Computer Lab Protocol

In: Computers and Technology

Submitted By pdavis11930
Words 392
Pages 2
Computer Lab Protocol

- The use of the computer lab is a privilege. Treat equipment and each other with respect at all times.
- Wait for instructions when entering the computer lab.
- If you have technical problems check with an adult. Do not touch any wires.
- Stay in your seat. If you need help raise your hand.
- Be sure to save your work often while working.
- You must have permission to print. When you have permission to print press print only once. If the printer is not working an adult will solve the problem.
- before you leave the lab save your work and close all programs.
- Please leave the lab neat and clean for the next class. Push in your chair. Leave the computer station in good order. • - Take all of your things with you. • - Computers are for school projects and assignments only. • - No food, chewing gum or drinks are allowed at the computers. • - Leave backpacks at the door…only take necessary materials to the computer workstation. • Remain in your seat at all times unless instructed to get up. • NO talking without permission from the teacher. • Do not change any of the software settings used on the computers. • Work only with the computer that is assigned to you. • Do not download software from the Internet onto the computers in the lab unless authorized to do so. • Surfing the web and checking personal e-mail is prohibited. • Only print work that is related to your assignments. • You must have permission each time you wish to print an assignment! • Any changes or damages to the computer are to be reported to the teacher immediately. • Notify the teacher if anything has been altered or is missing from the computer. • Log off at the end of the session. • Keep the lab clean and tidy. Put things back when you are finished with them, including keyboards, mice, and…...

Similar Documents

Lab Computer Information Sysytem,

...Lab #6 Questions & Answers 1. If you and another person want to encrypt messages, should you provide that person with your public? The public key is always provided as part of the handshake in order for encryption to take place. 2. What does GPG allow you to do once it is installed? GPG allows you to encrypt your hard drives content in order to secure it. 3. Name two different types of encryption supported by GPG for your key. The MD5 and Sha1 type of hashing encryption are supported by GPG. 4. What happens when you sign and trust a new key to your keychain? A new key is created to include the private and public key based on how the new key was created. 5. If a user sends you his/her public key, will he/she be able to decrypt your encrypted messages once you Import and sign his/her key? Both parties need to have each other private keys in order to be able to encrypt and decrypt all messages that are exchange among themselves. 6. What are the similarities between an MD5 hash and a fingerprint? They both insert a fingerprint to the data. 7. How would you encrypt a Web server and the pages it serves up? By setting the web server to redirect its web traffic to SSL hence encrypting all conversations between server and host in relation to the web traffic. 8. Why is hashing all database inputs not considered encryption of the database? What value does hashing? Hashing the input entries of a database is not considered encryption......

Words: 693 - Pages: 3

Computer Labs

...till 30 seconds or the end of the test. 5. What caused this reduction in “goodput” on the 11g WLAN? As in question 4 and shows on the graph of the roaming node as how it dropped in data rate instantly when entering the room. I would have to say that this reduction was caused from the roaming node. General Questions Concerning Mixing 11b and 11g Clients Guidelines: Answer each of the following questions using knowledge gained from the iLab, readings from the textbook, and individual research on the Web. Answer all questions in full college-level sentences and paragraphs. 6. Supposedly, 802.11b is backwards compatible with 802.11g, yet this lab demonstrates there are significant problems with allowing the two to coexist. What is the primary incompatibility between b and g? As it stated and from our results in the lab there is a major issue with running both modes. Running both B and G in mixed mode will most likely bring the speeds down on the G nodes to almost around B speeds. The G nodes will not perform at the intended speeds. Might even use connectively between the nodes. (Ciampa, 2013) 7. There is another mechanism besides RTS/CTS that helps the incompatibility. Explain briefly the difference between RTS/CTS and CTS-to-self and when each is used. This helps with transmitting only when there is no traffic in the air. This helps with slow transmission and get better performance overall. The RTS is request to send it sends out to a node and then the CTS......

Words: 1146 - Pages: 5

Lab 5 – Perform Protocol Capture & Analysis Using Wireshark & Netwitness Investigator

...Lab 5 – Perform Protocol Capture & Analysis Using Wireshark & Netwitness Investigator 1. What is the purpose of the address resolution protocol (ARP)? ARP is used to convert an IP address to a physical address such as an Ethernet address. 2. What is the purpose of the dynamic host control protocol (DHCP)? DHCP automates and controls the assignment of IP address configurations from a central position. 3. What was the DHCP allocated source IP host address for the Student VM and Target VM? 172.30.0.4 – Student VM 172.30.0.8 – Target VM 4. When you pinged the targeted IP host, what was the source IP address and destination IP address of the ICMP echo-request packet? Source: 172.30.0.2 Target: 172.30.0.8 5. Did the targeted IP host respond to the ICMP echo-request packet with an ICMP echo-reply packet? If yes, how many ICMP echo-request packets were sent back to the IP source? Yes it did. There were 8 packets. 6. Find a TCP 3-way handshake for a Telnet, FTP, or SSH session. What is the significance of the TCP three-way handshake? 172.17.0.99 172.17.0.2 TCP x9-icue > telnet [SYN] Seq=0 Win=65535 Len=0 MSS=1460 172.17.0.2 172.17.0.99 TCP telnet > x9-icue [SYN, ACK] Seq=0 Ack=1 Win=5840 Len=0 MSS=1460 172.17.0.99 172.17.0.2 TCP x9-icue > telnet [ACK] Seq=1 Ack=1 Win=65535 Len=0 The three way handshake is needed to establish a reliable connection between computers. The handshake allows client to server communications to agree on security......

Words: 536 - Pages: 3

Lab 1 Analyze Essential Tcp/Ip Networking Protocols

...Analyze Essential TCP/IP Networking Protocols A copy of my Wireshark Lab 1 .pcap file in electronic format is also attached. A screen capture of your successful NetWitness Investigator packet capture import Lab Assessment Questions 1. What is the purpose of the address resolution protocol (ARP)? ARP is used to mediate between Ethernet or other broadcast link-level protocols and the network layer, or IP protocols. Put more simply, ARP converts IP addresses to Ethernet addresses. 2. What is the purpose of the dynamic host control protocol (DHCP)? DHCP is a method for assigning IP addresses to individual machines in an organization. The IP addresses can be assigned permanently or temporary. 3. Identify the DHCP allocated source IP host address for the vWorkstation desktop and the TargetWindows01 virtual server. 172.30.0.2 – Student VM (Ubuntu) 172.30.0.8 – Target VM (Windows) 4. When you pinged the targeted IP host (172.30.0.8 or 172.30.0.200), what was the source IP address and destination IP address of the ICMP echo-request packet? Source: 172.30.0.2 Target: 172.30.0.8 5. Did the targeted IP host respond to the ICMP echo-request packet with an ICMP echo-reply packet? If yes, how many ICMP echo-request packets were sent back to the IP source? Yes, the targeted IP host responded to the ICMP echo-request packet with an ICMP echo-reply packet. There were 8 packets sent back to the IP source. 6. Find a TCP three-way handshake for a Telnet, FTP, or SSH......

Words: 467 - Pages: 2

Computer Network Security Lab 1

...ISSC421 Week 1 Lab #1: Analyze Essential TCP/IP Networking Protocols Lab Assessment Questions 1. What is the purpose of the address resolution protocol (ARP)? Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address (IP address) to a physical machine address that is recognized in the local network. 2. What is the purpose of the dynamic host control protocol (DHCP)? 3. DHCP (Dynamic Host Configuration Protocol) is a protocol that lets network administrators manage centrally and automate the assignment of IP (Internet Protocol) configurations on a computer network. 2 4. 3. Identify the DHCP allocated source IP host address for the vWorkstation desktop and the TargetWindows01 virtual server. 172.30.0.2 and 172.30.0.8 4. When you pinged the targeted IP host (172.30.0.8 or 172.30.0.200), what was the source IP address and destination IP address of the ICMP echo-request packet? 172.30.0.2 5. Did the targeted IP host respond to the ICMP echo-request packet with an ICMP echo-reply packet? If yes, how many ICMP echo-request packets were sent back to the IP source? Yes, each replied with 4 replies. 6. Find a TCP three-way handshake for a Telnet, FTP, or SSH session. What is the significance of the TCP three-way handshake? The three-way handshake is needed to establish a reliable connection. The handshake allows the server and client to agree on properties that provide for security as well as......

Words: 386 - Pages: 2

Computer & Logic Lab

...NT1110: Module 5 Computer Operation and Security Lab 5.1 Understanding BIOS, POST, and Security Basics In this lab, you will demonstrate your ability to fix issues related to BIOS/POST and secure the computer from viruses and Trojans. Required Setup and Tools A computer with access to the Internet Recommended Procedures Task 1: Understanding BIOS and POST A user boots his or her computer and hears a sequence of six beeps. The computer uses AMI BIOS. What error is indicated by the six beeps? A different user with a computer using Phoenix BIOS hears a sequence of beeps with pauses in between. The sequence is beep - pause - beep beep beep - pause - beep beep beep beep- pause - beep beep beep. What error is indicated by this beep sequence? Task 2: Basic Security Firewalls may be hardware devices or software programs. Hardware firewalls protect an entire network. Software firewalls protect a single computer. Research the Internet for an example of each of these types of firewalls and compare their features. Linksys and Cisco make firewall/routers for home use. The Zone labs are an example of a software firewall. Submission Requirements: Include a references page citing the resources you used from the textbook, ITT Tech Virtual Library, and credible websites to substantiate your answers. All citations should be in APA format. Refer to ITT Tech Virtual Library> Research Help> Research Guides> Grammar, Writing & Style> APA Formatting and Style Guide for help in APA...

Words: 296 - Pages: 2

Lab 1 Computer Structure and Logic

...between all components of the computer. | Accumulator | Store the result of the last calculation.Registers that store temporary numbers,And can be hard-wired to the logic unit.They we developed so that fewer bits couldBe used for instructions and operands. | Control Unit | Controls operations betweenAll components of the computer. | Input | Provides data to the computer from the user. | Memory | Stores program instructions and data. | Output | Displays data to the user. | Task 2: These are the common input, output, and memory components: Component | Function | Input | Keyboard, Mouse, Gaming Controller, Microphone, Camera | Magazines | Video Display, Speaker, Printer, Mouse | Memory | Motherboard RAM, system BIOS ROM, hard disk, CD/DVD disk, speakers | There are some devices that are both input and output devices. These include modems, network adapters, and expansion ports such as USB, FireWire, and PCMCIA slots. Similarities | Differences | Power Saving: Both types of computers can hibernate or sleep when not being used. | Components: The internal components of a desktop computer are not designed for low-power operation. This includes the CPU, which is equipped with a large heat sink and fan. A notebook computer contains low-power components, including the CPU. | Vulnerability: Both types of computers are vulnerable to malicious......

Words: 382 - Pages: 2

Computer Structure Lab

...Computer | Operating system | Hard Drive | RAM | Processor | Speed | Cost | Acer Aspire ES1-511-C59V 15.6-Inch Laptop (Diamond Black) | Windows 8.1 | Drive500 GB | 4 GB | Intel Celeron | 2.16GHz | $278.19 | CybertronPC Borg-Q GM4213A Desktop PC (Blue) | Windows 7 Home Premium 64-bit | 1000 GB | 8 GB | FX-Series Quad-Core FX-4120 | 3.8 GHz | $641.40 | HP Pavilion 23-g010 23-Inch All-in-One Desktop | Windows 8.1 | 500 GB | 4 GB | AMD E Series | 1.3 GHz | $479.99 | HP Slate 21-k100 Touchscreen All-in-One Desktop (Android 4.2 | Android 4.2 (Jelly Bean) | 8 GB | 1 GB | Tegra | 1.66 GHz | $294.34 | | Sharita Ramsey Computer Structure (NT1110) July 15, 2014 Assignment (lab 5) 1. A Teacher 2. A Graphic Designer 3. A Student A Teacher would need to use a computer with plenty of storage space. A computer with only 500 GB of Hard Drive and 4 GB of Ram would suffice. Teachers need computer capable of holding stored memory into its hard drive. This is good for things such as PowerPoint’s. Graphic designers couldn’t use anything other than a gaming computer with at less 8GB of RAM. People in profession like ( gamers, music producers, movie makers etc.) require there computers to work at it top speed for real time live streaming needs like ( 3.8 GHz or better) a gaming computer is needed in order to keep up with the programs that is being ran. Students wouldn’t need all that fancy 8 GB OR 16 GB RAM or with a 1 TB of hard drive. It would be useless A simple......

Words: 302 - Pages: 2

Wou Computer Survey Lab#4

...Q1: Computer science I believe is more of a general overview of computers / computing. Software engineering on the other hand focuses on the coding / design of software. Computer Engineering focusses on the design and construction of computer hardware. Information Technology is more of a computer science class that caters to the person that wants to work for a business and design their computer systems for them. Whereas Information Systems, is close to Information Technology however focuses more on the business optimization and knowledge of that. Q2: Computer science involves a lot more and is not limited to just computers. If a new invention that came out tomorrow called the Teschescope would astronomy be called Teschescopy? No it wouldn’t. Computers is more of a tool used by computer science. Computer science is really a way to process information, and if one day a better idea rises to perform that task and replace computers I believe the name of the field would not change. Q3: #1: Job Details If you are a Director of Engineering or Senior Manager with PHP application development experience, please read on. Top Reasons to Work with Us This is an exciting opportunity with a growing SaaS company in San Francisco who helps solve innovation challenges that have never been solved before. We use PHP, Node, MySQL, Linux, cloud, and big data to support millions of users. What You Will Be Doing - Lead the Engineering and QA teams through technical application......

Words: 594 - Pages: 3

Computer Lab 1

...Elizabeth Romero Computer and Logic Week 2 Lab Task 1: Identify the Ports Procedure 1. Look at the front and back of a desktop or notebook computer for the following bus connectors: RS232, USB, FireWire, and infrared. How many of each type of connector did you find? I found all four of them. 2. Label the appropriate names to the ports and adaptors given below. Ps/ 2 port USB ports Serial port VGA port Speakers Line in Microphone Ethernet port Pt 1 printer port Game port Task 2: Identify Memory Slots Procedure 1. Using the Internet, locate a diagram or photo of these types of memory slots on a desktop or notebook computer: Memory Stick (MS), Micro Drive (MD), Compact Flash (CF), and Secure Digital (SD). Memory Stick Slot Micro Drive Slot Compact Flash Slot Secure Digital Slot 1. Explain the diagram or photo(s) with the name of each type of memory slot. Memory Stick – is a removable flash memory card format. Electronic flash memory data storage device. Micro Drive- is an extremely small hard disk that can fit in a compact card memory slot. Compact flash- is a flash memory mass storage device used mainly in portable electronic devices. Secure digital- is a non-volatile memory card used extensively in portable devices. Task 3: Identify the Configuration Procedure 1. Identify the following configuration. When a SCSI host adapter card with internal and external connection is used, the SCSI daisy chain can extend through the card. The...

Words: 392 - Pages: 2

Lab 1: Introduction to Computers and Programming

...Lab 1: Introduction to Computers and Programming This lab accompanies Chapter 1 of Starting Out with Programming Logic & Design. Name: _____Patrick Ross____________ Lab 1.1 – GUI vs. Console Programming Help Video: Double click the file to view video [pic] This lab requires you to execute both types of programs to understand the differences. Step 1: Double click on the following console application and run the program. [pic] Step 2: Double click on the following GUI application and run the program. [pic] Step 3: Answer the following questions: 1. What similarities do you see between the two programs? Both programs use the same programming basics, adding any two numbers the user inputs. 2. What differences do you see between the two programs? The console app uses the command prompt, while the GUI application uses a window with graphics. 3. What input devices are used in the GUI and console programs? Mouse and keyboard 4. What output devices are used in the GUI and console programs? Monitor and speakers Lab 1.2 – Using Visual Basic IDE Help Video: Double click the file to view video [pic] This lab requires you to use the IDE (Integrated Development Environment) to create a project workspace using Visual Basic 2005. Step 1: Launch Visual Basic 2005. Click on File, then New Project. In the template window, select Console Application. In the Name...

Words: 1117 - Pages: 5

Computer Lab Plan

...| Computer Lab PlanAssignment One | Hersh Gulati | 5/27/13 | Project Management | | | Computer Lab PlanAssignment One | Hersh Gulati | 5/27/13 | Project Management | | Executive Summary Auckland University of Technology (AUT) is ranked in the top 500 universities of the world. The university has experienced a significant increase in the number of students enrolling in its Business and Law faculty over the years. Its Business and Management Studies was ranked as one of the top 200 in the world. As a result, there has been an increasing requirement for using computer systems in all its faculties, including the non-technological subject areas. Due to the growth envisioned over the next five years, AUT has decided that it requires two new computer labs to accommodate its Business and Law faculty students.To meet this requirement, level 7 of WF building will be refurbished to accommodate the new computer labs, instead of the exisiting seven classrooms. The renovation will be carried out as a 6 months long project commencing on 30th June 2015. Taking the Christmas and New Year’s holiday period into account, the project will be completed by 22nd December 2015, before the beginning of Term 1, 2016. The calculated budget for the project is $1.294 million, which includes 10% of contingency amount. The key deliverables for the project are: * Lab designs and architectural layouts for the computer labs * Two new computer labs The major tasks that......

Words: 4005 - Pages: 17

Computer Structure and Logic Lab 1

...Computer Structure and Logic Lab 1 12/17/2015 The computer I am working on right now has Windows 7 Installed on it. Windows 7 is not perfect. Some features are underdeveloped. For example when typing the cursor will move through the document. And some annoyances remain intact. But overall, the final version appears to be a worthy replacement to Windows XP. In window 7 you can take the Screen and split it into two. This is a great feature when you are writing a paper and doing research at the same time. To do this just click on the middle of the tab bar and drag left or right, then take your other screen and go the opposite way. In windows 7 you can now pin Icons to the task bar. For example you can pin chrome to your task bar, to do so open chrome, it will appear in the task bar when it does right click on it. Click on pin to task bar, now you have easy access to chrome. Windows 7 started the “Peak”. You can take your mouse and hover your mouse over an icon on the task bar that is active, when you do this a small screen pops up and you can see what is in that tab. Desktop Gadgets can be added to windows 7. You can add the Weather or even a picture slideshow to the desktop, just right click on your desktop and click on gadgets. Double click on the gadget you want and it will appear on your desktop. The desktop I am using has an Intel Core Processor the CPU is running at 3.30 GHz. It has 8 GB of RAM wish it had at least 16. Service Pack 1 is on this computer. SP1 is...

Words: 341 - Pages: 2

Pre Lab 4 of Mycalolide B Drug Protocol

...Cell Biology Day 4- pre lab: preparation for protocol Investigating: Neurospora Crassa Hyphal Tip Growth. Hypothesis: Null Hypothesis | Another Hypothesis | 400 nm of Nacodazole will have no effect on Neurospora Crassa Hyphal Tip Growth. | 400 nm of Nacodazole will have an effect on Neurospora Crassa Hyphal Tip Growth. | 400 nm of Nacodazole will have no effect on Neurospora Crassa Hyphal Nuclear position. | 400 nm of Nacodazole will have an effect on Neurospora Crassa Hyphal Nuclear position. | Variables: Fungal growth Tip | Nuclear positioning | Independent on time | Independent on time | Dependent on the distance migrated | Dependent on the distance migrated | Controls: * Observing the normal movement of Neurospora Crassa Hyphal Tip Growth without 400nm of Nacodazole. * Observing the normal Nuclear position of Neurospora Crassa Hyphal Tip Growth without 400nm of Nacodazole. Protocol : Investigation of Neurospora Crassa fungal tip growth and nuclear position. 1) From day 3, Neurospora Crassa cushions slides are required 2) Kohler Illumination set up under bright field microscopy. 3) Pick up two agar cushions without bubbles and label them as control 1 and control 2 4) Add 50 ul of growing medium to each control and place a covering slips on the. 5) For 5 minutes, put the slides inside the incubator allowing the medium to transfer into the cell 6) After, place the one of the control under kohler......

Words: 786 - Pages: 4

Computer Network Lab Manual

...CN LAB REPORT Dept. of ISE, BVBCET Department of Information Science & Engineering, BVBCET Hubballi COMPUTER NETWORKING LAB Mahantesh Patil 2BV14IS410 Mahantesh Patil 2BV14IS410 CN LAB REPORT Dept. of ISE, BVBCET LAB-01 List the hardware components 1) Difference between switch and Hub: 2) Difference between SWITCH and ROUTER 3) Differences between Router and Gateway 4) What is the Difference between Subnetting and Supernetting? HARDWARE COMPONENTS Cables: 1|Page Mahantesh Patil 2BV14IS410 CN LAB REPORT Dept. of ISE, BVBCET Cables: which are used to connect one or more devices to computer or network. Different types of network cables are available market they are Coaxial cable, Optical fiber cable, Twisted pair cable. RJ-45 The most common UTP connector is RJ45 (RJ stands for registered Jack), as shown in Figure. The RJ45 is a keyed connector, meaning the connector, meaning the connector can be inserted in only one way. 2|Page Mahantesh Patil 2BV14IS410 CN LAB REPORT Dept. of ISE, BVBCET SWITCHES: Switches contain many ports to connect different network segments. They are similar to hubs, but offer greater performance. When a network contains a large number of devices, switches are needed instead of hubs to make sure the communications between devices does not slow down. Contrary to hubs, switches send the data it receives only to specific ports. NIC(NETWORK INTERFACE CARD) A network card,......

Words: 3647 - Pages: 15