Module 4 Lab 1

In: Computers and Technology

Submitted By ben641964
Words 539
Pages 3
Week 4 Lab 1

This lab involves research on the size, speed, and slot type for RAM, as well as the model, interface type, capacity, and transfer rate of hard disks and optical disks in your computer system.
Required Setup and Tools
In this laboratory, you need: * A desktop or notebook computer * Access to the Internet for research
Recommended Procedures
Task 1: Examining RAM
To find out the types of RAM available to upgrade your computer, follow these steps: 1. Acquire computer information: Determine the make, model, and serial number of your computer by physically examining it. On a desktop computer, these numbers are on the back of the computer. For a laptop computer, this information is on the bottom of the computer. If the model and serial number are not clearly visible, refer to the manufacturer’s website for this information; otherwise, select a laptop you would consider buying for yourself and use its model number to obtain the information. a. Service Tag FPR5SW1 b. Computer Model Inspiron N7010

1 In Microsoft 10 go to life at a glance. 2 Go to settings 3 System 4 about
That is where you will find it very simple.

1. Check the commercial RAM website: Search the Internet for the commercial website of the manufacturer of the RAM by its name. Go to the RAM memory website and type in the make, model, and serial number, if required, of your computer. Search for the information on exact type and amount of RAM in your computer and the maximum size allowed. Take a screenshot of the website with the information on RAM.

2. Check the commercial RAM website: Search the Internet for the commercial website of the manufacturer of the RAM by its name. Go to the RAM memory website and type in the make, model, and serial number, if required, of your computer. Search for the…...

Similar Documents

Lab 1

...Lab 1: Input, Processing, and Output This lab accompanies Chapter 2 of Starting Out with Programming Logic & Design. Name: ___________________________ Lab 1.1 – Algorithms This lab requires you to think about the steps that take place in a program by writing algorithms. Read the following program prior to completing the lab. Write a program that will take in basic information from a student, including student name, degree name, number of credits taken so far, and the total number of credits required in the degree program. The program will then calculate how many credits are needed to graduate. Display should include the student name, the degree name, and credits left to graduate. Step 1: Examine the following algorithm. (Reference: Designing a Program, page 31). 1. Get the student name. 2. Get the degree program name. 3. Subtract the number of credits taken so far from the required credits for the degree. 4. Get the number of credits required for the degree program. 5. Get the number of credits the student has taken so far. 6. Display the input information in Step 1 and 2. 7. Display the calculated information. Step 2: What logic error do you spot and how would you fix it? Step 3: What steps require user interaction (Ex: user must type in some input)? Lab 1.2 – Pseudocode This lab requires you to think about the steps that take place in a program by writing pseudocode. Read the following......

Words: 2451 - Pages: 10

Ac3225 Week 4 Lab 1

...AC3225: Week 4 Depreciation Methods and Inventory Valuation Lab 4.1/Inventory Valuation, Depreciation of Assets, and Intangible Assets Solve the problems given below. Click here to download and save the templates that you must use to perform this week’s lab. 1. Remmers Company manufactures desks. Most of the company’s desks are standard models and are sold on the basis of catalog prices. At December 31, 2012, the following finished desks appear in the company’s inventory. Finished Desks 2012 catalog selling price FIFO cost per inventory list 12/31/12 Estimated current cost to manufacture (at December 31, 2012, and early 2013) Sales commissions and estimated other costs of disposal 2013 catalog selling price $500 $540 $900 $1,200 $50 $60 $80 $130 $460 $430 $610 $1,000 $470 $450 $830 $960 A $450 B $480 C $900 D $1,050 The 2012 catalog was in effect through November 2012, and the 2013 catalog is effective as of December 1, 2012. All catalog prices are net of the usual discounts. Generally, the company attempts to obtain a 20% gross profit on selling price and has usually been successful in doing so. Instructions At what amount should each of the four desks appear in the company’s December 31, 2012, inventory, assuming that the company has adopted a lower-of-FIFO-cost-or-market approach for valuation of inventories on an individual-item basis? 1 AC3225: Week 4 Depreciation Methods and Inventory Valuation Lab 4.1/Inventory Valuation, Depreciation of Assets, and......

Words: 1250 - Pages: 5

Module 4 Discussion 1 Ant 3300

...Name Tutor Course Date Module 4 Discussion 1 ANT 3300 Most Indian Americans are culturally aloof and this aloofness has had devastating effects on their overall health and social status. Because of their historic conflicts with European settlers who colonized the continent, decimated their population and drove them away from their lands, American Indians had frosty relations with the federal government. These frosty relations necessitated the formation of treaties with the federal government to protect their interest but the group still largely remains aloof and disconnected from the mainstream population. As a result of this disconnection from the mainstream population and the general cultural reluctance to freely integrate or mingle with the outside society, American Indians currently constitute the most impoverished minority group in the United States. More than 25 percent of American Indians currently live in poverty; comparatively, only 8 percent of white Americans live in poverty. A review of the over 500 American Indian tribes that are federally recognized by the government confirms that this minority group is more likely to suffer from health complications such as obesity, diabetes, alcoholism, and other mental health complications than other racial minority groups such as African Americans and Asian Americans. The Indian Health Service was formed to take care of this group’s health care, particularly for members of the group living in reservations, but it......

Words: 294 - Pages: 2

Nt1210 Lab 6. 1-4

...Lab 6.1 Review 1. It uses a beacon like transmission to find other devices on IBSS mode and on the same SSID to connect and share. 2. It has a very very short range and is unable to penetrate walls and other objects. 3. It is able to maintain connection anywhere in the house it is setup in without the need of trailing a connection cable like wired connections so you get a tradeoff of speed vs versatility Lab 6.2 Review 1. The biggest problem would be collision if multiple routers are using the same channel a common example of this is Comcast routers are set to use a channel close to the signal for the ps3 so you get a depredation of signal and loss of data packets as the connection goes on. 2. If a previously stated standard is not compatible with your adapter you could have issues with your connection not connecting Lab 6.3 Review 1. Um well I could write a book but simply a guest having access to your network could result in any imaginable results on your network to name a few rootkits,Trojan droppers, Remote Access Terminals, Keyloggers, Viruse’s. 2. Setting a MAC filter is a good way to filter who has access to your network its simply like saying Fred has access to the building with his fingerprint being scanned by a biometric scanner. Although this can be spoofed by spoofing your mac but you would still have to find out which macs are allowed and have to make sure the mac your spoofing is not connected so that you do not receive a duplicate error. Lab Review 6...

Words: 393 - Pages: 2

Week 4 Lab 1

...1. Unauthorized access to workstation. Unauthorized access to system, applications and data. Desktop or laptop computer operating system software vulnerabilities. Viruses, malicious code or malware infections. 2. Client-server and Web applications are susceptible to attack. Unauthorized accessed to systems. 3. Enable password protection on workstations for access. Enable auto screen lockout for inactive times. 4. Define strict access control policies, standards, procedures and guidelines. 5. Implement a second-level test to verify a user’s right to gain acces. 6.  Ensure back-ups are enforced and enable an automated antivirus protection solution that scans and updates individual workstaions with proper protection. 7. The Security Configuration and Analysis is a stand-alone snap-in tool that users can use to import one or more saved configurations to a private security database. Importing configurations builds a machine-specific security database that stores a composite configuration. You can apply this composite configuration to the computer and analyze the current system configuration against the stored composite configuration stored in the database. 8. Log on to a Windows 2000-based computer as a user with administrative privileges. To open the Group Policy console, click Start, click Run and type Gpedit.msc. Click OK. Click the + next to Computer Configuration, then Windows Settings, then Security Settings, and then Local Policies to expand......

Words: 468 - Pages: 2

Module 1

...Management Module 1 February 14, 2014 Highlight the management theories or principles of each reading Understanding and Using the Best-Sellers This chapter discusses the books that have been on high demand for focusing on different aspects of management. The first reason why the books have been successful is for the tremendous thirst for American success and a desire to learn what would stop some of the negative incidents. The second reason is fighting for the visibility and way to be different from other managements. This is to provide a message to take home that is positive, unique and also able to gain wide exposure. The third reason is being able to provide a hopeful message to a receptive market. The message helps business create an easy path to personal success. The fourth reason is an increased principle in commitment to proactive organizational change and a search for differentiating one’s approach. In order to find a book that is a good fit you must look at the pros and cons of each book. There are several areas the author wants you to review. A few includes author credentials, rationale, face validity and target organizations. Flawed Advice and the Management Trap Argyris talks about how people receive and accept advice that is basically flawed. He uses two modules to explain where the flaws exist. Module I behavior is focused on protecting oneself and having a biased view of everyone. Protectionism and defensiveness are the bases for the behavior. Module I......

Words: 2457 - Pages: 10

Nt1110 Module 1 Lab

...system and may also include accounting software for cost allocation of processor time, mass storage, printing, and other resources. For hardware functions such as input and output and memory allocation, the operating system acts as an intermediary between programs and the computer hardware, although the application code is usually executed directly by the hardware and frequently makes a system call to an OS function or be interrupted by it. Operating systems can be found on many devices that contain a computer—from cellular phones and video game consoles to supercomputers and web servers. Examples of popular modern operating systems include Android, BSD, iOS, Linux, OS X, QNX, Microsoft Windows, Windows Phone, and IBM z/OS.. History 1. Windows - The first Windows system was released in 1985. Originally, it was just a graphical user interface on top of MS-DOS – a state of affairs that lasted until the release of Windows 95, when MS-DOS products were integrated into Windows. Windows 95 was a huge departure from the previous systems and was the first major step in Window’s transition from GUI to operating system. 2. Apple - The Apple Macintosh system is a little older than Windows, having first been released in 1984. From the start, it was an entirely graphical operating system, and from quite an early stage became popular among the earliest computer graphic designers. In 2005, Apple changed the design and structure of Mac OS, moving from the IBM-made PowerPC CPU......

Words: 1245 - Pages: 5

Pt1420 Lab 4

...Lab 4-1 Module main () //Declare local variables 1. Declare String clientName 2. Declare Real feetUTP 3. Declare Real subTotal 4. Declare Real taxCost 5. Declare Real totalCost //Module calls 6. Module inputData () 7. Module calcCosts() 8. Module displayBill() End Module //this module takes in the required user input. There will be a display and input for each variable Module inputData(Real Ref feetUTP, String Ref clientName) 9. Display “Enter Client name” 10. Input clientName 11. Display “Number of feet of UTP installed” 12.Input feetUTP End Module //this module calculates subTotal, taxCost, and totalCost you also need feetUTP passed in to calculate //subTotal Module calcCosts(13. , , , ) 14. subTotal = feetUTP *.21 15. taxCost = subTotal*.06 16.totalCost = taxCost+subTotal End Module //this module displays clientName and totalCost Module displayBill (17. , ) 18.Display “The client name is ”clientName 19. Display “The final cost is “totalCost End Module Lab 4-2 Lab 4-3 Module Module1 Sub Main() Dim clientName As String = "NO VALUE" Dim feetUTP As Double = 0 Dim subTotal As Double = 0 Dim taxCost As Double = 0 Dim totalCost As Double = 0 inputData(clientName, feetUTP) calcCost(feetUTP, subTotal, taxCost, totalCost) finalBill(clientName, totalCost) Console.Write("Press enter to continue...") Console.ReadLine() End Sub Sub......

Words: 395 - Pages: 2

Lab 1 Student 1

...Lab 1: Introduction to Computers and Programming This lab accompanies Chapter 1 of Starting Out with Programming Logic & Design. Name: Diashawn A. Bell Lab 1.1 – GUI vs. Console Programming Help Video: Double click the file to view video [pic] This lab requires you to execute both types of programs to understand the differences. Step 1: Double click on the following console application and run the program. [pic] Step 2: Double click on the following GUI application and run the program. [pic] Step 3: Answer the following questions: 1. What similarities do you see between the two programs? Keyboards and monitor 2. What differences do you see between the two programs? Console use keyboard only, gui uses the mouse and keyboard. 3. What input devices are used in the GUI and console programs? Keyboard and mouse 4. What output devices are used in the GUI and console programs? Monitor Lab 1.2 – Using Visual Basic IDE Help Video: Double click the file to view video [pic] This lab requires you to use the IDE (Integrated Development Environment) to create a project workspace using Visual Basic 2005. Step 1: Launch Visual Basic 2005. Click on File. then New Project. In the template window, select Console Application. In the Name box, enter a name for your program. Click OK to create your workspace. [pic] Step 2: Save your program. Click on......

Words: 1071 - Pages: 5

B6002 Module 1 Assignment 4 External Financing

...B6002 Module 1 Assignment 4 External Financing http://homeworkfy.com/downloads/b6002-module-1-assignment-4-external-financing/ To Get this Tutorial Copy & Paste above URL Into Your Browser Hit Us Email for Any Inquiry at: Homeworkfy@gmail.com Visit our Site for More Tutorials: (http://homeworkfy.com/ ) Genesis Energy’s newly established operations management team decided to seek outside assistance in developing a long-term operating plan that also addresses the financial issues identified. A major consideration for Genesis Energy is assessing those short-term and long-term economic factors, which will greatly enhance the company’s ability to successfully transition to a viable international business. Grasping and correctly prioritizing these economic factors, supply and demand, interest rates, inflation, unemployment, and exchange rates are pivotal, thereby requiring expert guidance. Therefore, their first major decision was to hire a respected strategy-consulting firm, Sensible Essentials. After meeting with the client team, Sensible Essentials concluded that the operations management team would significantly benefit from a more in-depth understanding of the financial environment at Genesis Energy. This understanding needed to encompass not only sales, costs, and profitability forecast under the new strategic plan, but also the way expansion would highlight the need to manage working capital and cash flow in order to try to minimize the need for external......

Words: 385 - Pages: 2

Mat 106 Module 4 Mat106 Module 4

...MAT106 MAT 106 Quantitative Literacy Module 1 to Module 5 MAT 106 Complete Course Click below link for Answer visit www.workbank247.com http://workbank247.com/q/mat106-mat-106-quantitative-literacy-module-1-to-m/10428 http://workbank247.com/q/mat106-mat-106-quantitative-literacy-module-1-to-m/10428 MAT 106  Quantitative Literacy Complete Course MAT 106 Module 1 Unit 1 Assignment 1 Meet and Greet Your Classmates Please provide some basics about yourself. Tell us about some of your interests, places you have lived, and about the people in your life. This is a chance for students and the instructor to learn more about one another and to collaborate. In your post, please comment on how you plan to approach this class. How will you set aside time to study? How will you organize your study area? How have you successfully studied for math in the past? MAT 106 Module 1 Unit 1 Assignment 2 Advertising Claims In this assignment, look for and provide two advertisements that you think contain logical fallacies. Use any advertisement that you can find in magazines, on television, or from the Internet for this assignment. Your two examples must represent two of the following logical fallacies: 1. Appeal to Popularity 2. False Cause 3. Appeal to Ignorance 4. Hasty Generalization 5. Limited Choice 6. Appeal to Emotion 7. Personal Attack (ad hominem) 8. Circular Reasoning 9. Diversion (Red Herring) 10. Straw Man The goal is to examine statements critically,......

Words: 3325 - Pages: 14

Module 1 Lab

... 1) Windows 2) Mac OS X 3) Linux There are some differences between the three main software’s listed above. Let’s start with the first one. Windows: 1) Vulnerable to viruses’ and malware 2) Windows cost for their license to use their software 3) Uses more memory, and hard drive space 4) Very user friendly Mac OS X: 1) More powerful 2) More secure from viruses’ and malware 3) Only runs on Apple computer’s 4) More expensive to purchase Linux: 1) Open Source software to develope 2) Free 3) Will run on your pc 4) Used on many different types of product’s, like Cell Phones, Tablets, supercomputers, and routers. The basic functions of an operating system are: 1) Booting the computer a. This is what happens when you turn the power on, on your computer. 2) Performs basic computer task. It runs the devices that are on your computer like: b. Keyboard c. Mouse d. Printer e. Speakers f. Video 3) User interface, so user can interact with the software on system. It has two main types of interface. g. Graphical user interface (GUI) i. Definition of GUI: “Common method of interacting with a computer that allows any graphic image to be displayed on the screen.” h. Command Line Interface is DOS (Disk Operating System) ii. The user types commands for the computer to do specific task, and interacts directly with the operating system. 4)......

Words: 375 - Pages: 2

Et1220 Module 1 Lab Report

...Name: | | | Date: | | | Grade: | | Instructions: * Complete Part 1, then Part 2 sections of the Lab 1.1. Then, complete this Lab Report by filling in all details. Use information you gained during your experimentation to complete the answers. * Be sure to submit your lab report before the deadline. ------------------------------------------------- Part 1- Binary-to-Decimal Number Conversion Theory: 1. Enter the decimal, hexadecimal, and BCD numbers for each of the following binary numbers. Binary | Hexadecimal | BCD | Decimal | 0000 | 0 | 0000 | 0 | 0001 | 1 | 0001 | 1 | 0010 | 2 | 0010 | 2 | 0011 | 3 | 0011 | 3 | 0100 | 4 | 0100 | 4 | 0101 | 5 | 0101 | 5 | 0110 | 6 | 0110 | 6 | 0111 | 7 | 0111 | 7 | 1000 | 8 | 1000 | 8 | 1001 | 9 | 1001 | 9 | 1010 | A | Invalid | 10 | 1011 | B | Invalid | 11 | 1100 | C | Invalid | 12 | 1101 | D | Invalid | 13 | 1110 | E | Invalid | 14 | 1111 | F | Invalid | 15 | 2. Explain major differences between binary and BCD numeric representations. Ans 2: BCD each digit of a decimal number is coded as a 4 bit binary number between 0 and 9. This is not used too often as it is difficult to do calculations in BCD as opposed to binary, and it is not efficient – uses more bits than a binary coded number would.  In Binary the number is converted to base 2, binary code.  Planning: 1. Provide a list of places that you can obtain the datasheets for the following components: ...

Words: 1024 - Pages: 5

Module 4

...Module 4 6. In animal cells a cleavage furrow forms during cytokinesis. While in plant cells a cell plate forms in the middle of the cell. The furrow in animal cells is a contractile ring of actin microfilaments associated with molecules of the protein myosin. Action reacts with myosin causing ring to contract. The furrow deepens until parent cell divides into two producing two separate cells with their own nucleus and share of cytosol, organelles, and other subcellular structures. In plant cells vesicles from the Golgi apparatus move along the microtubules to the middle of the cell, where they coalesce, producing a cell plate. The plate enlarges until its surrounding membrane fuses with the plasma membrane along the perimeter of the cell. Two daughter cells result, each with its own plasma membrane. Meanwhile, a new cell wall arising from the contents of the cell plate has formed between the daughter cells. 7. Eukaryotic cells have a true nucleus, bound by a double membrane Prokaryotic cells have no nucleus. Eukaryotic DNA is linear; prokaryotic DNA is circular (it has no ends). Eukaryotes go through every phase of Mitosis including prophase, metaphase, anaphase, and telophase. Prokaryotic cell simply divides by cytokinesis after DNA replication which is known as binary fission. 8. Checkpoints make sure that the eukaryotic cell completes each phase with no problems. Without checkpoints it may affect cell growth which is very important. 9. The Hershey-Chase......

Words: 728 - Pages: 3

Bus470 Module 4 Assignment 1: Discussion Question

...BUS470 Module 4 Assignment 1: Discussion Question Click Link Below To Buy: http://hwcampus.com/shop/bus470-module-4-assignment-1-discussion-question/ To extend its international presence, Martinetti International has formed an expansion strategy focused on acquiring other like enterprises outside the European region. Martinetti, a subsidiary of a publicly owned parent company, is based in Rome where it enjoys an established brand name and superb reputation. As part of Martinetti’s globalization strategy, it has acquired Sand Coast Resort Group located in the heart of Chinatown, Singapore. Both hotel enterprises share common business values and excellent reputations, and offer high-end luxury accommodations for the local businessman and international traveler. The acquisition offers Martinetti ownership of the Sand Coast brand, trademarks, and contracts for the 9 Sand Coast hotel holdings. With this acquisition, Martinetti gains a footprint in Southeast Asia and expands its holdings 27 percent. Sand Coast has strong brand recognition in the region and has a portfolio that includes both hospitality services and travel agencies. Martinetti, a cross-culture organization, is comprised of approximately 65 percent Italian employees with the remaining representing 7 other countries and languages. San Coast also has a cross-cultural workforce with 88 percent being Singaporean of Chinese, Malay, and Indian ethnicity. Chinese is the official language. As a member of the......

Words: 289 - Pages: 2