Preview

Comp230 Week4 Essay Example

Satisfactory Essays
Open Document
Open Document
926 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Comp230 Week4 Essay Example
Student Name | name | Class | COMP230 | Date | 06-01-13 | VBScript IP Array Report In the space provided below, copy and paste your VBScript Program Code. If it doesn’t fit, use the next page for the continuation of your sourcecode program ' VBScript: IP_Array.vbs ' Written by: name ' Date: June 02, 2013 ' Class: COMP230 ' Professor: ' =================================== ' This initialize a 2-dimension array ' of IP Address. The first index +100 ' is the room# and the second index+1 ' is the computer# in the room. dim ipAddress(5,3) ipAddress(0,0)="192.168.10.11" ipAddress(0,1)="192.168.10.12" ipAddress(0,2)="192.168.10.13" ipAddress(0,3)="192.168.10.14" ipAddress(1,0)="192.168.10.19" ipAddress(1,1)="192.168.10.20" ipAddress(1,2)="192.168.10.21" ipAddress(1,3)="192.168.10.22" ipAddress(2,0)="192.168.10.27" ipAddress(2,1)="192.168.10.28" ipAddress(2,2)="192.168.10.29" ipAddress(2,3)="192.168.10.30" ipAddress(3,0)="192.168.10.35" ipAddress(3,1)="192.168.10.36" ipAddress(3,2)="192.168.10.37" ipAddress(3,3)="192.168.10.38" ipAddress(4,0)="192.168.10.43" ipAddress(4,1)="192.168.10.44" ipAddress(4,2)="192.168.10.45" ipAddress(4,3)="192.168.10.46" ipAddress(5,0)="192.168.10.51" ipAddress(5,1)="192.168.10.52" ipAddress(5,2)="192.168.10.53" ipAddress(5,3)="192.168.10.54" Define Script Variable roomStr="" compStr="" room=0

You May Also Find These Documents Helpful

  • Satisfactory Essays

    These are the system binary files that the system needs to run for all users…

    • 627 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    * Domain members rely heavily on DNS services to locate domain resources. For example, when a domain-joined computer boots, it queries domain Service Locator records (SRV) in DNS to locate a Domain Controller against which to authenticate. Without a local DNS instance, this process has to take place over a potentially slow site link. Of course, once a computer has located a Domain Controller, it will continue to authenticate against that server until it something forces the client to find another DC.…

    • 636 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 2 Essay

    • 418 Words
    • 2 Pages

    The Application Layer is launched when an application operation starts. It starts the communication with another computer when an application starts. It is in software packages that use client-server software. Examples of services within this layer are DNS, web browser, and NFS.…

    • 418 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Comp230 Wk 5 Lab

    • 411 Words
    • 2 Pages

    Copy your Mod1_PCTests.vbs program from NotePad++ and paste it into the space provided below. Any portion of the script that will not fit should be continued in the textbox on the next page.…

    • 411 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Comp230 Week 5

    • 1799 Words
    • 8 Pages

    Student Name | Class | COMP230 | Date | | VBScript Modular Lab Report ' Menu Driven Computer / Network Tests ' This VBScript program is run using the PC_Tests.cmd Batch Script Set args = WScript. Arguments WScript. Echo vbCrLf Select Case args. Item(0) Case "1" Call System_Information Case"2" Call System_Memory_Size Case "3" Call OS_Version Case "4" Call Printers_Status Case "5" Call Logical_HDD_Information End Select…

    • 1799 Words
    • 8 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Essay

    • 443 Words
    • 2 Pages

    Define client/server computing, packet switching, and TCP/IP. Explain how these three things make the Internet so powerful and robust.…

    • 443 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Nt1330 Unit 1 Essay

    • 601 Words
    • 3 Pages

    The number one web based attack of 2009 was Malicious PDF activity 49% of web based attacks--attempts to deliver malicious pdf content to victims through the web. The pdf attack is designed to exploit arbitrary vulnerabilities in applications that are able to process pdf’s. A successful pdf attack could compromise the integrity and security of affected computers. (Symantec Corporation, 2009)…

    • 601 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Research definitions using the Internet, You will write a definition of each term and provide at least two examples of the component or technology. Provide citations and references for all resources.…

    • 429 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Comp230 W2 Ilab

    • 1120 Words
    • 5 Pages

    WriteLine("End of Program") Copy your NameAge.vbs program from…

    • 1120 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    This paper will be an analysis of articles and the psychological concepts that the authors of these articles were researching. This paper will also discuss the types of research and studies that the authors used to investigate those concepts. In addition this paper will examine relationships between the consumer psychology and the marketing communications.…

    • 1029 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Comp230 iLab solutions

    • 855 Words
    • 6 Pages

    Host Name . . . . . . . . . . . . : vlab-PC1…

    • 855 Words
    • 6 Pages
    Better Essays
  • Best Essays

    Nt1310 Unit 1 Essay

    • 3319 Words
    • 14 Pages

    According to Roberts and Foehr (2006) 33% of children under six have a television in their room, while 5% of children in the same age group have a personal computer in their room. Those numbers jump to 68% for television and 31% for computers when children reach the age of 8. As those numbers continue to rise and portable media like digital music players, cell phones, and portable video game players become more ubiquitous it is important to examine the possible effects of having media in a child’s bedroom and children using media alone in their room (Gutnick, et al, 2011).…

    • 3319 Words
    • 14 Pages
    Best Essays
  • Satisfactory Essays

    IP Array

    • 644 Words
    • 5 Pages

    In the space provided below, copy and paste your IP_Array.vbs Program Code. If it doesn’t…

    • 644 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    java networking

    • 792 Words
    • 4 Pages

    SocketAddress - provides an immutable object used by sockets for binding, connecting, or as returned values. (Abstract class (used with InetAddress))…

    • 792 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Hello, I have a combo box to select the ID, then it will display the particular record from from the database into the text boxes. And now I'm trying to make a update command button. Then I can just change the record which displaying in the text box. And click update, then the record will be updated in the database. But my cmdUpdate_Click() statement seems doesn't work. Anyone can help please? Cheers…

    • 383 Words
    • 2 Pages
    Satisfactory Essays