Computer Lab Plan

In: Business and Management

Submitted By hersh
Words 4005
Pages 17
| Computer Lab PlanAssignment One | Hersh Gulati | 5/27/13 | Project Management | |

| Computer Lab PlanAssignment One | Hersh Gulati | 5/27/13 | Project Management | |

Executive Summary
Auckland University of Technology (AUT) is ranked in the top 500 universities of the world. The university has experienced a significant increase in the number of students enrolling in its Business and Law faculty over the years. Its Business and Management Studies was ranked as one of the top 200 in the world.
As a result, there has been an increasing requirement for using computer systems in all its faculties, including the non-technological subject areas. Due to the growth envisioned over the next five years, AUT has decided that it requires two new computer labs to accommodate its Business and Law faculty students.To meet this requirement, level 7 of WF building will be refurbished to accommodate the new computer labs, instead of the exisiting seven classrooms.
The renovation will be carried out as a 6 months long project commencing on 30th June 2015. Taking the Christmas and New Year’s holiday period into account, the project will be completed by 22nd December 2015, before the beginning of Term 1, 2016. The calculated budget for the project is $1.294 million, which includes 10% of contingency amount. The key deliverables for the project are: * Lab designs and architectural layouts for the computer labs * Two new computer labs
The major tasks that will be involved in the project are: * Refurbishment of existing classrooms * Acquiring furniture and equipment * Placement of furniture and hardware installation * Commissioning * Go Live
The outcome of this project will be that WF building will have a floor dedicated for computer labs, which will be beneficial for the Business and Lay faculty students. From AUT University’s…...

Similar Documents

Lab Computer Information Sysytem,

...Lab #6 Questions & Answers 1. If you and another person want to encrypt messages, should you provide that person with your public? The public key is always provided as part of the handshake in order for encryption to take place. 2. What does GPG allow you to do once it is installed? GPG allows you to encrypt your hard drives content in order to secure it. 3. Name two different types of encryption supported by GPG for your key. The MD5 and Sha1 type of hashing encryption are supported by GPG. 4. What happens when you sign and trust a new key to your keychain? A new key is created to include the private and public key based on how the new key was created. 5. If a user sends you his/her public key, will he/she be able to decrypt your encrypted messages once you Import and sign his/her key? Both parties need to have each other private keys in order to be able to encrypt and decrypt all messages that are exchange among themselves. 6. What are the similarities between an MD5 hash and a fingerprint? They both insert a fingerprint to the data. 7. How would you encrypt a Web server and the pages it serves up? By setting the web server to redirect its web traffic to SSL hence encrypting all conversations between server and host in relation to the web traffic. 8. Why is hashing all database inputs not considered encryption of the database? What value does hashing? Hashing the input entries of a database is not considered encryption......

Words: 693 - Pages: 3

Computer Labs

...till 30 seconds or the end of the test. 5. What caused this reduction in “goodput” on the 11g WLAN? As in question 4 and shows on the graph of the roaming node as how it dropped in data rate instantly when entering the room. I would have to say that this reduction was caused from the roaming node. General Questions Concerning Mixing 11b and 11g Clients Guidelines: Answer each of the following questions using knowledge gained from the iLab, readings from the textbook, and individual research on the Web. Answer all questions in full college-level sentences and paragraphs. 6. Supposedly, 802.11b is backwards compatible with 802.11g, yet this lab demonstrates there are significant problems with allowing the two to coexist. What is the primary incompatibility between b and g? As it stated and from our results in the lab there is a major issue with running both modes. Running both B and G in mixed mode will most likely bring the speeds down on the G nodes to almost around B speeds. The G nodes will not perform at the intended speeds. Might even use connectively between the nodes. (Ciampa, 2013) 7. There is another mechanism besides RTS/CTS that helps the incompatibility. Explain briefly the difference between RTS/CTS and CTS-to-self and when each is used. This helps with transmitting only when there is no traffic in the air. This helps with slow transmission and get better performance overall. The RTS is request to send it sends out to a node and then the CTS......

Words: 1146 - Pages: 5

Computer Network Security Lab 1

...ISSC421 Week 1 Lab #1: Analyze Essential TCP/IP Networking Protocols Lab Assessment Questions 1. What is the purpose of the address resolution protocol (ARP)? Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address (IP address) to a physical machine address that is recognized in the local network. 2. What is the purpose of the dynamic host control protocol (DHCP)? 3. DHCP (Dynamic Host Configuration Protocol) is a protocol that lets network administrators manage centrally and automate the assignment of IP (Internet Protocol) configurations on a computer network. 2 4. 3. Identify the DHCP allocated source IP host address for the vWorkstation desktop and the TargetWindows01 virtual server. and 4. When you pinged the targeted IP host ( or, what was the source IP address and destination IP address of the ICMP echo-request packet? 5. Did the targeted IP host respond to the ICMP echo-request packet with an ICMP echo-reply packet? If yes, how many ICMP echo-request packets were sent back to the IP source? Yes, each replied with 4 replies. 6. Find a TCP three-way handshake for a Telnet, FTP, or SSH session. What is the significance of the TCP three-way handshake? The three-way handshake is needed to establish a reliable connection. The handshake allows the server and client to agree on properties that provide for security as well as......

Words: 386 - Pages: 2

Computer & Logic Lab

...NT1110: Module 5 Computer Operation and Security Lab 5.1 Understanding BIOS, POST, and Security Basics In this lab, you will demonstrate your ability to fix issues related to BIOS/POST and secure the computer from viruses and Trojans. Required Setup and Tools A computer with access to the Internet Recommended Procedures Task 1: Understanding BIOS and POST A user boots his or her computer and hears a sequence of six beeps. The computer uses AMI BIOS. What error is indicated by the six beeps? A different user with a computer using Phoenix BIOS hears a sequence of beeps with pauses in between. The sequence is beep - pause - beep beep beep - pause - beep beep beep beep- pause - beep beep beep. What error is indicated by this beep sequence? Task 2: Basic Security Firewalls may be hardware devices or software programs. Hardware firewalls protect an entire network. Software firewalls protect a single computer. Research the Internet for an example of each of these types of firewalls and compare their features. Linksys and Cisco make firewall/routers for home use. The Zone labs are an example of a software firewall. Submission Requirements: Include a references page citing the resources you used from the textbook, ITT Tech Virtual Library, and credible websites to substantiate your answers. All citations should be in APA format. Refer to ITT Tech Virtual Library> Research Help> Research Guides> Grammar, Writing & Style> APA Formatting and Style Guide for help in APA...

Words: 296 - Pages: 2

Computer Structure Lab

...Computer | Operating system | Hard Drive | RAM | Processor | Speed | Cost | Acer Aspire ES1-511-C59V 15.6-Inch Laptop (Diamond Black) | Windows 8.1 | Drive500 GB | 4 GB | Intel Celeron | 2.16GHz | $278.19 | CybertronPC Borg-Q GM4213A Desktop PC (Blue) | Windows 7 Home Premium 64-bit | 1000 GB | 8 GB | FX-Series Quad-Core FX-4120 | 3.8 GHz | $641.40 | HP Pavilion 23-g010 23-Inch All-in-One Desktop | Windows 8.1 | 500 GB | 4 GB | AMD E Series | 1.3 GHz | $479.99 | HP Slate 21-k100 Touchscreen All-in-One Desktop (Android 4.2 | Android 4.2 (Jelly Bean) | 8 GB | 1 GB | Tegra | 1.66 GHz | $294.34 | | Sharita Ramsey Computer Structure (NT1110) July 15, 2014 Assignment (lab 5) 1. A Teacher 2. A Graphic Designer 3. A Student A Teacher would need to use a computer with plenty of storage space. A computer with only 500 GB of Hard Drive and 4 GB of Ram would suffice. Teachers need computer capable of holding stored memory into its hard drive. This is good for things such as PowerPoint’s. Graphic designers couldn’t use anything other than a gaming computer with at less 8GB of RAM. People in profession like ( gamers, music producers, movie makers etc.) require there computers to work at it top speed for real time live streaming needs like ( 3.8 GHz or better) a gaming computer is needed in order to keep up with the programs that is being ran. Students wouldn’t need all that fancy 8 GB OR 16 GB RAM or with a 1 TB of hard drive. It would be useless A simple......

Words: 302 - Pages: 2

Marketing Plan - Apple Computer

...Executive Summary The Company designs, manufactures and markets personal computers and related software, services, peripherals and networking solutions. Apple computers also designs, develops, and markets a line of portable digital music players along with related accessories and services. The company’s situation, marketing strategies and mix relate to the quality value of Apple products and services such as the Macintosh line of desktop and notebook computers, the iPod line of portable digital music players, the Xserve server and Xserve RAID storage products, a portfolio of consumer and professional software applications, the Mac operating system, the iTunes Store, portfolio of peripherals that support and enhance the Macintosh and iPod product lines, and a variety of other service and support offerings and sells its products worldwide through its online stores, its retail stores, its direct sales force and third party wholesalers, resellers and value-added resellers and sells products for the purpose of education, consumer, creative professional, business as well as government customers. Situational Analysis History/Background Apple Computers was incorporated under the laws of the State of California last January 1977 as Apple designs, manufactures and markets personal computers and related software, services, peripherals and networking solutions. The Company also designs, develops and markets a line of......

Words: 900 - Pages: 4

Wou Computer Survey Lab#4

...Q1: Computer science I believe is more of a general overview of computers / computing. Software engineering on the other hand focuses on the coding / design of software. Computer Engineering focusses on the design and construction of computer hardware. Information Technology is more of a computer science class that caters to the person that wants to work for a business and design their computer systems for them. Whereas Information Systems, is close to Information Technology however focuses more on the business optimization and knowledge of that. Q2: Computer science involves a lot more and is not limited to just computers. If a new invention that came out tomorrow called the Teschescope would astronomy be called Teschescopy? No it wouldn’t. Computers is more of a tool used by computer science. Computer science is really a way to process information, and if one day a better idea rises to perform that task and replace computers I believe the name of the field would not change. Q3: #1: Job Details If you are a Director of Engineering or Senior Manager with PHP application development experience, please read on. Top Reasons to Work with Us This is an exciting opportunity with a growing SaaS company in San Francisco who helps solve innovation challenges that have never been solved before. We use PHP, Node, MySQL, Linux, cloud, and big data to support millions of users. What You Will Be Doing - Lead the Engineering and QA teams through technical application......

Words: 594 - Pages: 3

Xyz Computers Disaster Plan

...When composing a disaster plan the most important step is to perform a very comprehensive investigation of all risks in the network. This includes all computer systems, servers, networks, and etc. When investing the network there are many risks to consider. These risks can include attacks from viruses, deletion of data from company employees, floods or other natural disasters and etc. When listing these threats it should be taken in effect which risks have more impact on the company. Once risks are determined and put in categories of importance, XYZ Computers should consider some very common questions. • How would the following affect XYZ Computers? o Virus attacks o Loss of personal information (company’s or employees) o Power outages o Loss of Internet service o Loss of phone service o Natural Disasters (floods, hurricanes, earthquakes, tornados, fires, and etc.) • What would be company costs in the event of any of these disasters? • What can XYZ Computers do to lessen the effect of disasters on our company? • What can XYZ Computers do to prevent certain disasters from happening? Some companies in areas that power outages are common may have emergency power in place. They will also back up all of their data on RAID tapes frequently. While prevention can cost the company money, recovery from disasters that could have been prevented could cost much more. Some businesses have even had to close due to certain disasters that could have been prevented. ......

Words: 1399 - Pages: 6

Computer Lab 1

...Elizabeth Romero Computer and Logic Week 2 Lab Task 1: Identify the Ports Procedure 1. Look at the front and back of a desktop or notebook computer for the following bus connectors: RS232, USB, FireWire, and infrared. How many of each type of connector did you find? I found all four of them. 2. Label the appropriate names to the ports and adaptors given below. Ps/ 2 port USB ports Serial port VGA port Speakers Line in Microphone Ethernet port Pt 1 printer port Game port Task 2: Identify Memory Slots Procedure 1. Using the Internet, locate a diagram or photo of these types of memory slots on a desktop or notebook computer: Memory Stick (MS), Micro Drive (MD), Compact Flash (CF), and Secure Digital (SD). Memory Stick Slot Micro Drive Slot Compact Flash Slot Secure Digital Slot 1. Explain the diagram or photo(s) with the name of each type of memory slot. Memory Stick – is a removable flash memory card format. Electronic flash memory data storage device. Micro Drive- is an extremely small hard disk that can fit in a compact card memory slot. Compact flash- is a flash memory mass storage device used mainly in portable electronic devices. Secure digital- is a non-volatile memory card used extensively in portable devices. Task 3: Identify the Configuration Procedure 1. Identify the following configuration. When a SCSI host adapter card with internal and external connection is used, the SCSI daisy chain can extend through the card. The...

Words: 392 - Pages: 2

Lab 1: Introduction to Computers and Programming

...Lab 1: Introduction to Computers and Programming This lab accompanies Chapter 1 of Starting Out with Programming Logic & Design. Name: _____Patrick Ross____________ Lab 1.1 – GUI vs. Console Programming Help Video: Double click the file to view video [pic] This lab requires you to execute both types of programs to understand the differences. Step 1: Double click on the following console application and run the program. [pic] Step 2: Double click on the following GUI application and run the program. [pic] Step 3: Answer the following questions: 1. What similarities do you see between the two programs? Both programs use the same programming basics, adding any two numbers the user inputs. 2. What differences do you see between the two programs? The console app uses the command prompt, while the GUI application uses a window with graphics. 3. What input devices are used in the GUI and console programs? Mouse and keyboard 4. What output devices are used in the GUI and console programs? Monitor and speakers Lab 1.2 – Using Visual Basic IDE Help Video: Double click the file to view video [pic] This lab requires you to use the IDE (Integrated Development Environment) to create a project workspace using Visual Basic 2005. Step 1: Launch Visual Basic 2005. Click on File, then New Project. In the template window, select Console Application. In the Name...

Words: 1117 - Pages: 5

Computer Lab Protocol

...Computer Lab Protocol - The use of the computer lab is a privilege. Treat equipment and each other with respect at all times. - Wait for instructions when entering the computer lab. - If you have technical problems check with an adult. Do not touch any wires. - Stay in your seat. If you need help raise your hand. - Be sure to save your work often while working. - You must have permission to print. When you have permission to print press print only once. If the printer is not working an adult will solve the problem. - before you leave the lab save your work and close all programs. - Please leave the lab neat and clean for the next class. Push in your chair. Leave the computer station in good order. • - Take all of your things with you. • - Computers are for school projects and assignments only. • - No food, chewing gum or drinks are allowed at the computers. • - Leave backpacks at the door…only take necessary materials to the computer workstation. • Remain in your seat at all times unless instructed to get up. • NO talking without permission from the teacher. • Do not change any of the software settings used on the computers. • Work only with the computer that is assigned to you. • Do not download software from the Internet onto the computers in the lab unless authorized to do so. • Surfing the web and checking personal e-mail is prohibited. • Only print work that is related to your assignments. • You must...

Words: 392 - Pages: 2

Computer Structure and Logic Lab 1

...Computer Structure and Logic Lab 1 12/17/2015 The computer I am working on right now has Windows 7 Installed on it. Windows 7 is not perfect. Some features are underdeveloped. For example when typing the cursor will move through the document. And some annoyances remain intact. But overall, the final version appears to be a worthy replacement to Windows XP. In window 7 you can take the Screen and split it into two. This is a great feature when you are writing a paper and doing research at the same time. To do this just click on the middle of the tab bar and drag left or right, then take your other screen and go the opposite way. In windows 7 you can now pin Icons to the task bar. For example you can pin chrome to your task bar, to do so open chrome, it will appear in the task bar when it does right click on it. Click on pin to task bar, now you have easy access to chrome. Windows 7 started the “Peak”. You can take your mouse and hover your mouse over an icon on the task bar that is active, when you do this a small screen pops up and you can see what is in that tab. Desktop Gadgets can be added to windows 7. You can add the Weather or even a picture slideshow to the desktop, just right click on your desktop and click on gadgets. Double click on the gadget you want and it will appear on your desktop. The desktop I am using has an Intel Core Processor the CPU is running at 3.30 GHz. It has 8 GB of RAM wish it had at least 16. Service Pack 1 is on this computer. SP1 is...

Words: 341 - Pages: 2

Computer Network Lab Manual

...CN LAB REPORT Dept. of ISE, BVBCET Department of Information Science & Engineering, BVBCET Hubballi COMPUTER NETWORKING LAB Mahantesh Patil 2BV14IS410 Mahantesh Patil 2BV14IS410 CN LAB REPORT Dept. of ISE, BVBCET LAB-01 List the hardware components 1) Difference between switch and Hub: 2) Difference between SWITCH and ROUTER 3) Differences between Router and Gateway 4) What is the Difference between Subnetting and Supernetting? HARDWARE COMPONENTS Cables: 1|Page Mahantesh Patil 2BV14IS410 CN LAB REPORT Dept. of ISE, BVBCET Cables: which are used to connect one or more devices to computer or network. Different types of network cables are available market they are Coaxial cable, Optical fiber cable, Twisted pair cable. RJ-45 The most common UTP connector is RJ45 (RJ stands for registered Jack), as shown in Figure. The RJ45 is a keyed connector, meaning the connector, meaning the connector can be inserted in only one way. 2|Page Mahantesh Patil 2BV14IS410 CN LAB REPORT Dept. of ISE, BVBCET SWITCHES: Switches contain many ports to connect different network segments. They are similar to hubs, but offer greater performance. When a network contains a large number of devices, switches are needed instead of hubs to make sure the communications between devices does not slow down. Contrary to hubs, switches send the data it receives only to specific ports. NIC(NETWORK INTERFACE CARD) A network card,......

Words: 3647 - Pages: 15

Computer Plan

...Mobile Computer Repair Marketing Plan Market Summary Market: Past, Present, and Future The mobile computer repair business has been around for quite some time now, and will remain to stay in the business. The nature of the computing industry has an astonishing rate of technological growth and continuous changes will work in our benefit immensely. According to (Mobile Computer Repair | Computer Service.), “In recent times, the mobile computer repair industry has seen a sharp rise in demand services. This is due to the busyness of the average working lifestyle increasing by large amount.” Mobile computer repair will stay strong within the industry of repairs because of it’s in home accessibility. Most consumers are busy in their day to day lives, and feel it is necessary for the computer experts to come fix their computers in the comfort of their own homes. Personal market research done indicates a striking market place for our services, which we are going to take full advantage of. Our marketing strategy is to take on our competitor’s weaknesses. Our main focus will be to get our name out there in advertising, and show our consumer’s how we out beat our competitors in every single way. We out beat our competitors because of our dedication to consumer satisfaction, amazing services, and prices that won’t cost you an arm and a leg. Our dedication providing consumer satisfaction will make out company out shine all of our competitors because we will do whatever needs to......

Words: 937 - Pages: 4

Computer Support Business Plan

...Chart: Sales Monthly 16 Chart: Sales by Year 16 5.5 Strategic Alliances 17 6.0 Management Summary 17 6.1 Organizational Structure 17 6.2 Management Team 17 6.3 Personnel Plan 18 Table: Personnel 18 6.4 Training 18 6.5 Feedback and Control 18 7.0 Financial Plan 19 7.1 Break-even Analysis 20 Chart: Break-even Analysis 20 Table: Break-even Analysis 20 Table: General Assumptions 21 7.3 Key Financial Indicators 22 Chart: Benchmarks 22 7.4 Projected Profit and Loss 23 Table: Profit and Loss 23 Chart: Gross Margin Monthly 24 Chart: Gross Margin Yearly 24 Chart: Profit Monthly 25 Chart: Profit Yearly 25 7.5 Projected Cash Flow 26 Chart: Cash 26 Table: Cash Flow 27 7.6 Projected Balance Sheet 28 Table: Balance Sheet 28 7.7 Business Ratios 28 Table: Ratios 29 8.0 Contingency Planning 30 Table: Sales Forecast 1 Table: Personnel 2 Table: General Assumptions 3 Table: Profit and Loss 4 Table: Cash Flow 5 Table: Balance Sheet 6 1.0 Executive Summary I Tech Solutions is a consulting-oriented company, intending to fill in the market need for a professional, customer-focused computer company. The company emphasizes service and support to differentiate itself from more price-oriented computer companies. We are on the brink of penetrating a lucrative market in a rapidly growing industry. The current trend towards an increase in the number of entrepreneurs and competition......

Words: 7733 - Pages: 31