0 evaluări0% au considerat acest document util (0 voturi)
79 vizualizări4 pagini
This document contains a list of books, articles, manuals, and online resources related to information technology topics such as computer assembly, hardware and software, networking, troubleshooting, and security. The resources cover subjects like configuration, file sharing, PC repair fundamentals, networking tips, operating system installation, and occupational safety precautions. Definitions are also provided for various computer and networking terms including client/server network, coaxial cable, configuration, crossover cable, directX, fiber optic, IP address, IP config, network, peer-to-peer network, ping, protocol, registry, RJ45, security, straight-through, subnet mask, twisted pair, and virus.
This document contains a list of books, articles, manuals, and online resources related to information technology topics such as computer assembly, hardware and software, networking, troubleshooting, and security. The resources cover subjects like configuration, file sharing, PC repair fundamentals, networking tips, operating system installation, and occupational safety precautions. Definitions are also provided for various computer and networking terms including client/server network, coaxial cable, configuration, crossover cable, directX, fiber optic, IP address, IP config, network, peer-to-peer network, ping, protocol, registry, RJ45, security, straight-through, subnet mask, twisted pair, and virus.
This document contains a list of books, articles, manuals, and online resources related to information technology topics such as computer assembly, hardware and software, networking, troubleshooting, and security. The resources cover subjects like configuration, file sharing, PC repair fundamentals, networking tips, operating system installation, and occupational safety precautions. Definitions are also provided for various computer and networking terms including client/server network, coaxial cable, configuration, crossover cable, directX, fiber optic, IP address, IP config, network, peer-to-peer network, ping, protocol, registry, RJ45, security, straight-through, subnet mask, twisted pair, and virus.
Amy Hisson, Computer Assembly and Configuration- Lab and Assignments
David Anfinson, Ken Quamme IT Essentials: PC Hardware and Software Companion Guide 3rd Edition- 2008 at 800 East 96th Street Indianapolis, Indiana 46240 USA Efraim Turban, R. Kelly Rainer Jr., Richarrd Potter Introduction to Information Technology 3rd Edition- 2005 at Rosewood Drive, Denver, John Wisley and Sons(Asia) Pte. Ltd Marigen N. Leosala, Bobby P. Caoagdan, Ronaldo V. Ramilo, and Rosalie P. Lujero Technology and Livelihood Education- Information and Communications Technology Learners Manual Grade 7 & 8 Rosalie P. Lujero, Ronaldo V. Ramilo Technology and Livelihood EducationInformation and Communications Technology Learners Manual Computer Hardware Servicing Grade 9 Electronic Resources: Definition of Configuration Retrieved from http://www.webopedia.com/TERM/C/configuration.html File Sharing Retrieved from http://www.techopedia.com/definition/16256/file-sharing Fundamentals of PC repair Retrieved from http://www.ustudy.in/ce/hard/u1 Hardware and Software Troubleshooting Tips | Virus Removal Tips | Best Anti-virus | Speeding Up Windows XP/Windows Vista/Windows 7 | Networking Tips | UNIX and LINUX Usability | Installation Procedure Of Various Operating Systems | computer repair | computer problems Retrieved from http://101-computertroubleshooting.blogspot.com/2009/09/directx-diagnostic-tooldxdiag.html-
317
How to configure peer to peer workgroup network step by step Guide
Retrieved from http://computernetworkingnotes.com/basic-workgroupnetworking/workgroup-set-up.htmlHow to make an Ethernet cross over cable Retrieved from http://www.makeuseof.com/tag/ethernet-crossover-cable/ Occupational Safety Precautions Retrieved from peer to peer networking Retrieved from http://h10025.www1.hp.com/ewfrf/wc/document?cc=us&lc=en&dlc=en &docname=bph05694Ping Tim Fisher Retrieved from http://pcsupport.about.com/od/commandlinereference/p/pingcommand.htmPuzzles for Activities Retrieved from http://puzzlemaker.discoveryeducation.com/CrissCrossSetupForm.asp System Configuration utility Retrieved from http://moderncomputerskillsandtraining.com/?page_id=2950Turn On the Windows Firewall Retrieved from http://windows.microsoft.com/en-ph/windows/turn-windows-firewall-onoff#turn-windows-firewall-on-off=windows-7 Windows Registry Retrieved from http://pcsupport.about.com/od/termsr/p/registrywindows.htm-http://info.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture%20Slides/ITE _PC_v40_Chapter2.pdf
318
Client/serverNetwork- a computer network in which one centralized, powerful
computer called server is a hub to which many less powerful personal compters or workstations called clients are connected. Coaxial cable- a type of wire that consists of a center wire surrounded by insulation and then a grounded shield of braided wire which minimizes electrical interference. Configuration- the way a system is set up. Configuration can refer to either hardware or software, or the combination of both. Cross-over- is a cable used to connect two network devices directly. Direct X- a set of APIs developed by Microsoft that enables programmers to write programs that access hardware features of a computer without knowing exactly what hardware will be installed on the machine where the program eventually runs. Fiber optic- is a technology that uses glass (or plastic) threads (fibers) to transmit data. Fiber optics has several advantages over traditional metal communications lines. IP Address- is a number that is used to identify a device on the network. IP config- is a command used to find out the IP address of a certain network. Network- is a group of two or more computer systems linked together. Peer-to-peer Network- a type of network in which each workstation has equivalent capabilities and responsibilities. Ping- a command prompt used to test the ability of the source computer to reach a specified destination computer.
319
Protocol- is the special set of rules that end points in a telecommunication
connection use when they communicate. Registry- is a database used by store configuration information.
Windows
operating
system
to
RJ45- short for Registered Jack-45, it is an eight-wire connector used
commonly to connect computers onto a Local-Area Network (LAN). Security- techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization Straight-through- is used in local area network to connect a PC to a network hub and router. Subnet mask- is used to determine what subnet an IP address belongs to. An IP address has two components, the network address and the host address. Twisted pair- is a type of cable that consists of two independently insulated wires twisted around one another. Virus- is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.
Computer Networking Beginners Guide: An Introduction on Wireless Technology and Systems Security to Pass CCNA Exam, With a Hint of Linux Programming and Command Line