Mid-Term #1 Solutions

Save this PDF as:
Size: px
Start display at page:

Download "Mid-Term #1 Solutions"

Transcription

1 Mid-Term #1 Solutions Chapter #1: Computers: Tools for an Information Age 1. Computers introduce the element into the modern economy. A. labor B. information C. capital D. land 2. Pie charts are an example of computer applications in: A. cooking. B. robotics. C. graphics. D. connectivity. 3. The set of instructions that tell a computer what to do is called a: A. instruction set. B. programmer. C. program. D. system. 4. Which of the following is not a secondary storage device? A. CD-ROM B. hard disk C. DVD-ROM D. central processing unit 5. The term that refers to all input, output, and secondary storage devices is: A. peripheral B. central C. attached D. network 6. Which of the following is not considered to be a peripheral device? A. disk drive B. keyboard C. monitor D. memory

2 7. The Internet is owned by: A. the U.S. government. B. a private business. C. an international consortium of universities. D. nobody. 8. A computer that operates as a connection point in a network for other computers to connect to is called a(n): A. server. B. browser. C. modem. D. ISP. 9. The protocol describing standard rules for Internet communication is: A. ISP. B. Web browser. C. TCP/IP. D. LAN. 10. The term Internet Service Provider refers to: A. a computer that contains shared software. B. a company that provides Internet connectivity for users. C. software that enables communications between computers. D. a Web site containing a home page. 11. The type of software you will typically use to explore the Web is a(n): A. ISP. B. home page. C. browser. D. Web site. 12. Which type of computer is least likely to have its own secondary storage? A. PDA B. workstation C. mainframe D. thin client Chapter 2: Applications Software: Getting the Work Done 13. The general term used for describing software that helps solve everyday personal or business tasks is: A. custom software. B. system software. C. application software.

3 D. vertical software. 14. Software that a company s computer programmers write specifically for the company s own use is: A. custom software. B. system software. C. application software. D. vertical software. 15. A program that includes the opportunity for programmers to modify or enhance its code is called: A. open source. B. public domain. C. freeware. D. custom software. 16. Database management software is most appropriate for: A. performing complex mathematical calculations. B. keeping a catalog of all inventory in stock. C. preparing high-quality advertisements and informational brochures. D. downloading important data files from the Internet. 17. If you wanted to calculate your budget and play what-if games based on different assumptions of income and expenditures, you would be most likely to use: A. database management software. B. spreadsheet software. C. communications software. D. graphics software. 18. Communications software is most appropriate for: A. performing complex mathematical calculations. B. storing a list of important phone numbers. C. preparing high-quality advertisements and informational brochures. D. downloading important data files from the Internet. 19. The term vertical market software refers to: A. business software that is primarily used by marketing companies. B. software used primarily in tower computers. C. business software geared to a particular industry of business function. D. volume discount software licenses with steadily declining costs. 20. Another term for groupware is: A. integrated application. B. vertical market software.

4 C. collaborative software. D. help desk software. 21. A help desk is a(n): A. ergonomically designed workspace for doing computer work. B. online documentation file that comes with software. C. instructor s manual. D. company s information and support center. 22. Which of the following would not be considered to be software piracy? A. A company buys a single-user copy of software and distributes it to all its employees. B. A student copies software from the school s computer lab in order to install it on his own computer at home. C. A person buys a copy of software and copies it to another CD for backup purposes. D. A person buys a CD, installs it on her own computer, and then gives the CD to her friend to install on the friend s computer. 23. Which of the following people is responsible for ensuring that computers in an organization can connect with and communicate effectively with each other? A. Computer programmer B. CIO C. Data entry operator D. Network manager 24. Which of the following people plans, oversees, and manages all the information technology functions for an organization? A. Computer programmer B. Systems analyst C. Computer operator D. CIO Chapter 3: Operating Systems: Software in the Background 25. An operating system is considered to be: A. computer hardware. B. application software. C. system software. D. memory. 26. Which of the following types of software would not be considered to be system software? A. operating system. B. utility programs.

5 C. program language translators. D. spreadsheet software. 27. The main part of an operating system is called a(n): A. computer operator. B. kernel. C. utility program. D. operations manager. 28. When we refer to software as resident, this means: A. it is installed on the hard drive. B. it controls the hardware. C. it resides in the home of the user. D. it remains in memory. 29. The term that refers to allocation of resources to programs for limited amounts of time is called: A. time events. B. response timing. C. time-sharing. D. time allocation. 30. Which is the most likely cause of degradation in a system s performance? A. Queueing B. Interruptions C. Thrashing D. Time slicing 31. Which of the following would not be considered to be a utility program? A. A file manager B. A defragmenter C. A device driver D. An operating system 32. What will the operating system do if a file needs to be saved to disk, but there is not enough contiguous space on the disk to accommodate the file s size? A. The operating system will display an error message to the user. B. The system will freeze up. C. The file will be fragmented and placed in noncontiguous locations. D. The file will be loaded into virtual storage. 33. Manufacturers of peripheral hardware devices include special software utilities to help the operating system send commands to the hardware devices. This software is referred to as:

6 A. managers B. directories C. drivers D. compressors Chapter 8: The Internet at Home and in the Workplace 34. The precursor to the Internet, which connected four university computer systems, was called: A. Intranet. B. ARPANET. C. NSFNet. D. CERNNet. 35. Navigation in the World Wide Web is accomplished by clicking on: A. Windows menus. B. hyperlinks. C. TCP packets. D. browsers. 36. The type of software that provides users with the capability to navigate through the Web is called: A. navigation software. B. a browser. C. an ISP. D. a hyperlink. 37. A message sent over the Internet is composed of uniformly sized: A. packets. B. browsers. C. links. D. protocols. 38. A plug-in is: A. a computer program that plugs into an expansion card or port. B. a special Web site that allows users to gain additional services. C. a software component that enhances the browser s functionality. D. a small program embedded in a Web page that runs when the browser loads the page.

7 39. An applet is: A. a special feature of Web site activation provided by Apple Corporation. B. a small WAP-enabled device for providing mobile access to the Web. C. a software component that enhances the browser s functionality. D. a small program embedded in a Web page that runs when the browser loads the page. 40. If you want to log onto a computer over the Internet and allow your PC to emulate a terminal on that computer, you would use: A. Usenet. B. FTP. C. Telnet. D You will use FTP to: A. send attachments to other users over the Internet. B. upload or download files over the Internet. C. remotely log into a host computer via the Internet. D. post and read newsgroup messages via the Internet. 42. Which type of address will include symbol before the domain? A. IP address. B. address. C. http Web address. D. intranet portal address. 43. The category of e-commerce that takes place between a construction company and its materials supplier is called: A. bricks-and-clicks. B. B2C. C. intranets. D. B2B. 44. The term portal refers to: A. a special form of banner ad that links to the Web site for the company being advertised. B. a personalized Web page that provides access to Web sites of interest and presents customized advertisements to the user. C. a dedicated Internet connection between a company and its suppliers. D. a secure firewall, which is like a doorway that needs a special key in order to open.

8 45. The most intrusive and distracting form of Internet advertisement is: A. banner. B. pop-over. C. context-sensitive. D. portal. 46. A(n) is a private network typically used internally by a single company, that utilizes tunneling technology to create private channels of communication through the Internet. A. WAN B. intranet C. VPN D. extranet 47. What was the first computer bug? A. A burned out tube B. A broken wire C. A moth caught in a relay D. A misplaced punch card 48. The first commercially successful GUI was part of the Mac OS and was introduced in A B C D The three fundamental characteristics of computers are: A. speed, storage capability, variety of applications. B. reliability, speed, storage capability. C. cost effectiveness, speed, variety of applications. D. cost effectiveness, reliability, storage capability. 50. The most important program in the operating system, that manages the operating system, is called A. the kernel. B. DOS. C. systems software. D. bootstrapping.

CMPE 003: Computer Concepts Exam #1 Review of Chapters 1-3, 8, and the appendix

CMPE 003: Computer Concepts Exam #1 Review of Chapters 1-3, 8, and the appendix CMPE 003: Computer Concepts Exam #1 Review of Chapters 1-3, 8, and the appendix Appendix The Continuing Story of the Computer Age: Past, Present, and Future Important Points: 1. DESCRIBE THE GENERATIONS

More information

Kernel. What is an Operating System? Systems Software and Application Software. The core of an OS is called kernel, which. Module 9: Operating Systems

Kernel. What is an Operating System? Systems Software and Application Software. The core of an OS is called kernel, which. Module 9: Operating Systems Module 9: Operating Systems Objective What is an operating system (OS)? OS kernel, and basic functions OS Examples: MS-DOS, MS Windows, Mac OS Unix/Linux Features of modern OS Graphical operating system

More information

Test 1 Review Chapter 1 What is a computer? 1. Definition of computer 2. Data and information. Emphasize that data is processed into information. 3.

Test 1 Review Chapter 1 What is a computer? 1. Definition of computer 2. Data and information. Emphasize that data is processed into information. 3. Test 1 Review Chapter 1 What is a computer? 1. Definition of computer 2. Data and information. Emphasize that data is processed into information. 3. Instructions 4. Describe the information processing

More information

Computers: Tools for an Information Age

Computers: Tools for an Information Age Computers: Tools for an Information Age Chapter 3 Operating Systems: Software in the Background Objectives of Chapter 3 Describe the functions of an Operating System Explain the basics of a personal computer

More information

CHAPTER 11: COMPUTERS AT WORK, SCHOOL, AND HOME

CHAPTER 11: COMPUTERS AT WORK, SCHOOL, AND HOME CHAPTER 11: COMPUTERS AT WORK, SCHOOL, AND HOME Multiple Choice: 1. For patients living in remote places, doctors use the Web to practice: A. anamorphic projection. B. remote imaging. C. Telemedicine.

More information

Lecture 6: Operating Systems and Utility Programs

Lecture 6: Operating Systems and Utility Programs Lecture 6: Operating Systems and Utility Programs Chapter 8 Objectives Identify the types of system software Summarize the startup process on a personal computer Summarize the features of several stand-alone

More information

Chapter 3. Operating Systems

Chapter 3. Operating Systems Christian Jacob Chapter 3 Operating Systems 3.1 Evolution of Operating Systems 3.2 Booting an Operating System 3.3 Operating System Architecture 3.4 References Chapter Overview Page 2 Chapter 3: Operating

More information

Why your own server space? Why should you set it up?

Why your own server space? Why should you set it up? Lab 5 servers Why your own server space? Why should you set it up? -Control factors -Demystifying how things get on the internet -Project from start to finish What is the Difference Between a Digital Art

More information

Lab 8.4.2 Configuring Access Policies and DMZ Settings

Lab 8.4.2 Configuring Access Policies and DMZ Settings Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set

More information

Kerio Control. Step-by-Step Guide. Kerio Technologies

Kerio Control. Step-by-Step Guide. Kerio Technologies Kerio Control Step-by-Step Guide Kerio Technologies 2011 Kerio Technologies s.r.o. All rights reserved. This guide provides detailed description on configuration of the local network which uses the Kerio

More information

Applications Software: Getting the Work Done. Chapter 2

Applications Software: Getting the Work Done. Chapter 2 Applications Software: Getting the Work Done Chapter 2 Objectives Distinguish between operating systems and applications software List the various methods by which individuals and businesses acquire software

More information

Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and

More information

Network Configuration Settings

Network Configuration Settings Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices

More information

Transport and Security Specification

Transport and Security Specification Transport and Security Specification 15 July 2015 Version: 5.9 Contents Overview 3 Standard network requirements 3 Source and Destination Ports 3 Configuring the Connection Wizard 4 Private Bloomberg Network

More information

EUCIP - IT Administrator. Module 2 Operating Systems. Version 2.0

EUCIP - IT Administrator. Module 2 Operating Systems. Version 2.0 EUCIP - IT Administrator Module 2 Operating Systems Version 2.0 Module 2 Goals Module 2 Module 2, Operating Systems, requires the candidate to be familiar with the procedure of installing and updating

More information

Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets

Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Device Interface

More information

Click to view Web Link, click Chapter 8, Click Web Link from left navigation, then click BIOS below Chapter 8 p. 395 Fig. 8-4.

Click to view Web Link, click Chapter 8, Click Web Link from left navigation, then click BIOS below Chapter 8 p. 395 Fig. 8-4. Chapter 8 Objectives Chapter 8 Operating Systems and Utility Programs Identify the the types types of of system software Summarize the the startup process on on a a personal computer Describe the the functions

More information

Protecting the Home Network (Firewall)

Protecting the Home Network (Firewall) Protecting the Home Network (Firewall) Basic Tab Setup Tab DHCP Tab Advanced Tab Options Tab Port Forwarding Tab Port Triggers Tab DMZ Host Tab Firewall Tab Event Log Tab Status Tab Software Tab Connection

More information

Chapter 8 Objectives. Chapter 8 Operating Systems and Utility Programs. Operating Systems. Operating Systems. Operating Systems.

Chapter 8 Objectives. Chapter 8 Operating Systems and Utility Programs. Operating Systems. Operating Systems. Operating Systems. Chapter 8 Objectives Chapter 8 s and Utility Programs Describe the two types of software Understand the startup process for a personal computer Describe the term user interface Explain features common

More information

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN

More information

Montgomery College Course Designator/Course Number: CS 110 Course Title: Computer Literacy

Montgomery College Course Designator/Course Number: CS 110 Course Title: Computer Literacy Montgomery College Course Designator/Course Number: CS 11 Course Title: Computer Literacy Course Length: 3 credits 3 5-minute meetings per week or equivalent Course Description: An introduction to the

More information

Chapter Contents. Operating System Activities. Operating System Basics. Operating System Activities. Operating System Activities 25/03/2014

Chapter Contents. Operating System Activities. Operating System Basics. Operating System Activities. Operating System Activities 25/03/2014 Chapter Contents Operating Systems and File Management Section A: Operating System Basics Section B: Today s Operating Systems Section C: File Basics Section D: File Management Section E: Backup Security

More information

Quick Note 026. Using the firewall of a Digi TransPort to redirect HTTP Traffic to a proxy server. Digi International Technical Support December 2011

Quick Note 026. Using the firewall of a Digi TransPort to redirect HTTP Traffic to a proxy server. Digi International Technical Support December 2011 Quick Note 026 Using the firewall of a Digi TransPort to redirect HTTP Traffic to a proxy server Digi International Technical Support December 2011 Contents 1 Introduction... 3 1.1 Outline... 3 1.2 Assumptions...

More information

lesson 19 Internet Basics

lesson 19 Internet Basics lesson 19 Internet Basics This lesson includes the following sections: The Internet: Then and Now How the Internet Works Major Features of the Internet Online Services Internet Features in Application

More information

Figure 41-1 IP Filter Rules

Figure 41-1 IP Filter Rules 41. Firewall / IP Filter This function allows user to enable the functionality of IP filter. Both inside and outside packets through router could be decided to allow or drop by supervisor. Figure 41-1

More information

CHAPTER 15: Operating Systems: An Overview

CHAPTER 15: Operating Systems: An Overview CHAPTER 15: Operating Systems: An Overview The Architecture of Computer Hardware, Systems Software & Networking: An Information Technology Approach 4th Edition, Irv Englander John Wiley and Sons 2010 PowerPoint

More information

Accessing Remote Devices via the LAN-Cell 2

Accessing Remote Devices via the LAN-Cell 2 Accessing Remote Devices via the LAN-Cell 2 Technote LCTN0017 Proxicast, LLC 312 Sunnyfield Drive Suite 200 Glenshaw, PA 15116 1-877-77PROXI 1-877-777-7694 1-412-213-2477 Fax: 1-412-492-9386 E-Mail: support@proxicast.com

More information

Chapter 8 Router and Network Management

Chapter 8 Router and Network Management Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by

More information

FI8910W Quick Installation Guide. Indoor MJPEG Pan/Tilt Wireless IP Camera

FI8910W Quick Installation Guide. Indoor MJPEG Pan/Tilt Wireless IP Camera Model: FI8910W Quick Installation Guide (For Windows OS) (For MAC OS please go to page 17) Indoor MJPEG Pan/Tilt Wireless IP Camera Black White Package Contents IP Camera FI8910W with IR-Cut.x 1 DC Power

More information

Chapter 2 Preparing Your Network

Chapter 2 Preparing Your Network Chapter 2 Preparing Your Network This document describes how to prepare your network to connect to the Internet through a router and how to verify the readiness of your broadband Internet service from

More information

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET 3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs

More information

Course Description and Outline. IT Essential II: Network Operating Systems V2.0

Course Description and Outline. IT Essential II: Network Operating Systems V2.0 Course Description and Outline IT Essential II: Network Operating Systems V2.0 Course Outline 1. Operating System Fundamentals 1.1 Operating System Basics 1.1.1 Overview of PC operating systems 1.1.2 PCs

More information

Windows Server 2003 default services

Windows Server 2003 default services Windows Server 2003 default services To view a description for a particular service, hover the mouse pointer over the service in the Name column. The descriptions included here are based on Microsoft documentation.

More information

OPERATING SYSTEMS Software in the Background. Chapter 2

OPERATING SYSTEMS Software in the Background. Chapter 2 OPERATING SYSTEMS Software in the Background Chapter 2 Objectives Describe the functions of an Operating System Explain the basics of a personal computer operating system Describe the advantages of a graphical

More information

Internet and Intranet Calling with Polycom PVX 8.0.1

Internet and Intranet Calling with Polycom PVX 8.0.1 Internet and Intranet Calling with Polycom PVX 8.0.1 An Application Note Polycom PVX is an advanced conferencing software application that delivers Polycom's premium quality audio, video, and content sharing

More information

CISC 1600 Introduction to Multi-media Computing

CISC 1600 Introduction to Multi-media Computing CISC 1600 Introduction to Multi-media Computing Spring 2012 Instructor : J. Raphael Email Address: Course Page: Class Hours: raphael@sci.brooklyn.cuny.edu http://www.sci.brooklyn.cuny.edu/~raphael/cisc1600.html

More information

Outline. TIM 50 - Business Information Systems. Lecture 10. Instructor: Terry Allen UC Santa Cruz 10/28/2011

Outline. TIM 50 - Business Information Systems. Lecture 10. Instructor: Terry Allen UC Santa Cruz 10/28/2011 TIM 50 - Business Information Systems Lecture 10 Instructor: Terry Allen UC Santa Cruz 10/28/2011 Outline Announcements Review Alibris Case Study Information Technology Student Presentations Client-Server

More information

TIM 50 - Business Information Systems

TIM 50 - Business Information Systems TIM 50 - Business Information Systems Lecture 10 Instructor: Terry Allen UC Santa Cruz 10/28/2011 Outline Announcements Review Alibris Case Study Information Technology Student Presentations Client-Server

More information

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Firewall VPN Router. Quick Installation Guide M73-APO09-380 Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,

More information

The Internet, Intranets, and Extranets. What is the Internet. What is the Internet cont d.

The Internet, Intranets, and Extranets. What is the Internet. What is the Internet cont d. C H A P T E R 7 The Internet, Intranets, and Extranets What is the Internet Millions of computers, all linked together on a computer network. A home computer usually links to the Internet using a phone

More information

The Internet and Network Technologies

The Internet and Network Technologies The Internet and Network Technologies Don Mason Associate Director Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer

More information

Multi-Homing Dual WAN Firewall Router

Multi-Homing Dual WAN Firewall Router Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet

More information

Chapter 6 Using Network Monitoring Tools

Chapter 6 Using Network Monitoring Tools Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Wireless-N Gigabit Router WNR3500. You can access these features by selecting the items

More information

M3-R3: INTERNET AND WEB DESIGN

M3-R3: INTERNET AND WEB DESIGN M3-R3: INTERNET AND WEB DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the TEAR-OFF ANSWER

More information

CA106 Web Design. Dr. Dónal Fitzpatrick, School of Computing Room l2.48, Extension 8929, dfitzpat@computing.dcu.ie

CA106 Web Design. Dr. Dónal Fitzpatrick, School of Computing Room l2.48, Extension 8929, dfitzpat@computing.dcu.ie CA106 Web Design Dr. Dónal Fitzpatrick, School of Computing Room l2.48, Extension 8929, dfitzpat@computing.dcu.ie History of the Internet Terminals attached to mainframe computer From mid 1960 s packet-switching

More information

Bandwidth Aggregation, Teaming and Bonding

Bandwidth Aggregation, Teaming and Bonding Bandwidth Aggregation, Teaming and Bonding The increased use of Internet sharing combined with graphically rich web sites and multimedia applications have created a virtually insatiable demand for Internet

More information

Introduction to Web Technology. Content of the course. What is the Internet? Diana Inkpen

Introduction to Web Technology. Content of the course. What is the Internet? Diana Inkpen Introduction to Web Technology Content of the course Diana Inkpen The Internet and the WWW. Internet Connectivity. Basic Internet Services. University of Ottawa School of Information Technology and Engineering

More information

Chapter 3. Outline the hardware and software technologies used to build an e business. its partners. access to the Internet and hosting of

Chapter 3. Outline the hardware and software technologies used to build an e business. its partners. access to the Internet and hosting of Chapter 3 E business Infrastructure 1 Learning outcomes Outline the hardware and software technologies used to build an e business infrastructure t within an organisation and with its partners Outline

More information

How To Configure SSL VPN in Cyberoam

How To Configure SSL VPN in Cyberoam How To Configure SSL VPN in Cyberoam Applicable Version: 10.00 onwards Overview SSL (Secure Socket Layer) VPN provides simple-to-use, secure access for remote users to the corporate network from anywhere,

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

Chapter 6 Using Network Monitoring Tools

Chapter 6 Using Network Monitoring Tools Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your Wireless-G Router Model WGR614v9. You can access these features by selecting the items under

More information

Chapter 10 Troubleshooting

Chapter 10 Troubleshooting Chapter 10 Troubleshooting This chapter provides troubleshooting tips and information for your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. After each problem description, instructions are provided

More information

Quick Installation Guide

Quick Installation Guide V2.01 Model: FI9821W Quick Installation Guide Indoor HD Pan/Tilt Wireless IP Camera Black White For Windows OS ------- Page 1 For MAC OS ------- Page 16 ShenZhen Foscam Intelligent Technology Co., Ltd

More information

Basic IPv6 WAN and LAN Configuration

Basic IPv6 WAN and LAN Configuration Basic IPv6 WAN and LAN Configuration This quick start guide provides basic IPv6 WAN and LAN configuration information for the ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N. For complete IPv6 configuration

More information

4.1 Introduction 4.2 Explain the purpose of an operating system 4.2.1 Describe characteristics of modern operating systems Control Hardware Access

4.1 Introduction 4.2 Explain the purpose of an operating system 4.2.1 Describe characteristics of modern operating systems Control Hardware Access 4.1 Introduction The operating system (OS) controls almost all functions on a computer. In this lecture, you will learn about the components, functions, and terminology related to the Windows 2000, Windows

More information

Option nv, Gaston Geenslaan 14, B-3001 Leuven Tel +32 16 317 411 Fax +32 16 207 164 http://www.option.com Page 1 of 14

Option nv, Gaston Geenslaan 14, B-3001 Leuven Tel +32 16 317 411 Fax +32 16 207 164 http://www.option.com Page 1 of 14 Page 1 of 14 ! " #!"#$ % &&' Page 2 of 14 1 INTRODUCTION One of the highly desirable features of the GlobeSurfer III device is the ability to network together Printers and External Hard Disk drives (aka

More information

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions Find your network example: 1. Basic network with and 2 WAN lines - click here 2. Add a web server to the LAN - click here 3. Add a web,

More information

The Internet. Chapter 10. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to:

The Internet. Chapter 10. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to: The Internet Chapter 10 Learning Objectives After reading this chapter, you should be able to: Discuss the responsibilities of the Internet Protocol (IP) and how IP can be used to create a connection between

More information

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003 Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while

More information

NETWORK SET UP GUIDE FOR

NETWORK SET UP GUIDE FOR NETWORK SET UP GUIDE FOR USZ11ZS USX21ZS USX31ZAND DVRX16D DVRX32D HDDX13D SUPPORTING ROUTER D-Link Linksys NETGEAR BELKI IP Addresses on the Internet When you connect to the Internet, through dialup connection,

More information

COURSE DESCRIPTIONS. Computer Information Systems

COURSE DESCRIPTIONS. Computer Information Systems COURSE DESCRIPTIONS Computer Information Systems CIS 110 Introduction to Computers Prerequisites: ENG 095, ENG 095A This course introduces computer concepts, including fundamental functions and operations

More information

Bitten by The NAS Bug

Bitten by The NAS Bug Bitten by The NAS Bug A Step-By-Step Guide to Converting and Using an Old Computer as a Workgroup File S Using the NASLite Network Attached Storage S Operating System TABLE OF CONTENTS Introduction...

More information

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person

More information

BROADBAND FIREWALL ROUTER WITH 1-USB + 1-PARALLEL PRINT SERVER PORT

BROADBAND FIREWALL ROUTER WITH 1-USB + 1-PARALLEL PRINT SERVER PORT BROADBAND FIREWALL ROUTER WITH 1-USB + 1-PARALLEL PRINT SERVER PORT USER S MANUAL V1.0 Trademarks Windows 95/98/Me and Windows NT/2000/XP are registered trademarks of Microsoft Corporation. All other brands

More information

Basic Network Configuration

Basic Network Configuration Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the

More information

Appendix C Network Planning for Dual WAN Ports

Appendix C Network Planning for Dual WAN Ports Appendix C Network Planning for Dual WAN Ports This appendix describes the factors to consider when planning a network using a firewall that has dual WAN ports. This appendix contains the following sections:

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Printing Date: August 15, 2007 This guide provides detailed description on configuration of the local network which

More information

lesson 1 An Overview of the Computer System

lesson 1 An Overview of the Computer System essential concepts lesson 1 An Overview of the Computer System This lesson includes the following sections: The Computer System Defined Hardware: The Nuts and Bolts of the Machine Software: Bringing the

More information

Working Together - Your Apple Mac and Microsoft Windows

Working Together - Your Apple Mac and Microsoft Windows Contains information about complex concepts and /or requires technical knowledge to get the most out of the article. Aimed at the more experienced / ambitious ICT manager or accidental techie. Working

More information

802.11n Wireless Broadband Router WNRT-625

802.11n Wireless Broadband Router WNRT-625 802.11n Wireless Broadband Router WNRT-625 Quick Installation Guide Table of Contents Introduction... 3 Package Content... 4 Hardware Installation... 5 Web Configuration... 8 Further Configuration...11

More information

Addonics T E C H N O L O G I E S. NAS Adapter. Model: NASU2. 1.0 Key Features

Addonics T E C H N O L O G I E S. NAS Adapter. Model: NASU2. 1.0 Key Features 1.0 Key Features Addonics T E C H N O L O G I E S NAS Adapter Model: NASU2 User Manual Convert any USB 2.0 / 1.1 mass storage device into a Network Attached Storage device Great for adding Addonics Storage

More information

Course/Program Credential(s): Credential Certificate Postsecondary Degree University Degree Other:

Course/Program Credential(s): Credential Certificate Postsecondary Degree University Degree Other: Course Title: Information Technology Fundamentals Unit: Computer Basics Content Standard(s) and 1. Distinguish between input and output devices, including monitor, keyboard, mouse, and scanner. 2. Utilize

More information

Niagara IT Manager s Guide

Niagara IT Manager s Guide 3951 Westerre Parkway, Suite 350 Richmond, VA 23233 804.747.4771 Phone 804.747.5204 FAX Niagara IT Manager s Guide A White Paper An IT Manager s Guide to Niagara This document addresses some of the common

More information

Connecting with Computer Science, 2e. Chapter 5 The Internet

Connecting with Computer Science, 2e. Chapter 5 The Internet Connecting with Computer Science, 2e Chapter 5 The Internet Objectives In this chapter you will: Learn what the Internet really is Become familiar with the architecture of the Internet Become familiar

More information

Chapter 4 Managing Your Network

Chapter 4 Managing Your Network Chapter 4 Managing Your Network This chapter describes how to perform network management tasks with your ADSL2+ Modem Wireless Router. Backing Up, Restoring, or Erasing Your Settings The configuration

More information

Prestige 202H Plus. Quick Start Guide. ISDN Internet Access Router. Version 3.40 12/2004

Prestige 202H Plus. Quick Start Guide. ISDN Internet Access Router. Version 3.40 12/2004 Prestige 202H Plus ISDN Internet Access Router Quick Start Guide Version 3.40 12/2004 Table of Contents 1 Introducing the Prestige...3 2 Hardware Installation...4 2.1 Rear Panel...4 2.2 The Front Panel

More information

iphone Softphone App for the Opera IP System Installation and user guide

iphone Softphone App for the Opera IP System Installation and user guide iphone Softphone App for the Opera IP System Installation and user guide IPhone App Installation and Use Specifications are subject to change without notice. Facilities described may or may not be supported

More information

Delphi 2015 SP1-AP1 System Requirements

Delphi 2015 SP1-AP1 System Requirements Delphi 2015 SP1-AP1 System Requirements Revision 1.2 Newmarket International Inc. July 24,2015 newmarketinc.com Copyright 2015 Newmarket International, Inc., an Amadeus company. All rights reserved. This

More information

WEB CONFIGURATION. Configuring and monitoring your VIP-101T from web browser. PLANET VIP-101T Web Configuration Guide

WEB CONFIGURATION. Configuring and monitoring your VIP-101T from web browser. PLANET VIP-101T Web Configuration Guide WEB CONFIGURATION Configuring and monitoring your VIP-101T from web browser The VIP-101T integrates a web-based graphical user interface that can cover most configurations and machine status monitoring.

More information

AS/400 System Overview

AS/400 System Overview Chapter 1 AS/400 System Overview 1.1 Major Characteristics of AS/400 1.1.1 High Level of Integration 1.1.2 Object Orientation 1.1.3 Relational and Integrated Database 1.1.4 Data and Program Independence

More information

Chapter 6 Using Network Monitoring Tools

Chapter 6 Using Network Monitoring Tools Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Dual Band Wireless-N Router WNDR3300. You can access these features by selecting the

More information

Yale Software Library

Yale Software Library Yale Software Library http://www.yale.edu/its/software/ For assistance contact the ITS Help Desk 203-432-9000, helpdesk@yale.edu Remote Desktop for Macintosh connection to Windows MS Remote Desktop Client

More information

CMSI 182 Intro to Computer Science. Week 13 Tuesday B.J. Johnson Doolan 222 09:25 10:40

CMSI 182 Intro to Computer Science. Week 13 Tuesday B.J. Johnson Doolan 222 09:25 10:40 CMSI 182 Intro to Computer Science Week 13 Tuesday B.J. Johnson Doolan 222 09:25 10:40 Where We Are: History Lesson We re here! I/O Peripherals Internet Architecture RAM/ROM Applications O/S Programs Languages

More information

Connecting to the Internet. LAN Hardware Requirements. Computer Requirements. LAN Configuration Requirements

Connecting to the Internet. LAN Hardware Requirements. Computer Requirements. LAN Configuration Requirements Connecting to the Internet LAN Hardware Requirements Computer Requirements LAN Configuration Requirements Installation Performed by Time Warner Cable Technician Connecting via Ethernet Connecting via USB

More information

Chapter 15: Advanced Networks

Chapter 15: Advanced Networks Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical

More information

CMS Central Monitoring System

CMS Central Monitoring System General In This Section CMS for Windows CMS Hardware CMS Functional Spec Relational Database Monitoring Interface Communication Network CMS Central Monitoring System General CMS Central Monitoring System

More information

1 Getting Started. Before you can connect to a network

1 Getting Started. Before you can connect to a network 1 Getting Started This chapter contains the information you need to install either the Apple Remote Access Client or Apple Remote Access Personal Server version of Apple Remote Access 3.0. Use Apple Remote

More information

1/5/2013. Technology in Action

1/5/2013. Technology in Action 0 1 2 3 4 5 6 Technology in Action Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management Chapter Topics System software basics Types of operating systems What the

More information

Intranet, Extranet, Firewall

Intranet, Extranet, Firewall Indian Institute of Technology Kharagpur Intranet, Extranet, Firewall Prof. Indranil Sen Gupta Dept. of Computer Science & Engg. I.I.T. Kharagpur, INDIA Lecture 31: Intranet, Extranet, Firewall On completion,

More information

Chapter 8 Operating Systems and Utility Programs

Chapter 8 Operating Systems and Utility Programs Operating Systems What are the functions of an? start the computer provide a user interface manage programs Chapter 8 Operating Systems and Utility Programs administer security control a network manage

More information

Program: Systems Engineering Certificate. Prerequisite: None. Hardware/Software required:

Program: Systems Engineering Certificate. Prerequisite: None. Hardware/Software required: Program: Systems Engineering Certificate Prerequisite: None Hardware/Software required: 1. PC or Mac Any device capable of running remote software. 2. Audio output capable PC so that you can interact with/listen

More information

Lesson 1 Quiz. 2012 Certification Partners, LLC. All Rights Reserved. Version 2.0

Lesson 1 Quiz. 2012 Certification Partners, LLC. All Rights Reserved. Version 2.0 Quiz Answers-1 Lesson 1 Quiz 1. A server is: a. a computer connected to a mainframe. b. a computer that acts as a mainframe. c. a computer that shares resources with other computers on a network. d. a

More information

COURSE NUMBER: CTS 2371

COURSE NUMBER: CTS 2371 Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2371 COURSE TITLE: Virtual Infrastructure: Deployment, Security, and Analysis PREREQUISITE(S): CTS

More information

Lab 8.4.2 Configuring Access Policies and DMZ Settings

Lab 8.4.2 Configuring Access Policies and DMZ Settings Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set

More information

Cloud Attached Storage 5.0

Cloud Attached Storage 5.0 Release Notes Cloud Attached Storage 5.0 March 2015 2015 Cloud Attached Storage 5.0 Release Notes 1 1 Release Contents Copyright 2009-2015 CTERA Networks Ltd. All rights reserved. No part of this document

More information

LotWan Appliance User Guide USER GUIDE

LotWan Appliance User Guide USER GUIDE LotWan Appliance User Guide USER GUIDE Copyright Information Copyright 2014, Beijing AppEx Networks Corporation The description, illustrations, pictures, methods and other information contain in this document

More information

Citrix Access Gateway Plug-in for Windows User Guide

Citrix Access Gateway Plug-in for Windows User Guide Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

ICAI4099A Build an intranet

ICAI4099A Build an intranet ICAI4099A Unit Descriptor Unit Sector Build an intranet This unit defines the competency required to design, build and implement an intranet for a client. It does not however cover aspects relating to

More information

800xA Smart Client Frequently Asked Questions

800xA Smart Client Frequently Asked Questions 800xA Smart Client Frequently Asked Questions Table of Contents Click section title to jump to topic area General information and licensing requirements Security Applications PC and operating system requirements

More information

Configuring Security for FTP Traffic

Configuring Security for FTP Traffic 2 Configuring Security for FTP Traffic Securing FTP traffic Creating a security profile for FTP traffic Configuring a local traffic FTP profile Assigning an FTP security profile to a local traffic FTP

More information