Premium Essay

Cmit

In: Computers and Technology

Submitted By jantoniog3
Words 5272
Pages 22
How to Build a Custom PC
Jinbin Zhu
University of Maryland University College

Table of Contents
Introductions 3
Hardware Components for PC 4
Preparations Before Installation 5
Step One: Mount the Motherboard 5
Step Two: Install the Processor 6
Step Three: Install CPU Fan 7
Step Four: Installing PCI/ Graphics Card ………………………………………………………………………………………………8
Step Five: Installing Hard Drive and DVD Drive…………………………………………………………………………………….8
Step Six: Install Power Supply……………………………………………………………………………………………………………..9
Step Seven: Connecting all the cables…………………………………………………………………………………………………..10
Step Eight: Connect all the external cables…………………………………………………………………………………………..12
Step Nine: Set Up Bios and Install Windows 7 Operating System…………………………………………………………13
Post Installation……………………………………………………………………………………………………………………………………17

Abstract This paper will cover all the steps to properly build a custom computer from scratch. After following this guide, the readers should be able to install the windows operating system, set up critical key features within the operating system, as well as knowing all the key components of a desktop computer as well as their functions. On top of learning how to install the hardware and software components, we will cover some safety protocols that will ensure the project is successful.

Introductions:
Building your own pc is one of the best ways to get the most out of your money. This method allows the consumers to pay only for the components they need for their everyday work. Custom computers are generally more efficient than factory made units. There are a plethora of options in the market which will match any user demands. You are in full control of your budget simply because you pay for what you want. Gathering all the necessary components. Every PC has a set amount of hardware that are required

Similar Documents

Free Essay

Cmit

...Extending the NATO Architecture Framework to Support Service Oriented Architectures Mr J Keefe – NATO AF Overview Dr I Bailey – SOA Views 23 May 2006 NATO NEC and the Decision Loop Understand Faster and better Cognitive Domain Knowledge Superiority Orient Information Domain Decide Better and faster Decision Superiority Decide Network Enabled Information Effects Capability Observe Act Superiority Superiority Physical Domain See first, more Act decisively NATO NEC will enable us to operate more effectively in the future strategic environment through the more efficient sharing and exploitation of information within the Alliance and with our coalition partners This will lead to better situational awareness across the board, facilitating improved decision-making, and bringing to bear the right military capabilities at the right time to achieve the desired military effect. Key Issues Clarity of vision Roadmap for change Dealing with complexity Legacy Environments – ‘stove-piped’ solutions Multiple Agencies New Technologies – SOA Information Assurance Multiple Customers Operators Operational planners Acquisition community Developers Framework and Methodology NAF Reality: Complexity of Defence Applications Reality: Complexity of Defence Applications inhibit agility inhibit agility Mainframe PC/NT apps Unix apps 3rd Party Interface AIS Reports Depository Banks Vendor Setup Budget ...

Words: 2809 - Pages: 12

Premium Essay

Part2 Cmit 350

...CMIT 350 WAN and SOHO Skills Implementation UMUC Winter 2015 Springfield Site Configuration: Required Implementation: Device hostnames, banners, secured passwords and spanning tree protocol. * Device Configurations: Implement device hostnames to match the xACME educational topology labels. Provide a template and sample configuration for the MOTD banner and login banner (wording and implementation) for one of the switches. Keep this generic, as it will be implemented on all switches in the xACME educational topology. Lastly, include the configuration steps for implementing device passwords on both console port (out-of-band communications) and VTY (Telnet/in-band communications). All passwords should be encrypted. Required Implementation: Configure all devices hostnames as per the xACME topology Configure encrypted passwords (console and Telnet ports) on all devices Configure MOTD and Login banner for one of the switches Create Server VLANS, Faculty VLANS, Instructional VLANS and Administrative VLANs on all switches Assign ports to VLANs on all switches Assign mode of access of VLANS Configure trunks between switches Make Switch1 as primary root bridge for all VLANs Configure security to protect from bogus BPDUs Configure Hostname: 1. Enable 2. Router# configure terminal 3. Router(config)#hostname (SpringfieldSw1, SpringfieldSw2, SpringfieldSw3, SpringfieldSw4) 4. End 5. Copy run start Creating Passwords: 1. Conf t 2...

Words: 3539 - Pages: 15

Premium Essay

Cmit Final Project

...CMIT376 FINAL PROJECT (250 points) You are the network administrator for City Power & Light. CP&L has five different locations named Central, Northwest, Northeast, Southwest, and Southeast. The Central location has 500 client computers and two network servers. The Northwest and Northeast locations have approximately 75 client computers and one server computer each. The Southwest and Southeast locations have 100 client computers and one network server each. The diagram below illustrates the company’s network infrastructure. Each server is on a separate IPv4 subnet, using non-MS routers to provide access to other internal locations. Subnetting Table (using a subnet mask of 255.255.255.0) 10.18.1.0 – Central Location – 250 users and server S1 10.18.2.0 – Central Location – 250 users and server S2 10.18.3.0 – Northwest Location – 75 users and server S3 10.18.4.0 – Northeast Location – 75 users and server S4 10.18.5.0 – Southwest Location – 100 users and server S5 10.18.6.0 – Southeast Location – 100 users and server S6 [pic] All servers are Domain Controllers in the City Power & Light domain (called CPANDL.AD). The servers run Microsoft Windows Server 2008, Enterprise Edition. All client computers run Windows XP, Vista SP1, or Windows 7. City Power & Light also has a website maintained by their ISP called CPANDL.COM (http://www.cpandl.com). Andy Ruth, director of CP&L, asked you to design a networking infrastructure for the company. The requirements are: ...

Words: 626 - Pages: 3

Premium Essay

Cmit 495 Implementation Plan

...World-Wide Trading Company: Project Implementation Plan Group 3 Kristine Bird (AD Forest Domain OU, Groups and GPO Implementation) Ryan Bonisch (Contact list and LAN Implementation Tasks) Anthony Campo (Configuration of Routers, Switches, and VLANs) Gerald Casanada (Voice VLAN, Wireless, DHCP and DNS) Jennifer Coleman (AD Implementation and Tasks lists for AD Policies) Billie Jo Derouin (Security Implementation) Raymond Mack (Security Technology and Timeline) University of Maryland University College CMIT 495 Professor Sam Musa February 28, 2016 Table of Contents Introduction 2 Purpose 3 Implementation Requirements 3 Project Contact List 3 Tool List 3 Equipment Installation Plan 5 Project TimeLine 6 Lan Implementation task 7 Security Implementation task 11 Configuration Routers 41 Switches 46 VLAN Configurations 49 Voice VLAN and Wireless 51 DHCP and DNS 54 Active Directory Implementation Task 56 Active Directory Policies 58 AD Forest Domain OU formation/AD Group Formation/AD GPO Implementation 68 Security Technologies 88 Introduction The implementation of the WWTC is crucial to keep the business functioning and growing. To ensure that new office installation goes smooth group 3 will create a functional implementation plan from the design we proposed to WWTC over the last 7 weeks. Purpose The purpose of this plan is to provide a step by step guide on the network designed proposed...

Words: 13687 - Pages: 55

Free Essay

Cmit 321 Final Exam

...CMIT 321 Final Exam Click Link Below To Buy: http://hwaid.com/shop/cmit-321-final-exam/ Written 2016 Attempt Score: 121 / 125 - 96.8 % Final Exam Question 1 1 / 1 point __________ is the exploitation of an organization's telephone, dial, and private branch exchange (PBX) system to infiltrate the internal network in order to abuse computing resources. a. War driving b. Line dialing c. PBX driving d. War dialing View Feedback Question 2 1 / 1 point __________ cryptography is the most common method on the Internet for authenticating a message sender or encrypting a message. a. Symmetric b. Hash-based c. Private-key d. Public-key View Feedback Question 3 1 / 1 point __________ is a lightweight Knoppix version cut to 50 MB for a business-card-sized CD. a. Gnoppix b. GeeXboX c. Morphix d. Damn Small Linux View Feedback Question 4 1 / 1 point The __________ utility tests the integrity of an ODBC data source. a. odbcping b. ASPRunner c. FlexTracer d. DbEncrypt View Feedback Question 5 1 / 1 point In the TCP/IP stack, the __________ layer is where applications and protocols, such as HTTP and Telnet, operate. a. Internet b. network c. transport d. application View Feedback Question 6 1 / 1 point Attackers can use a simple test to find out if an application is vulnerable to an OLE DB error. They can fill in the username and password...

Words: 4865 - Pages: 20

Premium Essay

Cmit 350 Final Project

...WAN Implementation with SOHO Skills Configuration Prepared for: University of Maryland University College Prepared by: Nathan Poole Table of Contents I. Springfield Site Device and STP Configurations II. Worchester Site Subnetting Configurations III. Boston Site Routing Protocol, Route Summarization and Topology Improvements IV. Sacramento Site VLAN, Routing on a Stick (ROS) and DHCP Implementation V. Los Angeles Site Management Technologies VI. xACME WAN - WAN Implementation and Secure Communications VII. Bibliography WAN Implementation with SOHO Skills Configuration I. Springfield Site Device and STP Configurations Problem Statement: The device hostnames on each switch are generic and default. They do not match the network topology device hostnames as delivered with the network architecture. Each switch and router must have the correct hostname configured per device. Switch>en Switch#config t Enter configuration commands, one per line. End with CNTL/Z. Switch(config)#Hostname SpringfieldSwitch1 SpringfieldSwitch1(config)# Switch>en Switch#config t Enter configuration commands, one per line. End with CNTL/Z. Switch(config)#Hostname SpringfieldSwitch2 SpringfieldSwitch2(config)# Switch>en Switch#config t Enter configuration commands, one per line. End with CNTL/Z. Switch(config)#Hostname SpringfieldSwitch3 SpringfieldSwitch3(config)# Switch>en Switch#config t Enter configuration commands, one per line. End with CNTL/Z...

Words: 1180 - Pages: 5

Premium Essay

Differentiate

...sectors), to maintain their competitive edge and to pursue ‘continued learning’. This may include both formal education and job-specific training and development, re-training and upskilling. The Higher Education and Training Awarding Council describes learning as ‘a process by which a sustainable change in a learner’s knowledge, skill or competence occurs as a result of experience (of phenomena)’ (HETAC, 2009). The phenomena could include such things as lectures, lecture notes, power point presentations, and graphics etc. (CMIT, 2015). It is argued that passive observation of such ‘phenomena’ does not necessarily constitute learning, as it is possible to sit through an entire lecture that includes, handouts, visuals and up front lecturing and learn nothing. In order to effectively learn, a learner must ‘through a process involving linking, modifying existing knowledge and with skill and competency…construct a ‘cognitive’ representation from the phenomena’ (CMIT, 2015, p.5). O’Carroll (2012) further develops this idea by suggesting that learning occurs when there is a permanent change in behaviour as a result of the phenomena. For the purposes of this assignment it is necessary to firstly have a basic understanding of some learning principles and theories, before trying to differentiate between the concepts of learning, training and development and education. In 1975, David Kolb, identified what he called experiential learning. He proposed that all effective learning is achieved...

Words: 997 - Pages: 4

Premium Essay

Final Paper

...CMIT 350 WAN and SOHO Skills Implementation Use this document as a guide for formatting and organizing your CMIT 350 Skills Implementation challenge. Title Page Professionalism will be key to your success and advancement in your academic and professional career. Use the title page to identify relevant information such as your name, the course, professor, and submission/completion date. Document Index/Contents Organization will allow your document to be divided into key areas of consideration and allows an overall structure to be placed over the submission. Sample text: I. Site “XXXXXXXX” Challenges and Implementation II. Site “XXXXXXXX” Challenges and Implementation III. Site “XXXXXXXX” Challenges and Implementation IV. Bibliography Site “XXXXXXXXXX” Challenge and Implementation (Provide a section for each site, as suggested in your table of contents.) Site Details and Challenges (Summary) Here, you will simply summarize the site requirements and/or challenges you are attempting to overcome. You will not need to implement solutions or discuss your approach at this point. This information is provided to you and can simply be organized and restated as you understand it. Think of this area as what needs to be corrected. Suggested length would be one or two paragraphs. Sample text: As described in the scenario, the xUMUC site was developed without any VLAN structure, and administrators have found the need to isolate broadcast traffic from a layer-2 perspective. Site...

Words: 663 - Pages: 3

Free Essay

Learning from the Titanic

...Learning from the Titanic Post-Mortem Hailmar Suranthe de Silva Overview • Snapshot • Understand what went wrong • Blame-game and performance evaluation • Factors during voyage • Learning from History • How it relates to the IT field Snapshot of circumstance... • Business case • • • • Safety and Luxury through new technology Unparalled Customer Experience 6 year construction and 2 year breakeven. 75% of revenue from first class – reflects in space allocation: 60% for 905 first-class and 7% for 1134 third-class Lavish attention and money substituted processes Marketing drive: ‘unsinkable ship’ Traditional safety (life-boats) given low priority Project Manager (Captain Smith) didn’t trust new methodologies (ice bucket test) • Implied non-functional requirements due to perception/assumptions • • • • • Over-confidence • Old School • Political Influence • • Project Sponsor (Bruce Ismay) High Expectations set – arrive a day early Snapshot of what happened... • Business and Economic pressures • • • • • • • Under-prepared (lack of equipment) and untrained crew – 83 of 900 were mariners Under-quality material substituted Untested processes/methods Traditional safety methods (life-boats) given low priority Safety: only mitigation by technology and no contingency/worst-case (life-boats) Testing: was maiden voyage Prove Titanic is the best ship even when grounded (Fatal) • Over-confidence • Decisions based on aesthetics and luxury compromised individual...

Words: 903 - Pages: 4

Premium Essay

Hcs 440 Week 2 Learning Team Literature Search

...This document MGT 350 Week 2 Learning Team Case Analysis Project Plan Critical Thinking Strategies in Decision Making contains a solution on following task: "Decisions in Paradise Case Analysis Project Plan. Submit the following: 1) Summary of Case 2) Company selected 3) Action Plan, e.g. who and how will this paper be researched and written. UMUC CMIT 425 Security Policy Project Using the GDI Case Study, complete the Security Policy Document. Provide a seven- to ten-page analysis summarizing the security policy to the executive management team of GDI. The summary should effectively describe the security policy in a manner that will allow the Senior Management to understand the organizational security requirements and make the appropriate decisions to enforce. Guidelines · Using the GDI Case Study, create the security policy document. · The security policy document must be 7 to 10 pages long, conforming to APA standards. See "Writing Guideline" in WebTycho where you'll find help on writing for research projects. · At least three authoritative, outside references are required (anonymous authors or web pages are not acceptable). These should be listed on the last page titled "References." · Appropriate citations are required. See the syllabus regarding plagiarism policies. · This will be graded on quality of research topic, quality of paper information, use of citations, grammar and sentence structure, and creativity. · The paper is due during...

Words: 362 - Pages: 2

Free Essay

Cmit350

...CMIT 350 WAN and SOHO Skills Implementation Prepared for: University of Maryland University College CMIT 250 Prepared by: Devin Manning I. Site “Los Angeles” Challenge and Implementation The site administrator has requested that the site establishes remote IOS storage, remote management of switches, ACL list implementation, and a network time protocol for devices as described in the site specific portion of the scenario. II. Site Solutions and Technologies * The recommended course of action for the request of a remote IOS storage capability at the site would be to establish a remote access server using a HTTP/ HTTPS protocol as opposed to the SSH option mainly because of the security and control over things such as the internet connection to the routers from not only the user database, but the source addresses as well in regards to their perspectives. This particular protocol also requires the timing information to be in setup and in place which would complement the network time protocol solution that has been requested by the site. For this request, I would use the SonicWall software in order to setup up this capability along with the SonicWall UTM appliance that is provided by the company. * In order to address the remote management of the switches request, it would require a console cable and a server that has an available console port such as the Cisco Nexus 2228TP GE Fabric Extender expansion module which is one of the easier servers to use that...

Words: 1625 - Pages: 7

Premium Essay

Team Management

...Organizing for the Airbus A3XX The market for commercial aircraft larger than the Boeing 747-400 is driven by the growth of the airline market generally, flight congestion at major airports, increased cost pressure on airlines, and demand for more environmentally-friendly aircraft. Many of these factors presuppose improved technology, superior design, new manufacturing processes and better supplier collaboration. To minimize weight and fuel costs, for example, the A3XX will incorporate a range of advanced materials such as carbon fiber reinforced plastics and a new aluminum and fiberglass laminate called "Glare." The design and implementation of such advanced materials necessitates close coordination with a wider range of suppliers. It also means that some elements will have to be outsourced to suppliers that possess deep expertise in particular areas and requires creative thinking on the part of such suppliers about how the expertise of secondary suppliers might be exploited to meet specifications and requirements. The wiring of the new aircraft will also be quite complex, consisting of nearly 100,000 wires bundled into 530km of cables held by 40,000 connectors. The design of the aircraft necessitates a switch from copper to aluminum wiring, the latter requiring a larger bend radius that could make it more difficult to maneuver around corners within an aircraft and could entail rerouting of some harnesses. Manufacturing and design of the A3XX will be spread across 85 countries...

Words: 528 - Pages: 3

Free Essay

Drroberr

...ENTRY STRATEGY INTO VIETNAMESE ENVIRONMENTAL MARKET A CASE STUDY OF ALTECH ENVIRONMENT PTE LTD by Dang Tran Bao Hanh A research study submitted in partial fulfillment of the requirements for the degree of Master in Business Administration Examination Committee Dr. Do Ba Khang (Chairman) Dr. Fredric W. Swierczek Dr. Lalit M Johri Nationality Vietnamese Previous degree Graduate Diploma in Business Administration SAV Program Scholarship Donor Government of Switzerland/ Swiss Agency for Development and Cooperation (SAV program) Asian Institute of Technology School of Management Bangkok, Thailand April, 2000 Acknowledgment It is a rare pleasure for me to express my profound gratitude and thanks to Dr. Do Ba Khang, advisor to this research, for his valuable guidance, explicit direction, and encouragement throughout this research. I also want to give my sincere thanks to Dr. Fred and Dr. Johri for serving as members of the examination committee together with their constructive and useful advice. My acknowledgements are due to Swiss - AIT - Vietnam Management Development Program and Swiss Government who gave me a great chance to participate in MBA study by providing financial support. My special thanks also go to the management of Altech Pte Ltd Company, especially Mr. Goh Boh Chung, for providing me helpful information and giving...

Words: 22837 - Pages: 92

Free Essay

How to Build a Pc

...CMIT 202 PC Build Project Customer Request for a PC Scenario You work at a small computer shop and have received a request from a customer for a brand new PC. The customer has an older computer that no longer meets the customer’s desires, and he wants to replace it. The new computer must be built from the ground up (no pre-built computers from an online company) and meet all of the customer requirements, as detailed below. * Form Factor * The customer has small children who may accidentally damage a smaller form factor. * The customer has heard about Carpal Tunnel Syndrome and wants to have a system that minimizes this. * The customer would like a high resolution screen but since he doesn’t have 20/20 vision anymore, he doesn’t want to have things appear small on the screen. * Entertainment * The customer wants to be able to watch and record television on their computer. * The customer wants to be able to watch DVD and Blu-Ray movies on the computer. * The customer wants to be able to scan, upload, edit, and print photographs and videos. * The customer already has a digital camera available to him and would like to be able to easily transfer photos from the memory card of his camera to his computer (his camera is using SDHC card) * The customer has family on the opposite coast and wants to be able to have video chats with them regularly. * The customer would like to have two monitors because that’s...

Words: 708 - Pages: 3

Premium Essay

Windows Network Proposal

...CMIT 370 - Windows Network Proposal ----: You have been hired by Shiv LLC as an Information Technology consultant to develop a technology proposal. Shiv LLC manufactures and distributes solar panel for the consumer market. Your job is to submit a proposal that meets their criteria. Current Implementation/Concerns: The company will have 3 locations (Los Angeles, Dallas, and Houston) but are planning to grow rapidly due to high demand in solar panels. Main staff will be at Dallas and Houston offices. Data security is priority since patent and trademarks are at stake. Los Angeles sales personnel will need secure remote access to Houston office. The WAN connectivity is in place and it is not an issue. There is ample bandwidth in place. Feel free to make other assumptions but they need to be noted in the paper. Topic to Cover Your document should cover the content presented in the course. The outline below contains recommended points to cover. You are free to add other related information. Describe the technical and business reasons for each choice, citing other resources as appropriate. The Windows Server 2012 operating system should be used for all aspects of the solution. The topics include: -Active Directory: What forest/domain model should Shiv LLC implement? What is the domain name? Where should the domain controllers be place? Should RODC be part of the consideration? FSMO Roles placement Plan for AD backup and recovery -Group Policy: Is Group Policy needed...

Words: 547 - Pages: 3