... 1. To operate the Device Manager of MS Windows 7 independently; 2. To determine the different hardware that makes up the entire computer system; 3. To validate the theories related to computer hardware structures. DISCUSSION: The Device Manager (see Figure 1.1) is a system software that comes with MS Windows 7 operating system. It is a powerful tool that lets you inspect, manage, and troubleshoot drivers for the hardware already installed in a computer. Figure 1.1 Device Manager EQUIPMENTS: One (1) Set Desktop Computer with MS Windows 7 operating system installed PROCEDURE: 1. Boot the computer using MS Windows 7 operating system. 2. Choose Start>Control Panel>System and Maintenance>System>Device Manager. - or - Choose Start, type “device manager” in the Search box, and then press Enter. 3. Expand the “Display adapters” category by clicking its corresponding plus (+) symbol. 4. List down below all installed devices under Display adapters. Display adapter devices: a. AMD Radeon HD 7640G 5. Show the device’s properties of first listed device by right-clicking its device name and then clicking“Properties” on the active menu (see Figure 1.2). Figure 1.2 Device Properties 6. On the Properties dialog box, click each of the following tabs: General, Details, Driver and Resources. Write the description below of each tab relating to that device. General: AMD Radeon HD 7640G Device type: Display Adapters ...
Words: 4193 - Pages: 17
...office in Eastern Washington. Each office runs differently. The company has a set of policies and procedures but each small office is allowed to interpret these rules as they see fit. The way this company is being ran is not working and things need to change before the company has more legal and financial issues. Recently, in our community, the main office relieved the manager of her duties and hired new management. The new management is working well together. They have put new ethical leadership and employee relations into effect and they are working on ways to “Reduce, Reuse & Recycle” ENVIROMENTAL CONSIDERATION AND RECOMMENDATIONS VSA does not have any policies that cover environmental issues at this time. The new management in the local office has recognized this as a problem and has made new policies for their individual office. Their supervisor from the main office is asking the new management to write all their ideas down and implement them. Once the main office has the new environmental policies for the local office they will be reviewing the policy and follow the progress. If they feel the local offices ideas are working and could benefit the company they will apply them company wide. Visitation Support Agency Because VSA is a service provider they do not have environmental issues that deal with a lot of...
Words: 3536 - Pages: 15
...Of the 29 places to eat on Cornell’s campus, I chose to evaluate the food waste practices at the Risley Dining Hall on North Campus, for this case study. Risley is one of the program houses and focuses on art and theater and is located right next to one of the major bus stops on north, across the street from Balch Residence Hall (an all girls’ freshman dorm hall). They are open for lunch and dinner everyday. I eat lunch at Risley almost every week day with my friends. In comparison to my experiences at some of the other dining halls on campus, Risley seems to have a quieter setting. Risley has one serving line, a salad bar, and a fruit/sides bar. There are round tables set up to seat about 4 people. Studies show that when an individual eats with a larger group of people, they are more likely to consume greater amounts of food, especially at a buffet-style dining area (citation). I think the small, round tables at Risley promote smaller lunch gatherings and thus, help cut back on the amount of food wasted. Several people eat alone while doing homework on their laptops. I have noticed that these individuals appear to eat less than those eating with a more social group of friends. There are also often adults getting lunch at Risley, more so than I...
Words: 1523 - Pages: 7
...PRACTICAL ASSIGNMENT PREPARATION SHEET | CHOICE OF WORK | DO NOT WRITE IN THIS MARGIN (For examiners use only) | ACTIVITIES/DISHES CHOOSEN | MAIN INGREDIENTS WITH QUANTITIES EGUIPMENT AND MATERIALS NEEDED | | * Prepare a sample budget. * Prepare a brochure. * Demonstrate your knowledge of recycled item for the home. * Prepare a low cost one pot meal. | Cartridge paper, 4 markers, 1 glue, 1 sheet cardboard, assortments of thumb tacks, 1 tape, 1 pencil, 1 ruler, 1 eraser. Sheet of blank papers, scissors, markers, pencils, coloured papers. Sheet of card board, sheets of news paper, assortment of thumb tacks, 1 tape, 4 markers, 1 glue. Mackerel and vegetable lasagna.2 tins grace Jack Mackerel, 8 strips lasagna noodles, 1 tlbs hot sauce, 11/2 cups water, 1 teaspoon garlic powder, 1 small onion, 1drained egg, chopped 1 sweet pepper, 12 uncooked lasagne noodles, 2 cups, white cheddar cheese, bread crumbs. | | PRACTICAL ASSIGNMENT PREPARATION SHEET PLAN OF WORK | DO NOT WRITE IN THIS MARGIN (For examiners use only) | TIME | ORDER OF WORK-METHOD/OVEN MANAGEMENT | | 12:00-12:3012:30-1:001:00-1:30 | General Preparation: Collect utensils and equipment needed. Wash and sanitize. Collect all ingredients on a tray. Set up work area. Line garbage bin, set cap. Wash hands and preheat oven to 350oF.Combine Mackerel and mixed vegetable with seasoning, mix well and set aside.Spread 1cup...
Words: 414 - Pages: 2
...3hours Task: make sure to view schedule at beginning of the shift to make sure areas have coverage at the end of shifts and enough to check-out customers…..3hours Total hours for objective one:11 hours Objective 2: develop a safety plan for cart pushers, and analyze a better method for scheduling duties, and using different techniques to make sure it’s a clean environment. Parking lot is clear of carts, and trash is picked up by……. Task: view the schedule ahead of time and schedule cart pushers to work on specific areas outside, and inside of the store…..2hours Task: once assigned a duty, report to ma or any other customer service manager when the task is completed, so that they can start on another task….2 hours Task: Assign three to four cart pushers a day rotating specific tasks and duties so that there is enough coverage during that day…..3 hours Task: Develop a plan to come up and assign recycling bins and putting trash in the trash cans, to recycle goods found outside in the parking lot, and throw away trash……2 hours Task: Make sure corrals/bins always full of carts or half full with reserves….2hours Total Hours for Objective Two: 11 hours Objective 3: Develop a method of filing and designing a system to keep important information and papered at the customer service desk to reduce time spent finding important papers and...
Words: 740 - Pages: 3
...20 things you do not know about Windows XP [pic] Now it's time to delve a bit deeper and uncover some of Windows XP's secrets. 1. It boasts how long it can stay up. Whereas previous versions of Windows were coy about how long they went between boots, XP is positively proud of its stamina. Go to the Command Prompt in the Accessories menu from the All Programs start button option, and then type 'systeminfo'. The computer will produce a lot of useful info, including the uptime. If you want to keep these, type 'systeminfo > info.txt'. This creates a file called info.txt you can look at later with Notepad. (Professional Edition only). 2. You can delete files immediately, without having them move to the Recycle Bin first. Go to the Start menu, select Run... and type ' gpedit.msc'; then select User Configuration, Administrative Templates, Windows Components, Windows Explorer and find the Do not move deleted files to the Recycle Bin setting. Set it. Poking around in gpedit will reveal a great many interface and system options, but take care -- some may stop your computer behaving as you wish. (Professional Edition only). 3. You can lock your XP workstation with two clicks of the mouse. Create a new shortcut on your desktop using a right mouse click, and enter 'rundll32.exe user32.dll,LockWorkStation' in the location field. Give the shortcut a name you like. That's it -- just double click on it and your computer will be locked. And if that's not easy enough, Windows key + L...
Words: 1371 - Pages: 6
...department made sure of that. We also had to pay for the activities we wanted to be part of, turn in all of our books, I was excited about this because, carrying around all of those books in my book bag was like carrying around bricks. We cleaned out our lockers for the last time. Our locker location changed each year, depending if you were a senior, junior, sophomore, or freshman. For me, my senior locker was #1137, and was located on the first floor in the senior wing of school. And of course, we couldn’t forget, we had to turn in the last dreadful assignments. Since English 12 was a mandatory class, everyone had to take it in order to graduate. No one liked our English teacher, she almost failed the previous senior class. We all had to write an eight to ten page paper, choosing to talk about one of the characters from the novel Pygmalion. It was about a lady named Eliza whose speech was horrid, and sought out help from Professor Higgins, renowned man of phonetics to help her become a lady. We were all threatened by Mrs.Borton, the senior guidance consular, that if we did not do all of those things, we could not participate in senior week. This week was our week, to finally left go and be free from our high school problems. If we could not participate in this week, what would be the point of working so hard all year, all of our high school years? This was the only week of high school that was absolutely care free. Everything was done, I had nothing more to do but to enjoy this...
Words: 2239 - Pages: 9
...e-mail message itself that will unravel their sometimes carefully woven veil of secrecy. Attackers come in all forms and from a variety of different circumstances. For instance, an attacker can begin a phishing scam with only a web server they control with very little programming experience and a way to send a lot of e-mail messages. (Jones 4) In order to combat the waves of cyber-attackers, we must utilize Open Source Community applications to combat the continual onslaught of infections, exploitations, and trickery employed everyday against our systems and networks. Today's attacker uses a variety of technologies to employ their methods and understanding those abilities is integral to preparing for an investigation. While dial up modems would seem pretty much a thing of the past, there are still a significant number of people accessing the Internet via these devices. Cable or DSL modems are now the in-vogue conduit to the Internet and offer the vulnerability of always being "on-line." Criminal activity comes in many different forms including, spam, phishing, viruses, and worms to name a...
Words: 2742 - Pages: 11
...author name] | | | Contents 1.0 Introduction 2 2.0 Terms of Reference 2 3.0 Findings 2 3.1 Sustainability 2 3.2 Green Business Practices 3 3.2.1 Disposable Materials 3 3.2.2 Source of Energy 3 3.2.3 Natural Hair Products 4 3.2.4 Recycling 4 3.3 Green ICT 4 3.3.1 Salon Genius Software 4 3.4 Customer Demand for Environmentally Friendly Products 5 4.0 Conclusion 5 5.0 Recommendations 5 Bibliography Appendix 1.0 Introduction As part of my HNC Administration and IT course I have been asked by my communication lecturer to investigate and write a report by delivering a concrete understanding outlining the benefits of being green to the environment and the organisation. It will explore one of the UK’s revolutionary greenest hair salon Élan Hair Design. The report was to be submitted by 01/10/14 and the recommendations that were asked for were: * To research the environment and the need for sustainability and apply it to a hairdressing business. * To research green business practices and apply it to a hairdressing business. * To research green ICT and apply it to a hairdressing business. * To assess customer demand for Environmental friendly products and apply to a hairdressing business. 2.0 Terms of Reference For research, this report used the internet...
Words: 1375 - Pages: 6
...Progress Report Supervisor: Hussam Jamal & Mohammad Alwan At IT Services with Unilever Project Name | Status | Description | Re locate Data cable and STC DP | Finished | Relocating the main STC data circuit distributed points from one location to another. That will require moving all the critical MPLS and IP VPN circuit with minimum downtime possible.To accomplish that, we should re-pulling new cables and isolate place with label every connectionDowntime was 15 MinutesNumbers of circuits:1 x MPLS4 X IP VPN35 X Telephone lines | Clean and organize server room | In Progress | Head Office Server room last organize was before 10 years, challenge was to clean and organize all the patch cords and cables with zero downtime.This is the active server room organizing projectNumbers of Racks= 5 Number of Patch Panel= 25 | Connection Documentation, Design layout | Not Started | Building High level design with all L2 and L3 information.Create backup configuration library for network devices in server room | Refurbishment Project Phase 2 | Finished (Following) | Refurbishment project to the entire building including IT infrastructure: * Wireless LAN * LAN * IP Telephone * Switches * Desk Top setupThe roll was to lead all moving and setup activity, and assure of service delivery on the entire building | Description of the accomplished...
Words: 701 - Pages: 3
...Windows ® XP FOR DUMmIES by Andy Rathbone ® HUNGRY MINDS, INC. New York, NY N Cleveland, OH N Indianapolis, IN N Foster City, CA Windows ® XP For Dummies® Published by Hungry Minds, Inc. 909 Third Avenue New York, NY 10022 www.hungryminds.com www.dummies.com Copyright © 2001 Hungry Minds, Inc. All rights reserved. No part of this book, including interior design, cover design, and icons, may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording, or otherwise) without the prior written permission of the publisher. Library of Congress Catalog Card No.: 2001092737 ISBN: 0-7645-0893-8 Printed in the United States of America 10 9 8 7 6 5 4 3 2 1 1B/TQ/QY/QR/IN Distributed in the United States by Hungry Minds, Inc. Distributed by CDG Books Canada Inc. for Canada; by Transworld Publishers Limited in the United Kingdom; by IDG Norge Books for Norway; by IDG Sweden Books for Sweden; by IDG Books Australia Publishing Corporation Pty. Ltd. for Australia and New Zealand; by TransQuest Publishers Pte Ltd. for Singapore, Malaysia, Thailand, Indonesia, and Hong Kong; by Gotop Information Inc. for Taiwan; by ICG Muse, Inc. for Japan; by Intersoft for South Africa; by Eyrolles for France; by International Thomson Publishing for Germany, Austria and Switzerland; by Distribuidora Cuspide for Argentina; by LR International for Brazil; by Galileo Libros for Chile; by Ediciones ZETA S.C.R. Ltda. for Peru; by WS Computer Publishing Corporation, Inc...
Words: 67418 - Pages: 270
...A+ Certification ____ has industry recognition, so it should be your first choice for certification as a PC technician. Computing Technology Industry Association The most significant certifying organization for PC technicians is the ____. Educating As a support technician, your goals can include ____ the user, as well as repairing the computer. Handshake When you arrive at the customer's site, greet them with a ____. Phone support requires more interaction with customers than any other type of PC support. Expectations Part of setting ____ is to establish a timeline with your customer for the completion of a project. Interviewing the user Troubleshooting begins by ____. Taking ownership of ____ a problem increases your value in the eyes of your coworkers and boss. Back injury ____, caused by lifting heavy objects, is one of the most common injuries that happen at work. Least As you solve computer problems, always keep in mind that you don't want to make things worse, so you should use the ____ invasive solution. False - Copyright laws When someone purchases software from a software vendor that person legally owns the software. STOP If a problem happens in the kernel mode of Windows, a ____ or blue screen error occurs. .docx Which file extension indicates a file created by a word processing program in the Office 2007 /2010 suite? Service A ____ is a program that runs in the background to...
Words: 1019 - Pages: 5
...SOLID WASTE MANAGEMENT FOR SMALL HOTELS JESSICA MOULD OKANAGAN COLLEGE Introduction Tourism is “one of the world’s fastest-growing industries”; as of 2012, “global tourism accounts for 1.2 trillion dollars (USD) in exports annually, 9% of worldwide GDP and is responsible for one out of every 12 jobs” [ (Canadian Tourism Commission, 2013) ]. Ninety percent of hotels worldwide are small hotels, e.g. hotels with less than 50 rooms (Radwan et al., 2010, p. 179). This essay addresses the problems associated with solid waste produced by the hotel industry including the difficulties faced by small hotels in managing their solid waste and ultimately describes benefits and solutions for sustainable waste management by small hotels. Waste minimizatioin is priority area 1 on Agenda 21 for the Travel and Tourism Industry [ (Stipanuk, 2006, p. 89) ]. The objective of priority area 1 is “to minimize resource inputs, maximize product quality, and minimize waste outputs” [ (Stipanuk, 2006, p. 89) ]. Waste is defined as “unused material produced as a result of inefficient production and/or consumption practices” that “puts economic and environmental costs on society through its collection, treatment and disposal” (Radwan et al., 2012, p. 535). “Waste can be regarded as a human concept as there appears to be no such thing as waste in nature” where “waste products created by a natural process or organism quickly become the raw products used by other processes and organisms”(Full Cycle...
Words: 3022 - Pages: 13
...Passing Score: 700 Time Limit: 240 min File Version: 16.5 http://www.gratisexam.com/ Exam Code: 312-49 Exam Name: Computer Hacking Forensic Investigator Practice Testw CHFI-1-105 QUESTION 1 When a file or folder Is deleted, the complete path, including the original file name, Is stored In a special hidden file called "INF02" In the Recycled folder. If the INF02flle Is deleted, It Is re-created when you _______ A. B. C. D. Restarting Windows Kill the running processes In Windows task manager Run the antivirus tool on the system Run the anti-spy ware tool on the system Correct Answer: A Section: (none) Explanation Explanation/Reference: A QUESTION 2 Graphics Interchange Format (GIF) is a ___________RGB bitmap Image format for Images with up to 256 distinct colors per frame. A. B. C. D. 8-bit 16-bit 24-bit 32-bit Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 3 The IIS log file format is a fixed (cannot be customized) ASCII text-based format. The IIS format includes basic items, such as client IP address, user name, date and time,service and instance, server name and IP address, request type, target of operation, etc. Identify theservice status code from the following IIS log. 192.168.100.150, -, 03/6/11, 8:45:30, W3SVC2,SERVER, 172.15.10.30, 4210, 125, 3524, 100, 0, GET, / dollerlogo.gif, A. B. C. D. W3SVC2 4210 3524 100 Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 4 International Mobile Equipment Identifier...
Words: 11383 - Pages: 46
...photos are standing side-by-side. In the first, a young teen-age boy is typing on a computer keyboard and smiling. In the second, a man is sitting in front of a computer reading using his refreshable braille display. In the third, three children are in a computer lab. All three have headphones. One is looking at the screen and one is listening to the output. (The face of the third child is blocked by the head of the second). End of graphic description]Joanmarie Diggs, M.Ed.The Carroll Center for the Blind 2002 AER International Conference 20 July 2002We know….The world is made up of objects whose function and form dictate how we access and use these objects. Children who are blind or visually impaired need concrete, hands-on experiences so that they can understand the world around them and can independently and safely interact with the objects they encounter.Similarly….The Windows Operating System is made up of objects whose function and form dictate how we access and use these objects. As with accessing objects in the environment, people who are sighted have visual information about the form and function of Windows objects and controls. In addition, a mouse user can access all windows controls in the same way: clicking on them. Children who are blind or visually impaired need to understand the form and function of these objects and controls so that they can independently use a computer and successfully interact with new and unexpected objects.[Graphic. Clip art of a young man sitting...
Words: 6098 - Pages: 25