Nt1110

In: Computers and Technology

Submitted By dotcom2209
Words 251
Pages 2
NT1110
Unit 6 Research 1: Network Attached Storage 1. What happens when you combine a hard drive and a network adapter is called NAS (Network System Storage). Network-attached storage (NAS) is a dedicated hard disk storage device that is set up with its own network address and provides file-based data storage services to other devices on the network. 2. NAS devices come in many varieties depending on if you build it yourself or purchase a vendor product. The speed is typically one gigabit Ethernet connection but this can be changed to multiple gigabit, 10 gigabit, fiber optic by adding a pci-e network card(s). Older parts can be used which may be limited to 10/100 megabit. If you need an exact answer for speed, simply look at the wiki on gigabit.

The capacity range again varies; people have built 40 TB machines and other just have 2TB. With port replication and add-on hard drive controller cards there is hardly a limit on size. A board with 6 sata ports can be replicated (1 to 5 port) allowing for 30 drives to be attached, if 3TB drives were used in raid 50 that would be 72TB of storage.

As far as fault tolerance, raid 50 is fairly stable if set up correctly, raid 10 has been touted as one of the best setups since more drives can fail at one time without data loss. All of those features can be used on typical NAS devices.…...

Similar Documents

Nt1110

...Mr. Yang | NT1110 Computer Structure and Logic | Unit 3 Assignment 1: I/O Devices | | Jesus Gutierrez I/O Devices I/O devices enable us to control the computer and Information in a variety of ways. * What critical I/O devices are necessary to use a personal computer? Which ones are not necessary for normal day-to- day use and why? Necessary devices used on a personal computer keyboard, for typing or telling the computer what to do. Monitor, for seeing all the information you type in, watching videos ect… Speakers for listening music and watching videos. Now a days we often use USB ports for just about everything, storing information from one device to a desk top up to a laptop. Also charging our electric devices, as well as storing information into USB cards. Not necessary I/O for a personal computer can be printer, scanner, web cam. * Why a modem is considered an I/O device? The reason Is it sends and retrieves data usually at the same time. * Though a printer is an essential I/O device, can you think of why it may be also classified as an input device? If It is a combination of printer/fax/scanner it could be both. When it is printing it’s an output device. When scanning it is an input device. [Type the abstract of the document here. The abstract is typically a short summary of the......

Words: 274 - Pages: 2

Nt1110

...Shondrick Stephens NT1110 Unit 10 Research Project Identity Theft “But he that filches from me my good name/ Robs me of that which not enriches him/ And make me poor indeed.” Shakespeare, Othello, Act 3 Scene 3 For as long as people have created civilizations there has been some sort of identity theft. Identity theft is when someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, usually for economic gain. Your name, birth date, address, Social Security number, your bank account or credit card number, your telephone calling card number, and other valuable identifying data can be used, for identity theft if they were to fall in the wrong hand, for personal profit at your expense. That bad part is that in the past it was not even a crime. In October 30, 1998 through the enactment of the Identity Theft and Assumption Deterrence Act of 1998, 18 USC & 1028 (a) (7). This Act states that identity theft occurs when a person: “knowingly transfers or uses, without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, any unlawful activity that constitutes a violation of Federal law, or that constitutes a felony under any applicable State or local law.” There are several ways a thief can steal your identity. And there are also just as many way to...

Words: 1213 - Pages: 5

Nt1110

...NT1110 Homework 3 USB 3.1 The new USB 3.1 Super Speed specification has been finalized by the USB Promoter Group, allowing manufacturers to begin building devices that can communicate at a blistering 10 Gb/s. The new USB Super Speed standard has been given its official designation - USB 3.1 - and doubles the possible throughput of a USB connection from 5Gb/s to 10Gb/s. As you might expect from a USB standard, backwards compatibility is also confirmed for previous USB devices - which will, naturally, run at their usual, slower speed even when connected to a USB 3.1 port. The specification team worked hard to make sure that the changes made to support higher speeds were limited and remained consistent with existing USB 3.0 architecture to ease product development. The move to push 10Gb/s through USB connections is believed to have been a response to the threat of Thunderbolt technology developed by Apple and Intel. First seen on Apple's own products, and now trickling out into the mainstream PC world, Thunderbolt offered 10Gb/s - but shortly after the USB Promoter Group announced that USB would match that speed, Intel announced the Falcon Ridge controller which doubles Thunderbolt's throughput to 20Gb/s. In both cases, the peak performance is theoretical: actual real-world transfer rates will depend on cable quality and length, chipset and bus limitations and a myriad of other factors. Nevertheless, both provide the potential for vastly improved transfer rates when......

Words: 309 - Pages: 2

Nt1110

...NT1110 Computer Structure and Logic Module 2 Short Answer 2.1 I/O Devices Professor Mo Suleiman I/O Devices An I/O device is defined as “any of various devices (including sensors) used to enter information and instructions into a computer for storage or processing and to deliver the processed data to a human operator or, in some cases, a machine controlled by the computer.” (Britannica, 2014) With that information presented, the critical I/O devices needed for the computer are a mouse and keyboard. They are both necessary because they are input devices. The mouse allows the user to tell the computer what program to open, while the keyboard is used for allowing the user to input information in a language the user and computer understands to carry it out. The monitor and printer are output devices. There are a different types of both. The traditional output device of a personal computer has been the CRT (Cathode Ray Tube) monitor. Just like a television set (an older one, anyway) the CRT monitor contains “a large cathode ray tube that uses an electron beam of varying strength”. (Computer Terminology) The monitor displays the video signal produced by a part within the computer. Thus then you have picture. A modem is classified as a Input and output devices because of what it does for the computer. It transmits and receives information, therefore is a input AND output. The printer as well can do this if it’s a fax machine built together with it. The Printer......

Words: 310 - Pages: 2

Nt1110

...NT1110 Analysis 3: WEP, WPA, WPA2 05/13/2014 * Wired Equivalent Privacy (WEP):  WEP is the original encryption protocol developed for wireless networks. As the name implies, WEP was supposed to be as secure as a wired network. However, WEP has many security flaws, is difficult to configure and is easily hacked. The Wi-Fi Alliance officially retired WEP in 2004. Due to US restrictions, many manufactures were limited to making their devices 64 bit. It was not until these restrictions were lifted that it was increased to 128 bit. Even though 256 bit was introduced, 128 bit remains the most common. Wi-Fi Protected Access (WPA):  WPA was made as something better to use instead of WEP while 802.11i wireless security standard was being developed. Current use of WPA uses a preshared key (PSK) also known as WPA Personal and the Temporary Key Integrity Protocol (TKIP) for its encryption. WPA used the 256 bit keys that are a huge improvement over WEP’s 64 bit. One of the significant changes was integrity checks that would determine if an attacker had captured or altered packets. WPA, like its predecessor WEP both have been shown in public demonstrations to be vulnerable to intrusion. Wi-Fi Protected Access II (WPA2) WPA2 officially replaced WPA in 2006. One of the biggest differences between WPA and WPA2 was the mandatory use of AES algorithms and the introduction of CCMP (Counter Cipher Mode with Block Chaining Message Authentication......

Words: 296 - Pages: 2

Nt1110

...NT1110 Computer Structure and Logic Short Answer 2.1 Input/Output Devices Professor Mo Suleiman October 4, 2014 In the wonderful world of computers, we need to tools to communicate with a computer. Of course, a base foundation is the Operating System. However, we do need tools that will allow end users to streamline a computer’s full potential and functionality. That is where input and output devices come into play. In computing, input and output devices refers to the way we as end users communicate with a computer. Input is defined as a way the data or information sent to a system, as in typing something on a keyboard. Outputs are the signals sent by the computer system to the outside end user. An input device is a piece of hardware that transfers information or data in the world for consumption from an end user to a computer. Critical input devices needed to communicate with a computer are a keyboard, and mouse. A keyboard is the sole way to input keys, or command instructions to a computer. Without a keyboard, a computer is useless to an end user. Another critical input device is a mouse. A mouse is a click and point device used to manipulate GUI interfaces within an operating system. A mouse is not necessary in sole computer programming, but in order to manipulate GUI based operating systems and programs, a mouse is needed to communicate to a computer. An output device is a piece of hardware a computer uses to communicate the results of data......

Words: 589 - Pages: 3

Nt1110

...Identifying the Operating System/ Lab Chiquita Pasha NT1110 Computer Structure and Logic Mrs. Shaw 9-22-14 The operating system for my laptop is Windows 7, and a service pack is installed within laptop. The Processor Speed for Windows 7 is 1GH2. The RAM for Windows 7 is 1GB (32 bit), 2GB (64 bit). The Disk Space for Windows 7 is 16GB (32 bit). Five features of the operating system on my PC are: Home Group, Windows Troubleshoot, Back-up and Restore, Device Management, and Getting Started. Home Group is the way two or more PC’s share information. You can email documents to the computer in the next room or in someone else office so you can print them out. Home Group is privacy oriented it protects your password putting you more in control. You decided what you want people to have and what you want to keep private something like Macintosh privacy. Back -Up and Restore creates safety for your personal files just in case something goes wrong. Windows can pick and choose what files they feel the need to be backed up or they let you select your own files to be backed up, whether it is an individual folder, libraries, or drives. You can back up your information to other drives also or a CD Rom a DVD. If you are using the professional side of Windows 7 you will also have the option to back up information to a network. Device Management is broke down into two features which are Device and Stage and the Device and Printer folder. Device stage is like a home page for your...

Words: 529 - Pages: 3

Nt1110

...Nt1110 Research Paper Unit 4 Port Expanders Unit 4 Research Paper 1: Port Expanders. A Port Expander is a hardware device that allows a user to use more than one device on a single port. A good example of a port expander is a USB hub. Most USB hubs allow you to hook up 3 to 5 USB connections from only 1 USB port on your computer. The disadvantage of using a port expander is speed. The single port you are connecting to only operates at a set speed; example of this is a USB 2.0 port operates at 480 Mbit/s. If you have a portable hard drive that runs at 300 Mbit/s and a digital camera running at 180 Mbit/s that leaves 0 Mbit/s left for any other USB device on the USB hub; you could run into a bottleneck situation if you are trying to run another device at the same time. I have used several USB hubs in the past and they seemed to work really well for me. I was not using all devices I had plugged into the hub at the same time. I found it was a lot easier than plugging and unplugging devices all the time just to plug in another device. There are some advantages of using a port expander. It is generally cheaper running a port expander than to actually buying “real” ports. Port expanders are generally computer specific, however there are exceptions to that rule. USB hubs only require that a USB port is available for the hub to plug into. A port expander is also known as a port replicator. Port replicators do not add new hardware to the computer. It provides a physical connection......

Words: 318 - Pages: 2

Nt1110

...NT1110 Computer Structure and Logic STUDENT COPY: Graded Assignments © ITT Educational Services, Inc. All Rights Reserved. -91- Change Date: 08/25/2011 Unit 2 Assignment 1: Transfer Time Learning Objectives and Outcomes This assignment addresses the key concept “Computer measurements of speed related to data transfer.” The expected learning outcomes that will result from completing the assignment are: • You will be able to perform specific calculations using numbers based in computer terms. • You will be able to determine transfer time for a file based on file size and transfer rate. • You will be able to determine file size based on transfer rate and transfer time. Assignment Requirements 1. Fill in the Transfer Time column in Table 1. State all times in appropriate units (seconds, minutes, or hours). Show all your calculations and number conversions. 2. Fill in the File Size column in Table 2. State all sizes in appropriate units (KB, MB, or GB). Show all your calculations and number conversions. 3. Comment on the relationship among file size, transfer rate, and transfer time. How are they related? Table 1: Calculating transfer time 100 MB 56 Kbps 4 Hours, 28 Minutes and 11 Seconds 100 MB 4 Mbps 0 Hours, 03 Minutes and 40 Seconds 2 GB 56 Kbps 11 Hours, 26 Minutes and 34 Seconds 2 GB 4 Mbps 1 Hours, 15 Minutes and 05 Seconds Table 2: Calculating file size Transfer Rate Transfer Time File Size 56 Kbps 30 minutes 12MB 4......

Words: 411 - Pages: 2

Nt1110

...NT1110 Computer Structure and Logic STUDENT COPY STUDENT COPY   The following sections contain student copies of the assignments that must be distributed to students at least two weeks prior to the due dates for those assignments. Online students will have access to those documents in PDF format available for downloading at any time during the course. © ITT Educational Services, Inc. All Rights Reserved.   -87- Change Date: 08/25/2011 NT1110 Computer Structure and Logic STUDENT COPY: Graded Assignments Graded Assignment Requirements   Assignment Requirements documents provided below must be printed and distributed to students as the guidance for completing the assignments and submitting them for grading. Instructors must remind students to retain all handouts and assignment documents issued in every U U unit, as well as student-prepared documentation and graded deliverables. Some or all these documents will be used repeatedly across different units. Unit 1 Assignment 1: Integrated Circuit Technology Learning Objectives and Outcomes This assignment addresses the course objective “Describe the components of a personal computer.” The expected learning outcomes that will result from completing the assignment are:  You will be able to perform specific Internet searches for information.  You will be able to illustrate the growth of the number of transistors available in integrated circuits used in......

Words: 652 - Pages: 3

Nt1110

...Frank Williams 04/05/2015 Ms. Easterling NT1110 In the video, it talked about the different ports on a computer. The Serial port transmits data one bit at a time. It usually is a male port with 9 or 25 pins. The Parallel port transmits data 8 bits at a time. It is usually a female port with 25 pins. The game port is usually female with 15 pins and two rows. The mouse and keyboard ports are used to access the mouse and keyboard. On older computers the mouse and keyboard used PS/2 connectors. All the ports have been replaced by USB ports. There are two types of USB ports, the USB1 which is 56 kbps and cord length of 3 meters. The USB2 which is 480 mbps and cord length of 5 meters. The USB can control up to 127 devices. The NIC (Network Interface Card) is responsible for connecting computer to the Internet. The VGA, DVI, S-video all are used to connect video. There are two types of monitors, the CRT monitor and the LCD monitor. The CRT (Cathode Ray Tube) monitor is usually big and bulky. The LCD (Liquid Crystal Display) monitors are thin and use TFT (Thin Film transistors). The Standard Resolution is 640 x 480, 800 x 600, 1024 x 768. The Native Resolutions are XGA – 1024x768, SXGA – 1280x1024, UXGA – 1600x1200, and WUXGA – 1920x1200. The video also showed how to configure these settings through the control panel or simply right click on screen, select properties then click on settings to adjust. The EMI (Electromagnetic Interface) created by electric source. Never open a...

Words: 421 - Pages: 2

Nt1110

...ITT-TECHNICAL INSTITUTE COMPUTER STRUCTURE AND LOGIC NT1110 Jesse Allen UNIT8. LAB8.2 CONTROL PANEL Gus Perez 19593003 Salem, Oregon. TASK Make a report on the Windows Control Panel with screen shots and your experience with control panel. The Control Panel for Windows7 on a Network Control Panel for a PC Control Panel The Control Panel is a part of the Microsoft Windows graphical user interface which allows users to view and manipulate basic system settings and controls via applets, such as adding hardware, adding and removing software, controlling user accounts, and changing accessibility options. Additional applets can be provided by third party software. The Control Panel has been an inherent part of the Microsoft Windows operating system since Windows 2.0, with many of the current applets being added in later versions. Beginning with Windows 95, the Control Panel is implemented as a special folder, i.e. the folder does not physically exist, but only contains shortcuts to various applets such as Add or Remove Programs and Internet Options. Physically, these applets are stored as .cpl files. For example, the Add or Remove Programs applet is stored under the name appwiz.cpl in the SYSTEM32 folder. In recent versions of Windows, the Control Panel has two views, Classic View and Category View, and it is possible to switch between these through an option that appears on either the left side or top of the window. Many of the individual Control......

Words: 549 - Pages: 3

Nt1110

...Unit 4 Assignment 1: Video Summary NT1110 – Computer Structure and Logic Instructor: Julio Birman Assignment Requirements 1. Watch video clip 1.04 from the Video Mentor DVD. 2. Write a summary of the information presented in the clip. 3. Create a bulleted list of the topics presented in the video clip. 4. Create a bulleted list of terms used in the video clip with their definitions. 5. Provide a summary of your thoughts on the information presented in the video clip, including what you learned from the presentation, what you may have found confusing, and where you might use the information. Required Resources In addition to having read Chapter 4 to become familiar with the motherboards and buses used with computers, you will need a computer with a DVD drive to watch the Video Mentor video clip. Submission Specifications Submit the results of your work using the following specifications: File Format: Microsoft Word (.doc /.docx) Length: 1-2 pages Font: Arial 10-point Line Spacing: Double Unit 4 Research Paper 1: Port Expander NT1110 – Computer Structure and Logic Instructor: Julio Birman Assignment Requirements 1. Search the Internet for information on “port expander.” 2. List the types of ports available on the expander hardware. Include screen shots of actual port expanders in an appendix to your completed assignment. 3. Determine whether port expanders are made for specific types of computers, or if they......

Words: 317 - Pages: 2

Nt1110

...!!!Rosa Cano NT1110 SAT 9AM July 15, 2015 Unit 1 Assignment 1: Integrated Circuit Technology Number 1 and 2 question Model of Processor | Year implemented | Transistor Count | Intel 4004 | 1971 | 2,300 | Intel 8008 | 1972 | 2,500 | Intel 8080 | 1974 | 4,500 | Intel 8085 | 1976 | 8,500 | Intel 8086 | 1978 | 29,000 | Intel 8088 | 1979 | 29,000 | Intel 80186 | 1982 | 55,000 | Intel 286 | 1982 | 134,000 | Intel 386 | 1985 | 275,000 | Intel 486 | 1989 | 1,200,000 | Intel Premium | 1993 | 3,100,000 | Intel Premium II | 1997 | 7,500,000 | Intel Premium III | 1999 | 9,500,000 | Intel Premium 4 | 2000 | 42,000,000 | Intel Itanium | 2001 | 25,000,000 | Intel Itanium 2 | 2003 | 220,000,000 | Intel Itanium 2(9MBcache) | 2004 | 592,000,000 | Core 2 duo | 2006 | 291,000,000 | Core i7 | 2008 | 731,000,000 | Quad-core Itanium | 2010 | 2,000,000,000 | Six-Core core i7/8 | 2011 | 2,270,000,000 | 8-Core Itanium | 2012 | 3,100,000,000 | 62-Core Xeon Phi | 2012 | 5,000,000,000 | 3. The Processor model that placed two billion transistors in a single processor chip was the Quad-core Itanium in 2010. 4. Citation: http://www.wagnercg.com/Portals/0/FunStuff/AHistoryofMicroprocessorTransistorCount.pdf 5. The growth of the transistors seems to be fairly reasonable, because since the power of the computations is growing rapidly so this has to also and it will continue to do so as new technology arises. Looking at this chart, it is showing......

Words: 351 - Pages: 2

Nt1110

...Janna Bedell NT1110 Unit 7 Research paper 3 The first high-volume applications for CMOS circuits emerged in battery-operated consumer products such as digital watches (1974 Milestone) and portable instruments that did not demand the ultimate in speed. By 1978, when Toshiaki Masuhara of Hitachi described a high-speed RAM at ISSCC, the combination of smaller lithography with the silicon-gate process enabled CMOS to compete in performance with bipolar and conventional MOS. As designers took advantage of scaling (1974 Milestone) to pack hundreds of thousands of transistors onto a chip, CMOS provided the best solution to manage the resulting power density issues. (Museum, 2007) The size of the CMOS memory has also pretty much stayed the same because there is no need to increase the size. There was never any need to store more than 512 bytes in the memory as it holds the absolute basic boot settings for the system. The typical size is still 512 bytes currently. All it comes down to is “If it ain’t broke don’t fix it.”, so it’s been that way since almost the very beginning. It does its job which is to just get the computer started and make sure everything is in place and then hands it all over to the computers OS. A small battery on the computer's motherboard provides the CMOS with constant power. Most computers use a 3-volt CR2032 coin cell, which can last for a number of years, depending on factors such as temperature, and the amount of time the computer is without power....

Words: 415 - Pages: 2

The Handmaid's Tale Season 3 torrent | 3×08 Crooked Steps | Terminada Twin Peaks 1990 - 1991