• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14

CSA & Networking.

Extracts from this document...

Introduction

CSA & NETWORKING TOM COURSEWORK BY MUTAHIR MALIK BIT YEAR 2 1) BINARY HEXADECIMAL & DECIMAL CHART CHARACTER HEXADECIMAL DECIMAL BINARY 128 64 32 16 8 4 2 1 0 Y 59 89 0 1 0 1 1 0 0 1 0 E 45 69 0 1 0 0 0 1 0 1 0 5 35 53 0 0 1 1 0 1 0 1 0 1 31 49 0 0 1 1 0 0 0 1 0 C 43 67 0 1 0 0 0 0 1 1 0 A 41 65 0 1 0 0 0 0 0 1 0 N 4E 78 0 1 0 0 1 1 1 0 0 P 50 80 0 1 0 1 0 0 0 0 0 1 31 49 0 0 1 1 0 0 0 1 0 2 32 50 0 0 1 1 0 0 1 0 0 3 33 51 0 0 1 1 0 0 1 1 0 W 57 87 0 1 0 1 0 1 1 1 0 L 4C 76 0 1 0 0 1 1 0 0 0 H 48 72 0 1 0 0 1 0 0 0 0 A 41 65 0 1 0 0 0 0 0 1 0 1 31 49 0 0 1 1 0 0 0 1 ...read more.

Middle

DATA LINES Data lines are the layers of hard drive that is used to store the functions and information the computer needs to operate .The type of data stored may vary depending on if the data is a text file or a program file. In Tom the data lines are the different layers of blocks where information can be stored in the memory location. Tom has 80 memory locations and therefore the amount of data lines would be 80 times the amount of data lines each memory location has . In a Intel Pentium however the data lines are many depending on the size of the hard drive. NETWORKING AN INTERNET COMPANY The internet company needs to be networked internally as well as both the offices to be linked as well. In order for the company to do this ,it will need a lot of very expensive equipment which I will be explaining as following NETWORKING INTERNALLY In order for both the offices to be linked together ,the company needs the following equipment. LOCAL AREA NETWORK A local area network will be needed to link the different computer stations within each office. Local area network consists of usually one server per office and can attach many number of office desk tops with the server in each office. ...read more.

Conclusion

FIREWIRE Firewire puts in to effect an access control policy between the two networks .It also has essential role as a security blanket for the management by alerting the management of any security breaches ..The firewalls purpose will be to keep hackers out of the computer networks . It also provides security for using the internet. It is very cheap and is easy to install. PCMCIA PCMCIA stands for personal computer memory card international association which is a small computer consisting of PC cards. They are designed for adding memory to portable computers. PC cards will help the business by transferring data and adding ROM and RAM in to the personal computer. The firm will also be able to change the card to a modem card without rebooting the system. BACKUP SYSTEM Back up is a process where all the data is stored in a different location from the main storage area so that data will not be lost if the main storage device stops working. A company needs to keep and update backup files on a regular basis if it needs to make sure that all its data is safe from being lost. The company will have to have back up computers or hard disks to store data all the time. CSA & NETWORKING CIS1308 TOM COURSEWORK BIT HND REPORT BY MUTAHIR MALIK - 1 - ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    Benefit of using Bluetooth is that it can overcome the problem of synchronization. Bluetooth in other words is a standard and communication protocol which has been designed for low power and cost transceiver microchips in every device. Another benefit of using Bluetooth is that as long as the transmission device

  2. Social Networking

    Let's look at the student progress in High school for a while; a Global Secure System performed a survey on 500 English school children between the age of 13 and 17. The result of this survey shows that 51% of student confirmed to being on SNS to check their profiles

  1. LAN & WAN Protocols

    This works at the network layer. It contains packetization which is data from the upper layer control encapsulated inside another packet or more packets or more datagram's. A control setup circuit is not required in order for a host to send packets to a host which it has not previously communicated with.

  2. I have been given the task to design a database for a company called ...

    When the total weight of three parcels came to 150 + 100 + 48 = 298 kg the database displayed an error message saying: Also when I tried to enter in the value -2 the same error message was displayed.

  1. Free essay

    Setting up and E-Commerce Site

    �700+ dependant on what is chosen �100 We can see that in the table above we have given rough price guides to how much these items will cost in relation to our website that we will have for e-commerce. Firstly we need to think do we need to build the

  2. Statistics - How good are people's memory considering different factors?

    This is to catch the awareness of the people taking the test to see if they remembered one of the item or both. All the pictures looked hand drawn but were scanned and printed. The pilot experiment did not contain a sheet for the words, meaning words were not tested.

  1. I have been given the task of creating a system for a hospital to ...

    When designing my system I will take the following points into consideration: * A title should be given to the display * It should not be too cluttered, use spaces and blanks to make it look better * It should indicate the size and format of data entry in each

  2. Smart Card System

    User Datagram Protocol The User Datagram Protocol (UDP) provides a simple, but unreliable message service for transaction-oriented services. Each UDP header carries both a source port identifier and destination port identifier, allowing high-level protocols to target specific applications and services among hosts.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work