1 Troubleshooting Scenarios Lab 6: IP Addressing and Routing. ICND1 Troubleshooting Scenarios ICND1 Part 4: Troubleshooting Labs Lab 7: IP Routing I ICND 2 Troubleshooting Scenarios Lab 13: IP Routing II Submit your written answers to your instructor at the beginning of Unit 2. ©ITT Educational Services, Inc: Date: 03/13/09 Network Technology and Service Integration Unit 2 Homework The following homework is designed to cover the course objectives for this unit. Assignment 2.1: Textbook/Workbook Assignments • Complete the following exercises and questions from Routers and Routing Basics: CCNA 3 Labs and Study Guide: Vocabulary Exercise: Matching...

Words: 2825 - Pages: 12

Premium Essay

Fin 100 Principles of Finance Complete Course New

...WK 4 Assignment 1 – Complexities of the U.S. Financials FIN 100 WK 8 Assignment 2 – Business Financing and the Capital Structure Fin 100 assignment 1 Fin 100 Assignment 2 FIN 100 HW Assignment 3 FIN 100 HW Assignment 4 FIN 100 HW Assignment 5 FIN 100 HW Assignment 6 FIN 100 HW Assignment 7 FIN 100 HW Assignment 8 FIN 100 Homework Assisgnment Week One FIN 100 Week 3 homework Homework Week 5 Homework Week 7 FIN 100 Week 3 – Lab Assignment 3 – Chapters 5 and 6 FIN 100 Week 5 – Lab Assignment 4 – Chapters 9 and 10 FIN 100 Week 6 – Lab Assignment 5 – Chapters 11 and 12 FIN 100 Week 7 – Lab Assignment 6 – Chapters 13 and 14 Week 8 DQ Week 9 DQs FIN 100 QUIZ 1 FIN 100 QUIZ 2 CHAPTER 1,4,5 FIN 100 QUIZ 3 CHAPTER 6,7,8,10 FIN 100 Quiz 4 FIN 100 Week 3 – Quiz 2 Chapters 3, 4, and 5 FIN 100 Week 5 – Quiz 3 Chapters 7 and 8 FIN 100 WEEK 9 QUIZ 6 FIN 100 Week 10 – Quiz 7 – Chapters 17 and 18 FIN 100 Quiz 5 FIN 100 Quiz 6 FIN 100 Quiz 7 FIN 100 Quiz 8 Activity mode aims to provide quality study notes and tutorials to the students of FIN 100 Principles Of Finance Complete Course New in order to ace their studies. FIN 100 PRINCIPLES OF FINANCE COMPLETE COURSE NEW To purchase this visit following link: http://www.activitymode.com/product/fin-100-principles-of-finance-complete-course-new/ Contact us at: SUPPORT@ACTIVITYMODE.COM FIN 100 PRINCIPLES OF FINANCE COMPLETE COURSE NEW FIN 100 Principles Of Finance Complete Course New FIN 100 WK 4 Assignment 1 –...

Words: 853 - Pages: 4

Free Essay

Cis 206 Ilab 4 Working with Directories

...(http://hwguiders.com/ ) CIS 206 iLab 4 Working With Directories Lab Title: Working with Directories Student Name: Date: Prepare this Lab Report when you have completed and lab assignment. Include any charts, graphs required to complete the lab. Refer to your initial lab plan to respond to the first questions. 1. Define the problem you were solving in this lab. (If any) This weeks lab was to familiarize ourselves with the Linux directory structure by creating, moving, and deleting files and directories using the “vim Editor.” 2. What challenges did you meet in working towards completing the Lab? The instructions were straight forward. I just had to look a few times, since we were asked to skip several instructions to focus on the main parts of the tutorial in our book assignment. [Side Note]: Many students seemed to have problem accessing the Lab for this week. I did not seem to have any troubles loading the Lab Mentor, unless the internal issue was hotfixed. 3. Were you successful in solving the problem? Did you use methods you learned in class? If yes, explain your solution, if no, explain the solution you did use. Please be specific, and provide a detailed description of your solution. I just kept the iLab assignment and book assignment side-by-side as I was reading through the instructions. The main task was multitasking several windows at the same time (i.e., iLab instructions, OS Book, Lab Mentors, Word 2010). TO Download Complete Tutorial With...

Words: 2827 - Pages: 12

Premium Essay

Cis 417 Week 4 Assignment 2 Forensic Lab Design

...CIS 417 WEEK 4 ASSIGNMENT 2 FORENSIC LAB DESIGN To purchase this visit here: http://www.activitymode.com/product/cis-417-week-4-assignment-2-forensic-lab-design/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417 WEEK 4 ASSIGNMENT 2 FORENSIC LAB DESIGN Imagine the university that employs you as an information security professional has recently identified the need to design and build a digital forensic laboratory. You have been tasked with designing the lab for the organization. Write a four to five (4-5) page paper in which you: 1. Explicate the steps you would take to plan a budget for the lab, keeping in mind the general business objective to avoid unneeded costs. 2. Recommend the physical requirements and controls that you would consider implementing in order to keep the lab safe and secure. 3. Identify at least three (3) hardware and software tools that you would include in the design of the lab and explain your reasons behind your choices. 4. Identify the high-level criteria that would be considered when selecting the forensic workstations to be utilized. More Details hidden… Activity mode aims to provide quality study notes and tutorials to the students of CIS 417 Week 4 Assignment 2 Forensic Lab Design in order to ace their studies. CIS 417 WEEK 4 ASSIGNMENT 2 FORENSIC LAB DESIGN To purchase this visit here: http://www.activitymode.com/product/cis-417-week-4-assignment-2-forensic-lab-design/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417 WEEK...

Words: 640 - Pages: 3

Premium Essay

Nt 1210

...ITT Technical Institute NT1210 Introduction to Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110...

Words: 4400 - Pages: 18

Premium Essay

Nt2640

...hours: 4.5 Contact /Instructional hours: 34 Theory, 22 Lab Prerequisite: NT1210 Introduction to Networking or equivalent Course Revision Table Change Date Updated Section Change Description Change Rationale Implementation Quarter 07/18/2011 All New Curriculum New Curriculum September 2011 02/19/2013 All Updated labs across the course to map the 2nd edition of lab manual Immediately 02/27/2013 Midterm and Final Examination Answer Keys Added examination keys Immediately 03/18/2013 Answer Keys for Midterm and Final Updated some answers to address the accuracy March 2013 04/19/2013 Assignment labels on Pages 43, 52, 61, 78, 87, 97, 106 and 132. Added labels to identify additional assignments in affected units Clarification of additional assignments March 2013 Table of Contents COURSE OVERVIEW 5 Catalog Description 5 Goals and Expectations 5 Learning Objectives and Outcomes 6 Career Impact 6 INSTRUCTIONAL RESOURCES 7 Required Resources 7 Additional Resources 7 COURSE MANAGEMENT 9 Technical Requirements 9 Test Administration and Processing 9 Replacement of Learning Assignments 10 Communication and Student Support 10 Academic Integrity 10 GRADING 11 COURSE DELIVERY 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 UNIT PLANS 15 Unit 1: The TCP/IP Model, LANs, WANs, and IP Networks 15 Unit 2: TCP/IP Network, Transport, and Application Layers 24 Unit 3: IP Subnetting and Basic Router Configuration 34 Unit 4: IP...

Words: 22068 - Pages: 89

Premium Essay

Nt1210 Introduction to Networking Onsite Course

...ITT Technical Institute NT1210 Introduction to Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110...

Words: 4400 - Pages: 18

Premium Essay

Unit 1 Labs

...ITT TECHNICAL INSTITUTE NT1210 Introduction to Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes Identify the major needs and major stakeholders for computer networks and network applications. Describe how digital devices store data. Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): Respond to the multiple-choice questions. Complete the List the Words inside Acronyms table. Required Resources Odom textbook Computer with word processing software Internet access Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they are...

Words: 16182 - Pages: 65

Premium Essay

Work in Progress

...Week 3 **When working this and the remaining portion of the course, it is best to do everything and look again and do everything before submission.) Instructions and Grading Criteria for Lab Assignment #1 Assignment instructions for the written report appear with the grading criteria below. The questions that must be addressed in the report and instructions for the lab portion of the assignment are attached to this assignment. Note: there are two parts to this lab, each part contains 4 questions for you to answer. The CSEC630 Lab 1 PDF attached document includes an introduction section to CrypTool. Lab part 1 starts on page 11 and Lab part 2 starts on page 17. Please submit a Word document that contains your answers to all 8 questions to Lab1 Assignment for Week 3. Objective: The objective of the lab session is for the student to explore cryptography in action by using the educational CrypTool. Competencies: Technology fluency, critical thinking Instructions: For this lab assignment, each student completes the lab exercise using the CrypTool software and prepares a report addressing the questions included in the lab assignment instructions attached to this topic. Submit your answers in the Assignment folder. This assignment is due at the end of the session week 3. Note: You are not required to turn this assignment to Turnitin.com. Grading Criteria This assignment is worth 10 percent of your total grade. • Your score for this assignment can range...

Words: 400 - Pages: 2

Free Essay

Hill Cipher

...CioheWednesday, April 13, 2016 University of Botswana ISS 334 LAB 2 ASSIGNMENT Ndlovu.I 200902852 Ndlovu.I ISS 334 Lab 2 Assignment Page 1 of 27 Wednesday, April 13, 2016 Contents 1. Hill Cipher Description .......................................................................................................................... 3 2. Question ................................................................................................................................................ 3 3. Implementation .................................................................................................................................... 3 3.1. Hill Cipher Encryption and Decryption.......................................................................................... 4 3.1.1. Part 1 ..................................................................................................................................... 5 3.1.2. Part 2 ..................................................................................................................................... 7 3.1.3. Part 3 ..................................................................................................................................... 9 3.1.4. Part 4 ................................................................................................................................... 11 3.1.5. Part 5 ........................................

Words: 2648 - Pages: 11

Free Essay

Wdad

...prepared for graduate-level studies, professional programs, or entry-level positions in the workforce. They will have an in-depth knowledge of their area of study and an attitude of service, ethical behavior, and willingness for hard work. They will have a renewed Christian faith, a lifelong desire for spiritual maturity, and a desire for lifelong learning about God’s creation. Physical Science I: The Earth GNSC 2313 Physical Geography GEOG 2313 Spring 2014 Lecture (all sections): M W F 12:30 – 1:20 PM in PEC 229 Lab Sections: 01 T 8:00 – 8:50 AM in NSW 111 02 T 11:30 AM – 12:20 PM in NSW 111 03 T 12:30 PM – 1:20 PM in NSW 111 Instructor: Dr. Amanda Nichols Office: NSW-HSH 202M Phone: x5420 E-Mail: amanda.nichols@oc.edu (best way to contact me) Course Websites: Blackboard (http://bb.oc.edu/) and MasteringGeology (http://www.masteringgeology.com) with Course ID: MGEOLNICHOLSSP14 Office Hours: M: 8-10 AM T: 1:30-3:30 PM W: 8-10 AM, 1:30-2:30 PM TR: 8-9 AM F: 8-10 AM Christian Worldview and Teaching Philosophy: Every scholar works within some sort of belief system. Since I am a Christian, I choose to examine Science through a Christian perspective. It is not my intention to indoctrinate or...

Words: 4366 - Pages: 18