...Mr. Yang | NT1110 Computer Structure and Logic | Unit 3 Assignment 1: I/O Devices | | Jesus Gutierrez I/O Devices I/O devices enable us to control the computer and Information in a variety of ways. * What critical I/O devices are necessary to use a personal computer? Which ones are not necessary for normal day-to- day use and why? Necessary devices used on a personal computer keyboard, for typing or telling the computer what to do. Monitor, for seeing all the information you type in, watching videos ect… Speakers for listening music and watching videos. Now a days we often use USB ports for just about everything, storing information from one device to a desk top up to a laptop. Also charging our electric devices, as well as storing information into USB cards. Not necessary I/O for a personal computer can be printer, scanner, web cam. * Why a modem is considered an I/O device? The reason Is it sends and retrieves data usually at the same time. * Though a printer is an essential I/O device, can you think of why it may be also classified as an input device? If It is a combination of printer/fax/scanner it could be both. When it is printing it’s an output device. When scanning it is an input device. [Type the abstract of the document here. The abstract is typically a short summary of the contents...
Words: 274 - Pages: 2
...NT1110 Computer Structure and Logic STUDENT COPY STUDENT COPY The following sections contain student copies of the assignments that must be distributed to students at least two weeks prior to the due dates for those assignments. Online students will have access to those documents in PDF format available for downloading at any time during the course. © ITT Educational Services, Inc. All Rights Reserved. -87- Change Date: 08/25/2011 NT1110 Computer Structure and Logic STUDENT COPY: Graded Assignments Graded Assignment Requirements Assignment Requirements documents provided below must be printed and distributed to students as the guidance for completing the assignments and submitting them for grading. Instructors must remind students to retain all handouts and assignment documents issued in every U U unit, as well as student-prepared documentation and graded deliverables. Some or all these documents will be used repeatedly across different units. Unit 1 Assignment 1: Integrated Circuit Technology Learning Objectives and Outcomes This assignment addresses the course objective “Describe the components of a personal computer.” The expected learning outcomes that will result from completing the assignment are: You will be able to perform specific Internet searches for information. You will be able to illustrate the growth of the number of transistors available in integrated circuits used in computers. You...
Words: 652 - Pages: 3
...Shondrick Stephens NT1110 Unit 10 Research Project Identity Theft “But he that filches from me my good name/ Robs me of that which not enriches him/ And make me poor indeed.” Shakespeare, Othello, Act 3 Scene 3 For as long as people have created civilizations there has been some sort of identity theft. Identity theft is when someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, usually for economic gain. Your name, birth date, address, Social Security number, your bank account or credit card number, your telephone calling card number, and other valuable identifying data can be used, for identity theft if they were to fall in the wrong hand, for personal profit at your expense. That bad part is that in the past it was not even a crime. In October 30, 1998 through the enactment of the Identity Theft and Assumption Deterrence Act of 1998, 18 USC & 1028 (a) (7). This Act states that identity theft occurs when a person: “knowingly transfers or uses, without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, any unlawful activity that constitutes a violation of Federal law, or that constitutes a felony under any applicable State or local law.” There are several ways a thief can steal your identity. And there are also just as many way to...
Words: 1213 - Pages: 5
...NT1110 Unit 6 Research 1: Network Attached Storage 1. What happens when you combine a hard drive and a network adapter is called NAS (Network System Storage). Network-attached storage (NAS) is a dedicated hard disk storage device that is set up with its own network address and provides file-based data storage services to other devices on the network. 2. NAS devices come in many varieties depending on if you build it yourself or purchase a vendor product. The speed is typically one gigabit Ethernet connection but this can be changed to multiple gigabit, 10 gigabit, fiber optic by adding a pci-e network card(s). Older parts can be used which may be limited to 10/100 megabit. If you need an exact answer for speed, simply look at the wiki on gigabit. The capacity range again varies; people have built 40 TB machines and other just have 2TB. With port replication and add-on hard drive controller cards there is hardly a limit on size. A board with 6 sata ports can be replicated (1 to 5 port) allowing for 30 drives to be attached, if 3TB drives were used in raid 50 that would be 72TB of storage. As far as fault tolerance, raid 50 is fairly stable if set up correctly, raid 10 has been touted as one of the best setups since more drives can fail at one time without data loss. All of those features can be used on typical NAS devices....
Words: 251 - Pages: 2
...NT1110 Computer Structure and Logic Module 2 Short Answer 2.1 I/O Devices Professor Mo Suleiman I/O Devices An I/O device is defined as “any of various devices (including sensors) used to enter information and instructions into a computer for storage or processing and to deliver the processed data to a human operator or, in some cases, a machine controlled by the computer.” (Britannica, 2014) With that information presented, the critical I/O devices needed for the computer are a mouse and keyboard. They are both necessary because they are input devices. The mouse allows the user to tell the computer what program to open, while the keyboard is used for allowing the user to input information in a language the user and computer understands to carry it out. The monitor and printer are output devices. There are a different types of both. The traditional output device of a personal computer has been the CRT (Cathode Ray Tube) monitor. Just like a television set (an older one, anyway) the CRT monitor contains “a large cathode ray tube that uses an electron beam of varying strength”. (Computer Terminology) The monitor displays the video signal produced by a part within the computer. Thus then you have picture. A modem is classified as a Input and output devices because of what it does for the computer. It transmits and receives information, therefore is a input AND output. The printer as well can do this if it’s a fax machine built together with it. The Printer outputs...
Words: 310 - Pages: 2
...!!!Rosa Cano NT1110 SAT 9AM July 15, 2015 Unit 1 Assignment 1: Integrated Circuit Technology Number 1 and 2 question Model of Processor | Year implemented | Transistor Count | Intel 4004 | 1971 | 2,300 | Intel 8008 | 1972 | 2,500 | Intel 8080 | 1974 | 4,500 | Intel 8085 | 1976 | 8,500 | Intel 8086 | 1978 | 29,000 | Intel 8088 | 1979 | 29,000 | Intel 80186 | 1982 | 55,000 | Intel 286 | 1982 | 134,000 | Intel 386 | 1985 | 275,000 | Intel 486 | 1989 | 1,200,000 | Intel Premium | 1993 | 3,100,000 | Intel Premium II | 1997 | 7,500,000 | Intel Premium III | 1999 | 9,500,000 | Intel Premium 4 | 2000 | 42,000,000 | Intel Itanium | 2001 | 25,000,000 | Intel Itanium 2 | 2003 | 220,000,000 | Intel Itanium 2(9MBcache) | 2004 | 592,000,000 | Core 2 duo | 2006 | 291,000,000 | Core i7 | 2008 | 731,000,000 | Quad-core Itanium | 2010 | 2,000,000,000 | Six-Core core i7/8 | 2011 | 2,270,000,000 | 8-Core Itanium | 2012 | 3,100,000,000 | 62-Core Xeon Phi | 2012 | 5,000,000,000 | 3. The Processor model that placed two billion transistors in a single processor chip was the Quad-core Itanium in 2010. 4. Citation: http://www.wagnercg.com/Portals/0/FunStuff/AHistoryofMicroprocessorTransistorCount.pdf 5. The growth of the transistors seems to be fairly reasonable, because since the power of the computations is growing rapidly so this has to also and it will continue to do so as new technology arises. Looking at this chart, it is showing that...
Words: 351 - Pages: 2
...Janna Bedell NT1110 Unit 7 Research paper 3 The first high-volume applications for CMOS circuits emerged in battery-operated consumer products such as digital watches (1974 Milestone) and portable instruments that did not demand the ultimate in speed. By 1978, when Toshiaki Masuhara of Hitachi described a high-speed RAM at ISSCC, the combination of smaller lithography with the silicon-gate process enabled CMOS to compete in performance with bipolar and conventional MOS. As designers took advantage of scaling (1974 Milestone) to pack hundreds of thousands of transistors onto a chip, CMOS provided the best solution to manage the resulting power density issues. (Museum, 2007) The size of the CMOS memory has also pretty much stayed the same because there is no need to increase the size. There was never any need to store more than 512 bytes in the memory as it holds the absolute basic boot settings for the system. The typical size is still 512 bytes currently. All it comes down to is “If it ain’t broke don’t fix it.”, so it’s been that way since almost the very beginning. It does its job which is to just get the computer started and make sure everything is in place and then hands it all over to the computers OS. A small battery on the computer's motherboard provides the CMOS with constant power. Most computers use a 3-volt CR2032 coin cell, which can last for a number of years, depending on factors such as temperature, and the amount of time the computer is without power....
Words: 415 - Pages: 2
...Identifying the Operating System/ Lab Chiquita Pasha NT1110 Computer Structure and Logic Mrs. Shaw 9-22-14 The operating system for my laptop is Windows 7, and a service pack is installed within laptop. The Processor Speed for Windows 7 is 1GH2. The RAM for Windows 7 is 1GB (32 bit), 2GB (64 bit). The Disk Space for Windows 7 is 16GB (32 bit). Five features of the operating system on my PC are: Home Group, Windows Troubleshoot, Back-up and Restore, Device Management, and Getting Started. Home Group is the way two or more PC’s share information. You can email documents to the computer in the next room or in someone else office so you can print them out. Home Group is privacy oriented it protects your password putting you more in control. You decided what you want people to have and what you want to keep private something like Macintosh privacy. Back -Up and Restore creates safety for your personal files just in case something goes wrong. Windows can pick and choose what files they feel the need to be backed up or they let you select your own files to be backed up, whether it is an individual folder, libraries, or drives. You can back up your information to other drives also or a CD Rom a DVD. If you are using the professional side of Windows 7 you will also have the option to back up information to a network. Device Management is broke down into two features which are Device and Stage and the Device and Printer folder. Device stage is like a home page for your...
Words: 529 - Pages: 3
...ITT-TECHNICAL INSTITUTE COMPUTER STRUCTURE AND LOGIC NT1110 Jesse Allen UNIT8. LAB8.2 CONTROL PANEL Gus Perez 19593003 Salem, Oregon. TASK Make a report on the Windows Control Panel with screen shots and your experience with control panel. The Control Panel for Windows7 on a Network Control Panel for a PC Control Panel The Control Panel is a part of the Microsoft Windows graphical user interface which allows users to view and manipulate basic system settings and controls via applets, such as adding hardware, adding and removing software, controlling user accounts, and changing accessibility options. Additional applets can be provided by third party software. The Control Panel has been an inherent part of the Microsoft Windows operating system since Windows 2.0, with many of the current applets being added in later versions. Beginning with Windows 95, the Control Panel is implemented as a special folder, i.e. the folder does not physically exist, but only contains shortcuts to various applets such as Add or Remove Programs and Internet Options. Physically, these applets are stored as .cpl files. For example, the Add or Remove Programs applet is stored under the name appwiz.cpl in the SYSTEM32 folder. In recent versions of Windows, the Control Panel has two views, Classic View and Category View, and it is possible to switch between these through an option that appears on either the left side or top of the window. Many of the individual Control Panel...
Words: 549 - Pages: 3
...NT1110 Homework 3 USB 3.1 The new USB 3.1 Super Speed specification has been finalized by the USB Promoter Group, allowing manufacturers to begin building devices that can communicate at a blistering 10 Gb/s. The new USB Super Speed standard has been given its official designation - USB 3.1 - and doubles the possible throughput of a USB connection from 5Gb/s to 10Gb/s. As you might expect from a USB standard, backwards compatibility is also confirmed for previous USB devices - which will, naturally, run at their usual, slower speed even when connected to a USB 3.1 port. The specification team worked hard to make sure that the changes made to support higher speeds were limited and remained consistent with existing USB 3.0 architecture to ease product development. The move to push 10Gb/s through USB connections is believed to have been a response to the threat of Thunderbolt technology developed by Apple and Intel. First seen on Apple's own products, and now trickling out into the mainstream PC world, Thunderbolt offered 10Gb/s - but shortly after the USB Promoter Group announced that USB would match that speed, Intel announced the Falcon Ridge controller which doubles Thunderbolt's throughput to 20Gb/s. In both cases, the peak performance is theoretical: actual real-world transfer rates will depend on cable quality and length, chipset and bus limitations and a myriad of other factors. Nevertheless, both provide the potential for vastly improved transfer rates when paired...
Words: 309 - Pages: 2
...NT1110 Analysis 3: WEP, WPA, WPA2 05/13/2014 * Wired Equivalent Privacy (WEP): WEP is the original encryption protocol developed for wireless networks. As the name implies, WEP was supposed to be as secure as a wired network. However, WEP has many security flaws, is difficult to configure and is easily hacked. The Wi-Fi Alliance officially retired WEP in 2004. Due to US restrictions, many manufactures were limited to making their devices 64 bit. It was not until these restrictions were lifted that it was increased to 128 bit. Even though 256 bit was introduced, 128 bit remains the most common. Wi-Fi Protected Access (WPA): WPA was made as something better to use instead of WEP while 802.11i wireless security standard was being developed. Current use of WPA uses a preshared key (PSK) also known as WPA Personal and the Temporary Key Integrity Protocol (TKIP) for its encryption. WPA used the 256 bit keys that are a huge improvement over WEP’s 64 bit. One of the significant changes was integrity checks that would determine if an attacker had captured or altered packets. WPA, like its predecessor WEP both have been shown in public demonstrations to be vulnerable to intrusion. Wi-Fi Protected Access II (WPA2) WPA2 officially replaced WPA in 2006. One of the biggest differences between WPA and WPA2 was the mandatory use of AES algorithms and the introduction of CCMP (Counter Cipher Mode with Block Chaining Message Authentication Code...
Words: 296 - Pages: 2
...Frank Williams 04/05/2015 Ms. Easterling NT1110 In the video, it talked about the different ports on a computer. The Serial port transmits data one bit at a time. It usually is a male port with 9 or 25 pins. The Parallel port transmits data 8 bits at a time. It is usually a female port with 25 pins. The game port is usually female with 15 pins and two rows. The mouse and keyboard ports are used to access the mouse and keyboard. On older computers the mouse and keyboard used PS/2 connectors. All the ports have been replaced by USB ports. There are two types of USB ports, the USB1 which is 56 kbps and cord length of 3 meters. The USB2 which is 480 mbps and cord length of 5 meters. The USB can control up to 127 devices. The NIC (Network Interface Card) is responsible for connecting computer to the Internet. The VGA, DVI, S-video all are used to connect video. There are two types of monitors, the CRT monitor and the LCD monitor. The CRT (Cathode Ray Tube) monitor is usually big and bulky. The LCD (Liquid Crystal Display) monitors are thin and use TFT (Thin Film transistors). The Standard Resolution is 640 x 480, 800 x 600, 1024 x 768. The Native Resolutions are XGA – 1024x768, SXGA – 1280x1024, UXGA – 1600x1200, and WUXGA – 1920x1200. The video also showed how to configure these settings through the control panel or simply right click on screen, select properties then click on settings to adjust. The EMI (Electromagnetic Interface) created by electric source. Never open a...
Words: 421 - Pages: 2
...NT1110 Computer Structure and Logic Short Answer 2.1 Input/Output Devices Professor Mo Suleiman October 4, 2014 In the wonderful world of computers, we need to tools to communicate with a computer. Of course, a base foundation is the Operating System. However, we do need tools that will allow end users to streamline a computer’s full potential and functionality. That is where input and output devices come into play. In computing, input and output devices refers to the way we as end users communicate with a computer. Input is defined as a way the data or information sent to a system, as in typing something on a keyboard. Outputs are the signals sent by the computer system to the outside end user. An input device is a piece of hardware that transfers information or data in the world for consumption from an end user to a computer. Critical input devices needed to communicate with a computer are a keyboard, and mouse. A keyboard is the sole way to input keys, or command instructions to a computer. Without a keyboard, a computer is useless to an end user. Another critical input device is a mouse. A mouse is a click and point device used to manipulate GUI interfaces within an operating system. A mouse is not necessary in sole computer programming, but in order to manipulate GUI based operating systems and programs, a mouse is needed to communicate to a computer. An output device is a piece of hardware a computer uses to communicate the results of data processing...
Words: 589 - Pages: 3
...NT 1110 COMPUTER STRUCTURE AND LOGIC | INTERGRATED CIRCUIT TECHNOLOGY | UNIT 1 ASSIGNMENT 1 | | ROBERT CANDIDO | 12/12/2013 | | THE INTEL QUAD CORE INTANIUM PROCESSOR WAS THE TWO BILLION TRANSISTOR THAT HAD BEEN PLACED ON A SINGLE CHIP. THIS PROCESSOR WAS RELEASED IN YEAR 2010. SOURCES FOR THIS ASSIGNMENT CAME FROM THE FOLLOWING: GOOGLE.COM INTEL CORPORATION.COM ALL RIGHTS RESERVED TO THOSE COMPANIES NAMES AND LOGOS. * FROM MY PERSONAL RECOGNITION ON THE GROWTH OF THE NUMBERS ON TRANSISTORS IS THAT OBLVIOUSLY STARTED OF SLOW. AS OVER THE YEARS HAVE GONE BY THEY SEEM TO EXPLODE REAL RAPIDLY TO THE POINT WHERE EVERY YEAR SEEMS IT JUMPS TO ANOTHER 10,000 TRANSITORS OR EVEN TO ANOTHER 100,000 TRANSISTORS. DEPENDING ON THE AMBITION OF THE COMPANY THAT IS TRYING IT HAS EXPLODED REAL FAST IN MY PERSONAL OPINION. * THE GROWTH SEEMS VERY REASONABLE FROM WHAT I SEE EVERY DECADE TRANSISTORS ON A SINGLE CHIP HAVE EVOLVED BY THE 100,000. LOOKS LIKE A SET PLAN BY THE COMPANIES OR POSSIBLY THE GOVERNMENT NOT TO ALLOW THE GROWTH TO BE FASTER. NOW A DAY’S EVERY YEAR THAT GOES BY THE LAST PC U MAY HAVE HAD IS CONSIDERED OLD. * FROM THE BEGINNING OF 1971 TO PRESENT DAY IT HAS BEEN SURPRISINGLY FAST. I CALCULATE THAT APPROXIMATELY BY 50 YEARS WE SHOULD HIT THE MARGIN OF 1 BILLION TRANSISTORS ON A SINGLE CHIP. WHO KNOWS REALLY WHAT THE WORLD OF TECHNOLOGY CAN truly BRING US SINCE IT EVOVLES RAPIDLY. * IN CONCLUSION SEEMS LIKE INTEL...
Words: 263 - Pages: 2
...Graphic Designer: A Graphic Designers job description is to create designs, concepts, and sample layouts based on knowledge of layout principles. Also they need to be able to use computer software to generate new images. They need to be able to design charts, graphs, illustrations, and other artwork, using the computer. ("Graphic Designer" job description part 1, 2012). Because of the duties that a Graphic Designer needs to perform, they need a computer that is capable of a large amount of memory (RAM), also one that has a fast processor for the many different programs that will run and their functions. Also they would need a great graphics card and capabilities. Based on the research that I did I think that the Alienware M18x Laptop would be a great laptop for this profession. It meets a lot of the specifications needed to perform everyday duties. Educator: An educator’s job description is to organize, develop, and manage educational programs and curriculum (online education degrees, 2013). Because of the responsibilities of an Educator, they need a computer that can access mainly basic programs such as Microsoft office programs, and internet capabilities. Based on the research that I did, I think that the best computer for this profession would be the Dell Inspiron 660 Desktop. The specifications for this computer meet basic everyday desktop needs. Engineer: An Engineer’s job description is to develop projects objectives, review project proposals and plans. Review bids...
Words: 466 - Pages: 2