Preview

Lab6 7 8 9

Satisfactory Essays
Open Document
Open Document
425 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab6 7 8 9
Adam Liles
11/4/14
NT1110
Lab 6, 7, 8, 9
Lab 6
To get to the “Add Hardware” on Windows 8 you must go to the home and go to the search button. There, you type in Add Hardware and Device Manager will pop up.
To get to the “Add or Remove Program” on Windows 8 you go to home and search Uninstall Programs.
Internet Options is found by going to your home screen on Windows 8 and type into the search box “Internet Options” and the screen will pop up.

Lab 7
1. Windows 95 supports full and incremental, but it does not support differential. Incremental and differential rely on full backup.
2. Because if something were to happen to the computer the backups wouldn’t be gone with the computer.
3. The backup site does not have to do with the temperature of the site. It has to do with the crucial effort used to do operations.

Lab 8
The error is for her keyboard. She needs to check to see if it is plugged in right. If that doesn’t work she needs to turn her computer off, disconnect the keyboard and verify that there are no bends, burns, or broken pins on the connector. She then needs to plug the keyboard in and turn it back on. If that doesn’t work she then needs to try the keyboard on another computer.
The other user has a “Test 8742 Keyboard Controller” error. He needs to do the same as the following user.

Lab 9

When I open IE. I see a search box. When I type IPCONFIG /RENEW it tells me No operation can be performed on Local Area Connection* 2 while it has its media disconnected. When I type IPCONFIG /ALL, A whole list of connections and my IP pop up.

Network Property
Actual Value
Purpose
IP Address
192.168.1.114
To track a computers location.
Subnet Mask
255.255.255.0
Used to determine what subnet my IP belongs to.
Default Gateway
191.168.1.1
Network software uses this when my IP does not match any routes on routing chart.
Physical Address
90-48-9A-7D-89-02
Is what is used to represent in the form of a binary number for the address bus.
DHCP Server
191.168.1.1

You May Also Find These Documents Helpful

  • Good Essays

    d. A 5KVA APD UPS provides power backup for the entire backbone computer system at La Jolla.…

    • 912 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Primary hardware that must have a backup to ensure availability is the web server and the database server. In addition to having a primary and a backup of each of these two servers a replication server must also be implemented into the architecture in order for the databases on each server to mirror each other. With proper planning and implementation of this system if the primary servers have a failure there will not be any interruption of service to the customer who is accessing the…

    • 2777 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    the first one? Because it only backed up the changes I made since the last backup. Incremental…

    • 776 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    In a computer network internet protocol is used for communication, to each device such as printers and computers a numerical label called an IP (Internet Protocol) Address is assigned. There are two functions of an IP Address a host or network interface identification, and also provides a location addressing. The basic elements of a network are the IP Address and Subnet Mask. There is also switching and routing which after you connect devices to switches and routers, data packets can be moved across the network. The Internet Protocol Version 4 (known as IPv4) is a protocol highly used even today, this IP Address consist of a 32-bit number in decimal or binary in four parts. In 1995 Internet Protocol Version 6 (known as IPv6) was created due to a high growth of the Internet, and the reduction of…

    • 413 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 6 Assignment 1

    • 228 Words
    • 1 Page

    1. How much data has been modified between the last back and the time of failure?…

    • 228 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Ch09 Solutions

    • 1016 Words
    • 5 Pages

    9. In Figure 15-9, the subnet mask is four notches tall and is considered a classless subnet…

    • 1016 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab 18

    • 425 Words
    • 2 Pages

    Rob calls the help desk to report that he cannot access any websites on the Internet. While he is still on the phone, you have him try to access a file on his departmental server. In both cases, his attempts fail. Troubleshoot Rob’s computer and determine why he is unable to access the network. The troubleshooting process will be completed when you are able to access the network using Rob’s computer.Completion time20 minutes…

    • 425 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Comp230 wk 1 ilab

    • 760 Words
    • 4 Pages

    Copy and paste the specified ipconfig /all command output from the Windows CLI into the Task 1 box provided below.…

    • 760 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Comp 230 Windows Cli

    • 1077 Words
    • 5 Pages

    NOTE: Please use Carriage Returns and Page Breaks as needed to prevent box contents from extending across page boundaries.…

    • 1077 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    The best time to perform a backup is when the network is at its lowest point of usage this is most probably when the business is closed. Because if you tried to back up the data when people are on the network it will degrade the speed in the network a lot and any data save while the backup is running will not be backed up.…

    • 935 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Chapter 8 LINUX Answers

    • 1190 Words
    • 5 Pages

    4. Which of the following can you restore from a backup tape made via the dump…

    • 1190 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    Answer: Yes, WinAudit is a portable Application. Because if you’re conducting audits on several computers, having the app on a Flash Drive can make the process much easier and more time efficient.…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    1. What are some common risks, and vulnerabilities commonly found in the System/Application Domain that must be mitigated with proper security countermeasures?…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Internet Information Services enables you to configure websites to use specific port numbers. This makes it possible to test the functionality of Windows Firewall.…

    • 970 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Lesson 1

    • 457 Words
    • 2 Pages

    1 For a computer to be accessible from the Internet, it must have an IP address that is both Registered and Uniqe.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays