SlideShare una empresa de Scribd logo
1 de 15
Descargar para leer sin conexión
Task1. Creating
Peer to Peer
Network
To create a peer network, follow these steps for each computer
connected to the network:
1. Shut down the computer and install the network card and
appropriate cabling for each computer.
NOTE: For information about how to configure your network
adapters and physically connect your computers, consult the
documentation included with your network adapters or
contact the manufacturer(s) of your network adapters.
2. Start Windows and install the network drivers. Windows
may detect your network card and install the drivers when
you start the computer. If the network card drivers are not
included with Windows, follow the manufacturer's
instructions about how to install the network drivers.
3. Choose a client and a common protocol for each computer. To
do this, follow these steps:
a. Click Start, point to Settings, click Control Panel, and then
double-click Network.
b. Click Add, click Client, and then click Add.
c. In the Manufacturers box, click the appropriate manufacturer,
click the appropriate client in the Network Clients box, and then
click OK.
d. Click Add, click Protocol, and then click Add.
e. In the Manufacturers box, click the appropriate manufacturer,
click the appropriate protocol in the Network Protocol box, and
then click OK.
4. Configure a peer server. Each computer that is
configured for File and Printer Sharing can act as a
server. To configure a computer for File and Printer
Sharing, use the following steps:
a. Click Start, point to Settings, click Control
Panel, and then double-click Network.
b. Click File and Print Sharing, click one or both
options to share files and printers, click OK, and
then click OK again.
c. Click Yes when you are prompted to restart your
computer.
5. Give each computer a unique computer name. To do
this, use the following steps:
a. Click Start, point to Settings, click Control
Panel, and then double-click Network.
b. On the Identification tab, type a unique name
in the Computer name box.
c. Click OK, and then click Yes when you are
prompted to restart your computer.
Task 2. Using the
Internet for
Research
In this activity, you will learn how useful the Internet can be
for a PC support technician.
1. Using your own or computer laboratory, pretend that the
motherboard manual is not available and you need to replace
a faulty processor. Identify the manufacturer and model of the
motherboard by looking for the manufacturer name and
model number stamped on the board. Research the Web site
for that manufacturer. Print the list of processors the board
can support.
2. Research the Web site for your motherboard and print the
instructions for flashing BIOS.
3. Research the Abit Web site
(www.abit.com.tw) and print a
photograph of a motherboardthat has a
riser slot. Also print the photograph of
the riser card that fits this slot. What
isthe function of the riser card?
Task 1. Setting
Windows
Network
Connection
Equipment, Tools and
Materials Required:
- UTP cables
- 4 Computer units
- 1 hub
Given the following materials, set-up a
network connection on four computers.
More Security for
Remote Desktop
Task2. Analyze the situations
below and answer the questions
that follow.
When Enzo travels on company business, he finds it’s a
great help to be able to access his office computer from
anywhere on the road using Remote Desktop. However, he
wants to make sure his office computer as well as the entire
corporate network is as safe as possible. One way you can
help Enzo to add more security is to change the port that
Remote Desktop uses. Knowledgeable hackers know that
Remote Desktop uses port 3389, but if you change this port
to a secret port, hackers are less likely to find the open port.
Search the Microsoft Knowledge Base articles
(support.microsoft.com) for a way to change the port that
Remote Desktop uses. Practice implementing this change
by doing the following:
1. Set up Remote Desktop on a computer to be the host computer. Use
another computer (the client computer) to create a Remote Desktop
session to the host computer. Verify the session works by transferring
files in both directions.
2. Next, change the port that Remote Desktop uses on the host
computer to a secret port. Print a screen shot showing how you made
the change. Use the client computer to create a Remote Desktop
session to the host computer using the secret port. Print a screen shot
showing how you made the connection using the secret port. Verify
the session works by transferring files in both directions.
3. What secret port did you use?

Más contenido relacionado

La actualidad más candente

ComputerAssembly
ComputerAssemblyComputerAssembly
ComputerAssemblyjay decelo
 
Basic Computer Operation And Troubleshooting
Basic  Computer  Operation And  TroubleshootingBasic  Computer  Operation And  Troubleshooting
Basic Computer Operation And TroubleshootingPraveen Sudarsan
 
Building a computer in virtual desktop.
Building a computer in virtual desktop.Building a computer in virtual desktop.
Building a computer in virtual desktop.OriginalGSM
 
CSS L07 - Preparing the Installer
CSS L07 - Preparing the InstallerCSS L07 - Preparing the Installer
CSS L07 - Preparing the InstallerMarvin Bronoso
 
CSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEM
CSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEMCSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEM
CSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEMMarvin Bronoso
 
CSS L05 - Computer System Assembly
CSS L05 -  Computer System AssemblyCSS L05 -  Computer System Assembly
CSS L05 - Computer System AssemblyMarvin Bronoso
 
Computer hardware basic -shashank
Computer hardware basic  -shashankComputer hardware basic  -shashank
Computer hardware basic -shashanktechbed
 
Operating system windows XP
Operating system windows XPOperating system windows XP
Operating system windows XPRohan Bhatkar
 
Project on computer assembling
Project on computer assemblingProject on computer assembling
Project on computer assemblingSubhojit Paul
 

La actualidad más candente (18)

ComputerAssembly
ComputerAssemblyComputerAssembly
ComputerAssembly
 
System unit
System unitSystem unit
System unit
 
Basic Computer Operation And Troubleshooting
Basic  Computer  Operation And  TroubleshootingBasic  Computer  Operation And  Troubleshooting
Basic Computer Operation And Troubleshooting
 
Specialized Computer Systems
Specialized Computer SystemsSpecialized Computer Systems
Specialized Computer Systems
 
Building a computer in virtual desktop.
Building a computer in virtual desktop.Building a computer in virtual desktop.
Building a computer in virtual desktop.
 
UNIT 2 P8
UNIT 2 P8UNIT 2 P8
UNIT 2 P8
 
Usb
UsbUsb
Usb
 
CSS L07 - Preparing the Installer
CSS L07 - Preparing the InstallerCSS L07 - Preparing the Installer
CSS L07 - Preparing the Installer
 
Computer Assembly
Computer AssemblyComputer Assembly
Computer Assembly
 
Virginiatools
VirginiatoolsVirginiatools
Virginiatools
 
CSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEM
CSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEMCSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEM
CSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEM
 
Installation guide_Rajeev
Installation guide_RajeevInstallation guide_Rajeev
Installation guide_Rajeev
 
CSS L05 - Computer System Assembly
CSS L05 -  Computer System AssemblyCSS L05 -  Computer System Assembly
CSS L05 - Computer System Assembly
 
2.2
2.22.2
2.2
 
Computer hardware basic -shashank
Computer hardware basic  -shashankComputer hardware basic  -shashank
Computer hardware basic -shashank
 
P1 unit 2
P1 unit 2P1 unit 2
P1 unit 2
 
Operating system windows XP
Operating system windows XPOperating system windows XP
Operating system windows XP
 
Project on computer assembling
Project on computer assemblingProject on computer assembling
Project on computer assembling
 

Destacado

Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks Venkatesh Iyer
 
Peer to peer network schemes and finding algorithms
Peer to peer network schemes and finding algorithmsPeer to peer network schemes and finding algorithms
Peer to peer network schemes and finding algorithmsMohamed El Sharnoby
 
Computer Architecture - Hardware - Lesson 3 - Electricity - Eric Vanderburg
 Computer Architecture - Hardware - Lesson 3 - Electricity - Eric Vanderburg Computer Architecture - Hardware - Lesson 3 - Electricity - Eric Vanderburg
Computer Architecture - Hardware - Lesson 3 - Electricity - Eric VanderburgEric Vanderburg
 
Computer Architecture - Hardware - Lesson 8B - Display - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8B - Display - Eric VanderburgComputer Architecture - Hardware - Lesson 8B - Display - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8B - Display - Eric VanderburgEric Vanderburg
 
Computer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric Vanderburg
Computer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric VanderburgComputer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric Vanderburg
Computer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric VanderburgEric Vanderburg
 
Computer Architecture - Hardware - Lesson 4 - Motherboard - Eric Vanderburg
 Computer Architecture - Hardware - Lesson 4 - Motherboard - Eric Vanderburg Computer Architecture - Hardware - Lesson 4 - Motherboard - Eric Vanderburg
Computer Architecture - Hardware - Lesson 4 - Motherboard - Eric VanderburgEric Vanderburg
 
Computer Architecture - Hardware - Lesson 12 - Portables - Eric Vanderburg
Computer Architecture - Hardware - Lesson 12 - Portables - Eric VanderburgComputer Architecture - Hardware - Lesson 12 - Portables - Eric Vanderburg
Computer Architecture - Hardware - Lesson 12 - Portables - Eric VanderburgEric Vanderburg
 
Power point lesson 02
Power point lesson 02Power point lesson 02
Power point lesson 02heidirobison
 
Computer Architecture - Hardware - Lesson 8A - I/O Devices - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8A - I/O Devices - Eric VanderburgComputer Architecture - Hardware - Lesson 8A - I/O Devices - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8A - I/O Devices - Eric VanderburgEric Vanderburg
 
Computer Architecture - Hardware - Lesson 13 - Printers - Eric Vanderburg
Computer Architecture - Hardware - Lesson 13 - Printers - Eric VanderburgComputer Architecture - Hardware - Lesson 13 - Printers - Eric Vanderburg
Computer Architecture - Hardware - Lesson 13 - Printers - Eric VanderburgEric Vanderburg
 
Computer Architecture - Hardware - Lesson 10 - Modems - Eric Vanderburg
Computer Architecture - Hardware - Lesson 10 - Modems - Eric VanderburgComputer Architecture - Hardware - Lesson 10 - Modems - Eric Vanderburg
Computer Architecture - Hardware - Lesson 10 - Modems - Eric VanderburgEric Vanderburg
 
Computer Architecture - Hardware - Lesson 5 - Memory - Eric Vanderburg
Computer Architecture - Hardware - Lesson 5 - Memory - Eric VanderburgComputer Architecture - Hardware - Lesson 5 - Memory - Eric Vanderburg
Computer Architecture - Hardware - Lesson 5 - Memory - Eric VanderburgEric Vanderburg
 
Quick Faq - Erasure Coding
Quick Faq - Erasure Coding Quick Faq - Erasure Coding
Quick Faq - Erasure Coding Western Digital
 
Introducing ppt 2010
Introducing ppt 2010Introducing ppt 2010
Introducing ppt 2010Frya Lora
 
Kto12 tle ict computer hardware servicing
Kto12 tle ict computer hardware servicingKto12 tle ict computer hardware servicing
Kto12 tle ict computer hardware servicingAlvin Francisco
 
K-12 Grade 9 - Computer Hardware Servicing ICT Learning Material
K-12 Grade 9 - Computer Hardware Servicing ICT Learning MaterialK-12 Grade 9 - Computer Hardware Servicing ICT Learning Material
K-12 Grade 9 - Computer Hardware Servicing ICT Learning Materialparagatol258
 
Computer Architecture - Hardware - Lesson 11 - Networking - Eric Vanderburg
Computer Architecture - Hardware - Lesson 11 - Networking - Eric VanderburgComputer Architecture - Hardware - Lesson 11 - Networking - Eric Vanderburg
Computer Architecture - Hardware - Lesson 11 - Networking - Eric VanderburgEric Vanderburg
 
Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...
Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...
Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...Eric Vanderburg
 

Destacado (20)

Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks
 
Peer to peer network schemes and finding algorithms
Peer to peer network schemes and finding algorithmsPeer to peer network schemes and finding algorithms
Peer to peer network schemes and finding algorithms
 
Computer Architecture - Hardware - Lesson 3 - Electricity - Eric Vanderburg
 Computer Architecture - Hardware - Lesson 3 - Electricity - Eric Vanderburg Computer Architecture - Hardware - Lesson 3 - Electricity - Eric Vanderburg
Computer Architecture - Hardware - Lesson 3 - Electricity - Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 8B - Display - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8B - Display - Eric VanderburgComputer Architecture - Hardware - Lesson 8B - Display - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8B - Display - Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric Vanderburg
Computer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric VanderburgComputer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric Vanderburg
Computer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 4 - Motherboard - Eric Vanderburg
 Computer Architecture - Hardware - Lesson 4 - Motherboard - Eric Vanderburg Computer Architecture - Hardware - Lesson 4 - Motherboard - Eric Vanderburg
Computer Architecture - Hardware - Lesson 4 - Motherboard - Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 12 - Portables - Eric Vanderburg
Computer Architecture - Hardware - Lesson 12 - Portables - Eric VanderburgComputer Architecture - Hardware - Lesson 12 - Portables - Eric Vanderburg
Computer Architecture - Hardware - Lesson 12 - Portables - Eric Vanderburg
 
Power point lesson 02
Power point lesson 02Power point lesson 02
Power point lesson 02
 
Computer Architecture - Hardware - Lesson 8A - I/O Devices - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8A - I/O Devices - Eric VanderburgComputer Architecture - Hardware - Lesson 8A - I/O Devices - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8A - I/O Devices - Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 13 - Printers - Eric Vanderburg
Computer Architecture - Hardware - Lesson 13 - Printers - Eric VanderburgComputer Architecture - Hardware - Lesson 13 - Printers - Eric Vanderburg
Computer Architecture - Hardware - Lesson 13 - Printers - Eric Vanderburg
 
1.4 network
1.4 network1.4 network
1.4 network
 
Computer Architecture - Hardware - Lesson 10 - Modems - Eric Vanderburg
Computer Architecture - Hardware - Lesson 10 - Modems - Eric VanderburgComputer Architecture - Hardware - Lesson 10 - Modems - Eric Vanderburg
Computer Architecture - Hardware - Lesson 10 - Modems - Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 5 - Memory - Eric Vanderburg
Computer Architecture - Hardware - Lesson 5 - Memory - Eric VanderburgComputer Architecture - Hardware - Lesson 5 - Memory - Eric Vanderburg
Computer Architecture - Hardware - Lesson 5 - Memory - Eric Vanderburg
 
Peer to-peer networks
Peer to-peer networksPeer to-peer networks
Peer to-peer networks
 
Quick Faq - Erasure Coding
Quick Faq - Erasure Coding Quick Faq - Erasure Coding
Quick Faq - Erasure Coding
 
Introducing ppt 2010
Introducing ppt 2010Introducing ppt 2010
Introducing ppt 2010
 
Kto12 tle ict computer hardware servicing
Kto12 tle ict computer hardware servicingKto12 tle ict computer hardware servicing
Kto12 tle ict computer hardware servicing
 
K-12 Grade 9 - Computer Hardware Servicing ICT Learning Material
K-12 Grade 9 - Computer Hardware Servicing ICT Learning MaterialK-12 Grade 9 - Computer Hardware Servicing ICT Learning Material
K-12 Grade 9 - Computer Hardware Servicing ICT Learning Material
 
Computer Architecture - Hardware - Lesson 11 - Networking - Eric Vanderburg
Computer Architecture - Hardware - Lesson 11 - Networking - Eric VanderburgComputer Architecture - Hardware - Lesson 11 - Networking - Eric Vanderburg
Computer Architecture - Hardware - Lesson 11 - Networking - Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...
Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...
Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...
 

Similar a Creating peer to peer network nadia perandos bisnar

B Sc IT II Sem NHSB Networking For Home And Small Business Amity University
B Sc IT II Sem NHSB Networking For Home And Small Business Amity UniversityB Sc IT II Sem NHSB Networking For Home And Small Business Amity University
B Sc IT II Sem NHSB Networking For Home And Small Business Amity UniversityKanhaiya Murarka
 
Bluetooth quick start_guide / Controlanything India
Bluetooth quick start_guide / Controlanything IndiaBluetooth quick start_guide / Controlanything India
Bluetooth quick start_guide / Controlanything IndiaDcube Tech Ventures
 
Taishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_LabTaishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_LabTaishaun Owens
 
manual vvtk camera_st7501
manual vvtk camera_st7501manual vvtk camera_st7501
manual vvtk camera_st7501TSOLUTIONS
 
Step by-step guide-to_getting_started_with_hyper-v
Step by-step guide-to_getting_started_with_hyper-vStep by-step guide-to_getting_started_with_hyper-v
Step by-step guide-to_getting_started_with_hyper-vPSD Solutions .....
 
Wfc878r eop hwsg_npd6407-00_en
Wfc878r eop hwsg_npd6407-00_enWfc878r eop hwsg_npd6407-00_en
Wfc878r eop hwsg_npd6407-00_enHerrySyafitri
 
Installing modem,printer.47
Installing modem,printer.47Installing modem,printer.47
Installing modem,printer.47myrajendra
 
Pc hardware course work
Pc hardware course workPc hardware course work
Pc hardware course workIsmail Mukiibi
 
Final exam results
Final exam resultsFinal exam results
Final exam resultsDale Vick
 
Chapter 12 - Computer Trouble Shooting Purchase a PC.ppt
Chapter 12 - Computer Trouble Shooting Purchase a PC.pptChapter 12 - Computer Trouble Shooting Purchase a PC.ppt
Chapter 12 - Computer Trouble Shooting Purchase a PC.pptRadziahSalleh4
 
Dreamweaver cs5.5 read me
Dreamweaver cs5.5 read meDreamweaver cs5.5 read me
Dreamweaver cs5.5 read mejosephegojocruz
 
Troubleshooting guide
Troubleshooting guideTroubleshooting guide
Troubleshooting guidejameszzzz
 
Troubleshooting guide
Troubleshooting guideTroubleshooting guide
Troubleshooting guidejameszzzzz
 
itft_Installing windows 2003
itft_Installing windows 2003 itft_Installing windows 2003
itft_Installing windows 2003 Swati Aggarwal
 

Similar a Creating peer to peer network nadia perandos bisnar (20)

B Sc IT II Sem NHSB Networking For Home And Small Business Amity University
B Sc IT II Sem NHSB Networking For Home And Small Business Amity UniversityB Sc IT II Sem NHSB Networking For Home And Small Business Amity University
B Sc IT II Sem NHSB Networking For Home And Small Business Amity University
 
Bluetooth quick start_guide / Controlanything India
Bluetooth quick start_guide / Controlanything IndiaBluetooth quick start_guide / Controlanything India
Bluetooth quick start_guide / Controlanything India
 
Taishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_LabTaishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_Lab
 
manual vvtk camera_st7501
manual vvtk camera_st7501manual vvtk camera_st7501
manual vvtk camera_st7501
 
Computer Problems
Computer ProblemsComputer Problems
Computer Problems
 
SCCM HOw to
SCCM HOw toSCCM HOw to
SCCM HOw to
 
Step by-step guide-to_getting_started_with_hyper-v
Step by-step guide-to_getting_started_with_hyper-vStep by-step guide-to_getting_started_with_hyper-v
Step by-step guide-to_getting_started_with_hyper-v
 
Presentation1
Presentation1Presentation1
Presentation1
 
computing networks and operating system
computing networks and operating system computing networks and operating system
computing networks and operating system
 
Wfc878r eop hwsg_npd6407-00_en
Wfc878r eop hwsg_npd6407-00_enWfc878r eop hwsg_npd6407-00_en
Wfc878r eop hwsg_npd6407-00_en
 
Installing modem,printer.47
Installing modem,printer.47Installing modem,printer.47
Installing modem,printer.47
 
Pc hardware course work
Pc hardware course workPc hardware course work
Pc hardware course work
 
Final exam results
Final exam resultsFinal exam results
Final exam results
 
Chapter 12 - Computer Trouble Shooting Purchase a PC.ppt
Chapter 12 - Computer Trouble Shooting Purchase a PC.pptChapter 12 - Computer Trouble Shooting Purchase a PC.ppt
Chapter 12 - Computer Trouble Shooting Purchase a PC.ppt
 
Dreamweaver cs5.5 read me
Dreamweaver cs5.5 read meDreamweaver cs5.5 read me
Dreamweaver cs5.5 read me
 
Girl Gets Ring
Girl Gets RingGirl Gets Ring
Girl Gets Ring
 
Troubleshooting guide
Troubleshooting guideTroubleshooting guide
Troubleshooting guide
 
Troubleshooting guide
Troubleshooting guideTroubleshooting guide
Troubleshooting guide
 
MDT Step public
MDT Step publicMDT Step public
MDT Step public
 
itft_Installing windows 2003
itft_Installing windows 2003 itft_Installing windows 2003
itft_Installing windows 2003
 

Más de Perla Pelicano Corpez

Silvestre T. Lumarda - The Working Mayor of the Booming Municipality of Inopacan
Silvestre T. Lumarda - The Working Mayor of the Booming Municipality of InopacanSilvestre T. Lumarda - The Working Mayor of the Booming Municipality of Inopacan
Silvestre T. Lumarda - The Working Mayor of the Booming Municipality of InopacanPerla Pelicano Corpez
 
1 c. functions, roles and skills of a manager2
1 c. functions, roles and skills of a manager21 c. functions, roles and skills of a manager2
1 c. functions, roles and skills of a manager2Perla Pelicano Corpez
 
1. external factors that affects business environment
1. external factors that affects business environment1. external factors that affects business environment
1. external factors that affects business environmentPerla Pelicano Corpez
 

Más de Perla Pelicano Corpez (20)

Adjusted ESIP FINAL 2016-2019
Adjusted ESIP FINAL 2016-2019Adjusted ESIP FINAL 2016-2019
Adjusted ESIP FINAL 2016-2019
 
Training design on SIM development
Training design on SIM developmentTraining design on SIM development
Training design on SIM development
 
Project VILMA of Tinago NHS
Project VILMA of Tinago NHSProject VILMA of Tinago NHS
Project VILMA of Tinago NHS
 
Silvestre T. Lumarda - The Working Mayor of the Booming Municipality of Inopacan
Silvestre T. Lumarda - The Working Mayor of the Booming Municipality of InopacanSilvestre T. Lumarda - The Working Mayor of the Booming Municipality of Inopacan
Silvestre T. Lumarda - The Working Mayor of the Booming Municipality of Inopacan
 
27. nature of directing
27. nature of directing27. nature of directing
27. nature of directing
 
24. movements of employees
24. movements of employees24. movements of employees
24. movements of employees
 
21. compensation and wages
21. compensation and wages21. compensation and wages
21. compensation and wages
 
16. theories of organization
16. theories of organization16. theories of organization
16. theories of organization
 
10. scope+and+nature+of+planning
10. scope+and+nature+of+planning10. scope+and+nature+of+planning
10. scope+and+nature+of+planning
 
9. forms of business organization
9. forms of business organization9. forms of business organization
9. forms of business organization
 
8. pestle analysis
8. pestle analysis8. pestle analysis
8. pestle analysis
 
6. internal and external analysis
6. internal and external analysis6. internal and external analysis
6. internal and external analysis
 
2. personal swot analysis
2. personal swot analysis2. personal swot analysis
2. personal swot analysis
 
1 c. functions, roles and skills of a manager2
1 c. functions, roles and skills of a manager21 c. functions, roles and skills of a manager2
1 c. functions, roles and skills of a manager2
 
1 b. functions of manager
1 b. functions of manager1 b. functions of manager
1 b. functions of manager
 
1 a. functions of management
1 a. functions of management1 a. functions of management
1 a. functions of management
 
1. external factors that affects business environment
1. external factors that affects business environment1. external factors that affects business environment
1. external factors that affects business environment
 
Organizing
 Organizing Organizing
Organizing
 
Two letter scrabble words
Two letter scrabble wordsTwo letter scrabble words
Two letter scrabble words
 
7 letter scrabble q words
7 letter scrabble q words7 letter scrabble q words
7 letter scrabble q words
 

Último

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 

Último (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Creating peer to peer network nadia perandos bisnar

  • 1. Task1. Creating Peer to Peer Network
  • 2. To create a peer network, follow these steps for each computer connected to the network: 1. Shut down the computer and install the network card and appropriate cabling for each computer. NOTE: For information about how to configure your network adapters and physically connect your computers, consult the documentation included with your network adapters or contact the manufacturer(s) of your network adapters. 2. Start Windows and install the network drivers. Windows may detect your network card and install the drivers when you start the computer. If the network card drivers are not included with Windows, follow the manufacturer's instructions about how to install the network drivers.
  • 3. 3. Choose a client and a common protocol for each computer. To do this, follow these steps: a. Click Start, point to Settings, click Control Panel, and then double-click Network. b. Click Add, click Client, and then click Add. c. In the Manufacturers box, click the appropriate manufacturer, click the appropriate client in the Network Clients box, and then click OK. d. Click Add, click Protocol, and then click Add. e. In the Manufacturers box, click the appropriate manufacturer, click the appropriate protocol in the Network Protocol box, and then click OK.
  • 4. 4. Configure a peer server. Each computer that is configured for File and Printer Sharing can act as a server. To configure a computer for File and Printer Sharing, use the following steps: a. Click Start, point to Settings, click Control Panel, and then double-click Network. b. Click File and Print Sharing, click one or both options to share files and printers, click OK, and then click OK again. c. Click Yes when you are prompted to restart your computer.
  • 5. 5. Give each computer a unique computer name. To do this, use the following steps: a. Click Start, point to Settings, click Control Panel, and then double-click Network. b. On the Identification tab, type a unique name in the Computer name box. c. Click OK, and then click Yes when you are prompted to restart your computer.
  • 6. Task 2. Using the Internet for Research
  • 7. In this activity, you will learn how useful the Internet can be for a PC support technician. 1. Using your own or computer laboratory, pretend that the motherboard manual is not available and you need to replace a faulty processor. Identify the manufacturer and model of the motherboard by looking for the manufacturer name and model number stamped on the board. Research the Web site for that manufacturer. Print the list of processors the board can support. 2. Research the Web site for your motherboard and print the instructions for flashing BIOS.
  • 8. 3. Research the Abit Web site (www.abit.com.tw) and print a photograph of a motherboardthat has a riser slot. Also print the photograph of the riser card that fits this slot. What isthe function of the riser card?
  • 10. Equipment, Tools and Materials Required: - UTP cables - 4 Computer units - 1 hub
  • 11. Given the following materials, set-up a network connection on four computers.
  • 12.
  • 13. More Security for Remote Desktop Task2. Analyze the situations below and answer the questions that follow.
  • 14. When Enzo travels on company business, he finds it’s a great help to be able to access his office computer from anywhere on the road using Remote Desktop. However, he wants to make sure his office computer as well as the entire corporate network is as safe as possible. One way you can help Enzo to add more security is to change the port that Remote Desktop uses. Knowledgeable hackers know that Remote Desktop uses port 3389, but if you change this port to a secret port, hackers are less likely to find the open port. Search the Microsoft Knowledge Base articles (support.microsoft.com) for a way to change the port that Remote Desktop uses. Practice implementing this change by doing the following:
  • 15. 1. Set up Remote Desktop on a computer to be the host computer. Use another computer (the client computer) to create a Remote Desktop session to the host computer. Verify the session works by transferring files in both directions. 2. Next, change the port that Remote Desktop uses on the host computer to a secret port. Print a screen shot showing how you made the change. Use the client computer to create a Remote Desktop session to the host computer using the secret port. Print a screen shot showing how you made the connection using the secret port. Verify the session works by transferring files in both directions. 3. What secret port did you use?