Free Essay

Identify the Ports

In:

Submitted By krasnake
Words 418
Pages 2
For Task 1: Identify the Ports

On my personal laptop, I have 4 USB connectors and a RS232 connector. There was a diagram given on the assignment where I need to identify the ports and adapters labeled in the diagram. I will start at the top left and work clockwise around the diagram to properly identify each one. The first one contains a SPDIF optical digital audio port and 5 1/8-inch mini-jack audio ports. Next we have USB ports then a USB micro socket. Next is the blue colored port which is called a serial port. The last one on the top is mini USB ports. Now continuing to go clockwise but moving to the bottom the PS/2 mouse and/or keyboard adaptor is located. The biggest connector is the parallel port and finally is the Ethernet port.

For Task 2: Identify Memory Slots

Task 3: Identify the Configuration

The configuration shown is SCSI controller which stands for small computer systems interface which is generally used for mass storage. The need of a SCSI connector would be to hook up additional peripheral. A SCSI adaptor allow you to install multiple harddrives, disk drives, scanners, printers, and etc. through one port on your motherboard. It is a shared connection; but it can be used to share devices on two separate computers.

Task 4: Identify the Color Codes

Pink- Microphone In
Light Blue- Line In
Lime Green- Stereo or headphone Out
Brown- Left to Right Speaker
Orange- Subwoofer

Task 5: Identify the Following

There are four pictures given and I will identify each item that is shown. In the first picture there are two plugs shown, the one on the left is a VGA female connector and the one on the right is a VGA male connector. The second picture has two plugs shown as well, the one on the left is a dual link DVI-D female connector and the one on the right is a single link DVI-D male connector. The third picture has two plugs as well, the one on the left is a male dual link DVI-D connector and the one on the right is an HDMI cable. Finally, the last picture has five ports to identify. I will start on the top left hand side and work my way around clockwise to identify each one. They are PS/2 keyboard or mouse connector, EGA connector, DVI-D dual link, HDMI port, and lastly is another PS/2 port.

Similar Documents

Premium Essay

Lab 2

...Task 1: Identify the Ports Procedure 1. Look at the front and back of a desktop or notebook computer for the following bus connectors: RS232, USB, FireWire, and infrared. How many of each type of connector did you find? 12 2. Label the appropriate names to the ports and adaptors given below. PS/2 keyboard port PS/2 keyboard port Parallel port Parallel port Ethernet Ethernet USB ports USB ports Serial port Serial port USB mini jack USB mini jack Audio ports Audio ports USB ports USB ports Task 2: Identify Memory Slots Procedure 1. Using the Internet, locate a diagram or photo of these types of memory slots on a desktop or notebook computer: Memory Stick (MS), Micro Drive (MD), Compact Flash (CF), and Secure Digital (SD). 2. Explain the diagram or photo(s) with the name of each type of memory slot. USB 1 USB 1 Memory card slot Memory card slot Examples: USB 3.0 ports USB 3.0 ports Audio port microphone and earphone jacks Audio port microphone and earphone jacks IEEE 1394 port IEEE 1394 port E sata port E sata port Sd mini slot Sd mini slot Micro sd slot Micro sd slot USB 2.0 PORT USB 2.0 PORT Compact flash Compact flash Dual slot Dual slot Task 3: Identify the Configuration Procedure 1. Identify the following configuration. 2. Define a SCSI and the need to use a SCSI Controller. ------------------------------------------------- SCSI is a set of parallel interface standard used to attach...

Words: 403 - Pages: 2

Free Essay

Computer Lab 1

...Elizabeth Romero Computer and Logic Week 2 Lab Task 1: Identify the Ports Procedure 1. Look at the front and back of a desktop or notebook computer for the following bus connectors: RS232, USB, FireWire, and infrared. How many of each type of connector did you find? I found all four of them. 2. Label the appropriate names to the ports and adaptors given below. Ps/ 2 port USB ports Serial port VGA port Speakers Line in Microphone Ethernet port Pt 1 printer port Game port Task 2: Identify Memory Slots Procedure 1. Using the Internet, locate a diagram or photo of these types of memory slots on a desktop or notebook computer: Memory Stick (MS), Micro Drive (MD), Compact Flash (CF), and Secure Digital (SD). Memory Stick Slot Micro Drive Slot Compact Flash Slot Secure Digital Slot 1. Explain the diagram or photo(s) with the name of each type of memory slot. Memory Stick – is a removable flash memory card format. Electronic flash memory data storage device. Micro Drive- is an extremely small hard disk that can fit in a compact card memory slot. Compact flash- is a flash memory mass storage device used mainly in portable electronic devices. Secure digital- is a non-volatile memory card used extensively in portable devices. Task 3: Identify the Configuration Procedure 1. Identify the following configuration. When a SCSI host adapter card with internal and external connection is used, the SCSI daisy chain can extend through the card. The...

Words: 392 - Pages: 2

Free Essay

I/O Devices

...Task 1: Identify the Ports Procedure 1. Look at the front and back of a desktop or notebook computer for the following bus connectors: RS232, USB, FireWire, and infrared. How many of each type of connector did you find? Desktop: RS232= 02 USB= 04 FireWire= 02 Infrared=00 2. Label the appropriate names to the ports and adaptors given below. Audio Ports 15-Pin VGA Female Port USB Port Type 1.0 PS/2 Keyboard/Mouse Port Parallel Port RJ-45 Ethernet LAN Port HDMI Port USB Port Type 1.0 Task 2: Identify Memory Slots Procedure 1. Using the Internet, locate a diagram or photo of these types of memory slots on a desktop or notebook computer: Memory Stick (MS), Micro Drive (MD), Compact Flash (CF), and Secure Digital (SD). [http://images10.newegg.com/NeweggImage/productimage/A24P_1302690737661335787nIu3iEbNe.jpg] 2. Explain the diagram or photo(s) with the name of each type of memory slot. Task 3: Identify the Configuration Procedure 1. Identify the following configuration. Identified as Multiple Device Support with SCSI Host Adapters - this configuration is also known as Daisy Chaining. It allows multiple devices to work on a single SCSI Host Adapter. 2. Define a SCSI and the need to use a SCSI Controller. ------------------------------------------------- Small Computer System Interface that works as an intermediary bus host adapter to accommodate connections with hard disks (mass storage) and other peripheral devices. The...

Words: 378 - Pages: 2

Free Essay

Nt1110 Worksheet

...This assessment is about the identification of I/O ports and devices linked to a computer. It is easy to accidentally unplug an I/O device. If you do, knowledge of the ports and the devices that connect to them will help you correctly reconnect the device. Required Setup and Tools In this laboratory, you need to: * Look at the outside of a desktop or notebook computer. * Access to the Internet for research. Recommended Procedures Task 1: Identify the Ports Procedure 1. Look at the front and back of a desktop or notebook computer for the following bus connectors: RS232, USB, FireWire, and infrared. How many of each type of connector did you find? I found on my desktop a total of five USB ports, 2. Label the appropriate names to the ports and adaptors given below. PS/2 mouse/keyboard port PS/2 mouse/keyboard port Parallel port Parallel port Ethernet port Ethernet port USB Mini-B socket USB Mini-B socket Serial port Serial port USB Micro-B socket USB Micro-B socket 1/8inch mini jack audio port 1/8inch mini jack audio port USB ports USB ports A memory stick is a removable flash drive. It can store images from digital cameras, camcorders, or other kinds of electronics. It was introduced in 1998 by Sony, which can describe it in the whole memory stick family. There are many types Memory stick Pro, Memory stick Duo, Memory stick Duo Pro, Memory stick Micro, and Memory Stick Pro-HG. The memory stick pro allows maximum...

Words: 711 - Pages: 3

Premium Essay

Blah

...3 SYSTEM UNIT Curriculum Development Centre Ministry of Education Malaysia 1 ICTL For Secondary School - Computer Hardware Module 1. Name of Module : System Unit 2. Learning Outcomes: The students should be able to: • • • identify the components of a system unit state the functions of the main components of a system unit state the functions of cpu, ram, rom and expansions slots found on the motherboard 3. Knowledge and Skills: • main components in the computer system 4. Module Summary: • • • At the end of the module, a student is able to : identify main components of system unit and motherboard state the functions of main components of system unit state the functions of CPU, RAM, ROM and expansion slot This module contains 2 activities: Activity 1 : Identify the components of a system unit Activity 2 : Identify the components of a motherboard As you are doing this module, use the computer in the lab to identify the components in the system unit. 2 ICTL For Secondary School - Computer Hardware Module Notes: What is system unit? Box-like case that contains computer’s electronic components Sometimes called the chassis Figure 1 Examples of System Unit 3 ICTL For Secondary School - Computer Hardware Module Activity 1 : Identify the components of a system unit Inside view of system unit Figure 2 Inside view of System Unit 4 ICTL For Secondary School - Computer Hardware Module Front layer of a system unit DVD-ROM drive CD-ROM/CD-RW drive Zip drive Empty...

Words: 1581 - Pages: 7

Free Essay

Gaza

...GENERAL OBJECTIVES At the end of this course, students should be able to : 1. Identify key elements of the global environment. 2. Discuss how environmental elements interact locally and globally in predictable and unpredictable ways. 3. Describe the impact of human activities on the global environment. 4. Discuss issues relating to sustainable development. 5. Identify international and Caribbean regional environmental challenges 6. Identify biotic and abiotic components of ecosystems and some of their possible interactions. 7. Describe physical, chemical and biological characteristics of the oceans. 8. Identify the principal marine pollutants and the threat they represent. 9. Assess the impact on the marine environment of oil pollution from the oil industry and the shipping industry. 10. Identify requirements to maintain healthy ports and harbours, and current programs to rehabilitate Caribbean ports. 11. Identify organizations and regulatory structures concerned with oceans management and costal zone management in general and within the Caribbean region, including the UNEP regional seas programme. 12. Discuss national and international marine law; the use of civil and criminal law in regulating the environment and the conflict between private property rights and environmental regulation. 13. Identify the main features of UNCLOS, MARPOL, and the London Dumping, Civil Liability, ...

Words: 727 - Pages: 3

Free Essay

Test

...manageable pieces, packaging and addressing them so they will arrive at their proper destination and then reassembling the pieces into the original signal or stream. This paper will observe the part the Transport layer plays in application data encapsulating for use by the Network layer; how it allows simultaneous communication of multiple applications on a single host device while ensuring reliable data delivery to the right application correcting errors if required. The Transport layer is layer 4 in the Open Systems Interconnection (OSI) Model and layer 2 in the Transmission Control Protocol/Internet Protocol (TCP/IP) Model. The Transport layer is needed to track individual conversations, segment, manage and reassemble data packets, identify sending and receiving applications, perform flow control between end users, enable error recovery and initiate and terminate sessions. Any one host may have several applications that are using the network to communicate at one time. The Transport layer’s responsibility is to keep track of and maintain the communication streams that are taking place with each of these applications. Each application creates a stream of data that it uses to communicate with another application using the network. Most of these streams...

Words: 1829 - Pages: 8

Free Essay

Ccna Ch 4

...CCNA 1 Chapter 4 V4.0 Answers Posted in CCNA 1 - Network Fundamentals (V4.0) - 5 March 2010 - 1 comment - 188,626 views 1 Refer to the exhibit. What two pieces of information can be determined from the output that is shown? (Choose two.) The local host is using three client sessions. The local host is using web sessions to a remote server. The local host is listening for TCP connections using public addresses. The local host is using well-known port numbers to identify the source ports. The local host is performing the three-way handshake with 192.168.1.101:1037. 2. After a web browser makes a request to a web server that is listening to the standard port, what will be the source port number in the TCP header of the response from the server? 13 53 80 1024 1728 3. Which information is found in both the TCP and UDP header information? sequencing flow control acknowledgments source and destination 4. Which is an important characteristic of UDP? acknowledgement of data delivery minimal delays in data delivery high reliability of data delivery same order data delivery 5. Refer to the exhibit. Host A is using FTP to download a large file from Server 1. During the download process, Server 1 does not receive an acknowledgment from Host A for several bytes of transferred data. What action will Server 1 take as a result? create a Layer 1 jam signal reach a timeout and resend the data...

Words: 973 - Pages: 4

Free Essay

Information

...Nalapatla 3884252 What is a Port Number A port number is a way to identify a specific process to which an internet or other network message is to be forwarded when it arrives at a server. For the transmission control protocol and the user Datagram protocol, a port number is a 16 bit integer that is put the header appended to a message unit. This port number is passed logically between the client and the server transport layers and physically between the transport layer and the Internet Protocol layer and it will forward it on to the other layers. For an example, a request from a client to a server on the internet may request a file to transfer from the host File Transport Protocol (FTP) server. In order to pass that request which is passed by us to the FTP in the remote server, the Transmission Control Protocol (TCP) identifies the port number which is of 16 bit length, then that port will forward the request to the FTP Server. FTP and the FTP Port Number The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files from one host to the other host over a TCP – based network, for an example Internet. FTP is a Client – server architecture and uses a separate control and the data connections between the client and the server. The model of the FTP is shown below. Fig 1: File Transport Protocol Model Executing an FTP port connection through a client is two – stage process requiring the use of two different ports. Once the user enter the...

Words: 1400 - Pages: 6

Free Essay

Ccna 1 Chapter 4 Study Materials

...1. [pic] ccna 1 chapter 4 answers 100% 2011 Refer to the exhibit. What two pieces of information can be determined from the output that is shown? (Choose two.) The local host is using three client sessions. The local host is using web sessions to a remote server. The local host is listening for TCP connections using public addresses. The local host is using well-known port numbers to identify the source ports. The local host is performing the three-way handshake with 192.168.1.101:1037. 2. After a web browser makes a request to a web server that is listening to the standard port, what will be the source port number in the TCP header of the response from the server? 13 53 80 1024 1728 3. Which information is found in both the TCP and UDP header information? sequencing flow control acknowledgments source and destination 4. Which is an important characteristic of UDP? acknowledgement of data delivery minimal delays in data delivery high reliability of data delivery same order data delivery 5. [pic] ccna 1 chapter 4 answers 100% 2011 Refer to the exhibit. Host A is using FTP to download a large file from Server 1. During the download process, Server 1 does not receive an acknowledgment from Host A for several bytes of transferred data. What action will Server 1 take as a result? create a Layer 1 jam signal reach a timeout and resend the data that needs to be acknowledged send a RESET bit to the host change the window size in the Layer 4 header 6. ...

Words: 1109 - Pages: 5

Premium Essay

Ccna

... Virtual Circuit The OSI Model As you study this section, answer the following questions:       What is the OSI model and why is it important in understanding networking? How does the third OSI model layer relate to administering routers? Which OSI model layer is concerned with MAC addresses? What protocols correspond to the Presentation and Session layers? What is the difference between the TCP and UDP protocols? What is the EIA/TIA 232 protocol concerned with? This section covers the following exam objectives:    103. Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network 105. Describe the purpose and basic operation of the protocols in the OSI and TCP models 110. Identify and correct common network problems at layers 1, 2, 3 and 7 using a layered model approach OSI Model Facts The OSI model classifies and organizes the tasks that hosts perform to prepare data for transport across the network. You should be familiar with the OSI model because it is the most widely used method for understanding and talking about network communications. However, remember that it is only a theoretical model that defines standards for programmers and network...

Words: 73801 - Pages: 296

Free Essay

Wertewrterterw

...to the network are called: A. supercomputers. B. mainframe computers. C. servers. D. embedded computers. Answer: C Reference: Objective 2: Identify the Different Types of Computers Difficulty: Moderate The computer and any equipment that connects to it are called the: E. hardware. F. software. G. motherboard. H. control unit Answer: A Reference: Objective 3: Describe Hardware Devices and Their Uses Difficulty: Easy The nonvolatile, permanent memory that remains in the computer even when it is turned off is called: I. CPU. J. ALU. K. RAM. L. ROM. Answer: D Reference: Objective 3: Describe Hardware Devices and Their Uses Difficulty: Easy Input, process, output, and storage are the four basic computer functions known as the: M. central processing system. N. information processing cycle. O. memory processing. P. logical data processing. Answer: B Reference: Objective 1: Define Computer and Identify the Four Basic Computing Functions Difficulty: Moderate A(n) ____________ computer is one that is capable of running more than one operating system. Q. open-source R. wide area network S. local area network T. dual-boot Answer: D Reference: Objective 4: Identify Types of Software and Their Uses Difficulty: Challenging Connecting one computer to another creates a(n): U. network. V. control unit. W. sector. ...

Words: 769 - Pages: 4

Free Essay

Port Scanning

...Unit 3 Assignment 1 Choosing Port Scanning Software NT2670, James Fairchild 1. What is Port Scanning? Is a software application designed to probe a server or host for open ports. This is often used by administrators to verify security policies of their networks and by attackers to identify running services on a host with the view to compromise it. 2. What is the goal of Port Scanning? The results of a scan on a port is usually generalized into one of three categories, Open or accepted: The host sent a reply indicating that a service is listening on the port. Closed or denied or not listening: the host sent a reply indicating that connections will be denied to a port. Filtered, dropped or blocked no reply from the host. Open ports present two vulnerabilities of which administrators must be wary, Security and stability concerns associated with the programs responsible for delivering the service- open ports. Security and stability concerns associated with the operating system that is running on the host. Open or closed ports. 3. Would you prefer an open source or proprietary port scanning software? Depending on who you ask? Many people in business prefer to use proprietary software instead of open source software, due to the misconception that proprietary software is better supported than open source. After several years of supporting both open source and proprietary software it becomes clearly evident that just because you pay for proprietary software does not mean...

Words: 454 - Pages: 2

Premium Essay

Paper

...PCs using MS Word Table, MS Access, and MS PowerPoint Case Study – Using MS Office 2010 / 2013 / 365 Please use the document “READ FIRST - Case Study Instructions – Director’s Requirements” for each of the parts described below. Part 1: Specifications Table (MS Word) Use the project description HERE to complete this activity. For a review of the complete rubric used in grading this exercise, click on the Assignments tab, then on the title Case Study Part 1 - PC Specs (Word)– click on Show Rubrics if the rubric is not already displayed. For the case study provided to you, create MS Word tables that identify and contain the hardware and software requirements to meet the director's requirements. The MS Word document in its final form will include 6 MS Word tables. It will include a two-paragraph narrative summary that classifies the user type and identifies the PC category that will be recommended. The specific instructions are found in the table at the end of this file. Students are expected to conduct external research to adequately address all aspects of the assignment requirements. It is suggested that students use a computer manufacturer's site (i.e., Apple, Dell, Toshiba) to help in identifying all the components needed to meet the director's requirements. Remember, although there are 5 computers to be purchased, you are required to configure only one, as the same one may be purchased for all 5 employees. Any outside sources should be correctly cited in...

Words: 2182 - Pages: 9

Premium Essay

System Unit

...Chapter 4 Objectives Differentiate among various styles Differentiate among various styles of system units of system units Identify chips, adapter cards, and other Identify chips, adapter cards, and other components of aamotherboard components of motherboard Describe the components of aaprocessor and how Describe the components of processor and how they complete aamachine cycle they complete machine cycle Identify characteristics of various personal Identify characteristics of various personal computer processors on the market today computer processors on the market today Define aabit and describe how aaseries of bits Define bit and describe how series of bits represents data represents data Explain how programs transfer in Explain how programs transfer in and out of memory and out of memory Differentiate among the various Differentiate among the various types of memory types of memory Describe the types of expansion slots and Describe the types of expansion slots and adapter cards adapter cards Explain the difference among aaserial port, aa Explain the difference among serial port, parallel port, aaUSB port, and other ports parallel port, USB port, and other ports Describe how buses contribute to aa Describe how buses contribute to computer’s processing speed computer’s processing speed Identify components in mobile computers Identify components in mobile computers and mobile devices and mobile devices Chapter 4 The Components of the System Unit Next The System Unit ...

Words: 3218 - Pages: 13