Cmit

In: Computers and Technology

Submitted By jantoniog3
Words 5272
Pages 22
How to Build a Custom PC
Jinbin Zhu
University of Maryland University College

Table of Contents
Introductions 3
Hardware Components for PC 4
Preparations Before Installation 5
Step One: Mount the Motherboard 5
Step Two: Install the Processor 6
Step Three: Install CPU Fan 7
Step Four: Installing PCI/ Graphics Card ………………………………………………………………………………………………8
Step Five: Installing Hard Drive and DVD Drive…………………………………………………………………………………….8
Step Six: Install Power Supply……………………………………………………………………………………………………………..9
Step Seven: Connecting all the cables…………………………………………………………………………………………………..10
Step Eight: Connect all the external cables…………………………………………………………………………………………..12
Step Nine: Set Up Bios and Install Windows 7 Operating System…………………………………………………………13
Post Installation……………………………………………………………………………………………………………………………………17

Abstract This paper will cover all the steps to properly build a custom computer from scratch. After following this guide, the readers should be able to install the windows operating system, set up critical key features within the operating system, as well as knowing all the key components of a desktop computer as well as their functions. On top of learning how to install the hardware and software components, we will cover some safety protocols that will ensure the project is successful.

Introductions:
Building your own pc is one of the best ways to get the most out of your money. This method allows the consumers to pay only for the components they need for their everyday work. Custom computers are generally more efficient than factory made units. There are a plethora of options in the market which will match any user demands. You are in full control of your budget simply because you pay for what you want. Gathering all the necessary components. Every PC has a set amount of hardware that are required…...

Similar Documents

Learning from the Titanic

...Project Manager has a responsibility to say ‘NO’ project • Managing Scope: Set the right expectations becoming the • Managing Quality: Quality checkpoints and testing (final and integrated) are a must next Titanic • • completion Manage Benefits: Have an integrated benefit management plan and track it to Disaster Recovery program that is detailed and have escalated action phases Manage Risks: No matter how great the outlook seems – plan for the worst. Have a Questions & Comments References • “Titanic Lessons for IT Projects” - IT Projects from Hell , Authored by Mark KozakHolland, HP Services (July 13th, 2007) Presentation for the Center for the Management of Information Technology (CMIT) Lessons-from-History Link: http://www2.commerce.virginia.edu/cmit/activities/Lessons_from_Titanic_for%20Project sv7.pdf ...

Words: 903 - Pages: 4

Drroberr

...started both CME and CMIT with an objective to offer high quality and comprehensive environmental monitoring and analytical services, and energy-efficient pollution control technologies. CMT specialized in environmental and ambient sampling, monitoring and laboratory ananlysis. CMIT is dedicated to provide a wide range of environmental engineering and pollution control system construction and turnkey services. By starting both CME and CMIT, CMT has aimed fulfil its obligation as a responsible member of the society to reduce environmental pollution and improve the quality of life in Taiwan. In 1996, to further upgrade CMIT and CME’s technical and management skill, CMT and International Technology Corporation (IT) executed a joint venture agreement to strengthen CMIT and CME’s financial position and technical and management capability. IT is a global leader in providing environmental infrastructure solutions. With its stocks listed in the New York stock Exchange (NYSE), IT has a 70-year corporate history in providing services to all levels of government agencies, a wide spectrum of industrial and commercial companies, and leading research institutions. Between the seven years from 1989 to 1996, IT was ranked #1 in the U.S.A.by the authoritative Engineering News Record (ENR) in the area of harzadous waste management. Honestly, Quality, Service and Innovation are the company’s long term commitment to clients. The joint venture between CMT, CME, CMIT, and IT allows......

Words: 22837 - Pages: 92

Team Management

...latter requiring a larger bend radius that could make it more difficult to maneuver around corners within an aircraft and could entail rerouting of some harnesses. Manufacturing and design of the A3XX will be spread across 85 countries, dozens of Airbus facilities, and hundreds of suppliers. A single chief engineer will be made responsible for the entire program across the four operating divisions that have been independently managed in France, Germany, the UK, and Spain. Nine aircraft component management teams (ACMTs) will be responsible for the development of the major elements of the A3XX. To ensure smooth coordination and communication with sub-elements within each of the nine major elements, component management integration teams (CMITs) will collaborate with the ACMTs and approximately 100 component design build teams responsible for sub-elements of the aircraft. Altogether, not counting supplier facilities, 16 Airbus sites scattered across Europe will be involved in the construction of the major components of the A3XX. Each site will produce a complete section of the aircraft, which will be transported to the final assembly lines in Toulouse by air, land, and sea, the size of the subassemblies presenting a major challenge. Indeed, many of the manufacturing facilities will need to be purpose-built to accommodate the massive size of the A3XX and its component pieces -- the final assembly site in Toulouse, for example, to have a ground surface of 500 meters by 250 meters...

Words: 528 - Pages: 3

Hcs 440 Week 2 Learning Team Literature Search

...This document MGT 350 Week 2 Learning Team Case Analysis Project Plan Critical Thinking Strategies in Decision Making contains a solution on following task: "Decisions in Paradise Case Analysis Project Plan. Submit the following: 1) Summary of Case 2) Company selected 3) Action Plan, e.g. who and how will this paper be researched and written. UMUC CMIT 425 Security Policy Project Using the GDI Case Study, complete the Security Policy Document. Provide a seven- to ten-page analysis summarizing the security policy to the executive management team of GDI. The summary should effectively describe the security policy in a manner that will allow the Senior Management to understand the organizational security requirements and make the appropriate decisions to enforce. Guidelines · Using the GDI Case Study, create the security policy document. · The security policy document must be 7 to 10 pages long, conforming to APA standards. See "Writing Guideline" in WebTycho where you'll find help on writing for research projects. · At least three authoritative, outside references are required (anonymous authors or web pages are not acceptable). These should be listed on the last page titled "References." · Appropriate citations are required. See the syllabus regarding plagiarism policies. · This will be graded on quality of research topic, quality of paper information, use of citations, grammar and sentence structure, and creativity. · The paper is due......

Words: 362 - Pages: 2

Mgt 350 Entire Course

...This document MGT 350 Week 2 Learning Team Case Analysis Project Plan Critical Thinking Strategies in Decision Making contains a solution on following task: "Decisions in Paradise Case Analysis Project Plan. Submit the following: 1) Summary of Case 2) Company selected 3) Action Plan, e.g. who and how will this paper be researched and written. UMUC CMIT 425 Security Policy Project Using the GDI Case Study, complete the Security Policy Document. Provide a seven- to ten-page analysis summarizing the security policy to the executive management team of GDI. The summary should effectively describe the security policy in a manner that will allow the Senior Management to understand the organizational security requirements and make the appropriate decisions to enforce. Guidelines · Using the GDI Case Study, create the security policy document. · The security policy document must be 7 to 10 pages long, conforming to APA standards. See "Writing Guideline" in WebTycho where you'll find help on writing for research projects. · At least three authoritative, outside references are required (anonymous authors or web pages are not acceptable). These should be listed on the last page titled "References." · Appropriate citations are required. See the syllabus regarding plagiarism policies. · This will be graded on quality of research topic, quality of paper information, use of citations, grammar and sentence structure, and creativity. · The paper is due......

Words: 364 - Pages: 2

Hcs 440 Week 1 Individual Economic Terms and Health Care History

...This document MGT 350 Week 2 Learning Team Case Analysis Project Plan Critical Thinking Strategies in Decision Making contains a solution on following task: "Decisions in Paradise Case Analysis Project Plan. Submit the following: 1) Summary of Case 2) Company selected 3) Action Plan, e.g. who and how will this paper be researched and written. UMUC CMIT 425 Security Policy Project Using the GDI Case Study, complete the Security Policy Document. Provide a seven- to ten-page analysis summarizing the security policy to the executive management team of GDI. The summary should effectively describe the security policy in a manner that will allow the Senior Management to understand the organizational security requirements and make the appropriate decisions to enforce. Guidelines · Using the GDI Case Study, create the security policy document. · The security policy document must be 7 to 10 pages long, conforming to APA standards. See "Writing Guideline" in WebTycho where you'll find help on writing for research projects. · At least three authoritative, outside references are required (anonymous authors or web pages are not acceptable). These should be listed on the last page titled "References." · Appropriate citations are required. See the syllabus regarding plagiarism policies. · This will be graded on quality of research topic, quality of paper information, use of citations, grammar and sentence structure, and creativity. · The paper is due......

Words: 358 - Pages: 2

Differentiate

...sectors), to maintain their competitive edge and to pursue ‘continued learning’. This may include both formal education and job-specific training and development, re-training and upskilling. The Higher Education and Training Awarding Council describes learning as ‘a process by which a sustainable change in a learner’s knowledge, skill or competence occurs as a result of experience (of phenomena)’ (HETAC, 2009). The phenomena could include such things as lectures, lecture notes, power point presentations, and graphics etc. (CMIT, 2015). It is argued that passive observation of such ‘phenomena’ does not necessarily constitute learning, as it is possible to sit through an entire lecture that includes, handouts, visuals and up front lecturing and learn nothing. In order to effectively learn, a learner must ‘through a process involving linking, modifying existing knowledge and with skill and competency…construct a ‘cognitive’ representation from the phenomena’ (CMIT, 2015, p.5). O’Carroll (2012) further develops this idea by suggesting that learning occurs when there is a permanent change in behaviour as a result of the phenomena. For the purposes of this assignment it is necessary to firstly have a basic understanding of some learning principles and theories, before trying to differentiate between the concepts of learning, training and development and education. In 1975, David Kolb, identified what he called experiential learning. He proposed that all effective learning is......

Words: 997 - Pages: 4

Cmit 495 Implementation Plan

...World-Wide Trading Company: Project Implementation Plan Group 3 Kristine Bird (AD Forest Domain OU, Groups and GPO Implementation) Ryan Bonisch (Contact list and LAN Implementation Tasks) Anthony Campo (Configuration of Routers, Switches, and VLANs) Gerald Casanada (Voice VLAN, Wireless, DHCP and DNS) Jennifer Coleman (AD Implementation and Tasks lists for AD Policies) Billie Jo Derouin (Security Implementation) Raymond Mack (Security Technology and Timeline) University of Maryland University College CMIT 495 Professor Sam Musa February 28, 2016 Table of Contents Introduction 2 Purpose 3 Implementation Requirements 3 Project Contact List 3 Tool List 3 Equipment Installation Plan 5 Project TimeLine 6 Lan Implementation task 7 Security Implementation task 11 Configuration Routers 41 Switches 46 VLAN Configurations 49 Voice VLAN and Wireless 51 DHCP and DNS 54 Active Directory Implementation Task 56 Active Directory Policies 58 AD Forest Domain OU formation/AD Group Formation/AD GPO Implementation 68 Security Technologies 88 Introduction The implementation of the WWTC is crucial to keep the business functioning and growing. To ensure that new office installation goes smooth group 3 will create a functional implementation plan from the design we proposed to WWTC over the last 7 weeks. Purpose The purpose of this plan is to provide a step by step guide on the network designed......

Words: 13687 - Pages: 55

Cmit 321 Final Exam

...CMIT 321 Final Exam Click Link Below To Buy: http://hwaid.com/shop/cmit-321-final-exam/ Written 2016 Attempt Score: 121 / 125 - 96.8 % Final Exam Question 1 1 / 1 point __________ is the exploitation of an organization's telephone, dial, and private branch exchange (PBX) system to infiltrate the internal network in order to abuse computing resources. a. War driving b. Line dialing c. PBX driving d. War dialing View Feedback Question 2 1 / 1 point __________ cryptography is the most common method on the Internet for authenticating a message sender or encrypting a message. a. Symmetric b. Hash-based c. Private-key d. Public-key View Feedback Question 3 1 / 1 point __________ is a lightweight Knoppix version cut to 50 MB for a business-card-sized CD. a. Gnoppix b. GeeXboX c. Morphix d. Damn Small Linux View Feedback Question 4 1 / 1 point The __________ utility tests the integrity of an ODBC data source. a. odbcping b. ASPRunner c. FlexTracer d. DbEncrypt View Feedback Question 5 1 / 1 point In the TCP/IP stack, the __________ layer is where applications and protocols, such as HTTP and Telnet, operate. a. Internet b. network c. transport d. application View Feedback Question 6 1 / 1 point Attackers can use a simple test to find out if an application is vulnerable to an OLE DB error. They can fill in the username and......

Words: 4865 - Pages: 20

Cmit350

...CMIT 350 WAN and SOHO Skills Implementation Prepared for: University of Maryland University College CMIT 250 Prepared by: Devin Manning I. Site “Los Angeles” Challenge and Implementation The site administrator has requested that the site establishes remote IOS storage, remote management of switches, ACL list implementation, and a network time protocol for devices as described in the site specific portion of the scenario. II. Site Solutions and Technologies * The recommended course of action for the request of a remote IOS storage capability at the site would be to establish a remote access server using a HTTP/ HTTPS protocol as opposed to the SSH option mainly because of the security and control over things such as the internet connection to the routers from not only the user database, but the source addresses as well in regards to their perspectives. This particular protocol also requires the timing information to be in setup and in place which would complement the network time protocol solution that has been requested by the site. For this request, I would use the SonicWall software in order to setup up this capability along with the SonicWall UTM appliance that is provided by the company. * In order to address the remote management of the switches request, it would require a console cable and a server that has an available console port such as the Cisco Nexus 2228TP GE Fabric Extender expansion module which is one of the easier servers to use......

Words: 1625 - Pages: 7

Part2 Cmit 350

...CMIT 350 WAN and SOHO Skills Implementation UMUC Winter 2015 Springfield Site Configuration: Required Implementation: Device hostnames, banners, secured passwords and spanning tree protocol. * Device Configurations: Implement device hostnames to match the xACME educational topology labels. Provide a template and sample configuration for the MOTD banner and login banner (wording and implementation) for one of the switches. Keep this generic, as it will be implemented on all switches in the xACME educational topology. Lastly, include the configuration steps for implementing device passwords on both console port (out-of-band communications) and VTY (Telnet/in-band communications). All passwords should be encrypted. Required Implementation: Configure all devices hostnames as per the xACME topology Configure encrypted passwords (console and Telnet ports) on all devices Configure MOTD and Login banner for one of the switches Create Server VLANS, Faculty VLANS, Instructional VLANS and Administrative VLANs on all switches Assign ports to VLANs on all switches Assign mode of access of VLANS Configure trunks between switches Make Switch1 as primary root bridge for all VLANs Configure security to protect from bogus BPDUs Configure Hostname: 1. Enable 2. Router# configure terminal 3. Router(config)#hostname (SpringfieldSw1, SpringfieldSw2, SpringfieldSw3, SpringfieldSw4) 4. End 5. Copy run start Creating Passwords: 1. Conf t ......

Words: 3539 - Pages: 15

Cmit

...Extending the NATO Architecture Framework to Support Service Oriented Architectures Mr J Keefe – NATO AF Overview Dr I Bailey – SOA Views 23 May 2006 NATO NEC and the Decision Loop Understand Faster and better Cognitive Domain Knowledge Superiority Orient Information Domain Decide Better and faster Decision Superiority Decide Network Enabled Information Effects Capability Observe Act Superiority Superiority Physical Domain See first, more Act decisively NATO NEC will enable us to operate more effectively in the future strategic environment through the more efficient sharing and exploitation of information within the Alliance and with our coalition partners This will lead to better situational awareness across the board, facilitating improved decision-making, and bringing to bear the right military capabilities at the right time to achieve the desired military effect. Key Issues Clarity of vision Roadmap for change Dealing with complexity Legacy Environments – ‘stove-piped’ solutions Multiple Agencies New Technologies – SOA Information Assurance Multiple Customers Operators Operational planners Acquisition community Developers Framework and Methodology NAF Reality: Complexity of Defence Applications Reality: Complexity of Defence Applications inhibit agility inhibit agility Mainframe PC/NT apps Unix apps 3rd Party Interface AIS Reports Depository Banks Vendor......

Words: 2809 - Pages: 12

Cmit 350 Final Project

... WAN Implementation with SOHO Skills Configuration Prepared for: University of Maryland University College Prepared by: Nathan Poole Table of Contents I. Springfield Site Device and STP Configurations II. Worchester Site Subnetting Configurations III. Boston Site Routing Protocol, Route Summarization and Topology Improvements IV. Sacramento Site VLAN, Routing on a Stick (ROS) and DHCP Implementation V. Los Angeles Site Management Technologies VI. xACME WAN - WAN Implementation and Secure Communications VII. Bibliography WAN Implementation with SOHO Skills Configuration I. Springfield Site Device and STP Configurations Problem Statement: The device hostnames on each switch are generic and default. They do not match the network topology device hostnames as delivered with the network architecture. Each switch and router must have the correct hostname configured per device. Switch>en Switch#config t Enter configuration commands, one per line. End with CNTL/Z. Switch(config)#Hostname SpringfieldSwitch1 SpringfieldSwitch1(config)# Switch>en Switch#config t Enter configuration commands, one per line. End with CNTL/Z. Switch(config)#Hostname SpringfieldSwitch2 SpringfieldSwitch2(config)# Switch>en Switch#config t Enter configuration commands, one per line. End with CNTL/Z. Switch(config)#Hostname SpringfieldSwitch3 SpringfieldSwitch3(config)# Switch>en Switch#config t Enter configuration commands, one per line. End with......

Words: 1180 - Pages: 5

Final Paper

...CMIT 350 WAN and SOHO Skills Implementation Use this document as a guide for formatting and organizing your CMIT 350 Skills Implementation challenge. Title Page Professionalism will be key to your success and advancement in your academic and professional career. Use the title page to identify relevant information such as your name, the course, professor, and submission/completion date. Document Index/Contents Organization will allow your document to be divided into key areas of consideration and allows an overall structure to be placed over the submission. Sample text: I. Site “XXXXXXXX” Challenges and Implementation II. Site “XXXXXXXX” Challenges and Implementation III. Site “XXXXXXXX” Challenges and Implementation IV. Bibliography Site “XXXXXXXXXX” Challenge and Implementation (Provide a section for each site, as suggested in your table of contents.) Site Details and Challenges (Summary) Here, you will simply summarize the site requirements and/or challenges you are attempting to overcome. You will not need to implement solutions or discuss your approach at this point. This information is provided to you and can simply be organized and restated as you understand it. Think of this area as what needs to be corrected. Suggested length would be one or two paragraphs. Sample text: As described in the scenario, the xUMUC site was developed without any VLAN structure, and administrators have found the need to isolate broadcast traffic from a layer-2......

Words: 663 - Pages: 3

Cmit Final Project

...CMIT376 FINAL PROJECT (250 points) You are the network administrator for City Power & Light. CP&L has five different locations named Central, Northwest, Northeast, Southwest, and Southeast. The Central location has 500 client computers and two network servers. The Northwest and Northeast locations have approximately 75 client computers and one server computer each. The Southwest and Southeast locations have 100 client computers and one network server each. The diagram below illustrates the company’s network infrastructure. Each server is on a separate IPv4 subnet, using non-MS routers to provide access to other internal locations. Subnetting Table (using a subnet mask of 255.255.255.0) 10.18.1.0 – Central Location – 250 users and server S1 10.18.2.0 – Central Location – 250 users and server S2 10.18.3.0 – Northwest Location – 75 users and server S3 10.18.4.0 – Northeast Location – 75 users and server S4 10.18.5.0 – Southwest Location – 100 users and server S5 10.18.6.0 – Southeast Location – 100 users and server S6 [pic] All servers are Domain Controllers in the City Power & Light domain (called CPANDL.AD). The servers run Microsoft Windows Server 2008, Enterprise Edition. All client computers run Windows XP, Vista SP1, or Windows 7. City Power & Light also has a website maintained by their ISP called CPANDL.COM (http://www.cpandl.com). Andy Ruth, director of CP&L, asked you to design a networking infrastructure for the company. The requirements......

Words: 626 - Pages: 3

Various - L'Osteria | Casual Dresses HOT | The Struts