• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14

CSA & Networking.

Extracts from this document...

Introduction

CSA & NETWORKING TOM COURSEWORK BY MUTAHIR MALIK BIT YEAR 2 1) BINARY HEXADECIMAL & DECIMAL CHART CHARACTER HEXADECIMAL DECIMAL BINARY 128 64 32 16 8 4 2 1 0 Y 59 89 0 1 0 1 1 0 0 1 0 E 45 69 0 1 0 0 0 1 0 1 0 5 35 53 0 0 1 1 0 1 0 1 0 1 31 49 0 0 1 1 0 0 0 1 0 C 43 67 0 1 0 0 0 0 1 1 0 A 41 65 0 1 0 0 0 0 0 1 0 N 4E 78 0 1 0 0 1 1 1 0 0 P 50 80 0 1 0 1 0 0 0 0 0 1 31 49 0 0 1 1 0 0 0 1 0 2 32 50 0 0 1 1 0 0 1 0 0 3 33 51 0 0 1 1 0 0 1 1 0 W 57 87 0 1 0 1 0 1 1 1 0 L 4C 76 0 1 0 0 1 1 0 0 0 H 48 72 0 1 0 0 1 0 0 0 0 A 41 65 0 1 0 0 0 0 0 1 0 1 31 49 0 0 1 1 0 0 0 1 ...read more.

Middle

DATA LINES Data lines are the layers of hard drive that is used to store the functions and information the computer needs to operate .The type of data stored may vary depending on if the data is a text file or a program file. In Tom the data lines are the different layers of blocks where information can be stored in the memory location. Tom has 80 memory locations and therefore the amount of data lines would be 80 times the amount of data lines each memory location has . In a Intel Pentium however the data lines are many depending on the size of the hard drive. NETWORKING AN INTERNET COMPANY The internet company needs to be networked internally as well as both the offices to be linked as well. In order for the company to do this ,it will need a lot of very expensive equipment which I will be explaining as following NETWORKING INTERNALLY In order for both the offices to be linked together ,the company needs the following equipment. LOCAL AREA NETWORK A local area network will be needed to link the different computer stations within each office. Local area network consists of usually one server per office and can attach many number of office desk tops with the server in each office. ...read more.

Conclusion

FIREWIRE Firewire puts in to effect an access control policy between the two networks .It also has essential role as a security blanket for the management by alerting the management of any security breaches ..The firewalls purpose will be to keep hackers out of the computer networks . It also provides security for using the internet. It is very cheap and is easy to install. PCMCIA PCMCIA stands for personal computer memory card international association which is a small computer consisting of PC cards. They are designed for adding memory to portable computers. PC cards will help the business by transferring data and adding ROM and RAM in to the personal computer. The firm will also be able to change the card to a modem card without rebooting the system. BACKUP SYSTEM Back up is a process where all the data is stored in a different location from the main storage area so that data will not be lost if the main storage device stops working. A company needs to keep and update backup files on a regular basis if it needs to make sure that all its data is safe from being lost. The company will have to have back up computers or hard disks to store data all the time. CSA & NETWORKING CIS1308 TOM COURSEWORK BIT HND REPORT BY MUTAHIR MALIK - 1 - ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    Major drawback is that it can cause network congestion which then results in network performance, the speed and many other things. Peer-to-Peer Network In a Peer-to-peer network a couple of computers are connected together without the use of a server and they share the resources.

  2. Social Networking

    during lessons and over a quarter declare that they spend more than 30 minutes on SNS each day at school. All these result shows that teens are very serious about social networking. For them failing to attend to these duties could end friendships and go down their reputations.

  1. I have been given the task of creating a system for a hospital to ...

    Kent they will not travel all the way to this hospital to loan some equipment. * Contact Number - Only allowing telephone numbers * Ward Number - As I was given a list of all the wards that can loan equipment I have used a drop down menu here but

  2. The Data Management Structure: Components and the data structure

    are cheap and easy to add to the system. Whole routines underneath the language statement in former system are single AS/400 instructions or, at best, a few. Witness the number of language you have to choose from. * SPECIFICATIONS FOR DATA FORMAT, DEVICE DESCRIPTIONS, AND LOGICAL DATA: The CREATE A

  1. LAN & WAN Protocols

    It works with to lower layer of the OSI model. The data link layer and the physical layer. It further splits the data link layer into Logical Link Control and Media Access Control. IEEE 802.11 This is the standard which handles Wi-Fi connections.

  2. I have been given the task to design a database for a company called ...

    The validation rule stated that the value entered in the length field must be between 0 and 150 centimeters. So the smallest value you could enter is 1centimeter and the largest you can enter is 150 centimeters. It also means this it won't be possible for the user to enter in a negative number.

  1. Coursework 1 (c)Install Apache Web Server on Unix ...

    Program pipe.c It is a pipe program. 1 Preprocessor Commands #include <stdio.h> #include <stdlib.h> #include <unistd.h> #include <sys/types.h> #include <sys/wait.h> Functions 10 20 30 void client(int readfd, int writefd) /*Child call this function*/ { char buf[1024]; int cnt; /* read from stdin and write to pipe */ cnt = read(0,

  2. Information technology coursework

    Output: The Printer Printers receive electrical codes from the computer and then print the corresponding letter or number on paper. The result is called hard copy. Plotters and some printers can even reproduce computer graphics on paper. Types of Printer Ink Jet Printers Ink jet printers work as their name

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work