• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14

CSA & Networking.

Extracts from this document...

Introduction

CSA & NETWORKING TOM COURSEWORK BY MUTAHIR MALIK BIT YEAR 2 1) BINARY HEXADECIMAL & DECIMAL CHART CHARACTER HEXADECIMAL DECIMAL BINARY 128 64 32 16 8 4 2 1 0 Y 59 89 0 1 0 1 1 0 0 1 0 E 45 69 0 1 0 0 0 1 0 1 0 5 35 53 0 0 1 1 0 1 0 1 0 1 31 49 0 0 1 1 0 0 0 1 0 C 43 67 0 1 0 0 0 0 1 1 0 A 41 65 0 1 0 0 0 0 0 1 0 N 4E 78 0 1 0 0 1 1 1 0 0 P 50 80 0 1 0 1 0 0 0 0 0 1 31 49 0 0 1 1 0 0 0 1 0 2 32 50 0 0 1 1 0 0 1 0 0 3 33 51 0 0 1 1 0 0 1 1 0 W 57 87 0 1 0 1 0 1 1 1 0 L 4C 76 0 1 0 0 1 1 0 0 0 H 48 72 0 1 0 0 1 0 0 0 0 A 41 65 0 1 0 0 0 0 0 1 0 1 31 49 0 0 1 1 0 0 0 1 ...read more.

Middle

DATA LINES Data lines are the layers of hard drive that is used to store the functions and information the computer needs to operate .The type of data stored may vary depending on if the data is a text file or a program file. In Tom the data lines are the different layers of blocks where information can be stored in the memory location. Tom has 80 memory locations and therefore the amount of data lines would be 80 times the amount of data lines each memory location has . In a Intel Pentium however the data lines are many depending on the size of the hard drive. NETWORKING AN INTERNET COMPANY The internet company needs to be networked internally as well as both the offices to be linked as well. In order for the company to do this ,it will need a lot of very expensive equipment which I will be explaining as following NETWORKING INTERNALLY In order for both the offices to be linked together ,the company needs the following equipment. LOCAL AREA NETWORK A local area network will be needed to link the different computer stations within each office. Local area network consists of usually one server per office and can attach many number of office desk tops with the server in each office. ...read more.

Conclusion

FIREWIRE Firewire puts in to effect an access control policy between the two networks .It also has essential role as a security blanket for the management by alerting the management of any security breaches ..The firewalls purpose will be to keep hackers out of the computer networks . It also provides security for using the internet. It is very cheap and is easy to install. PCMCIA PCMCIA stands for personal computer memory card international association which is a small computer consisting of PC cards. They are designed for adding memory to portable computers. PC cards will help the business by transferring data and adding ROM and RAM in to the personal computer. The firm will also be able to change the card to a modem card without rebooting the system. BACKUP SYSTEM Back up is a process where all the data is stored in a different location from the main storage area so that data will not be lost if the main storage device stops working. A company needs to keep and update backup files on a regular basis if it needs to make sure that all its data is safe from being lost. The company will have to have back up computers or hard disks to store data all the time. CSA & NETWORKING CIS1308 TOM COURSEWORK BIT HND REPORT BY MUTAHIR MALIK - 1 - ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    PAN It stands for Personal Area Network and used for communication between computer devices which include telephone and also PDA's. As well as using to communicate with PDA's it can also be used for connecting to next level up in the next hierarchy and connecting to the Internet.

  2. Social Networking

    during lessons and over a quarter declare that they spend more than 30 minutes on SNS each day at school. All these result shows that teens are very serious about social networking. For them failing to attend to these duties could end friendships and go down their reputations.

  1. Smart Card System

    Qualified providers are signed by a trusted entity.) JCE 1.2.1 supplements the JavaTM 2 platform, which already includes interfaces and implementations of digital signatures and message digests. This release of JCE is a non-commercial reference implementation that demonstrates a working example of the JCE 1.2.1 APIs. A reference implementation is similar to a proof-of-concept implementation of an API specification.

  2. System I designed in order to produce a promotion package for her newly formed ...

    troubleshooting guide for new users Microsoft Access * Wizard for guidance of structuring techniques * Easy to do datasheets * Gives you the option of creating your database in design view or on the datasheet itself * Checks any spelling errors * Automatically stores created documents * East to change

  1. Infernowear is a new company run by a self-employed creative designer aiming to producing ...

    The other query is used in the form named FrmOrderline, it shows all the orders even if they have not been paid for, so when confirmation of payment comes through the "payment received check box" can be ticked. To do this the criteria for the payment received box was left empty to show all data.

  2. Computer Maintainance - anti-virus, cookie deletion, drive scanning

    Consequently, many networks are now connected to the Internet where Internet connectivity would otherwise have been too great a risk. Firewalls allow network administrators/user to offer access to specific types of Internet services to selected network users.

  1. The purpose of this coursework is to design a network for a small to ...

    Fig 1. On both company sites users need to be able to share peripheral devices such as printers and scanners for this reason a star topology will be implemented in both offices Star Topology: A star topology is when each device is connected to a central routing device for example a switch, which would then forward the data to the appropriate device.

  2. Explain the different techniques of gathering information to answer an IT Technical problem or ...

    The policies and procedures that may influence the technical advice would consist of the companies training policies, budget, type of organisation (charity/ other), company culture, work pressure, user IT expertise and other factors. Training Policies A company with a good training policy would most definitely run more efficiently and be more professional.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work