Free Essay

Computer & Logic Lab

In:

Submitted By MACCHARLES
Words 296
Pages 2
NT1110: Module 5 Computer Operation and Security
Lab 5.1 Understanding BIOS, POST, and Security Basics In this lab, you will demonstrate your ability to fix issues related to BIOS/POST and secure the computer from viruses and Trojans. Required Setup and Tools
A computer with access to the Internet
Recommended Procedures

Task 1: Understanding BIOS and POST A user boots his or her computer and hears a sequence of six beeps. The computer uses AMI BIOS. What error is indicated by the six beeps? A different user with a computer using Phoenix BIOS hears a sequence of beeps with pauses in between. The sequence is beep - pause - beep beep beep - pause - beep beep beep beep- pause - beep beep beep. What error is indicated by this beep sequence?

Task 2: Basic Security Firewalls may be hardware devices or software programs. Hardware firewalls protect an entire network. Software firewalls protect a single computer. Research the Internet for an example of each of these types of firewalls and compare their features. Linksys and Cisco make firewall/routers for home use. The Zone labs are an example of a software firewall.

Submission Requirements: Include a references page citing the resources you used from the textbook, ITT Tech Virtual Library, and credible websites to substantiate your answers. All citations should be in APA format. Refer to ITT Tech Virtual Library> Research Help> Research Guides> Grammar, Writing & Style> APA Formatting and Style Guide for help in APA formatting. Your report should be two- to four-page long. Include a header containing your name and the date on each page. Name the document NT1110_StudentName_Module5_Lab.doc, replacing StudentName with your name. Use Arial 12-point font and double-line spacing. Evaluation Criteria: The Lab rubric will be used to evaluate this assessment.

1

Similar Documents

Free Essay

Computer Logic Lab 3

...• Task I 2. The LGA 1156 motherboards are for use with Intel H1 processors. The LGA 1156 connector’s main purpose is to connect the processor to the motherboard for use with the PC. 3. The H55 chipset is the first generation of the Intel I-series. It is compatible with LGA 1556 motherboards. 4. Some of the Gigabyte GA-H55M-UD2H ‘s unique features are on/off charge for best ipod/android charging, 2oz copper PCB, and smart 6 technology along with more common though no less useful features like USB 3.0, 2 PCIx16 slots for multiple GPU setups, and an Easy setting for OCing the GPU. • Task II 1. The AMD 770 chipset was the last chipset for ATI before they merged with AMD. Because of this, there are many names that this series has gone by. Some notable processors from this series was the AMD 790fx, 790x, and 790gx. 2. Some of the processors that are compatible with the SB710 southbridge chipset are Terion II Neo, Athlon II Neo, and Sepron. 3. The AM3 socket is a AMD compatible motherboard socket for use with processors such as Phenom II x6, Phenom II x4, Phenom II x3, and the Phenom II x2. Processor//Clock Speed//Cache//Bus Speed//Architecture. I7//3.5ghz//6mb//4.8GTs//Bloomfield x86-x64 I7m//2.8ghz//6mb//2.5gts//Clarksfield x86-x64 I5//3.5ghz//6mb//2.5GTs//Lynnfield x86-x64 I5m//2.7ghz//3mb//2.5GTs//Arandale x86-x64 I3//3.4ghz//3mb//2.5GTs//Clarksfield x86-x64 I3m//2.4ghz//3mb/2.5GTs//Nehalam x86-x64 vPro//2.9ghz//1.5mb//4.8GTs//Clarksfield x86-x64 vPro m//3...

Words: 330 - Pages: 2

Free Essay

Computer Structure and Logic Lab 1

...Computer Structure and Logic Lab 1 12/17/2015 The computer I am working on right now has Windows 7 Installed on it. Windows 7 is not perfect. Some features are underdeveloped. For example when typing the cursor will move through the document. And some annoyances remain intact. But overall, the final version appears to be a worthy replacement to Windows XP. In window 7 you can take the Screen and split it into two. This is a great feature when you are writing a paper and doing research at the same time. To do this just click on the middle of the tab bar and drag left or right, then take your other screen and go the opposite way. In windows 7 you can now pin Icons to the task bar. For example you can pin chrome to your task bar, to do so open chrome, it will appear in the task bar when it does right click on it. Click on pin to task bar, now you have easy access to chrome. Windows 7 started the “Peak”. You can take your mouse and hover your mouse over an icon on the task bar that is active, when you do this a small screen pops up and you can see what is in that tab. Desktop Gadgets can be added to windows 7. You can add the Weather or even a picture slideshow to the desktop, just right click on your desktop and click on gadgets. Double click on the gadget you want and it will appear on your desktop. The desktop I am using has an Intel Core Processor the CPU is running at 3.30 GHz. It has 8 GB of RAM wish it had at least 16. Service Pack 1 is on this computer. SP1 is...

Words: 341 - Pages: 2

Premium Essay

Lab 1 Computer Structure and Logic

... Accumulator Arithmetic Logic Unit Arithmetic Logic Unit Control Unit Control Unit Memory Memory Component | Function | Arithmetic Logic Unit | Control operations between all components of the computer. | Accumulator | Store the result of the last calculation.Registers that store temporary numbers,And can be hard-wired to the logic unit.They we developed so that fewer bits couldBe used for instructions and operands. | Control Unit | Controls operations betweenAll components of the computer. | Input | Provides data to the computer from the user. | Memory | Stores program instructions and data. | Output | Displays data to the user. | Task 2: These are the common input, output, and memory components: Component | Function | Input | Keyboard, Mouse, Gaming Controller, Microphone, Camera | Magazines | Video Display, Speaker, Printer, Mouse | Memory | Motherboard RAM, system BIOS ROM, hard disk, CD/DVD disk, speakers | There are some devices that are both input and output devices. These include modems, network adapters, and expansion ports such as USB, FireWire, and PCMCIA slots. Similarities | Differences | Power Saving: Both types of computers can hibernate or sleep when not being used...

Words: 382 - Pages: 2

Free Essay

It113 Project Scope

...that the company obtains a high performance network for a reasonable price. Project description MK Institute of Higher Learning is purposing a project with the description to network a classroom based floor. This floor will consist of three wings. Each wing accommodates one distribution closet, which must be interconnected to one another. Each wing also has eight classrooms and one computer lab. Classrooms will need 2 drops and the computer labs will need 44 drops, resulting in 60 drops in all per wing. The ISP connection will be entering from the north wing’s distribution room. The institute will also be requiring that a wireless access coverage to the central lobby area, allowing 100 users simultaneously, to be made possible. Also noting that the central lobby area consists of three solid supports, holding a 25’ ceiling. Major Deliverables * The networking of the MK Institute of Higher Learning. * Placing needed hardware. * Wiring the hardware and network. * Interconnecting distribution rooms. * 3 wings, each consisting of 8 classrooms = 16 drops, one computer lab = 44, and one distribution room. * Wireless central lobby allowing 100+ users simultaneously. * Fully functional Networking...

Words: 607 - Pages: 3

Premium Essay

Information Centre

...Computer Lab Rules & Regulations Swinburne University computing facilities may only be used by current Swinburne students and staff. Swinburne identity card must be presented upon request. The computing facilities should only be used for educational and research purposes. The following rules and regulations apply to all lab computers on campus. Lab Rules & Regulations 1. The computer lab provided by the University is solely for educational and research activities. Students are prohibited from using the lab for any other reasons. 2. Students must have a valid student ID card to use the computer labs. 3. Students must abide by all rules and regulations, such as those shown on booking sheets, computer screens, and notices near the computers or on the wall. 4. Two-hour Usage Rule: When the lab is full and students are waiting for a vacant computer, the two-hour rule will apply. Students will be limited to 2 hours on the computer per session. 5. All users must abide by the license requirements of any software or resources being used on the computer. 6. The downloading of non-coursework related materials is strictly prohibited on the campus network as it uses much of the network bandwidth, thus slowing down all internet access. 7. All personal data must be saved on a floppy disk, handy drive or on your Home drive. Do not save personal data on the computer hard drive. 8. Please be reminded to scan your handy...

Words: 484 - Pages: 2

Premium Essay

Rules

...Lab Rules & Regulations 1. The computer lab provided by the University is solely for educational and research activities. Students are prohibited from using the lab for any other reasons. 2. Students must have a valid student ID card to use the computer labs. 3. Students must abide by all rules and regulations, such as those shown on booking sheets, computer screens, and notices near the computers or on the wall. 4. Two-hour Usage Rule: When the lab is full and students are waiting for a vacant computer, the two-hour rule will apply. Students will be limited to 2 hours on the computer per session. 5. All users must abide by the license requirements of any software or resources being used on the computer. 6. The downloading of non-coursework related materials is strictly prohibited on the campus network as it uses much of the network bandwidth, thus slowing down all internet access. 7. All personal data must be saved on a floppy disk, handy drive or on your Home drive. Do not save personal data on the computer hard drive. 8. Please be reminded to scan your handy drive before use to reduce the risk of any virus outbreak. 9. The Management is not responsible for any loss of data or personal belongings regardless of the cause. 10. No moving or unplugging of any equipment in the labs. 11. No pornographic and offensive images & videos. 12. No games (both computer and physical). 13. No...

Words: 413 - Pages: 2

Free Essay

Transmittal Letter

...college of business were our focal point. Surveys were given to students with questions regarding financial hardships caused by laptop requirement and their opinions of the policy among others. Faculty was interviewed on their thoughts and how the policy helped with the classroom. Administration helped with the reasoning behind implementing the policy and some hints to phase outs of the computer labs located in the college of business. We found that students believed that the policy is not effective, but should be enforced. For faculty, some believe that the policy is helpful for learning and welcome laptops in the classroom while others feel that laptops can be a distraction to everyone. The administration implemented the policy because they want students to have the ability to work anywhere at any time with the specialized tools/software needed for courses taken. They also feel laptops are necessary for non-traditional students who may be full time professionals and have the option to complete courses online. Rumors that the laptop requirement was put into place because of possible computer lab phase outs are false, null, and void. To improve the effectiveness of the laptop requirement in the college of business, we recommend the following: * Making sure students/faculty are aware of the laptop requirement * Enforcing consequences for those who don’t have a laptop Thank you for welcoming our concerns and suggestions through this project. We learned a great deal and...

Words: 314 - Pages: 2

Free Essay

Man U

... | - First Come First Serve basis (PJ Campus- 300 students) - First Come First Serve basis (Gombak Campus- 100 students) (EXAMINATION WILL BE HELD IN THE MIDDLE OF THE YEAR 2012) DATE OF M.U.E.T REGISTRATION AS FOLLOWS: |DATE |DAY |TIME |VENUE | |22/03/2012 |Thursday |8:30 AM - 12:30 NOON 2:00 PM - 3:30 PM |MULTI PURPOSE LAB A | | | | |(PJ campus) | |23/03/2012 |Friday |8:30 AM - 12:00 PM | | | | |2:45 PM – 3:30 PM | | |DATE |DAY |TIME ...

Words: 577 - Pages: 3

Free Essay

Fdfglkd

...Process Principles I N-11 Calculus I 2 Chemical Process Principles I 2 English Comprehension and Composition 2 Islamic Studies 2 Lab-Engineering Drawing 2 Lab-Physics for Chemical Engineers 2 Physics for Chemical Engineers 2 Tuesday Monday English Comprehension and Composition Calculus I N-7 N-12 Chem-Amjad Riaz N-11 Wednesday Phy-Dr. Saif Ur Rehman Physics for Chemical Chemical Process Engineers Principles I N-18 HUM-Dr. Musferah Mehfooz N-19 Math-Imran Zulfiqar Cheema Dr. Saif Ur Rehman / Dr. Ishrat Sultana Thursday Islamic Studies Calculus I Lab-Physics for Chemical Engineers N-15 N-3 Applied Physics Lab Chem-Muhammad Imran Rafiq Friday Lab-Engineering Drawing PC Lab-C Lessons/week 14 Timetable generated:11/13/2014 aSc Timetables Final Time Table - Fall 2014 ( v 20141113-1130 ) CIIT_Lahore FA14-BEC-B (Semester 1) (DDP) 2 10:00 - 11:30 Math-Syed Tahir Raza Rizvi 1 8:30 - 10:00 HUM-Huma Ijaz 3 11:30 - 1:00 4 1:30 - 3:00 5 3:00 - 4:30 6 4:30 - 6:00 7 6:00 - 7:30 Subjects Count English Comprehension and Composition Calculus I N-10 Phy-Dr. Ayesha Anjum N-4 HUM-Huma Ijaz Calculus I 2 Chemical Process Principles I 2 English Comprehension and Composition 2 Islamic Studies 2 Lab-Engineering Drawing 2 Lab-Physics for Chemical Engineers 2 Physics for...

Words: 31997 - Pages: 128

Premium Essay

Lab1

...Instructor Guide Lab 1: Computer Model Understanding Activity (paper and pencil) Learning Objectives and Outcomes The student is expected to demonstrate the ability to work with the von Neumann model of a computer. To demonstrate this ability, the student will: 1. Draw a diagram of a computer from the von Neumann perspective, including definitions of all parts of the model. 2. Provide examples of the Input, Output, and Memory sections of the model. 3. Provide a comparison table showing the similarities and differences between desktop and notebook computers. Required Setup and Tools In this laboratory, students will need only paper and pencil to do the required work. However, the use of a drawing program, such as Visio or the Drawing toolbar in Microsoft Word, is suggested for drawing the von Neumann computer model. Lab Solutions The student should provide solutions similar to what is shown here. Task 1: Here is an example of the von Neumann model of the computer. 1 Memory Control Unit Arithmetic Logic Unit Output Input Accumulator Central Processing Unit Here are the functions of each component in the von Neumann model of the computer. Component Control Unit Arithmetic Logic Unit Accumulator Function Control operations between all components of the computer. Perform calculations using the accumulator. Store the result of the last calculation. Accumulators are registers that store temporary numbers and can be hard-wired to the logic unit. They were...

Words: 765 - Pages: 4

Premium Essay

Nt1110

...Unit 1 Lab 1 Computer Model *Control Unit and Arithmetic Logic Unit make up CPU *Control Unit and Arithmetic Logic Unit make up CPU OUTPUT OUTPUT Accumulator Accumulator INPUT INPUT ARITHMETIC UNIT ARITHMETIC UNIT CONTROL UNIT CONTROL UNIT RAM (MEMORY) RAM (MEMORY) Von Neumann Model Definitions CPU – The CPU is essentially the brain of the computer. It calculates the math and is responsible for telling the rest of the computer what to do. It is broke into two parts; The Control Unit and Arithmetic Unit. Control Unit – The control unit reads and interprets a program’s instructions, which are converted into electrical signal that activate other components of the computer. Arithmetic Unit - The arithmetic unit (also known as the logic unit) is takes care of arithmetic and logic operations. RAM – RAM (Random Access Memory) is memory that is randomly accessed from the processor and is stored in data cells. The data stored in each cell is a number between 0 and 255, each of which is a byte of information. They are stored in binary form (series of 0’s and 1’s) instead of decimal form. Device Examples Input Device – Mouse, Keyboard, Scanner, Optical Pen Output Device – Printer, Monitor, Speakers, Headphones Both Input and Output Devices – CD/DVD, Touch Screen, Webcam, Hard Disk, RAM Memory Device – CD/DVD, Hard Drive, RAM Personal Computer/Laptop Comparison Personal Computer Typically components the processor resides within a box...

Words: 292 - Pages: 2

Free Essay

Comp 228 Outline

...Department of Computer Science and Software Engineering Concordia University COMP228 Fall 2009 Instructor: H.F. Li [EV 3.409; hfli@cse.concordia.ca; x3020] Office Hours: Tue 4:15 – 5:15 pm; Thurs 10:30 – 11:30 am. Objective: The objective of this course is to introduce key concepts in computer organization at the level of assembly/machine language. Students are expected to learn about features that affect programmability and performance at the hardware layer. Hardware details are discussed at a level appropriate for beginning students in computer science and software engineering. Basics of assembly language programming via a simple language are introduced, supplemented with some hands-on experience on NASM. Tentative Course Outline Topic Material Text Week Introduction Some basic concepts/terminologies, Chapter 1 1 system abstractions, von Neumann model Data Representation Binary representations of integer and Chapter 2 2 – 3 floating point number, 2’s complement addition, ASCII, CRC and Hamming code Digital Logic Boolean functions, logic circuit, Chapter 3 4 full adder, register A Simple Computer Processor internal, introduction to bus, Chapter 4 5 – 8 memory, I/O subsystems, Marie ISA and programming, real examples (NASM) More on ISA variations of ISA, pipelining Chapter 5 8 – 9 Memory types of memory, memory hierarchy, Chapter 6...

Words: 769 - Pages: 4

Premium Essay

Its Making Put Something Here

...pseudo code. CO3: Write programs that perform input, processing, and output. Unit Learning Outcomes LO8: Determine program input, processing, and output stages. LO9: Create the necessary flowcharts to describe a program’s structure. LO10: Use pseudocode to define a program’s structure. LO11: Formulate solution algorithms for calculations by properly following the order of operations. Key Concepts ▪ Determining input, process, and output ▪ Creating flowcharts and pseudocode ▪ Formulating algorithms Reading ▪ Gaddis, Chapter 2: “Introduction to Computers and Programming,” pages 29-55 Resources: • Data Projector • ITT Virtual Library • Text Books • Visual Studio • Lab Computers • Student Removable Hard Drive • VM Ware Player Methods: • Lecture • Group Discussion • Lab Work • Review exercise / Research Papers • Quiz Brief Lesson Overview: Today’s lecture we would be discussing the following topics. • Discuss how all programs basically consist of a three-step process: input, process, and output. Use the payroll calculation program example from Figure 2.3 on page 34 of the textbook to illustrate this process. Ask students to think of and share other examples that follow this three-step process. • Discuss how a necessary input and process is used to achieve an output, which is not always very easy to determine. Explain that...

Words: 895 - Pages: 4

Premium Essay

Nt1210 Introduction to Networking Onsite Course

...hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking ...

Words: 4400 - Pages: 18

Premium Essay

Nt1310 Unit 3 Assignment 1 Data Analysis

...his courses. For each course, the professor will be able to download the students' assignments and review them. All courses will be recorded, the professor will be able to show a file of his storage on the classroom's projector when connected to the LAN through the classroom's computer. If the course is online, the professor will be able to upload video. The student account contains a personal storage of 1GB. The student will be able to access to the university computers by login to his session. The computers will not save anything, they just contain computer...

Words: 1527 - Pages: 7