task4

=AfrostabTask's=

=Task 4 Questions=

Couldnt find diagrams and powerpoint that jayden has done, questions 2,3,4,8 **Question 1** Mouse, keyboard monitor, floppy drive tower, CD drive **Question 5** RAM is the common computer memory and ROM is memory that can be accessed but not changed. DRAM is dynamic random-access memory, that constantly refreshes while SRAM is pretty much the same but faster and more expensive and also doesn’t constantly refresh **Question 6** ISA: This stands for Industry standard Architecture. It is an 8-bit expansion bus and provides a buffered interface from devices on expansion cards to the PC internal bus. PCI: A PCI card is an add-on that you slot into the motherboard. AGP: An AGP is an Accelerated Graphics Port. It allows 3D graphics to display quickly on personal computers. **Question 9** This new technology with floppy disks and CD ROMS increase storage capacities which means you can put more tracks in your CD and a floppy disk can store more data.

Windows XP || Adobe CS3 || || A apple Mac || Notebook Software 10 || || Linux || Inspiration || || 
 * Question 10**
 * Operating System Software ** ||
 * Application Software ** ||
 * Utilities Software ** ||
 * Utilities Software ** ||

Question 11
Computer networks are generally classified as being one of the following: a) LAN – Local Area Network- is a network that only covers a small area like a house or a business b)  WAN – Wide Area Network- is a network that covers a lot of area, like a country or the whole world like the internet c) International Network-is a network that is used globally or between countries

Question 12
A LAN (Local Area Network) consists of five component parts: a) A network server is a server that manages the network. It is the device every other devices in connected to so that you can share resources between devices. b)  Other network (computer) hardware – including workstations and other peripheral devices- can be another computer, printer or scanner. All these devices are connected together. c) Network Interface cards- A network interface card (NIC) is a computer circuit board or [|card] that is installed in a computer so that it can be connected to a network. d)  Network transmission media- is the way computers communicate. We use sound waves while computers can communicate through cables, light, and radio waves. e) Network communications equipment- are used in the representation, transfer, interpretation and processing of data in a network.

Question 13
The following are 4 possible means of transmission of data across a network. List them in order of speed from slowest to fastest: 1.Ciasxial Cable 2.Twisted Cable Pair 3.Microwave 4.Fibre-optic Cable

Question 14
Different operating systems offer various security features. However, these can sometimes be by-passed if a computer ‘hacker’ discovers a user’s password or gains physical access to the system. List 10 different measures that can be taken to protect the physical security of a computer system.

Firewall Anti virus software Anti spy ware Passwords Don’t write down passwords Don’t connect to the internet without a firewall Don’t open unknown email Don’t open unknown programs Turn off the computer when not being used Make backups of files.

Question 15
Still further protection is available through the following: a) CMOS password- a password required to turn on the computer. b)  File permissions- different permissions on what you can do to a file. For example only being able to look at but now edit. c) Firewall- blocks anything unwanted from entering your computer, d)  Data encryption- having passwords on files before they can be opened.

Question 16
As networks are expanded, and as they age, new servers will from time to time need to be added to the system. The list below indicates the steps necessary to upgrade from an old to a new server. Re-arrange these into their correct order.

1. Obtain hardware 2. Set up new hardware 3. Install operating system 4. Install software 5. Connect to the network 6. Allocate network address 7. Close security gaps 8. Run security check 9. Ensure customers can access their data 10. Restore files from old server