Explain the components of a modern computer

Assignment Help Computer Engineering
Reference no: EM133071006

617/2268 Computer and Network Technology - OTHM Level 4 Diploma In Information Technology

Aim: The aim of this unit is to provide learners with knowledge of computer networking essentials, how they operate, protocols, standards, security considerations and the prototypes associated with a range of networking technologies.

Learners will explore a range of hardware and related software and will learn to configure and install these. A range of networking technologies will be explored including Local Area Networking (LAN), Wide Area Networking (WAN) and how these technologies evolved to form largescale networks. Protocol methodologies related to IP data networks will also be explored.

Learning Outcome 1: Understand the fundamentals of the computer.
1.1 Summarise the historical development of computer systems.
1.2 Explain the components of a modern computer.
1.3 Differentiate client and server environments.
1.4 Assess different operating systems.

Learning Outcome 2: Understand networking principles and their protocols.
2.1 Describe network standards and protocols.
2.2 Assess different network topologies.
2.3 Evaluate the impact of different network standards.
2.4 Differentiate between network hardware and software.

Learning Outcome 3: Be able to carry out desktop engineering fundamentals.
3.1 Carry out PC assembling and basic troubleshooting.

3.2 Carry out installation of client and server operating systems.

3.3 Configure client systems to meet organisational policies.

Learning Outcome 4: Be able to demonstrate routing and switching techniques.
4.1 Configure a network using routing and switching techniques.

LO1 • Introduction to PC
• Introduction to Operating System
• Booting
• Serial, Parallel, PS/2, SCSI & USB
• Hard Disk
• Optical Storage Devices
• SMPS
• UPS
• Input Devices
• Printer
• Display Interfaces & Monitor
• Multimedia
• Modem
• Backup Devices
• Viruses
• Laptop & Palmtop Computers
• Installation of Operating System
• Managing Application on Operating System
• Mail Client Configuration
• PC Assembling Practical
• Trouble Shooting

LO2 • Topology: Logical e.g. Ethernet, Token Ring; physical e.g. star, ring, bus, mesh, tree, ring.
• Protocols: Purpose of protocols; routed protocols e.g. IPv4, IPv6, IPv6 addressing, Global unicast, Multicast, Link local, Unique local, EUI 64, Auto configuration,
FTP, HTTP, SMTP, POP3, SSL; management of protocols for addressing.

LO3 • Basic Numbering Systems
• Networking Fundamentals
• Transmission Media and Networking Topologies
• Network Reference Models
• Networking Protocols
• IP Addressing
• Subnetting
• Variable Length Subnet Mask (VLSM)
• Basic Router Configuration
• Router Boot Sequence
• IP Routing
• Back Up and Restoring of Router Configuration
• Switching Concepts
• Managing Switches
• Advanced Switching Technology
• Virtual Local Area Network (VLAN)
• Inter-VLAN Routing and VLAN Trunking Protocol
• Network Security
• Access list, Extended Access List, Named Access List
• Network Address Translation (NAT)
• Wireless technologies
• Wireless Security
• IPv6
• IPv6 Routing Protocols
• WAN Technologies

LO4 • Transmission Media and Networking Topologies.
• Networking Protocols.
• IP Addressing.
• Subnetting.
• Variable Length Subnet Mask (VLSM).
• Basic Router Configuration.
• Router Boot Sequence.
• IP Routing.
• Back Up and Restoring of Router Configuration.
• Managing Switches.
• Virtual Local Area Network (VLAN).
• Inter-VLAN Routing and VLAN Trunking Protocol.
• Enabling Network Security.
• Access list, Extended Access List, Named Access. List.
• IPv6 Routing Protocols.

Attachment:- OTHM Level 4 Diploma In Information Technology.rar

Reference no: EM133071006

Questions Cloud

Indicate how much depreciation expense should be recorded : Question - At the beginning of 2020, Sheffield Company acquired equipment costing $175,600. Indicate how much depreciation expense should be recorded
Understand the software development lifecycle : Explain the importance of each stage in traditional software lifecycle approaches and deploy a functional business application to meet business requirements
How much will be musicland bad debt expense for the year : Musicland, Inc. had a $44,000 balance in Accounts Receivable and a $2,200 credit balance. How much will be Musicland Bad Debt Expense for the year
Calculate the earnings per share and price-earnings ratio : Calculate the earnings per share, price-earnings ratio, and payout ratio for the common shareholders for each of the three years
Explain the components of a modern computer : Explain the components of a modern computer and demonstrate routing and switching techniques - Configure a network using routing and switching techniques
Prepare general journal entries for the three bonds issued : Use this information to prepare General Journal entries for the three bonds issued and any interest accruals and payments for the fiscal year 2020
Record the entries related to the investment in libra ltd : The firm has developed a patent. According to my analysis, the fair value of the patent is $ 12M. Record the entries related to the investment in Libra Ltd
Evaluate the impact of common web development technologies : Evaluate the impact of common web development technologies and frameworks on website design, functionality and management
How many pizzas they need to make each month to break even : If they sell each pizza for $19.50 and pay their delivery driver $2.00 on average per pizza sold, how many pizzas do they need to make each month to break even

Reviews

Write a Review

Computer Engineering Questions & Answers

  Who needs to be on the incident response team

In today's highly connected world, cyber incidents happen on a daily basis. Every corporation from the very large to small and medium (SME) companies.

  How to accomplish goal using documented vulnerability

The primary goal of the vulnerability assessment and remediation is to identify specific, documented vulnerabilities and remediate them in a timely fashion.

  Determine the second shortest path between the vertices

Devise a strategy for determining the second shortest path between the vertices. Print out the vertices on the path, in order from start to goal

  Express limitations and current research trends in the area

Autonomous (intelligent) software agents are used in Artificial Intelligence to solve an increasing number of complex problems. explain their main applicability as well as their advantages, limitations and current research trends in the area.

  An approximation to a zero of a continuous function

provide a pseudocode for the bisection method algorithm Bise(f(x),a,b,error) for finding an approximation to a zero of a continuous function f(x) in the interval [a, b] accurate to within error.

  Discuss privacy issues related to use of biometric devices

Discuss the Privacy issues related to the use of Biometric devices and comment on a classmates report. For the remaining Assignments you must have at least 3.

  How the national security telecommunications and

how the national security telecommunications and information systems security policy nstissp national policies

  The tabular output has to include these cross-totals

Thus, each salesperson passes in between 0 and 5 sales slips per day. suppose that the information from all the slips for last month is available.

  Discuss quantitative methodology in detail

Quantitative data can be measured and documented with numbers. Additionally, quantitative data can be represented as quantities.

  Write a code fragment that prints hot

Write a code fragment that prints HOT if a variable named temp is greater than 90, mid if its from 60-90, cool if less than 60.

  Tcp and udp

UDP and TCP utilize the 1s complement for their checksums. Assume you have the following three 8-bit bytes: 01010101, 01110000, 01001100. Along with the 1s complement schema, how does receiver detect the errors?

  Write a user program to access the physical memory

Please write a user program to access the physical memory using /dev/mem. Please note that, addresses you need to use here must be physical addresses.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd