Self Checks - Administer Network Peripherals

March 28, 2018 | Author: Tom Patrick Dacayo | Category: Computer Network, Personal Computers, Printer (Computing), Image Scanner, Computer Networking


Comments



Description

ICAS3121B Administer Network Peripherals Patrick DacayoICAS3121B Administer Network Peripherals Self Check Question 1: Planning the installation of peripherals When planning and connecting peripherals you need to consider a number of points. For each peripheral named in the left column of the table below, choose from the pool of factors that should be considered when attaching the peripheral. A factor may be used more than once. Factors to choose from Network point Space around peripheral Sturdy, level surface Ventilation Ease of access for users Arrange so the peripheral does not encroach on the user’s workspace Ensure the user is centred on the screen for the receiver’s view. Ease of installation and maintenance Direct view point to reduce glare Distance from computer Table 1: Factors relating to placement of peripheral devices Peripheral Network connected printer Factors relating to peripheral Network point Sturdy, level surface Space around peripheral Ease of access for users Ease of installation and maintenance Host connected printer Arrange so the peripheral does not encroach on the user’s workspace Ease of access for users Ease of installation and maintenance Distance from computer Scanner Arrange so the peripheral does not encroach on the user’s workspace Distance from computer Ease of access for users Ease of installation and maintenance Ensure the user is centred on the screen for the receiver’s view. Distance from computer Ease of access for users Arrange so the peripheral does not encroach on the user’s workspace Distance from computer Webcam Speakers 56 cm Colour copying speed B&W/Colour: 19 char/min Document reduce/enlarge: 25% 400% Auto-duplex copying: Included Monthly duty volume: 10 000 First copy out time: 8 sec Max H-resolution/Max V-resolution: 300 dpi/300 dpi Modem/Comm: Fax/modem Integrated Scanner type: Flatbed scanner integrated Scan mode: Single-pass Interpolated resolution optical/Interpolated resolution: 600dpi/ 9600dpi Sample max grey depth: 8-bit (256 grey levels) Sample max colour depth: 24-bit (16. Peripherals list to choose from Mouse Keyboard Monitor Printer Speakers Digital camera Scanner External hard disk Table 2: Peripheral specifications Specification 1 Diagonal size: 43 cm Height/Width/Depth: 39 cm/37. Unix. Mac.3 cm/11.4 cm/18.5 cm: 35. automatic backup Capacity: 160 GB Specification 3 Type: 2-way Sensitivity: 90 dB Magnetic shield: Yes THX certified: Yes Specification 4 Compatibility: PC. RCA Weight: 6.ICAS3121B Administer Network Peripherals Patrick Dacayo Network attached storage device – hard disk Network point Ease of access for users Question 2: Peripheral specifications Using the list of peripherals given. match each one to one of the specifications sets in the following table.7M colours) Max output power: 150 Watt Connector type: XLR. TRS.3 kilograms Feature: Front-firing subwoofer Peripheral Printer Interface type: Hi-speed USB Average seek time: 9 ms Cable included: 1 USB cable external Voltage required: 50/60 Hz Peripheral Speakers Max vertical view angle: +70/-70 Max horizontal view angle: +80/-80 Max sync rate (V x H): 76 Hz x 82 KHz Analogue video signal: RGB Peripheral External Hard Disk Peripheral Monitor . Mac Height/Width/Depth: 3.3 cm Software type: Drivers & utilities.61 cm/52 cm Max doc size: 21. brightness.5 cm/54. H/V position Max resolution: 1280 x 1024 Dot pitch: 0. One peripheral belongs to each of the four specifications.6 cm/20 cm Controls: Volume. Linux Height/Width/Depth: 49.264 mm Specification 2 Compatibility: PC. TRUE Question 7: Answer true or false – Firewire is a standard for high-speed communications and data transfer.ICAS3121B Administer Network Peripherals Patrick Dacayo Feeder capacity: 250 sheets Question 3: Answer true or false . WS – Work station. For file servers and workstations a 3-digit number. Part of name First 2 characters Next 2 characters Next 2 characters Describing Type of device Location Department Examples FS – File server. TRUE Question 8: Answer true or false .A printer can be attached to a computer using a serial cable. HO – Hobart. TRUE Question 6: Answer true or false . TRUE Question 5: Answer true or false . model name and the location. and then by width. Question 2: Naming peripherals Assume that the standards below are in use and apply them to answer the questions following.The size of the viewing area of a monitor is usually measured by height. FALSE Question 4: Answer true or false . HR – Human resources CC – Call centre For subsequent characters. the manufacturer. For .A printer can be attached directly to the network using a parallel cable.USB connections eliminate the need for a variety of connections to be made available on a computer to attach peripherals. DA – Darwin AC – Accounts. FALSE Self Check Question 1: Creating a name system for a printer What do you think could be incorporated in the name of a printer? The DEET of the school.Many peripherals are attached to a host computer through the attachment on an adapter card.A scanner can be attached directly to a network. PR – Printer SY – Sydney. It was developed by Apple Computer and is similar to USB connections on other computers. TRUE Question 9: Answer true or false . depends upon item. which is attached to the computer’s main board (or motherboard) PCI (Peripheral Component Interface) slot. Everyone can design their own templates to ensure their own work is consistent. but their jobs are not always urgent. but always have urgent jobs. What groups would you set up for the printer. a) What would be the name of the HP8150 used by the HR department in Sydney? PRSYHR HP8150 b) What would be the name of the network-attached storage hard disk device in the IT department in Perth? FSPEIT NAS c) What would be the name of the IBM network printer used by the accounts department in Penrith? PRSYAC Printer Question 3: Advantages in limiting access to a peripheral Why would you want to restrict access to a printer? It allows you to easily control the printing quota and it makes sure that only staffs or any other designated people can use the printer. Staff in accounts use it infrequently. everything should be cleaned and consumables replaced in busy organisations. but only two of them print urgent jobs infrequently. Managers also use it infrequently. Question 2: Templates are use to ensure the following (select all that apply):     Consistency in the layout and presentation of documents. Being stored in personal folders means staff can access them easily. Most of the general staff use it heavily. up to 8 characters can uniquely describe the printer type.ICAS3121B Administer Network Peripherals Patrick Dacayo printers. Self Check Question 1: When do computer peripherals require maintenance? (Select all that apply)     When the technician is prepared. Every month. Question 3: Assigning priorities Thirty staff share a printer. Essential information can be included on a template to ensure it is always present when creating a new document. In accord with the instructions in the vendor’s manual. Printers usually require toner replacements after a specific number of pages have been printed. and how would you assign priorities . Staff Group/normal priority Leave the groups as they are and set no priorities Accounts Group/high priority. b) What information should inform the design of a training plan? What an organisation wants from training What skills they have now and what they need in the future What resources have they set aside for the training .ICAS3121B Administer Network Peripherals Patrick Dacayo to the groups?     Accounts Group/high priority. Managers’ Group/normal priority. Question 2: Answer true or false: One-to-one instruction is most useful when teaching theoretical concepts. what is a training plan? A training plan is the instructor’s road map to his/her customer’s training. Which roles would a one-to-one trainer need to play? (Check the boxes. Staff Group/normal priority. Staff Group/normal priority Self Check Question 1: One-to one instruction To provide good instruction. FALSE Question 3: Planning a) In the context of providing one-to-one or small group training. Managers’ Group/normal priority. It contains all the details such as which skills they need to learn and the time frame for the training.)  Facilitator  Evaluator  Writer  Mentor  Advisor  needs analyst  administrator  motivator. a trainer needs to play many roles. Managers’ Group/low priority. as listed below. Staff Urgent Group/high priority Accounts Group/high priority. ICAS3121B Administer Network Peripherals Patrick Dacayo What approaches to training are appropriate Question 4: Getting feedback on training What feedback techniques can an instructor use to evaluate the effectiveness of the training? Ask the clients some questions related to the training and request for an immediate feedback. Provide surveys/questionnaires for the clients to fill up.An un-interruptible power supply (UPS) does not form part of a preventative maintenance program. Question 2: A preventative maintenance program is used by a business to:     Extend the warranty on equipment purchased.The protecting environment that a computer works in should be part of a preventative maintenance program. Get the clients to perform a task related to the training and observe them. FALSE Question 4: Answer true or false . You can then analyse the results and you can see which areas of the training can be improved. - Self Check Question 1: SLA stands for:     Synchronous language algorithm Service level agreement Standard language acronym Serial line authentication. TRUE Question 5: Key elements of a maintenance program Identify the key elements of a maintenance program by doing the following drag-and-drop . Gain extra performance from a piece of equipment Ensure that a piece of equipment meets their needs Maximise the life of equipment in a cost effective manner Question 3: Answer true or false . Record your observations and results as you can use them to analyse whether they have acquired the necessary skills. Sort each of the PC components listed below according to whether they require preventative maintenance or do not require preventative maintenance. Maintenance program: Meets OH&S guidelines Elements: Include every device in the organisation Cost effectiveness Maintenance schedule Meets business needs Only include items out of warranty Question 6: Preventative maintenance Identify the components of a PC that require preventative maintenance by doing the following drag-and-drop activity.ICAS3121B Administer Network Peripherals Patrick Dacayo activity. identify the four elements that should be part of a maintenance program. Preventative maintenance required: Hard disk drive Keyboard Optical mouse PC component: No preventative maintenance required: DVD/CD drive CPU Floppy disk drive RAM . From the Elements column below. Write them down under Maintenance program. Write each component in the correct column. what must you do?     Give users and groups levels of access.com. to test a computer to check its own network card? What commands would you enter. Remove the host computer from the network. . Put users into groups.au server? What command would you enter to find the full configuration of your own computer? Enter command IPCONFIG IPCONFIG PING TRACERT TRACERT IPCONFIG (/ALL) Question 2: User access After you install a peripheral on a host computer to allow other people on the network to access it. to test the connection to another computer on the network? What command would you enter.com. to find the ip address of the closest google. Share the peripheral.ICAS3121B Administer Network Peripherals Patrick Dacayo Self Check Question 1: Troubleshooting commands Identify various commands you would enter from a command screen by completing the following table: Question What commands would you enter.au server? What command would you enter to find the number of hops to the closest google. CPU 2. Limited Processing Target i. Internet Protocol Configuration g. LAN 3. File Transfer Protocol d. Give the users group share access to the folder and the managers’ group normal access. TELNET 10. and leave users as they are. Local Area Network k. Packet Internet Groper n. LPT Correct term Possible terms a. one for users and one for managers and move staff into the appropriate group. Create one group for users and one group for managers and move staff into the appropriate group. Line Printer j. Give everyone the same access but put users in one group and managers in another.ICAS3121B Administer Network Peripherals Patrick Dacayo Question 3: To allow general users and managers to have different access. Full Tower Processor e. Cyber Principle Unix c. IPCONFIG 8. and leave users as they are. Create one group for managers only. Wide Area Network t. MB 5.   Question 5: Acronyms Identify important acronyms by completing this table of acronyms: Acronym 1. Create one group for managers only. Megabytes m. what do you have to do?   Share the peripheral and give everyone full access. With Adaptive Notch Central Processing Unit Local Area Network Wide Area Network Megabytes Packet Internet Groper Trace Router Internet Protocol Configuration File Transfer Protocol Telecommunications Netwok Line Printer (Line Print Terminal) . Create one group for users and one group for managers and move staff into the appropriate group. what must you do?     Create groups. Share the peripheral and give everyone full access. Telecommunications Network q. Central Processing Unit b. PING 6. FTP 9. Internal Process Cluster f. Port Interface Network Genlock o. Give the users group read access and the managers group full access. Telstra’s National Ethernet p. Magnitude Bezel l. Question 4: To allow general users to have read access and managers to have full access to a folder. Trace Router r. WAN 4. Track Certification s. TRACERT 7. Less Adaptive Notch h. ICAS3121B Administer Network Peripherals Patrick Dacayo .
Copyright © 2024 DOKUMEN.SITE Inc.