Premium Essay

Nt 1110 Unit 10 Analysis: Repair Shop

In:

Submitted By bravo4686
Words 322
Pages 2
Unit 10 Analysis: Repair Shop

The pros are:
• The users personal files will be saved
• The user will have a fresh start and a chance to take preventative measures to avoid future problems
• All of the users data will be backed up

The cons are:
• The user may have to pay to reinstall certain programs
• The user will have to reinstall old programs

The user with the new computer will not likely be affected as much as the user who has ran their computer for several years. The new user will not have accumulated many personal files or documents and most of the data will consist of factory programs and settings. Recent cache memory should be the only noticeable effect.

The user with several years of use of his computer would be ore affected as over the years, he/she may have accumulated many personal files, documents and applications. Of course all of his personal data should be backed up by the computer shop and placed on a CD for later installation, however many programs and applications will be affected. Any changes or personalization’s made to the programs and applications will be lost as they will have to be reinstalled as new applications. The user may also have to pay for some of the applications again.

The user who mostly browses the internet and uses email will more than likely only have accumulated cache memory as opposed to the business professional who may have stored important documents and programs on his computer. The email will not be affected as the data is all stored remotely by the email server.

The business professional may have stored files relating to his/her business and may not have copies of these files. Therefore the process would be high risk. This user may also have work related programs and applications that would have to be reinstalled to the computer. This could all greatly impact

Similar Documents

Free Essay

Pc Hardware Servicing

...Republic of the Philippines DEPARTMENT OF EDUCATION K to 12 Basic Education Curriculum Technology and Livelihood Education Learning Module COMPUTER HARDWARE SERVICING EXPLORATORY COURSE Grades 7 and Grade 8 TABLE OF CONTENTS What Is This Module About? .................................................................................... 2 How Do You Use This Module ............................................................................... 3 LESSON 1 – Use Hand Tools ........................................................................ 4 – 30 LESSON 2 – Perform Mensuration and Calculation ................................ 31 – 46 LESSON 3 –Prepare and Interpret Technical Drawing ............................ 47 – 63 LESSON 4 – Practice Occupational Safety and Health............................. 64 - 103 Answer Keys .................................................................................................. 104 - 111 Acknowledgment..................................................................................................... 112 COMPUTER HARDWARE SERVICING K to 12 – Technology and Livelihood Education 1 What Is This Module About? Welcome to the world of Computer Hardware Servicing! This Module is an exploratory course which leads you to Computer Hardware Servicing National Certificate Level II ( NC II)1. It covers 4 common competencies that a Grade 7 / Grade 8 Technology and Livelihood Education (TLE) student like you ought...

Words: 22909 - Pages: 92

Premium Essay

Research

...Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States SEVENTH EDITION Data Communications and Computer Networks A Business User’s Approach Curt M. White DePaul University Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Data Communications and Computer Networks: A Business User’s Approach, Seventh Edition Curt M. White Editor-In-Chief: Joe Sabatino Senior Acquisitions Editor: Charles McCormick, Jr. Senior Product Manager: Kate Mason Editorial Assistant: Courtney Bavaro Marketing Director: Keri Witman Marketing Manager: Adam Marsh Senior Marketing Communications Manager: Libby Shipp Marketing Coordinator: Suellen Ruttkay Media Editor: Chris Valentine Art and Cover Direction, Production Management, and Composition: PreMediaGlobal Cover Credit: © Masterfile Royalty Free Manufacturing Coordinator: Julio Esperas © 2013 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means—graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act—without the prior written permission of the publisher. For product information and technology assistance...

Words: 234459 - Pages: 938

Premium Essay

Technology and Computers

...INFORMATION TECHNOLOGY FOUNDATION 1 Compiled By: RONKY F. DOH (aka: ronky biggy diggy daddy igp) FU DAME TALS OF COMPUTERS We are living in an information age dependent upon digital information. Digital information is electronic information, the result of computer processing. Every type of job relies upon getting information, using it, managing it, and relaying information to others. Computers enable the efficient processing and storage of information. Do not think of a computer merely as the machine with the keyboard and the mouse, although that might be true for some types of computers. Embedded computers may be inside your household appliances, the video cassette recorder, the automobile, planes, trains, power plants, water purification plants, calculators, and even inside a few toys. These embedded computers are very small. They affect our lives each day. Why, even modern traffic lights operate with computers. They are all around us. Think of additional ways in which computers affect our lives each day. Every organization somehow use(s) a computer to run the organization. Some of the places are hospitals, schools, fire department, banks, stores or supermarkets, stock exchange, police department, insurance companies, transport companies, and government agencies etc. What is a computer? A computer is many things to many people, depending on what it is being used for. At one time the computer can be a machine which processes the payroll, then it can be a machine which tabulates...

Words: 67033 - Pages: 269

Premium Essay

General Mills Earnings

...Adjusted Diluted EPS, Excluding Certain Items Affecting Comparability* Return on Average Total Capital* Average Diluted Shares Outstanding Dividends per Share $17,910 $ 3,154 $ 1,824 $ 2.83 $ 2.82 11.6% 646 $ 1.55 $17,774 $ 3,223 $ 1,855 $ 2.79 $ 2.72 12.0% 666 $ 1.32 + 1% − 2% − 2% + 1% + 4% −40 basis pts. − 3% +17% N ET SA LE S Dollars in millions 2010 201 1 2012 2013 2014 14,636 14,880 16,658 17,774 17,910 A DJ USTE D S E G M E NT O PE R ATI N G PRO F IT * Dollars in millions 2010 201 1 2012 2013 2014 2,854 2,946 3,012 3,223 3,154 A DJ USTE D D I LUTE D E A R N I N G S PE R S H A R E * Dollars 2010 201 1 2012 2013 2014 2.31 2.48 2.56 2.72 2.82 D I V I D E N DS PE R S H A R E Dollars 2010 201 1 2012 2013 2014 0.96 1.12 1.22 1.32 1.55 *See page 87 for discussion of non-GAAP measures. Putting the Consumer First At General Mills, our key strategy for growing our worldwide food businesses is to Put the Consumer First. We work to connect with consumers and develop deep insight into what they like to eat, where they shop for food, and how they approach cooking today. From product development to manufacturing to distribution, marketing and sales, our focus is on meeting consumers’ evolving preferences and needs for high-quality, nutritious, convenient and great-tasting food. 19% 19% 19% 14% 14% 14% 15% 15% 15% General Mills at a Glance 12% 12% 12% 3% 3% 3% 22% 22% 22% U.S. RETAIL Net Sales by Division 17% 17% 17% 17% 17% 17% $10.6 Billion ...

Words: 48114 - Pages: 193

Free Essay

Maglev

...are different systems on a drilling rig ? Explain any one in detail with suitable diagramme. 18 2. a) Calculate Bottom hole pressure if well depth is 2500 m and mud weight is 1.2 gm/cc. b) Calculate mud weight if mud gradient is 0.87 psi/ft. ′ c) Calculate volume bbl/meter for drill pipe O.D. = 5′ inch and I.D. = 4.276 inch. 2 2 2 10 8 8 16 d) Draw circulation system on a drilling rig. 3. a) Discuss IADC classification of a bit in details. b) Discuss different factors affecting rate of penetration in details. 4. Write short note on : i) Coring ii) Fishing tools iii) BOP iv) Directional well P.T.O. [3963] – 103 -2- *3963103* SECTION – II 5. a) Discuss different types of casings and function of the casings in brief. b) Discuss different types of well completion techniques. 6. a) Discuss primary cementation process with suitable sketch. b) Discuss different perforation methods in brief. 7. a) What are different types of packer ? Discuss any one in brief. b) Draw well head assembly for A, B and C section. 8. Write short note on : i) Drill stem test ii) SSSV iii) X – Mas tree iv) Squeeze cementation. ––––––––––––––––– 8 10 10 6 8 8 16 B/I/11/120 *3963108* [3963] – 108 T.E. (Petroleum)...

Words: 172166 - Pages: 689

Premium Essay

Auditing Cases

...acceptance . . . . . . . . . . . . . . . . . . . . . . . . . . . S o l u tionS inc lu de d in t h iS Section 1.1 Ocean Manufacturing, Inc. 3 The New Client Acceptance Decision s e ct ion Understanding the Client’s Business and assessing risk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 S o l u tionS inc lu de d in t h iS Section 2.1 Your1040Return.com Evaluating eBusiness Revenue Recognition, Information Privacy, and Electronic Evidence Issues . . . . . . . . . . . . . . . . . . . . . . . . . . 25 2.2 2.3 2.4 Dell Computer Corporation Evaluation of Client Business Risk Flash Technologies, Inc. Asher Farms Inc. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 Risk Analysis and Resolution of Client Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 Understanding of Client’s Business Environment s e ct ion 3 Professional and ethical issues . . . . . . . . . . . . . . . . . . . . . . . 59 S o l u tio nS inc lu de d in t h iS Section 3.1 3.2 3.3 3.4 3.5 A Day in the Life of Brent Dorsey Staff Auditor Professional Pressures Nathan Johnson’s Rental Car Reimbursement Solving Ethical Dilemmas–Should He Pocket the Cash? Recognizing It’s a Fraud and Evaluating What to Do . . . . . . . . . . . . . . . . 63 The Anonymous Caller WorldCom . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....

Words: 162000 - Pages: 648

Premium Essay

Security Analyst

...Exploring TCP/IP Ports 7. Understanding Network Devices 8. Working with MAC Addresses 9. Intrusion Prevention and Intrusion Detection Systems 10. Network Security 11. Knowing Operating Systems 12. Backups and Archiving 13. Summary 14. Exam Essentials 15. Review Questions 5. Chapter 3: Cryptography 2 1. Cryptography: Early Applications and Examples 2. Cryptography in Action 3. Understanding Hashing 4. Issues with Cryptography 5. Applications of Cryptography 6. Summary 7. Exam Essentials 8. Review Questions 6. Chapter 4: Footprinting and Reconnaissance 1. Understanding the Steps of Ethical Hacking 2. What Is Footprinting? 3. Terminology in Footprinting 4. Threats Introduced by Footprinting 5. The Footprinting Process 6. Summary 7. Exam Essentials 8. Review Questions 7. Chapter 5: Scanning Networks 1. What Is Network Scanning? 2. Checking for Live Systems 3. Checking for Open Ports 4. Types of Scans 5. OS Fingerprinting 6. Banner Grabbing 7. Countermeasures 8. Vulnerability Scanning 9. Drawing Network Diagrams 10. Using Proxies 11. Summary 12. Exam Essentials 13. Review Questions 8. Chapter 6: Enumeration of Services 3 1. A Quick Review 2. What Is Enumeration? 3. Windows Basics 4. Enumeration with SNMP 5. Unix and Linux Enumeration 6. LDAP and Directory Service Enumeration 7. Enumeration Using NTP 8. SMTP Enumeration 9. Using EXPN 10. Using RCPT TO 11. SMTP Relay 12. Summary 13. Exam Essentials 14. Review Questions 9. Chapter 7: Gaining Access to a System 1. Up to...

Words: 71242 - Pages: 285

Premium Essay

Databasse Management

...Fundamentals of Database Systems Preface....................................................................................................................................................12 Contents of This Edition.....................................................................................................................13 Guidelines for Using This Book.........................................................................................................14 Acknowledgments ..............................................................................................................................15 Contents of This Edition.........................................................................................................................17 Guidelines for Using This Book.............................................................................................................19 Acknowledgments ..................................................................................................................................21 About the Authors ..................................................................................................................................22 Part 1: Basic Concepts............................................................................................................................23 Chapter 1: Databases and Database Users..........................................................................................23 ...

Words: 229471 - Pages: 918

Premium Essay

Work, Culture and Identity in Mozambique and Southafrica 1860-1910

...Acknowledgments ix Acknowledgments This book owes a great deal to the mental energy of several generations of scholars. As an undergraduate at the University of Cape Town, Francis Wilson made me aware of the importance of migrant labour and Robin Hallett inspired me, and a generation of students, to study the African past. At the School of Oriental and African Studies in London I was fortunate enough to have David Birmingham as a thesis supervisor. I hope that some of his knowledge and understanding of Lusophone Africa has found its way into this book. I owe an equal debt to Shula Marks who, over the years, has provided me with criticism and inspiration. In the United States I learnt a great deal from ]eanne Penvenne, Marcia Wright and, especially, Leroy Vail. In Switzerland I benefitted from the friendship and assistance of Laurent Monier of the IUED in Geneva, Francois Iecquier of the University of Lausanne and Mariette Ouwerhand of the dépurtement évangélrlyue (the former Swiss Mission). In South Africa, Patricia Davison of the South African Museum introduced me to material culture and made me aware of the richness of difference; the late Monica Wilson taught me the fundamentals of anthropology and Andrew Spiegel and Robert Thornton struggled to keep me abreast of changes in the discipline; Sue Newton-King and Nigel Penn brought shafts of light from the eighteenthcentury to bear on early industrialism. Charles van Onselen laid a major part of the intellectual foundations on...

Words: 178350 - Pages: 714

Premium Essay

Maxwell Report

...OCCUPATIONAL HEALTH AND SAFETY ACT REVIEW March 2004 Chris Maxwell © State of Victoria Printed by State of Victoria, March 2004 ISBN 1920921044 This work is copyright. Apart from any use permitted under the Copyright Act 1968, no part may be reproduced by any process without prior written permission from State of Victoria. Disclaimer: The content in this report is provided for information purposes only. The views expressed herein are those of the author and do not purport to represent the position of the State of Victoria. Neither the author nor the State of Victoria accept any liability to any persons for the information (or the use of such information) which is provided in this review or incorporated into it by reference. The information in this Review is provided on the basis that all persons having access to it undertake responsibility for assessing the relevance and accuracy of its content. OCCUPATIONAL HEALTH AND SAFETY ACT REVIEW March 2004 Chris Maxwell TABLE OF CONTENTS TABLE OF CONTENTS ABBREVIATIONS ACKNOWLEDGEMENTS EXECUTIVE SUMMARY INTRODUCTION CHAPTER 1: A CONSULTATIVE INQUIRY CHAPTER 2: THE SAFETY CONSENSUS PART 1: NEW CHALLENGES FOR OHS 1 3 5 6 15 15 20 24 24 29 46 46 54 60 71 96 96 100 110 120 135 141 159 163 169 177 177 186 192 192 215 222 227 233 233 258 272 284 284 293 328 347 350 354 354 357 360 363 383 387 392 392 397 ...

Words: 160731 - Pages: 643

Premium Essay

Sql Quiz

...Emory University | Internetworking Technology Handbook | [Type the document subtitle] | | SAVIOUR EMMANUEL UDOBONG | [Pick the date] | [Type the abstract of the document here. The abstract is typically a short summary of the contents of the document. Type the abstract of the document here. The abstract is typically a short summary of the contents of the document.] | Internetworking Basics An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. Internetworking refers to the industry, products, and procedures that meet the challenge of creating and administering internetworks. The following articles provide information about internetworking basics: * Internetworking Basics * Introduction to LAN Protocols * Introduction to WAN Technologies * Bridging and Switching Basics * Routing Basics * Network Management Basics * Open System Interconnection Protocols LAN Technologies A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers, and other devices. LANs offer computer users many advantages, including shared access to devices and applications, file exchange between connected users, and communication between users via electronic mail and other applications. The following articles provide information different LAN technologies: * Ethernet...

Words: 217433 - Pages: 870

Premium Essay

Art of Deception

...Engineering Social Engineering uses influence and persuasion to deceive people by convincing them that the social engineer is someone he is not, or by manipulation. As a result, the social engineer is able to take advantage of people to obtain information with or without the use of technology. Contents Foreword Preface Introduction Part 1 Behind the Scenes Chapter 1 Security's Weakest Link Part 2 The Art of the Attacker Chapter 2 When Innocuous Information Isn't Chapter 3 The Direct Attack: Just Asking for it Chapter 4 Building Trust Chapter 5 "Let Me Help You" Chapter 6 "Can You Help Me?" Chapter 7 Phony Sites and Dangerous Attachments Chapter 8 Using Sympathy, Guilt and Intimidation Chapter 9 The Reverse Sting Part 3 Intruder Alert Chapter 10 Entering the Premises Chapter 11 Combining Technology and Social Engineering Chapter 12 Attacks on the Entry-Level Employee Chapter 13 Clever Cons Chapter 14 Industrial Espionage Part 4 Raising the Bar Chapter 15 Information Security Awareness and Training Chapter 16 Recommended Corporate Information Security Policies Security at a Glance Sources Acknowledgments Foreword We humans are born with an inner drive to explore the nature of our surroundings. As young men, both Kevin Mitnick and I were intensely curious about the world and eager to prove ourselves. We were rewarded often in our attempts to learn new things, solve puzzles, and win at games. But at the same time, the world around us taught us rules of behavior that...

Words: 125733 - Pages: 503

Free Essay

Green

...Sehat (S2) Diit untuk Penderita Diabetes 8 AKADEMI PEREKAM Agustina MEDIK & INFO KES Wulandari CITRA MEDIKA AKADEMI PEREKAM MEDIK & INFO KES Anton Sulistya CITRA MEDIKA AKADEMI PEREKAM Eka Mariyana MEDIK & INFO KES Safitri CITRA MEDIKA AKADEMI PEREKAM MEDIK & INFO KES Ferlina Hastuti CITRA MEDIKA AKADEMI PEREKAM Nindita Rin MEDIK & INFO KES Prasetyo D CITRA MEDIKA AKADEMI PEREKAM MEDIK & INFO KES Sri Rahayu CITRA MEDIKA AKADEMI PERIKANAN YOGYAKARTA PKMK Kasubi Wingko Kaya Akan Karbohidrat yang Menyehatkan 9 PKMK Pemanfaatan Limbah Kayu Sebagai Bahan Utama Membuat Sangkar Burung Sekaligus Mengurangi Pemanasan Global Di Klaten Jawa Tengah Bolu Kulit Pisang Sebagai Peluang Usaha Mahasiswa APIKES Citra Medika Surakarta 10 PKMK 11 PKMK Tempe Lamtoro Kaya Gizi Sebagai Lauk 12 PKMK Rainbow Casava Nugget Alternatif Makanan Kaya Serat dan Gizi 13...

Words: 159309 - Pages: 638