Free Essay

Task 2

In:

Submitted By fangone
Words 1343
Pages 6
1

Name
Job
Date
Tony Starks
Helpdesk technician
27/08 10:00 am
Steve Rogers
IT assistant
28/08 10:00 am
Bruce Banners
Support technician
29/08 10:00 am Computer workgroups need to be scalable. Scalability is the ease at which a network system can be expanded or upgraded should the need arise.
As a rule, all computer workgroup networks should:

• Support growth in the number of users for the foreseeable life of the technology • Allow for increase in data traffic and storage needs as the network grows • Be flexible to allow for the incorporation of new technologies as they emerge When new workgroups established, it is important to conduct and audit on the needs of the network users to find out what resources they need to access. This process will then inform your decision on that and with whom resources should be shared. In general, there are some basic areas and resources need to be shared.

• Hardware peripherals ‐ Printers and scanners

• Data ‐ Customer lists, Databases of sales information

• Services ‐ Such as email

• Other computers ‐ Both desktop and laptop computers

• Personal digital assistants and smart phones

Equipment requirement

For a computer workgroup to be established, certain equipment must be used. As a rule, all workgroup networks should have computers that want to share resources on the network, along with:

• Computers equipped with network cards
It is an expansion card that enables a computer to connect to a network; such as a home network, or the Internet using an Ethernet cable with an RJ‐45 connector. 2

• Ethernet hub
A common connection point for devices in a network, hubs are commonly used to connect segments of a LAN. A hub contains multiple ports. When a packet arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets.

• Ethernet cables
Alternatively referred to as a cord, connector or plug, a cable is one or more wires covered in a plastic covering that connects a computer to a power source or other device. The picture is an example of what the power cord may look like for your computer or monitor. The power cord is just one example of millions of other cables found in and around computers.

Benefit of computer network

File Sharing: Networks offer a quick and easy way to share files directly.
Instead of using a disk or USB key to carry files from one computer or office to another, you can share files directly using a network.

Software Cost and Management: Many popular software products are available for networks at a substantial savings in comparison to buying individually licensed copied for all of your computers. You can also load software on only the file server which saves time compared to installing and tracking files on independent computers. Upgrades are also easier because changes only have to be done once on the file server instead of on individual workstations. Security: Specific directories can be password protected to limit access to authorized users. Also, files and programs on a network can be designated as
"copy inhibit" so you don’t have to worry about the illegal copying of programs. Resource Sharing: All computers in the network can share resources such as printers, fax machines, modems, and scanners.

Communication: Even outside of the internet, those on the network can communicate with each other via electronic mail over the network system.
When connected to the internet, network users can communicate with people around the world via the network.

Flexible Access: Networks allow their users to access files from computers throughout the network. This means that a user can begin work on a project

3

on one computer and finish up on another. Multiple users can also collaborate on the same project through the network.

Workgroup Computing: Workgroup software like Microsoft BackOffice enables many users to contribute to a document concurrently. This allows for interactive teamwork.

4

Network diagram

Workgroup network diagrams can be used to keep track of computers and peripherals in a network. They are typically used when several routers are required, a large number of computers are in use in one workgroup if a number of workgroups are working alongside each other. When this is the case, the network diagram can be used to:

• Identify the relationship between computers

• Identify where peripherals are attached

• Establish the security required for peripherals to be assessed

One of the key steps in the process of using and designing network diagrams is in systematically using consistent symbols for the network diagram, so that information about components of the network can be gained accurately from the diagram. Typically, the larger an organization is, the more important and the more complex the network diagram becomes. There are now many different types of software that can be used to assist in the creation of network diagrams, each giving different levels of flexibility. Base on the scenario, the network diagram for this firm should be like this:

5

Implementation

Timelines for establishing a computer workgroup are based on a range of factors, and can take anywhere from a few days through to a number of months, depending on the complexity of the workgroup being established. Key factors that can contribute to establishing timeline constraints are:

• Organizational policy and procedures, especially in regard to the approval process for large system changes and expenditure

• The number of people involved in the implementation phase of the workgroup • The number of computers in the new workgroup

• The range of security features and shared resources to be managed

• The availability of IT professionals and technicians for consultation in designing the preferred workgroup

• The availability of IT technicians to assist in installing specialist aspects of the workgroup.

Network access point

Network access points provide access for one or more computers or other devices to a computer network. Modems, routers, bridges and wireless access points are all subcategories of network access points that provide different types of access to the network or the Internet. Read on to learn about how each access point differs in its functionality

Modem
Short for MODulator/DEModulator, the older phone modem has been almost entirely supplanted by cable or DSL‐based modems in the modern world.
These devices provide access to Wide Area Networks such as the networks of telecommunications and cable providers. However, modems are typically only able to provide access to one connected device at a time.

Router
A router is a device that provides multiple devices access to a given network.
Modern routers usually do so using the Network Address Translation protocol to effectively assign one Internet address to multiple devices. Most routers are

6

not capable of directly interfacing with cable or DSL providers, however, so it is usually necessary for a modem to be used in concert with the router.

Bridge
A bridge is a device that allows two or more networks to connect and communicate simultaneously. It is distinct from a router in that it does not provide routing capabilities. As such, bridges are typically used to extend the range of a wired or wireless network in concert with a router.

Wireless Access Points
Wireless access points are commonly known as Wi‐Fi access points. These access points allow devices supporting a wireless connection standard to connect to their associated network. Wireless access points may be separate devices, but are typically integrated into routers and sometimes into modems to provide both wired and wireless connection capabilities.

Network access points come in a number of varieties and are frequently used in combination; e.g., it is possible to connect to a bridge that connects to a router that finally connects to the wider Internet via a modem. Understanding which types of access points provide which types of network services is vital to correctly configuring and connecting to a home network or the Internet.

Reference
Workbook
http://www.conceptdraw.com/samples/network‐diagram http://www.computerweekly.com/feature/How‐to‐set‐up‐your‐small‐businesscomputer‐ network‐Essential‐Guide http://www.wikihow.com/Set‐up‐a‐Computer‐Network

Similar Documents

Premium Essay

Classroom Management Task 2

...An in-class activity I would have my students participate in would a warm-up activity for the beginning of the class period. Some of the reasons that I would have my students do a warm-up activity are that it helps get the students to start thinking about the subject and begin to focus on it. This will help the students make their transition mentally from their last class to my class. I would also use the warm-up as a way to set the tone for the upcoming lesson, like a building block to get their thought process going in the right direction for the day. Most importantly, I would use the warm-up to allow myself to assess the student’s attitude and ability for the day to help me determine the best way for to form groups for other activities for the day. A behavioral expectation that I would have for my students for the warm-up activity is that they would have their materials (ex. Pencil and paper) out on their desk ready to begin the warm-up after the bell rings. Another behavioral expectation I would have of my students for the warm-up activity that before they begin the activity, they take time to reflect on the prompts I gave them for the assignment and begin to work quietly and individually. An evaluation method I would use to ensure that my students have an understanding of my behavioral expectations is to have a poster up on my wall that is a reminder of the classroom expectations and pointed out to the students who are not working on the warm-up. The classroom expectations...

Words: 1161 - Pages: 5

Free Essay

Task 2

...*If you are submitting the form electronically (via MyLO) then it does not have to be signed, but the details for each student must be included. By submitting the form into your account you are declaring your agreement with the above statement about plagiarism. Statement on Plagiarism and Academic Integrity Plagiarism is a form of cheating. It is taking and using someone else's thoughts, writings or inventions and representing them as your own, for example: • using an author's words without putting them in quotation marks and citing the source; • using an author's ideas without proper acknowledgment and citation; or • copying another student's work. If you have any doubts about how to refer to the work of others in your assignments, please consult your lecturer or tutor for relevant referencing guidelines, and the academic integrity resources on the web at www.academicintegrity.utas.edu.au/. The intentional copying of someone else’s work as one’s own is a serious offence punishable by penalties that may range from a fine or deduction/cancellation of marks and, in the most serious of cases, to exclusion from a unit, a course or the University. Details of penalties that can be imposed are available in the Ordinance of Student Discipline – Part 3 Academic Misconduct, see www.utas.edu.au/universitycouncil/legislation/ord9.pdf The University reserves the right to submit assignments to plagiarism detection software, and might then retain a copy of the assignment...

Words: 3520 - Pages: 15

Premium Essay

Task 2

...Task 2, Community Health (C228) Edward Croston Western Governors University Task 2, Community Health (C228) MEASLES Measles was at one time in the not too distant past, a killer of those that became infected. Measles has been around for centuries. The first published, written account of the disease was in the ninth century by a Persian doctor. According to the Centers for Disease Control and Prevention (CDC) website on measles, it was not until 1757 that a Scottish physician, named Francis Home, proved that something infectious in the blood was causing the disease. By the early 1900’s, the United States began requiring every healthcare provider and laboratory to report all identified cases, with approximately 6,000 deaths being related to measles each year. Almost all children contracted the disease by the time they were the age of 15, with an estimated yearly infection rate of three to four million United States citizens. Each year, it is estimated, 400 to 500 people died from measles, 48,000 hospitalized, and 4,000 developing encephalitis as a side effect of the disease. The measles, mumps, and rubella (MMR) vaccine was made available to the public in 1963. The MMR has significantly reduced the reported cases of measles. In the year 2000 measles was declared eradicated in the United States. But since then, the disease has returned from time to time. ("Measles History," 2014, p. 2) Measles is a virus that has an incubation period of approximately 14 days. It is known...

Words: 1240 - Pages: 5

Premium Essay

Task 2

...Task 2 Compare and contrast the life span and the diseases and illnesses profile for an infant born today in the developed world and in the developing world. Sierra Leone (developing country) United States of America (developed country) Life expectancy 47.5years 78.7 years Population 5.4 million 313.9 million Fertility rate 6.3 births per women 1.8 births per women Effecting factors • pervasive poverty • high level of illiteracy significantly among females • limited access to safe drinking water • proper sanitation • malnutrition • overcrowded housing • access to quality health services • obesity • lack of a healthy life style • eating and workout habits • smoking • drinking Diseases • Malaria • Acute Respiratory Illnesses • STI • Diarrhoea • Heart disease • Cancer • Chronic lower respiratory disease • Stroke • Accidents • Diabetes If a baby girl was born in a developing country such as Sierra Leone, her chances of survival are minimum. The effecting factors of life expectancy is primarily based on the lack of resource her county has to ensure her survival. Factors such as "limited access to safe drinking water" is a non-problem to a child born in a developed country. In regards, to diseases many individuals in developing countries do not live long enough to contract any chronic illness. Developing countries are plagues with acute diseases, like Malaria and STI's that demolish their population because they lack efficient health care....

Words: 385 - Pages: 2

Free Essay

Task 2

...Task Stream 2 Microbiology can be broken down into categorizations based upon the environmental conditions necessary for organisms in which to grow. Two large categories of microorganisms are those requiring oxygen to live (obligate aerobes) and those which can grow with oxygen but have the ability to also grow without it (facultative aerobes). The obligate aerobes produce more energy from nutrients than anaerobes by using oxygen as the “final electron acceptor in the electron transport chain, which produces most of the ATP in these organisms”(Betsy & Keogh, 2005, p.104). The facultative microorganisms are able to use oxygen but can also go without by using fermentation or anaerobic respiration when it is not available (Betsy & Keogh,2005). The microorganisms being cultured in our first task (Lactobacillus acidophilus and Staphylococcus epidermidis) are obligate aerobes. Microorganisms can grow in a variety of conditions with temperature being one of those variables, but the types we frequently encounter in our environment thrive in fairly warm temperatures. Both Lactobacillus acidophilus and Staphylococcus epidermidis are examples of these, which are referred to as mesophiles. Extreme temperatures (as in deep freezing or auotoclaves for example) are effective in destroying microorganisms due to their inability to thrive outside of more moderate temperatures). Growth of these two organisms would be optimized by remaining between 25 and 40 degrees celsius (Betsy...

Words: 1281 - Pages: 6

Premium Essay

Task 2

...Task 2 A Mahatma Gandhi was born in Porbandar, Kathiawar, India on October 2, 1869, in. After studying law in London, England, he left for South Africa in 1893, where he spent twenty years fighting biased legislation against Indians. As an innovator of passive opposition of mass non-violent civil defiance, he turn out to be a major political and spiritual leader (Biography.com 2013). In 1914, Gandhi went back to India and became the leader of the Indian National Congress and gave his support the Home Rule movement, furthermore advocating a strategy of non-violent non-cooperation to attain independence. Gandhi’s main objective was to assist poor laborers and farmers protest discriminating taxation and prejudices. His struggled was to liberate women, ease poverty, and stop class discrimination. Mahatma Gandhi main goal was for India to rule itself (Biography.com 2013). Mahatma Gandhi spent two years in jail, from 1922-24, for conspiracy. In 1930, he marched 200 miles to the ocean to gather salt to show defiance to governmental control. Gandhi sat at the London Round Table Conference in 1931, regarding Indian constitutional reform. In 1946, he negotiated for a new constitutional structure with the Cabinet Mission. In 1947 after the independence, Gandhi worked to stop the Hindu-Muslim conflict in Bengal, which eventually caused his assassination (Biography.com 2013). Mahatma Gandhi's pledge to non-violence and conviction to simple living has been an inspiration of hope for oppressed...

Words: 816 - Pages: 4

Premium Essay

Task 2

...Linksys WRT54G Running DD-WRT v24-sp2 firmware The Linksys WRT54G series router was released in 2002. This is an older router capable of utilizing the 802.11b/g standards, however by flashing the WRT54G with DD-WRT firmware you now have a SOHO router that is on par with most business-class wireless routers in capabilities and features. Contents: 1. Configure Linksys WRT54G/DD-WRT to perform NAT 2. Enable packet filter on Linksys WRT54G/DD-WRT 3. Setup the default gateway to share internet and network services among hosts Enabling NAT 1. After powering on the Linksys WRT45G connect the data cable from computer or laptop to Ethernet port 1 on the back of the Linksys. 2. Open a web browser and enter IP Address 192.168.1.1 into the address bar. The browser will open the DD-WRT browser interface at the System Information Page. 3. Click on the Setup tab in the upper left corner of the page. 4. You will be prompted for a username and password. The default username and password is root & admin. 5. From the setup page you will configure the WAN connection (the connection to the ISP). In almost all cases ISPs use DHCP to configure the connection. In the rare case that the ISP use a Static IP you will need to know the IP Address, Subnet Mask, Default Gateway and DNS servers all this info should be provided by the ISP. 6. Once the WAN connection is configured. You will now configure DHCP so the hosts on the client’s network can...

Words: 594 - Pages: 3

Premium Essay

Task 2

...Leadership is important in managing and organizing the structure of the organization while trying to maintain a profitable company that takes into consideration employees, shareholders, customers and board of directors, etc. Another attribute of a great leader is managing diversity in the workplace. However, diversity includes many different issues and needs to be managed and if done properly can lead to competitive advantages for the company. Thomas A. Kochan, professor at MIT, stated “Diversity can enhance business performance only if the proper training is provided and the organizational culture supports diversity (Dubrin, 2010). Managing Cultural Diversity: Managing cultural diversity is not an easy task, however, when incorporated into the organizations core values, is makes it easier to incorporate (Dubrin, 2010). Below is a diagram that provides a breakdown of areas or issues that may need to be looked at to evaluate the possibility of creating and leading a culturally diverse organization. These areas may help to identify areas where a competitive advantage may be available in the organization. In such a culturally diverse world and as the organization makes decisions that will impact them globally, these discussions are vital for the success of the company. Whether not decisions are made to implement or not to implement decisions based on diversity within the organization, these ideas, may identify some of the organizations strengths and weaknesses. (Cox...

Words: 1249 - Pages: 5

Free Essay

Task 2

...Part A & C The first educational resource that I chose was a video though Kahn academy. I chose this because not only do the students watch a video about third grade math they have to work a few math problems. This educational resource is appropriate for most of the student population. The video is for third grade math so that makes it appropriate for early childhood. The video gives gradual instructions with visual aids, which can help students who have learning disabilities. The videos on Kahn academy are appropriate for gifted and talented students because the video is based on what the students is learning and what they know. This video is appropriate for students who have challenging behaviors because the video is active and can keep a students interest. The video is appropriate for English language learners because on the website you can choose a variety of languages to hear it in. The video on third grade math warm ups is not appropriate for students with hearing impairments because it does not have closed captioning as an option. The video was not appropriate for students with visual impairments because the video shows different math activities in step-by-step instructions. If a student cannot visually see the steps, I am not sure that the video will help them. Overall, I think that the Kahn academy video would be appropriate for most of the students. The second educational resource that I chose was the Scholastic website as a...

Words: 1475 - Pages: 6

Free Essay

Bsbwor501 Manage Personal Work Priorities

... Address | | Phone | Daytime | | Evening/Mobile | | Email address | | Company name | | Training date(s) | | Training location | | Trainer’s name | | Assessment due date | | Date submitted | | Submission Date | | Resubmit 1 | | Resubmit 2 | | Purpose of the assessment The purpose of this assessment task is to assess evidence for part of a unit/s of competency which in full will lead towards a nationally-accredited qualification I acknowledge the following (all boxes need to be ticked) ❏ The assessment process has been explained to me ❏ I am ready to commence the assessment process. I have been advised of the assessment requirements, my rights and responsibilities as an assessment candidate, and I choose to be assessed at this time ❏ I understand which unit/s to complete, evidence I need to provide, and how to complete this document ❏ I understand my right of appeal, and this has been fully explained to me ❏ I have discussed with my trainer any special needs that should be considered when undertaking this assessment task | Candidate declaration - By signing/dating below, I declare that 1. I have been advised of the assessment requirements for this unit of competency, have been made aware of my rights and responsibilities as...

Words: 2880 - Pages: 12

Premium Essay

Jet 2 Task 2

...Rachel Johnson Addy JET Task 2 March 29, 2014 JET Task 2 1. A budget is an itemized estimate of expected income as well as estimated expenses over a specified period of time. The reason to design a budget is to regulate spending. There are multiple causes of concern with Competition Bikes budget plan. The main cause for concern is that the sales estimated for year 9 is 3,510 units. This estimate is not supported by past sales data. Due to the current economic status, the amount of units sold from year 7 to 8 decreased 15% according to the horizontal analysis. Rider sponsorships were also reduced and will most likely remain limited in the future (WGU, 2014). There is some misleading and inaccurate information posted within the budget. Under the Selling, General, and Administrative breakdown “utilities” is listed at $150,000 on the vertical analysis for year 8 and year 9. Then there is another listing for “utilities and services” of $54,000. This is misleading because this entry was not listed in the expenses from the previous year. Another cause of concern is that the cash budget is not included in the uncollected receivables. CB makes expensive bikes so there should be room for uncollectable accounts. The uncollectable receivables budget could be used to cover the any uncollected payments. The reduction of sponsorships and the slow economy could possibly cause a rise in uncollectable accounts. There is also some concern because the operating income is incredibly...

Words: 1749 - Pages: 7

Free Essay

Time Management

...Task and Sub-tasks | Estimated Time | 1. Select location and Date 2.1. Contact party goers to determine best date 2.2. Select and contact locations to determine availability | 2 Days1 Day | 2. Find entertainment 3.3. Contact retiree to determine interests 3.4. Select and contact entertainers suited to retiree’s interests | 20 Minutes1 Day | 3. Procure food 4.5. Contact party goers and retiree to find out food preference 4.6. Select, contact, and schedule caterer | 3 Days2 Days | 4. Schedule speakers 5.7. Contact and schedule close friends to speak at party 5.8. Contact retiree’s immediate supervisor and schedule them to speak | 2 Days1 Day | 5. Gather funds for parting gift 6.9. Contact retiree’s co-workers and friends to contribute to gift 6.10. Contact retiree to determine what type of gift would be suitable | 4 Days30 Minutes | If a conflict arose in the team, planning the retirement party I would try and reach some common ground with the person or people involved. I would also try to think of a way that both parties can benefit or parts of both ideas could be used, once some form of common ground has been established. As far as what you gain from teamwork in the work place. You gain the ability to accomplish larger tasks and tasks can be completed more quickly. The value of teamwork in school is that you get varied opinions and ideas. With both you get to communicate with your peers and get feedback...

Words: 260 - Pages: 2

Free Essay

No Late Work Accepted Policy

... Introduction 1. Definition of the no late work accepted policy 2. Applications of the policy Body 1. Primary intention of the No Late Work Accepted Policy 2. Situations when the No Late Work Accepted Policy may not be applicable 3. Advantages and disadvantages of the No Late Work Accepted Policy Conclusion 1. Current status of the No Late Work Accepted Policy in organizations No Late Work Accepted Policy ‘No Late Work Accepted Policy’ is a plan of action adopted by an institution or an individual in order to make firm the manner in which individuals manage their roles (Jha 22). The major aim of the policy is to ensure that individuals complete a task assigned within a given deadline. The policy has many merits. Primarily, it ensures that an individual keeps time. Thus, time management forms an essential ingredient of the No Late Work Accepted Policy and is particularly crucial in managing an individual’s career, and the improving an individual’s life (Jha 24). The No Late Work Accepted Policy seeks to ensure that individuals remain focused on an assigned role. The primary intention of the No Late Work Accepted Policy is to prohibit individuals from misusing the leniency previously accorded to submission of assigned tasks. Many people treat late tasks as an exceptional occurrence, as a result, many people have developed the habit of procrastination until the assigned task is overdue and the consequences may relate to penalties and minor sufferings...

Words: 1149 - Pages: 5

Free Essay

Perfect Phrases for the Toefl

...Perfect Phrases for the TOEFL Speaking and Writing Sections This page intentionally left blank Perfect Phrases for the TOEFL Speaking and Writing Sections Hundreds of Ready-to-Use Phrases to Improve Your Conversational Ability, Develop Your Writing Skills, and Build Exam Confidence Roberta G. Steinberg New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved.Manufactured in the United States of America. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher. 0-07-159247-4 The material in this eBook also appears in the print version of this title: 0-07-159246-6. All trademarks are trademarks of their respective owners. Rather than put a trademark symbol after every occurrence of a trademarked name, we use names in an editorial fashion only, and to the benefit of the trademark owner, with no intention of infringement of the trademark. Where such designations appear in this book, they have been printed with initial caps. McGraw-Hill eBooks are available at special quantity discounts to use as premiums and sales promotions, or for use in corporate training programs. For more information, please contact George Hoare, Special Sales, at...

Words: 27912 - Pages: 112

Free Essay

Literature Review Week 3

...key elements that are needed when conducting a good strong job analysis. This article showed me that I needed to include both essential and non-essential task descriptions. It also gave specifics on the type of equipment that would need to be used and physical demands as well as many other things to include in my analysis. I was honestly hoping this article would help me more. Though I found some of it useful, it didn’t really help me understand what exactly I need to do to gather the information needed in the job analysis. The second article I found was by Jody Wheaton. Her article is all about how conducting a proper job analysis can improve your business. In the article she describes different ways to actually conduct a job analysis. The thing I took from this article was mostly the importance of actually doing research into the job. Because of this article, I actually sought out the HR department and found out what kind of things they would actually need in an HR reception/assistant position. I wanted to know what kind of equipment they would be using and what exactly they would like that person in that role to do. Jody Wheaton states that “Knowledge, skills, abilities, work behaviors, tasks associated with the job, competencies and cultural aspects of the organization should all be part of the data collection process.”2 I was able to add some of these aspects into my paper as well, allowing it to be a little more detailed. This article helped me by explaining to me the...

Words: 685 - Pages: 3