• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14

CSA & Networking.

Extracts from this document...

Introduction

CSA & NETWORKING TOM COURSEWORK BY MUTAHIR MALIK BIT YEAR 2 1) BINARY HEXADECIMAL & DECIMAL CHART CHARACTER HEXADECIMAL DECIMAL BINARY 128 64 32 16 8 4 2 1 0 Y 59 89 0 1 0 1 1 0 0 1 0 E 45 69 0 1 0 0 0 1 0 1 0 5 35 53 0 0 1 1 0 1 0 1 0 1 31 49 0 0 1 1 0 0 0 1 0 C 43 67 0 1 0 0 0 0 1 1 0 A 41 65 0 1 0 0 0 0 0 1 0 N 4E 78 0 1 0 0 1 1 1 0 0 P 50 80 0 1 0 1 0 0 0 0 0 1 31 49 0 0 1 1 0 0 0 1 0 2 32 50 0 0 1 1 0 0 1 0 0 3 33 51 0 0 1 1 0 0 1 1 0 W 57 87 0 1 0 1 0 1 1 1 0 L 4C 76 0 1 0 0 1 1 0 0 0 H 48 72 0 1 0 0 1 0 0 0 0 A 41 65 0 1 0 0 0 0 0 1 0 1 31 49 0 0 1 1 0 0 0 1 ...read more.

Middle

DATA LINES Data lines are the layers of hard drive that is used to store the functions and information the computer needs to operate .The type of data stored may vary depending on if the data is a text file or a program file. In Tom the data lines are the different layers of blocks where information can be stored in the memory location. Tom has 80 memory locations and therefore the amount of data lines would be 80 times the amount of data lines each memory location has . In a Intel Pentium however the data lines are many depending on the size of the hard drive. NETWORKING AN INTERNET COMPANY The internet company needs to be networked internally as well as both the offices to be linked as well. In order for the company to do this ,it will need a lot of very expensive equipment which I will be explaining as following NETWORKING INTERNALLY In order for both the offices to be linked together ,the company needs the following equipment. LOCAL AREA NETWORK A local area network will be needed to link the different computer stations within each office. Local area network consists of usually one server per office and can attach many number of office desk tops with the server in each office. ...read more.

Conclusion

FIREWIRE Firewire puts in to effect an access control policy between the two networks .It also has essential role as a security blanket for the management by alerting the management of any security breaches ..The firewalls purpose will be to keep hackers out of the computer networks . It also provides security for using the internet. It is very cheap and is easy to install. PCMCIA PCMCIA stands for personal computer memory card international association which is a small computer consisting of PC cards. They are designed for adding memory to portable computers. PC cards will help the business by transferring data and adding ROM and RAM in to the personal computer. The firm will also be able to change the card to a modem card without rebooting the system. BACKUP SYSTEM Back up is a process where all the data is stored in a different location from the main storage area so that data will not be lost if the main storage device stops working. A company needs to keep and update backup files on a regular basis if it needs to make sure that all its data is safe from being lost. The company will have to have back up computers or hard disks to store data all the time. CSA & NETWORKING CIS1308 TOM COURSEWORK BIT HND REPORT BY MUTAHIR MALIK - 1 - ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    Benefit of using Bluetooth is that it can overcome the problem of synchronization. Bluetooth in other words is a standard and communication protocol which has been designed for low power and cost transceiver microchips in every device. Another benefit of using Bluetooth is that as long as the transmission device

  2. Social Networking

    during lessons and over a quarter declare that they spend more than 30 minutes on SNS each day at school. All these result shows that teens are very serious about social networking. For them failing to attend to these duties could end friendships and go down their reputations.

  1. System I designed in order to produce a promotion package for her newly formed ...

    the orders and record information, would login using an ID and password, and they would be given access to the operations that they require. Whereas customers would log on to the Internet site, enter all the find and order the CDs they need, this would be then checked and verified,

  2. Infernowear is a new company run by a self-employed creative designer aiming to producing ...

    This is very useful, as I don't have to make my own verification dialogue boxes. Payment received testing: After an order has been placed and the payment has been taken a simple check box by each order line should be checked to show that the customer has paid.

  1. Computer Maintainance - anti-virus, cookie deletion, drive scanning

    - After removing the four mounting screws from the old PC power supply, it is ready to be replaced. - The new power supply should have instruction on how to fit the unit but basically just screw the unit back to the case with the screws provided.

  2. The purpose of this coursework is to design a network for a small to ...

    Figure 2 shows that each computer connecting to a switch with just a cable. Fig 2 Cabling The media which will be used to connect each user and the company servers to the internet will be Category 6, 1000BASE-T twisted-pair cables these cables will be able to give the support

  1. Explain the different techniques of gathering information to answer an IT Technical problem or ...

    This would mean that the IT Technical Support would be depend on the organisation as in Microsoft would have a big team whilst a charity like Oxfam would not. Company Culture This would depend on the employees. A company like Microsoft, Cisco and IBM would have a professional work culture

  2. LAN & WAN Protocols

    STMP - Simple Mail Transfer Protocols is currently the most used protocol. It can send and receive e-mail over the internet. It is commonly known as a SMTP. ADSL ADSL which stands for Asymmetric Digital Subscribers Line is a high speed transmission protocol.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work