Amy Hisson, Computer Assembly and Configuration- Lab and Assignments
David Anfinson, Ken Quamme IT Essentials: PC Hardware and Software Companion Guide 3rd Edition- 2008 at 800 East 96th Street Indianapolis, Indiana 46240 USA Efraim Turban, R. Kelly Rainer Jr., Richarrd Potter Introduction to Information Technology 3rd Edition- 2005 at Rosewood Drive, Denver, John Wisley and Sons(Asia) Pte. Ltd Marigen N. Leosala, Bobby P. Caoagdan, Ronaldo V. Ramilo, and Rosalie P. Lujero Technology and Livelihood Education- Information and Communications Technology Learners Manual Grade 7 & 8 Rosalie P. Lujero, Ronaldo V. Ramilo Technology and Livelihood EducationInformation and Communications Technology Learners Manual Computer Hardware Servicing Grade 9 Electronic Resources: Definition of Configuration Retrieved from http://www.webopedia.com/TERM/C/configuration.html File Sharing Retrieved from http://www.techopedia.com/definition/16256/file-sharing Fundamentals of PC repair Retrieved from http://www.ustudy.in/ce/hard/u1 Hardware and Software Troubleshooting Tips | Virus Removal Tips | Best Anti-virus | Speeding Up Windows XP/Windows Vista/Windows 7 | Networking Tips | UNIX and LINUX Usability | Installation Procedure Of Various Operating Systems | computer repair | computer problems Retrieved from http://101-computertroubleshooting.blogspot.com/2009/09/directx-diagnostic-tooldxdiag.html-
317
How to configure peer to peer workgroup network step by step Guide
Retrieved from http://computernetworkingnotes.com/basic-workgroupnetworking/workgroup-set-up.htmlHow to make an Ethernet cross over cable Retrieved from http://www.makeuseof.com/tag/ethernet-crossover-cable/ Occupational Safety Precautions Retrieved from peer to peer networking Retrieved from http://h10025.www1.hp.com/ewfrf/wc/document?cc=us&lc=en&dlc=en &docname=bph05694Ping Tim Fisher Retrieved from http://pcsupport.about.com/od/commandlinereference/p/pingcommand.htmPuzzles for Activities Retrieved from http://puzzlemaker.discoveryeducation.com/CrissCrossSetupForm.asp System Configuration utility Retrieved from http://moderncomputerskillsandtraining.com/?page_id=2950Turn On the Windows Firewall Retrieved from http://windows.microsoft.com/en-ph/windows/turn-windows-firewall-onoff#turn-windows-firewall-on-off=windows-7 Windows Registry Retrieved from http://pcsupport.about.com/od/termsr/p/registrywindows.htm-http://info.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture%20Slides/ITE _PC_v40_Chapter2.pdf
318
Client/serverNetwork- a computer network in which one centralized, powerful
computer called server is a hub to which many less powerful personal compters or workstations called clients are connected. Coaxial cable- a type of wire that consists of a center wire surrounded by insulation and then a grounded shield of braided wire which minimizes electrical interference. Configuration- the way a system is set up. Configuration can refer to either hardware or software, or the combination of both. Cross-over- is a cable used to connect two network devices directly. Direct X- a set of APIs developed by Microsoft that enables programmers to write programs that access hardware features of a computer without knowing exactly what hardware will be installed on the machine where the program eventually runs. Fiber optic- is a technology that uses glass (or plastic) threads (fibers) to transmit data. Fiber optics has several advantages over traditional metal communications lines. IP Address- is a number that is used to identify a device on the network. IP config- is a command used to find out the IP address of a certain network. Network- is a group of two or more computer systems linked together. Peer-to-peer Network- a type of network in which each workstation has equivalent capabilities and responsibilities. Ping- a command prompt used to test the ability of the source computer to reach a specified destination computer.
319
Protocol- is the special set of rules that end points in a telecommunication
connection use when they communicate. Registry- is a database used by store configuration information.
Windows
operating
system
to
RJ45- short for Registered Jack-45, it is an eight-wire connector used
commonly to connect computers onto a Local-Area Network (LAN). Security- techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization Straight-through- is used in local area network to connect a PC to a network hub and router. Subnet mask- is used to determine what subnet an IP address belongs to. An IP address has two components, the network address and the host address. Twisted pair- is a type of cable that consists of two independently insulated wires twisted around one another. Virus- is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.
Computer Networking Beginners Guide: An Introduction on Wireless Technology and Systems Security to Pass CCNA Exam, With a Hint of Linux Programming and Command Line