Computer Lab Plan

In: Business and Management

Submitted By hersh
Words 4005
Pages 17
|
Computer Lab PlanAssignment One |
Hersh Gulati | 5/27/13
| Project Management |
|

|
Computer Lab PlanAssignment One |
Hersh Gulati | 5/27/13
| Project Management |
|

Executive Summary
Auckland University of Technology (AUT) is ranked in the top 500 universities of the world. The university has experienced a significant increase in the number of students enrolling in its Business and Law faculty over the years. Its Business and Management Studies was ranked as one of the top 200 in the world.
As a result, there has been an increasing requirement for using computer systems in all its faculties, including the non-technological subject areas. Due to the growth envisioned over the next five years, AUT has decided that it requires two new computer labs to accommodate its Business and Law faculty students.To meet this requirement, level 7 of WF building will be refurbished to accommodate the new computer labs, instead of the exisiting seven classrooms.
The renovation will be carried out as a 6 months long project commencing on 30th June 2015. Taking the Christmas and New Year’s holiday period into account, the project will be completed by 22nd December 2015, before the beginning of Term 1, 2016. The calculated budget for the project is $1.294 million, which includes 10% of contingency amount. The key deliverables for the project are:
* Lab designs and architectural layouts for the computer labs
* Two new computer labs
The major tasks that will be involved in the project are:
* Refurbishment of existing classrooms
* Acquiring furniture and equipment
* Placement of furniture and hardware installation
* Commissioning
* Go Live
The outcome of this project will be that WF building will have a floor dedicated for computer labs, which will be beneficial for the Business and Lay faculty students. From AUT University’s…...

Similar Documents

Marketing Plan - Apple Computer

... distribution of third-party digital content through its online iTunes Store. While the Company is widely recognized as an innovator in the personal computer and consumer electronic markets as well as a leader in the emerging market for distribution of digital content, these are all highly competitive markets that are subject to aggressive pricing and increased competition. To remain competitive, the Company believes increased investment in research and development and marketing and advertising is necessary to maintain and extend its position in the markets where it competes. The Company utilizes a variety of direct and indirect distribution channels. The Company believes sales of its innovative and differentiated products are enhanced by knowledgeable salespersons who can convey the value of the hardware, software, and peripheral integration, demonstrate the unique digital lifestyle solutions that are available only on Macintosh computers and demonstrate the compatibility of the Macintosh with the Windows platform and networks. The Company further believes providing a high-quality sales and after-sales support experience is critical to attracting and retaining customers. To ensure a high-quality buying experience for its products in which service and education are emphasized, the Company has expanded and improved its distribution capabilities by opening its own retail stores to improve the buying experience through reseller channels. The......

Words: 900 - Pages: 4

Computer Plan

...Mobile Computer Repair Marketing Plan Market Summary Market: Past, Present, and Future The mobile computer repair business has been around for quite some time now, and will remain to stay in the business. The nature of the computing industry has an astonishing rate of technological growth and continuous changes will work in our benefit immensely. According to (Mobile Computer Repair | Computer Service.), “In recent times, the mobile computer repair industry has seen a sharp rise in demand services. This is due to the busyness of the average working lifestyle increasing by large amount.” Mobile computer repair will stay strong within the industry of repairs because of it’s in home accessibility. Most consumers are busy in their day to day lives, and feel it is necessary for the computer experts to come fix their computers in the comfort of their own homes. Personal market research done indicates a striking market place for our services, which we are going to take full advantage of. Our marketing strategy is to take on our competitor’s weaknesses. Our main focus will be to get our name out there in advertising, and show our consumer’s how we out beat our competitors in every single way. We out beat our competitors because of our dedication to consumer satisfaction, amazing services, and prices that won’t cost you an arm and a leg. Our dedication providing consumer satisfaction will make out company out shine all of our competitors because we will do whatever needs to...

Words: 937 - Pages: 4

Computer

...NETW320 -- Converged Networks with Lab Lab #4 Title: IPv4 TOS and Router Queuing – Cont. Procedure Start OPNET IT Guru Open the scenario 1. Select File/Open. 2. Select Computer or My Computer (depending on your O/S). You may also need to allow Citrix access to your computer. 3. On your F: drive, open the op_models and then open the NETW320 folder. 4. Open the Lab2_RouterTOS.project 5. Click on Lab2_RouterTOS.prj 6. Click Open. The project should open. 7. Choose Scenarios > Switch To Scenario > FIFO Configure the Simulation Run 1. We are now ready to configure the Simulation Run. Select the Configuration/Run Discrete Event Simulation tab (the running man) from the tool bar. The following screen will open. 2. Set the Duration to 4 (if it is not set) and change hour(s) to minute(s). 3. Click Apply and Cancel. 4. Go to File > Save, to save your configuration. 5. Before we duplicate the scenarios, now would be a good time to run the first simulation to ensure we have all the configurations made correctly. Once we copy them over to the PQ and WFQ scenarios, if something is configured incorrectly, that mistake will be transferred over. 6. Select the running man icon again to bring up the Configuration/Run Discrete Event Simulation panel again and click Run. The Simulation Execution window will open and the sim will start. 7. When the Sim completes and the Close window lights, click it to end. 8. We are now ready to look at the results. From the...

Words: 2594 - Pages: 11

Lab Computer Information Sysytem,

...Lab #6 Questions & Answers 1. If you and another person want to encrypt messages, should you provide that person with your public? The public key is always provided as part of the handshake in order for encryption to take place. 2. What does GPG allow you to do once it is installed? GPG allows you to encrypt your hard drives content in order to secure it. 3. Name two different types of encryption supported by GPG for your key. The MD5 and Sha1 type of hashing encryption are supported by GPG. 4. What happens when you sign and trust a new key to your keychain? A new key is created to include the private and public key based on how the new key was created. 5. If a user sends you his/her public key, will he/she be able to decrypt your encrypted messages once you Import and sign his/her key? Both parties need to have each other private keys in order to be able to encrypt and decrypt all messages that are exchange among themselves. 6. What are the similarities between an MD5 hash and a fingerprint? They both insert a fingerprint to the data. 7. How would you encrypt a Web server and the pages it serves up? By setting the web server to redirect its web traffic to SSL hence encrypting all conversations between server and host in relation to the web traffic. 8. Why is hashing all database inputs not considered encryption of the database? What value does hashing? Hashing the input entries of a database is not considered encryption...

Words: 693 - Pages: 3

Computer Network Security Lab 1

...ISSC421 Week 1 Lab #1: Analyze Essential TCP/IP Networking Protocols Lab Assessment Questions 1. What is the purpose of the address resolution protocol (ARP)? Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address (IP address) to a physical machine address that is recognized in the local network. 2. What is the purpose of the dynamic host control protocol (DHCP)? 3. DHCP (Dynamic Host Configuration Protocol) is a protocol that lets network administrators manage centrally and automate the assignment of IP (Internet Protocol) configurations on a computer network. 2 4. 3. Identify the DHCP allocated source IP host address for the vWorkstation desktop and the TargetWindows01 virtual server. 172.30.0.2 and 172.30.0.8 4. When you pinged the targeted IP host (172.30.0.8 or 172.30.0.200), what was the source IP address and destination IP address of the ICMP echo-request packet? 172.30.0.2 5. Did the targeted IP host respond to the ICMP echo-request packet with an ICMP echo-reply packet? If yes, how many ICMP echo-request packets were sent back to the IP source? Yes, each replied with 4 replies. 6. Find a TCP three-way handshake for a Telnet, FTP, or SSH session. What is the significance of the TCP three-way handshake? The three-way handshake is needed to establish a reliable connection. The handshake allows the server and client to agree on properties that provide for security as well as...

Words: 386 - Pages: 2

Computer Os and Matienance Lab 1.1 & 5.1

...Report on Computer OS and Maintenance - Seminar One This report documents the Lab Project assignments given for week one. These assignments cover chapters one, three, five, and six of the Managing and Troubleshooting PCs Exam 220-801 book. This report also provides a brief summary of what information was learned. Table of Contents Page 1.1 Lab Exercise 1.1…………………….……………………………………… 4-5 1.2 Lab Exercise 5.1………………………………………….………………… 5-6 2 SUMMARY OF SEMINAR 1.......................................................................... 6 • Lab Exercise 1.1 If you have access to the Internet, do some searching on computer certifications. Make a personal certification tree or pathway that maps out a series of certifications to pursue that might interest you. Which certifications would be useful if you want to be a graphic designer, for example? What if you want to create computer games? I am interested in Video Game Design. Here is a certification pathway showing the types of certifications I would need to be successful in this field: Certificate in Game Design Includes classes for the following subjects  Game theory  Game genres  Design principles  3-D graphics programming  Character animation  Game engine architectures Java C++ Flash Bachelors Degree in Computer Programming Includes classes for...

Words: 613 - Pages: 3

Lab 1 Computer Structure and Logic

...Task 1: Von Neumann Model: Input Input Output Output Central Processing Unit Central Processing Unit Accumulator Accumulator Arithmetic Logic Unit Arithmetic Logic Unit Control Unit Control Unit Memory Memory Component | Function | Arithmetic Logic Unit | Control operations between all components of the computer. | Accumulator | Store the result of the last calculation.Registers that store temporary numbers,And can be hard-wired to the logic unit.They we developed so that fewer bits couldBe used for instructions and operands. | Control Unit | Controls operations betweenAll components of the computer. | Input | Provides data to the computer from the user. | Memory | Stores program instructions and data. | Output | Displays data to the user. | Task 2: These are the common input, output, and memory components: Component | Function | Input | Keyboard, Mouse, Gaming Controller, Microphone, Camera | Magazines | Video Display, Speaker, Printer, Mouse | Memory | Motherboard RAM, system BIOS ROM, hard disk, CD/DVD disk, speakers | There are some devices that are both input and output devices. These include modems, network...

Words: 382 - Pages: 2

Computer Structure Lab

...Computer | Operating system | Hard Drive | RAM | Processor | Speed | Cost | Acer Aspire ES1-511-C59V 15.6-Inch Laptop (Diamond Black) | Windows 8.1 | Drive500 GB | 4 GB | Intel Celeron | 2.16GHz | $278.19 | CybertronPC Borg-Q GM4213A Desktop PC (Blue) | Windows 7 Home Premium 64-bit | 1000 GB | 8 GB | FX-Series Quad-Core FX-4120 | 3.8 GHz | $641.40 | HP Pavilion 23-g010 23-Inch All-in-One Desktop | Windows 8.1 | 500 GB | 4 GB | AMD E Series | 1.3 GHz | $479.99 | HP Slate 21-k100 Touchscreen All-in-One Desktop (Android 4.2 | Android 4.2 (Jelly Bean) | 8 GB | 1 GB | Tegra | 1.66 GHz | $294.34 | | Sharita Ramsey Computer Structure (NT1110) July 15, 2014 Assignment (lab 5) 1. A Teacher 2. A Graphic Designer 3. A Student A Teacher would need to use a computer with plenty of storage space. A computer with only 500 GB of Hard Drive and 4 GB of Ram would suffice. Teachers need computer capable of holding stored memory into its hard drive. This is good for things such as PowerPoint’s. Graphic designers couldn’t use anything other than a gaming computer with at less 8GB of RAM. People in profession like ( gamers, music producers, movie makers etc.) require there computers to work at it top speed for real time live streaming needs like ( 3.8 GHz or better) a gaming computer is needed in order to keep up with the programs that is being ran. Students wouldn’t need all that fancy 8 GB OR 16 GB RAM or with a 1 TB of hard drive. It would be useless A simple......

Words: 302 - Pages: 2

Wou Computer Survey Lab#4

...Q1: Computer science I believe is more of a general overview of computers / computing. Software engineering on the other hand focuses on the coding / design of software. Computer Engineering focusses on the design and construction of computer hardware. Information Technology is more of a computer science class that caters to the person that wants to work for a business and design their computer systems for them. Whereas Information Systems, is close to Information Technology however focuses more on the business optimization and knowledge of that. Q2: Computer science involves a lot more and is not limited to just computers. If a new invention that came out tomorrow called the Teschescope would astronomy be called Teschescopy? No it wouldn’t. Computers is more of a tool used by computer science. Computer science is really a way to process information, and if one day a better idea rises to perform that task and replace computers I believe the name of the field would not change. Q3: #1: Job Details If you are a Director of Engineering or Senior Manager with PHP application development experience, please read on. Top Reasons to Work with Us This is an exciting opportunity with a growing SaaS company in San Francisco who helps solve innovation challenges that have never been solved before. We use PHP, Node, MySQL, Linux, cloud, and big data to support millions of users. What You Will Be Doing - Lead the Engineering and QA teams through technical application...

Words: 594 - Pages: 3

Computer Lab 1

...Elizabeth Romero Computer and Logic Week 2 Lab Task 1: Identify the Ports Procedure 1. Look at the front and back of a desktop or notebook computer for the following bus connectors: RS232, USB, FireWire, and infrared. How many of each type of connector did you find? I found all four of them. 2. Label the appropriate names to the ports and adaptors given below. Ps/ 2 port USB ports Serial port VGA port Speakers Line in Microphone Ethernet port Pt 1 printer port Game port Task 2: Identify Memory Slots Procedure 1. Using the Internet, locate a diagram or photo of these types of memory slots on a desktop or notebook computer: Memory Stick (MS), Micro Drive (MD), Compact Flash (CF), and Secure Digital (SD). Memory Stick Slot Micro Drive Slot Compact Flash Slot Secure Digital Slot 1. Explain the diagram or photo(s) with the name of each type of memory slot. Memory Stick – is a removable flash memory card format. Electronic flash memory data storage device. Micro Drive- is an extremely small hard disk that can fit in a compact card memory slot. Compact flash- is a flash memory mass storage device used mainly in portable electronic devices. Secure digital- is a non-volatile memory card used extensively in portable devices. Task 3: Identify the Configuration Procedure 1. Identify the following configuration. When a SCSI host adapter card with internal and external connection is used, the SCSI daisy chain can extend through the card...

Words: 392 - Pages: 2

Computer Lab Protocol

...Computer Lab Protocol - The use of the computer lab is a privilege. Treat equipment and each other with respect at all times. - Wait for instructions when entering the computer lab. - If you have technical problems check with an adult. Do not touch any wires. - Stay in your seat. If you need help raise your hand. - Be sure to save your work often while working. - You must have permission to print. When you have permission to print press print only once. If the printer is not working an adult will solve the problem. - before you leave the lab save your work and close all programs. - Please leave the lab neat and clean for the next class. Push in your chair. Leave the computer station in good order. • - Take all of your things with you. • - Computers are for school projects and assignments only. • - No food, chewing gum or drinks are allowed at the computers. • - Leave backpacks at the door…only take necessary materials to the computer workstation. • Remain in your seat at all times unless instructed to get up. • NO talking without permission from the teacher. • Do not change any of the software settings used on the computers. • Work only with the computer that is assigned to you. • Do not download software from the Internet onto the computers in the lab unless authorized to do so. • Surfing the web and checking personal e-mail is prohibited. • Only print work that is related to your assignments. • You...

Words: 392 - Pages: 2

Computer Structure and Logic Lab 1

...Computer Structure and Logic Lab 1 12/17/2015 The computer I am working on right now has Windows 7 Installed on it. Windows 7 is not perfect. Some features are underdeveloped. For example when typing the cursor will move through the document. And some annoyances remain intact. But overall, the final version appears to be a worthy replacement to Windows XP. In window 7 you can take the Screen and split it into two. This is a great feature when you are writing a paper and doing research at the same time. To do this just click on the middle of the tab bar and drag left or right, then take your other screen and go the opposite way. In windows 7 you can now pin Icons to the task bar. For example you can pin chrome to your task bar, to do so open chrome, it will appear in the task bar when it does right click on it. Click on pin to task bar, now you have easy access to chrome. Windows 7 started the “Peak”. You can take your mouse and hover your mouse over an icon on the task bar that is active, when you do this a small screen pops up and you can see what is in that tab. Desktop Gadgets can be added to windows 7. You can add the Weather or even a picture slideshow to the desktop, just right click on your desktop and click on gadgets. Double click on the gadget you want and it will appear on your desktop. The desktop I am using has an Intel Core Processor the CPU is running at 3.30 GHz. It has 8 GB of RAM wish it had at least 16. Service Pack 1 is on this computer. SP1 is......

Words: 341 - Pages: 2

Computer

...Hardware Theft and Vandalism Hardware theft and vandalism are other types of computer security risks. Hardware theft is the act of stealing computer equipment. Hardware vandalism is the act of defacing or destroying computer equipment. Hardware vandalism takes many forms, from someone cutting a computer cable to individuals breaking into a business or school computer lab and aimlessly smashing computers. Companies, schools, and other organizations that house many computers are at risk of hardware theft and vandalism, especially those that have smaller system units that easily can fit in a backpack: briefcase. Mobile users also are susceptible to hardware theft. It is estimated that more than 600,000 notebook computers are stolen each year. The size and weight of these computers make them easy to steal. Safeguards against Hardware Theft and Vandalism To help reduce the chances of theft, companies and schools use a variety of security measures. Physical access controls, such as locked doors and windows, usually are adequate to protect the equipment. Many businesses, schools, and some homeowners install alarm systems for additional security. School computer labs and other areas with a large number of semi-frequent users often attach additional physical security devices such as cables that lock the equipment to a desk, cabinet, r floor. Small locking devices also exist that require a key to access a hard disk or optical disc drive. Some businesses use a real time...

Words: 3217 - Pages: 13

Computer

...1. What is it called when a virtualization server provides a virtual desktop for users on multiple client machines? ?VDI 2. Which of the following is a good practice when working with an overly confident user over the phone? ?Compliment the user's knowledge, insight, and experience 3. Which of the following is NOT an important principle to consider when customizing a system? ?Ensure your company can supply all parts 4. Which of the following is a good practice when working with a customer on site? ?Limit use of your cell phone to work-related calls 5. You should take ownership of a customer's problem as if it is your own problem. ?True 6. Once you feel like you have resolved a problem, politely tell the customer the job is finished, and go on your way. ?False 7. Which of the following is defined as a record of a call for help with a computer problem? ?Ticket 8. Which of the following is NOT a good practice when working with a computer illiterate user over the phone?? Before proceeding with the call, tell the customer to put someone else on the line. 9. When working with co-workers and supervisors, which of the following is a good practice? ?Be professional by putting business matters over personal matters 10. Which of the following is true about the A+ 2012 certification and exams? ?The A+ certification is not vendor specific 11. What should you do when you have a customer that is frequently complaining about your company, products or...

Words: 591 - Pages: 3

Computer Network Lab Manual

...CN LAB REPORT Dept. of ISE, BVBCET Department of Information Science & Engineering, BVBCET Hubballi COMPUTER NETWORKING LAB Mahantesh Patil 2BV14IS410 Mahantesh Patil 2BV14IS410 CN LAB REPORT Dept. of ISE, BVBCET LAB-01 List the hardware components 1) Difference between switch and Hub: 2) Difference between SWITCH and ROUTER 3) Differences between Router and Gateway 4) What is the Difference between Subnetting and Supernetting? HARDWARE COMPONENTS Cables: 1|Page Mahantesh Patil 2BV14IS410 CN LAB REPORT Dept. of ISE, BVBCET Cables: which are used to connect one or more devices to computer or network. Different types of network cables are available market they are Coaxial cable, Optical fiber cable, Twisted pair cable. RJ-45 The most common UTP connector is RJ45 (RJ stands for registered Jack), as shown in Figure. The RJ45 is a keyed connector, meaning the connector, meaning the connector can be inserted in only one way. 2|Page Mahantesh Patil 2BV14IS410 CN LAB REPORT Dept. of ISE, BVBCET SWITCHES: Switches contain many ports to connect different network segments. They are similar to hubs, but offer greater performance. When a network contains a large number of devices, switches are needed instead of hubs to make sure the communications between devices does not slow down. Contrary to hubs, switches send the data it receives only to specific ports. NIC(NETWORK INTERFACE CARD) A network card...

Words: 3647 - Pages: 15