...An operating system is the software that manages the hardware and software resources, it is required for most application programs to function. Operating systems work as an in-between for the programs and computer hardware. It is responsible for allocating computer resources for efficient use of space and power. There are three major operating systems in use today and they are Windows, Linux, and Mac OSX, and each has its own pros and cons depending on what you are using it for. Mac OSX is the operating system used by Apple for their computers. Mac OSX will only work on Macintosh computers with PowerPC or Intel processors, as opposed to Windows and Linux which are compatible with most brands. Mac OSX uses a graphical user interface that is popular with musicians and artist because it has more readily available design/media software. Several high-end graphic, video and audio applications were developed for Mac platforms in the early days of personal computers and the trend has continued even though the applications have been ported for Windows they still run more efficiently on Macs making them preferable for people in the creative arts community. Many people also like OSX for its ease of use and their frequent updates via point releases that make the computer run more efficiently. Linux is a growing number of operating systems meant to run in computers, phones, and several more electronic devises. Linux was created by Linus Torvalds as a free alternative to Windows. The graphical...
Words: 655 - Pages: 3
...NT1110: Module 6 Troubleshooting and Networks Lab 6.1 Troubleshooting Networking Issues A good troubleshooter should be capable of discerning whether the problem is software or hardware related and repair all of these problems. In this lab, you will demonstrate your ability to use the six-step troubleshooting model to fix a networking issue and outline the steps toward a solution. Required Setup and Resources: A computer with access to the Internet Before starting work on Task 1, perform the following steps: 1. Open Internet Explorer. Click the Tools menu and select Internet Options. 2. Click the Connections tab. 3. Click the LAN Settings button. 4. In the Proxy Server section, select Use a proxy server for your LAN. Then, click the Advanced button. 5. In the Proxy Settings window, enter 192.168.100.1 for the HTTP proxy address and port 80 for the port. Note: Remember to reset the proxy settings to their original values when Task 1 is finished. Recommended Procedures Task 1: Network Troubleshooting When you boot your computer and open Internet Explorer, this is what you see: 1 NT1110: Module 6 Troubleshooting and Networks Lab 6.1 Troubleshooting Networking Issues Apply the six-step troubleshooting model to the problem. Document everything associated with each step of the troubleshooting model. 1. Ascertain what the problem is. 2. Write down probable causes of the problem. 3. Determine if theories are correct...
Words: 513 - Pages: 3
...Exploring the Motherboard and Busses Exploring the Motherboard and Busses The motherboard represents the logical foundation of the computer. Everything that makes a computer must be attached to the motherboard. Answer the following questions: 1. What are the major components of the motherboard? Provide a brief description of each component. 1. Processor (CPU): The processor is the brain of the computer and is the chip where all the computing is done. 2. Memory: This is where the computer stores information while it is working on it. 3. Chipset: The chipset is a link between the processor and the outside world, and handles things like controlling the hard drives, the USB ports, the keyboard and mouse, generates the sounds the computer makes, and sometimes even creates the pictures you see on the screen. 4. Expansion Slots: Expansion slots are connectors that allow you to attach additional cards on the computer, such as video cards, sound cards, modems, and add abilities to the computer that the motherboard doesn’t provide. 5. I/O (Inputs/ Outputs): These are a set of connectors that allows you to connect various devices to the computer, such as the keyboard, monitor, mouse, hard drives, flash drives, printers, and connect the computer to a network. 2. Upgrading only the motherboard will give some performance improvement to a computer system. Why? Upgrading the motherboard will definitely give performance improvement to any computer system...
Words: 469 - Pages: 2
...NT1110: Module 5 Computer Operation and Security Lab 5.1 Understanding BIOS, POST, and Security Basics In this lab, you will demonstrate your ability to fix issues related to BIOS/POST and secure the computer from viruses and Trojans. Required Setup and Tools A computer with access to the Internet Recommended Procedures Task 1: Understanding BIOS and POST A user boots his or her computer and hears a sequence of six beeps. The computer uses AMI BIOS. What error is indicated by the six beeps? A different user with a computer using Phoenix BIOS hears a sequence of beeps with pauses in between. The sequence is beep - pause - beep beep beep - pause - beep beep beep beep- pause - beep beep beep. What error is indicated by this beep sequence? Task 2: Basic Security Firewalls may be hardware devices or software programs. Hardware firewalls protect an entire network. Software firewalls protect a single computer. Research the Internet for an example of each of these types of firewalls and compare their features. Linksys and Cisco make firewall/routers for home use. The Zone labs are an example of a software firewall. Submission Requirements: Include a references page citing the resources you used from the textbook, ITT Tech Virtual Library, and credible websites to substantiate your answers. All citations should be in APA format. Refer to ITT Tech Virtual Library> Research Help> Research Guides> Grammar, Writing & Style> APA Formatting and Style Guide for help in APA formatting. Your report...
Words: 296 - Pages: 2
...NT1110: Module 5 Computer Operation and Security Lab 5.1 Understanding BIOS, POST, and Security Basics In this lab, you will demonstrate your ability to fix issues related to BIOS/POST and secure the computer from viruses and Trojans. Required Setup and Tools A computer with access to the Internet Recommended Procedures Task 1: Understanding BIOS and POST A user boots his or her computer and hears a sequence of six beeps. The computer uses AMI BIOS. What error is indicated by the six beeps? A different user with a computer using Phoenix BIOS hears a sequence of beeps with pauses in between. The sequence is beep - pause - beep beep beep - pause - beep beep beep beep- pause - beep beep beep. What error is indicated by this beep sequence? Task 2: Basic Security Firewalls may be hardware devices or software programs. Hardware firewalls protect an entire network. Software firewalls protect a single computer. Research the Internet for an example of each of these types of firewalls and compare their features. Linksys and Cisco make firewall/routers for home use. The Zone labs are an example of a software firewall. Submission Requirements: Include a references page citing the resources you used from the textbook, ITT Tech Virtual Library, and credible websites to substantiate your answers. All citations should be in APA format. Refer to ITT Tech Virtual Library> Research Help> Research Guides> Grammar, Writing & Style> APA Formatting and Style Guide for help in APA...
Words: 296 - Pages: 2