...1. Purchase CAT5e cable. 2. Cut both ends of CAT5e cable with crimp tool to appropriate length. Ensure CaT5e cable is cut squarely and not diagonally. 3. Place the CATe cable into the stripper portion of the crimp tool so that the end of the cable is against the stop.Squeeze the handles and slowly pull out CATe cable, keeping it square. This removes the correct length of outer insulation without damaging the insulation on the inner wires. 4. Uncoil/unravel each of the four pairs of wires manually. 5. Straighten each wire as much as possible with fingers and arrange wires in correct colour order orange white, orange, green white, blue, blue white, green, brown white and brown. This wiring scheme is known as 568B. Hold the wires arranged...
Words: 686 - Pages: 3
...<= # of resource, A~D 0 0 1 2 <= Allocation 1 0 0 0 1 3 5 4 0 6 3 2 0 0 1 4 0 0 1 2 <= Max 1 7 5 0 2 3 5 6 0 6 5 2 0 6 5 6 1 5 2 0 <= Available 5 <= # of process, P0~P4 4 <= # of resource, A~D 0 0 1 2 <= Allocation 1 0 0 0 1 3 5 4 0 6 3 2 0 0 1 4 0 0 1 2 <= Max 1 7 5 0 2 3 5 6 0 6 5 2 0 6 5 6 1 5 2 0 <= Available Input a text file that includes the number of processes, resources, and the matrixes for allocations, max, and available. Output System Safe or Unsafe 1) Read the # of processes and the # of resources 2) Read allocation, max and available for each process and each resource 3) Print whether this system is safe or not. Data Structures for the Banker’s Algorithm Let n = number of processes, and m = number of resources types. Available: Vector of length m. If available [j] = k, there are k instances of resource type Rj available Input.txt Input.txt Max: n x m matrix. If Max [i,j] = k, then process Pi may request at most k instances of resource type Rj Allocation: n x m matrix. If Allocation[i,j] = k then Pi is currently allocated k instances of Rj Need: n x m matrix. If Need[i,j] = k, then Pi may need k more instances of Rj to complete its task Need [i,j] = Max[i,j] – Allocation [i,j] Safety Algorithm 1. Let Work and Finish be vectors of length m and n, respectively. Initialize: Work = Available Finish [i] = false for i = 0, 1, …, n- 1 2. Find an i such that both: ...
Words: 403 - Pages: 2
...08 Fall 08 Fall 1. RJ’s job as foreman in terms of its resource inputs really focused on expertise environmental factors, organizational process assets, and activity resource requirement. The resource that was really pushing her buttons and giving her problems is the expertise environmental factors because she did not know how to handle certain situations. She was not read to be the person who solves the problems that occur daily unexpectedly and was becoming frustrated with the construction workers. She was also lacking on how to manage workers because she would find things out last minute and is heavily depended on oversight operation. Expertise really got to her because she may have worked in a legal office and hospital, but the stress and daily tasks she had in those jobs was clearly not enough for her to adapt to being a Foreman. Foreman’s deal with a lot of things such as, financial control, quality control, communication with stakeholders, managing workers, and overall site operation. The resource of expertise environment really affected her the days she worked because it was not a resource she really had in her father’s business. 2. A job analysis would have been extremely helpful for RJ to perform the job as foreman for many reasons. For one, job analysis can be used to really identify and find out in detail what job duties are important to be required and learned for a job. This is an analysis of a job, not the person doing the job. It is important to...
Words: 1166 - Pages: 5
...<= # of resource, A ~ D 0 0 1 2 <= Allocation 1 0 0 0 1 3 5 4 0 6 3 2 0 0 1 4 0 0 1 2 <= Max 1 7 5 0 2 3 5 6 0 6 5 2 0 6 5 6 1 5 2 0 <= Available 5 <= # of process, P0 ~ P4 4 <= # of resource, A ~ D 0 0 1 2 <= Allocation 1 0 0 0 1 3 5 4 0 6 3 2 0 0 1 4 0 0 1 2 <= Max 1 7 5 0 2 3 5 6 0 6 5 2 0 6 5 6 1 5 2 0 <= Available Input a txt file that includes the number of processes, resources, and the matrixes for allocations, max, and available. Output Safe or Unsafe 1) Read the # of processes and the # of resources 2) Read allocation, max and available for each process and each resource 3) Print whether this system is safe or not to the output file. Data Structures for the Banker’s Algorithm Input.txt Input.txt Let n = number of processes, and m = number of resources types. Available: Vector of length m. If available [j] = k, there are k instances of resource type Rj available Max: n x m matrix. If Max [i,j] = k, then process Pi may request at most k instances of resource type Rj Allocation: n x m matrix. If Allocation[i,j] = k then Pi is currently allocated k instances of Rj Need: n x m matrix. If Need[i,j] = k, then Pi may need k more instances of Rj to complete its task Need [i,j] = Max[i,j] – Allocation [i,j] Safety Algorithm 1. Let Work and Finish be vectors of length m and n, respectively. Initialize: Work = Available Finish [i] = false for i = 0, 1, …, n- 1 2. Find an i such that both: ...
Words: 406 - Pages: 2
...this section, you should be able to complete the following tasks: * Read simulated component documentation and view components to make appropriate choices to meet the scenario. * Add and remove simulated computer components. * Change views to view and add simulated components. * Use the zoom feature to view additional image details. * Attach simulated cables. * Use the simulation interface to identify where simulated cables connect to the computer. You have been hired as a network technician for a small corporate network. Today is your first day on the job and you need to familiarize yourself with the network. A new employee will work in Office 2 and you need to complete the workstation in the office. Complete the following tasks in Office 2: * Add the monitor to the office (next to the computer). * Use the DVI-D cable to connect the monitor to the computer. * Connect the power cord to the monitor and plug in the monitor. * Add the mouse to the office, and connect the mouse's USB cable to a USB port on the computer. * Add the keyboard to the office, and connect the keyboard's USB cable to a USB port on the computer. * Turn on the monitor and the computer. Tip: Click the following button shown in Office 2 to go to the workstation: | | Watch the preceding demonstration to see how to complete any of these tasks. Once you have completed all of the assigned tasks, feel free to explore the hardware and operating system interfaces...
Words: 11760 - Pages: 48
...Processor : Intel Core i7 3930K (Sandy Bridge-E) Hexa-Core CPU : 3.2 GHz Motherboard : Asus P9X79 RAM : Patriot Viper 3 16GB DDR3-1600 Kit (2 x 8 GB) Graphics Card : 2 x Sapphire Radeon R9 280X 3GB GDDR5 Hard Drive and SSD : Western Digital Caviar Blue 1TB 7200 RPM HDD Power Supply : EVGA SuperNOVA 1000G2 1000W 80 PLUS Gold Monitor : 15.6" diagonal HD BrightView LED-backlit Keyboard with Numpad SuperMulti DVD Burner Integrated 10/100 BASE-T Ethernet LAN (RJ-45) Wireless Connectivity 802.11b/g/n Bluetooth 2 x dts Sound+ Internal speakers dts Sound+ Audio Playback Dual speakers Full-size island-style keyboard with numeric keys Touchpad supporting multi-touch gestures Card Reader 2 Super speed USB 3.0 1 USB 2.0 1 HDMI 1 VGA 1 RJ-45 1 Headphone-out/microphone-in combo jack 6-cell Li-Ion HP TrueVision HD Webcam with integrated digital microphone (720p, fixed focus, low light enhancement Why do organizations need computer ? Computers are essential today. We check our email...
Words: 682 - Pages: 3
...COGNITIVE ORIENTATION TO LEARNING Introduction Orientation to learning in the early years was stressed upon in debating which orientation to learning is best suited for a working environment, namely behavioural learning or cognitive learning. As years pass, learning is becoming a more active, constructive and goal oriented process (Shuell, 1986). Basically, learning is no longer based on studying or obtaining knowledge from a certain source alone but can be achieved through performing tasks or activities and learning from past experiences as well. Thus, the more suitable style of learning is none other than cognitive learning in which Boud (1998) described that it emphasizes on the internal attributes of the mind while furnishing views based on the form of knowledge needed for working performance and their development. The purpose of this paper is to determine the advantages and the shortcomings of the cognitive style of learning in the workplace which has evolved over the years. In addition to that, this paper will also briefly describe the behavioural orientation to learning as it acts as the other style of learning within the workplace when cognitive learning does not see fit. At the end of this paper, the outcome will be referring to whether cognitive learning orientation is appropriate and should be undertaken in the workplace to improve employee learning, performance and development. Advantages of Cognitive Learning Glaser (1984) defined cognitive learning as how...
Words: 2357 - Pages: 10
...Task 1: Identify the Ports Procedure 1. Look at the front and back of a desktop or notebook computer for the following bus connectors: RS232, USB, FireWire, and infrared. How many of each type of connector did you find? Desktop: RS232= 02 USB= 04 FireWire= 02 Infrared=00 2. Label the appropriate names to the ports and adaptors given below. Audio Ports 15-Pin VGA Female Port USB Port Type 1.0 PS/2 Keyboard/Mouse Port Parallel Port RJ-45 Ethernet LAN Port HDMI Port USB Port Type 1.0 Task 2: Identify Memory Slots Procedure 1. Using the Internet, locate a diagram or photo of these types of memory slots on a desktop or notebook computer: Memory Stick (MS), Micro Drive (MD), Compact Flash (CF), and Secure Digital (SD). [http://images10.newegg.com/NeweggImage/productimage/A24P_1302690737661335787nIu3iEbNe.jpg] 2. Explain the diagram or photo(s) with the name of each type of memory slot. Task 3: Identify the Configuration Procedure 1. Identify the following configuration. Identified as Multiple Device Support with SCSI Host Adapters - this configuration is also known as Daisy Chaining. It allows multiple devices to work on a single SCSI Host Adapter. 2. Define a SCSI and the need to use a SCSI Controller. ------------------------------------------------- Small Computer System Interface that works as an intermediary bus host adapter to accommodate connections with hard disks (mass storage) and other peripheral devices. The...
Words: 378 - Pages: 2
...HARDWARE BASICS Computer History Computer Classification PCs Personal Computers Monitor, keyboard, mouse, speakers A high-end desktop computer with massive computing power. Desktop Computers Workstations Portable Computers • Laptop computers— sometimes called notebook computers— designed for portability • Netbooks are extrasmall, extra-light, nofrills computers Handheld Devices Personal digital assistants (PDAs) Smart phones combine the functions of a phone, camera, PDA, game machine, and music/video player. Tablet computers bridge the gap between smart phone and notebook/netbook PC. Smart phone Servers Server: A computer that provides other computers connected to a network with access to data, programs, and other resources Any desktop computer can be used as a server but some are specifically designed for this purpose. Servers have faster processors, more memory, or faster network connections. Often clustered together in groups to increase processing power Supercomputers Typical supercomputer is constructed out of thousands of microprocessors. Power users with special requirements need access to fastest, most powerful computers. Computer Ethics Know the rules and the law. Don’t assume that it’s okay if it’s legal. Think scenarios. When in doubt, talk it out. Make yourself proud. Remember the golden rule. Take the long view. Do your...
Words: 1690 - Pages: 7
...12/16/2011 Submitted By Section E, Group 8 Aravind Ganesan 2011PGP448 Gadkhel Rohit 2011PGP629 Gokulnath R 2011PGP638 Kartik Shrivastava 2011PGP685 Sumit Prakash 2011PGP907 Upasana Mukherjee 2011PGP922 Vemb V 2011PGP932 The task is to evaluate the best costing alternative for Lehigh steel. For this, an improvised costing system is developed which overcomes the assumptions of ABC and TOC costing and the optimum product mix for Lehigh Steel is calculated using the same Executive Summary Lehigh Steel is a manufacturer of speciality steels for high strength, high use applications. Its financial performance has generally trended wit but outperformed the industry as a whole. Following the general recessionary trend of the market, Lehigh Steel reported record losses in 1991 after posting record profits in 1988. This had led to an increasing need to rationalizing Lehigh Steel‟s product mix. Traditionally, Lehigh Steel has followed Standard Cost Method for cost accounting. Jack Clark, CFO of Lehigh Steel has given Bob Hall the task of implementing Activity Based Costing at Lehigh Steel. Mark Edwards, Director of Operations and MIS explored the implementation of Theory of Constrains (TOC) accounting for Lehigh Steel. The task is to evaluate the best costing alternative for Lehigh steel. For this, an improvised costing system is developed which overcomes the assumptions of ABC and TOC costing and the optimum product mix for Lehigh Steel is calculated using the...
Words: 4202 - Pages: 17
...CCNA 1 Chapter 1 V4.0 1. Which of the following descriptions are true regarding the management connections on a Cisco router? (Choose three.) They are non-network connections. They are used to connect the router to the rest of the production network. They are synchronous serial ports. They are used for initial router configuration. They are asynchronous serial ports. They are accessed using their assigned IP address. 2. The console port can be used for which of the following? (Choose three.) debugging. password recovery. routing data between networks. troubleshooting. connecting one router to another. 3. Which of the following describes the function of a WAN? connects peripherals in a single location. connects multiple networks in a single building. provides connectivity on a LAN. provides connectivity over a large geographic area. 4. An internetwork must include which of the following? (Choose three.) switching. static addressing. IETF standardization. dynamic or static routing. consistent end-to-end addressing. 5. ABC Company just purchased three new routers to start their company network. Which items are needed to establish a terminal session between a PC and the router for the initial configuration? (Choose three.) straight-through cable. terminal emulation software. rollover cable. RJ-45 to DB-9 connector. V.35 cable. 6. Terminal emulation software, such as HyperTerminal, can be used to configure a router. Which of the following HyperTerminal...
Words: 1042 - Pages: 5
...------------------------------------------------- Step 1: Choose mode table glossary small large 3" x 5" index card Want to print a test? Click here. Alphabetize Flip terms and definitions ------------------------------------------------- Step 2: Open the file Open PDF ------------------------------------------------- Step 3: Print it! ← Back to Set | PC Pro Certification Practice Exam A+ 220-801Study online at quizlet.com/_ipciw | 1. | An administrator wants to prevent people outside of the building from accessing a new wireless router. Which of the following is the LEAST labor intensive method to use while setting up new workstations? A. Turn SSID broadcast off B. Use wireless encryption C. Institute MAC filtering D. Setup static IP addresses | | A. Turn SSID broadcast off | 2. | After installing a bar code reader, which of the following is commonly done to configure the reader? A. Scan in program codes B. Enable the code reader in the BIOS C. Use Device Manager to enable I⁄R ports D. Adjust jumper switches | | A. Scan in program codes | 3. | After installing a new serial port card in a computer, the communication parameters need to be configured. Which of the following is the MOST common communication configuration for a serial port? A. Eight data bits, even parity, two stop bits B. Seven data bits, no parity, one stop bit C. Eight data bits, no parity, one stop bit D. Seven data bits, even...
Words: 11959 - Pages: 48
...organizational performance. The financial statements are prepared properly and accurately to provide a picture of the real situation regarding the outcome or accomplishment that has been achieved by a company for a certain period, this is the state that is used to asses financial performance. Moreover, information on the financial performance of a company is very useful for various stakeholders, such as investors, creditors, government, bankers, management itself and other parties concerned. The module Assignment is made to complete the course assessment requirements set by the teaching team (Mrs. Catur and Mrs. Maria Carmelia) for financial management subjects in the Excellent class. It required us to make the task of module analyzes the company's financial statements as listed in the task module requirements listed in the book module. We used the data from Metrodata Electronics company for the years 2008 - 2012 as the target of our analysis for the Analysis of Financial Statements. Primary data in the analysis of financial statements is a secondary data consisting of balance sheet, income statement, cash flow statement and statement of retained earnings. 1.2. OBJECTIVE * General purpose To fulfill our final assignment in financial management subject at this semester. * Particular purpose To improve our knowledge and to know the implementation of the theory we got in financial management subject in the real life. Also, Ability to evaluate the...
Words: 4179 - Pages: 17
...connector and there ports from fast use and the slower methods which explain what devices will soon replace them. Serial, Parallel, & Game Ports * Serial- Transmit data 1 bit at a time, between 9-25 pins, Male, * Parallel- transmit 8 bits at a time, 25 pins, Female * Game- 15pins(2 row) / Similar to the Video Port 15pins but has 3 rows All three have for the most port have been replaced by USB ports. Mouse’s & Keyboard * Mouse- Use Serial connectors * Keyboard- Use 5-Pin DIN Connectors Newer Mouse & Keyboard use PS/2 Connectors or USB/ Wireless NIC-Network Interface Card * NIC- connects to local network, distant network or internet * Concerts Parallel communication to serial * Connects to internet through RJ-45 Connector Modem (Dial-up Slowest Possible Method) * Connect with phone line (Internet) * Standard speed for Modem (56kbps Old/ V.92 Faster Newer) * Converting analog signal from phone line to digital so computer can use. * Connector use RJ-11 Connector Video (Two types of video) * VGA- Analog interface, D-type, 15Pins, 3rows(Common) * DVI- Digital Visual interface (Common) * S-Video- Connect to TV, 4-7 pins(Sometimes) USB- Universal Serial Bus (Replacing older Serial & Parallel ports) * Hot Swappable * USB 1- 12 Mbps, 3 meter cable * USB 2- 480Mbps, 5 meter cable ( 40t faster) * 2 Sizes A-Connector (Large) to Computer, B-Connector (Smaller) to Devices * 127 Devices may...
Words: 1159 - Pages: 5
...Windows®. Life without Walls™. HP recommends Windows 7. ENVY CAN YOU HANDLE IT? Windows®. Life without Walls™. HP recommends Windows 7. IN A CLASS OF ITS OWN The HP ENVY range has outdone itself. Refined and reinvented, the newly enhanced selection delivers the ultimate in sensorial indulgence, addressing the visual, aural, tactile and emotional aspects of a premium digital lifestyle. The various models have been crafted differently so that you may have your say on which suits you best. Do you prefer light and luxurious? Or one that’s larger-than-life? You choose. Empower yourself with the knowledge of what makes each HP ENVY so desirable. Deliberate a little. Decide. Once you’re ready, set yourself free and be the object of envy. ENVY13 ENVY 14 ENVY15 ENVY17 The HP ENVY has outdone itself. Now it’s your turn. Visit www.hp.com/apac/envy if you can handle it. Windows®. Life without Walls™. HP recommends Windows 7. MESMERISING AT FIRST SIGHT First impressions count, which is why the HP ENVY comes elegantly housed in an exquisite box. The allure continues as you lift the lid to reveal the notebook’s all-metal design. You’ll find its metal alloy chassis artistically etched with a mesmerising pattern that emanates both poise and potency. As you proceed to hold up your new status symbol, you’ll feel its unbelievable lightness and slimness. How can it be? Seems too thin for the powerhouse you had in mind. That’s because it has been refined to the last...
Words: 3538 - Pages: 15