• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14

CSA & Networking.

Extracts from this document...

Introduction

CSA & NETWORKING TOM COURSEWORK BY MUTAHIR MALIK BIT YEAR 2 1) BINARY HEXADECIMAL & DECIMAL CHART CHARACTER HEXADECIMAL DECIMAL BINARY 128 64 32 16 8 4 2 1 0 Y 59 89 0 1 0 1 1 0 0 1 0 E 45 69 0 1 0 0 0 1 0 1 0 5 35 53 0 0 1 1 0 1 0 1 0 1 31 49 0 0 1 1 0 0 0 1 0 C 43 67 0 1 0 0 0 0 1 1 0 A 41 65 0 1 0 0 0 0 0 1 0 N 4E 78 0 1 0 0 1 1 1 0 0 P 50 80 0 1 0 1 0 0 0 0 0 1 31 49 0 0 1 1 0 0 0 1 0 2 32 50 0 0 1 1 0 0 1 0 0 3 33 51 0 0 1 1 0 0 1 1 0 W 57 87 0 1 0 1 0 1 1 1 0 L 4C 76 0 1 0 0 1 1 0 0 0 H 48 72 0 1 0 0 1 0 0 0 0 A 41 65 0 1 0 0 0 0 0 1 0 1 31 49 0 0 1 1 0 0 0 1 ...read more.

Middle

DATA LINES Data lines are the layers of hard drive that is used to store the functions and information the computer needs to operate .The type of data stored may vary depending on if the data is a text file or a program file. In Tom the data lines are the different layers of blocks where information can be stored in the memory location. Tom has 80 memory locations and therefore the amount of data lines would be 80 times the amount of data lines each memory location has . In a Intel Pentium however the data lines are many depending on the size of the hard drive. NETWORKING AN INTERNET COMPANY The internet company needs to be networked internally as well as both the offices to be linked as well. In order for the company to do this ,it will need a lot of very expensive equipment which I will be explaining as following NETWORKING INTERNALLY In order for both the offices to be linked together ,the company needs the following equipment. LOCAL AREA NETWORK A local area network will be needed to link the different computer stations within each office. Local area network consists of usually one server per office and can attach many number of office desk tops with the server in each office. ...read more.

Conclusion

FIREWIRE Firewire puts in to effect an access control policy between the two networks .It also has essential role as a security blanket for the management by alerting the management of any security breaches ..The firewalls purpose will be to keep hackers out of the computer networks . It also provides security for using the internet. It is very cheap and is easy to install. PCMCIA PCMCIA stands for personal computer memory card international association which is a small computer consisting of PC cards. They are designed for adding memory to portable computers. PC cards will help the business by transferring data and adding ROM and RAM in to the personal computer. The firm will also be able to change the card to a modem card without rebooting the system. BACKUP SYSTEM Back up is a process where all the data is stored in a different location from the main storage area so that data will not be lost if the main storage device stops working. A company needs to keep and update backup files on a regular basis if it needs to make sure that all its data is safe from being lost. The company will have to have back up computers or hard disks to store data all the time. CSA & NETWORKING CIS1308 TOM COURSEWORK BIT HND REPORT BY MUTAHIR MALIK - 1 - ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    They are a lot less secure. They take a lot of time to maintain the software on an individual workstation. Network performance can be a issue because peer-to-peer is designed for a small network when to a bigger network of let's say 10 or more computers than the network speed will decrease making it difficult to expand.

  2. Social Networking

    during lessons and over a quarter declare that they spend more than 30 minutes on SNS each day at school. All these result shows that teens are very serious about social networking. For them failing to attend to these duties could end friendships and go down their reputations.

  1. I have been given the task of creating a system for a hospital to ...

    typing mistakes) I added some validation rules. The validation rules I used were on: * Date of Birth - Only allowing dates to be entered * Town - Allowing only values from the drop down menu. The hospital will only deal with patients from a certain attachment area, as the

  2. LAN & WAN Protocols

    IEEE 802.16 It is known as the Broadband Wireless Access. This is the standard for the upcoming WiMax system. It stands for Worldwide Interoperability for Microwave Access. It is a telecommunication technology which uses wireless transmission to deploy broadband to anywhere.

  1. I have been given the task to design a database for a company called ...

    To do this I set up a table. The table includes where the buttons move from and where it goes to and whether it works or not. The table is shown below. From To Worked Welcome form Existing customer menu Yes Welcome form New Customer menu Yes Existing Customer form

  2. I.C.T. coursework on Computer games retail store.

    Many websites and books can be used to help the student out. www.beginners.co.uk is one such site, and a book designed for training a person in the Internet is "The Internet for Dummies" by John R. Levine. For more information, the user can type "I.C.T for beginners" in a search engine and find the information/book they are looking for.

  1. Internet pre-History: Ancient Roads of Telecommunications & Computers.

    Following a dinner table conversation with Dr. Charles Jackson regarding recent European discoveries on electromagnetic properties, he makes his first notes regarding his "Recording Electric Magnetic Telegraph" and a dot - dash alphabet code. Later, Jackson claims credit for Morse's invention, saying he had supplied key information.

  2. The Data Management Structure: Components and the data structure

    Cursor Create Data Space Index Ensure Data Space Entries Set Cursor Copy Data Space Entries Insert Data Space Entry Materialize Data Space Attributes Materialize Data Space Index Attributes ........and more. Most present-day computers have instruction such as "Move binary bits left one bit", hundreds of which the compiler programmer must

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work