SlideShare a Scribd company logo
1 of 1
Test Table for Wireless NIC
Ajay Jassi
Test Number
1

Date
29/11/13

Test Description
Test to see if
device appears in
device manager.

Expected Results
It will appear as
device and driver
is installed
correctly.
Light on back
flashing, which
means internet
connection is
connected.
I expecting the
ping to be around
150 ms.

2

29/11/13

Testing to check if
the lights on the
wireless NIC are
working correct.

3

29/11/13

Ping the machine.

4

29/11/13

Test internet
connection is
working.

There would be a
strong connection
of internet.

5

29/11/13

Go into CMD and
check if the
ipconfig/all
settings all are
active and
running.

A list of internet
information
about the ip
address, subnet
mask, and the
default gateway.

Actual Results
The device was
recognizes and
appeared in
device manager.
The green light
was flashing so
it’s successful.

The machine
pinged at 168 ms,
so it was better
than I expected,
therefore the
ping was
successful.
The signal
strength was low,
as it was a far
distance away
from a wireless
router.
A list of internet
information
containing correct
information,
which was a
success.

More Related Content

Viewers also liked

Radio Trail Script
Radio Trail ScriptRadio Trail Script
Radio Trail Scriptjacklloyd0o
 
2014 Family Law Bench Brief
2014 Family Law Bench Brief2014 Family Law Bench Brief
2014 Family Law Bench BriefKathleen Rivers
 
Конспект вводных занятий практикума по ОС UNIX
Конспект вводных занятий практикума по ОС UNIXКонспект вводных занятий практикума по ОС UNIX
Конспект вводных занятий практикума по ОС UNIXTimur Shaporev
 
Empfehlungsschreiben - Kempermann
Empfehlungsschreiben - KempermannEmpfehlungsschreiben - Kempermann
Empfehlungsschreiben - KempermannJessica Bellmann
 
Tôi đã sai lầm khi yêu người con gái quá dễ dãi
Tôi đã sai lầm khi yêu người con gái quá dễ dãiTôi đã sai lầm khi yêu người con gái quá dễ dãi
Tôi đã sai lầm khi yêu người con gái quá dễ dãiNguyễn Hòa
 
デザイン篇2 2
デザイン篇2 2デザイン篇2 2
デザイン篇2 2goodsiemanual
 
Marketing Research Final Project
Marketing Research Final ProjectMarketing Research Final Project
Marketing Research Final ProjectMatthew Houseal
 

Viewers also liked (8)

Asturias, todo belleza
Asturias, todo bellezaAsturias, todo belleza
Asturias, todo belleza
 
Radio Trail Script
Radio Trail ScriptRadio Trail Script
Radio Trail Script
 
2014 Family Law Bench Brief
2014 Family Law Bench Brief2014 Family Law Bench Brief
2014 Family Law Bench Brief
 
Конспект вводных занятий практикума по ОС UNIX
Конспект вводных занятий практикума по ОС UNIXКонспект вводных занятий практикума по ОС UNIX
Конспект вводных занятий практикума по ОС UNIX
 
Empfehlungsschreiben - Kempermann
Empfehlungsschreiben - KempermannEmpfehlungsschreiben - Kempermann
Empfehlungsschreiben - Kempermann
 
Tôi đã sai lầm khi yêu người con gái quá dễ dãi
Tôi đã sai lầm khi yêu người con gái quá dễ dãiTôi đã sai lầm khi yêu người con gái quá dễ dãi
Tôi đã sai lầm khi yêu người con gái quá dễ dãi
 
デザイン篇2 2
デザイン篇2 2デザイン篇2 2
デザイン篇2 2
 
Marketing Research Final Project
Marketing Research Final ProjectMarketing Research Final Project
Marketing Research Final Project
 

Similar to Test Table for Wireless NIC

Troubleshooting Your Network.pptx
Troubleshooting Your Network.pptxTroubleshooting Your Network.pptx
Troubleshooting Your Network.pptxssusere578aa
 
connectivity utility
connectivity utilityconnectivity utility
connectivity utilitytumetr1
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAAiman Hud
 
Installation and Testing of Hardware
Installation and Testing of HardwareInstallation and Testing of Hardware
Installation and Testing of HardwareAjay Jassi
 
Troubleshooting-computer-system-network-1.pptx
Troubleshooting-computer-system-network-1.pptxTroubleshooting-computer-system-network-1.pptx
Troubleshooting-computer-system-network-1.pptxkylejustinferrer
 
Installation of a selected piece of hardware
Installation of a selected piece of hardwareInstallation of a selected piece of hardware
Installation of a selected piece of hardwareOriginalGSM
 
IT Essentials (Version 7.0) - ITE Chapter 6 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 6 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 6 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 6 Exam AnswersITExamAnswers.net
 
Student's industrial attachment logbook
Student's industrial attachment logbookStudent's industrial attachment logbook
Student's industrial attachment logbookPaullaster Okoth
 
Commands used in Assessing Network layout & Security
Commands used in Assessing Network layout & SecurityCommands used in Assessing Network layout & Security
Commands used in Assessing Network layout & SecurityLearningwithRayYT
 
Netreg Presentation
Netreg PresentationNetreg Presentation
Netreg Presentationpetertrevino
 
P5 connect hardware safely to a computer system
P5  connect hardware safely to a computer systemP5  connect hardware safely to a computer system
P5 connect hardware safely to a computer systemsophie07
 
Network Troubleshooting
Network TroubleshootingNetwork Troubleshooting
Network TroubleshootingJoy Sarker
 
Wireless router-setup-manual
Wireless router-setup-manual Wireless router-setup-manual
Wireless router-setup-manual Dawood Aqlan
 
Positive Hack Days. Pavlov. Network Infrastructure Security Assessment
Positive Hack Days. Pavlov. Network Infrastructure Security AssessmentPositive Hack Days. Pavlov. Network Infrastructure Security Assessment
Positive Hack Days. Pavlov. Network Infrastructure Security AssessmentPositive Hack Days
 
Wireless lab4902
Wireless lab4902Wireless lab4902
Wireless lab4902mark scott
 
How to WRAPS like Snoop Dogg
How to WRAPS like Snoop DoggHow to WRAPS like Snoop Dogg
How to WRAPS like Snoop DoggAlex Kim
 

Similar to Test Table for Wireless NIC (20)

Troubleshooting Your Network.pptx
Troubleshooting Your Network.pptxTroubleshooting Your Network.pptx
Troubleshooting Your Network.pptx
 
connectivity utility
connectivity utilityconnectivity utility
connectivity utility
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
Installation and Testing of Hardware
Installation and Testing of HardwareInstallation and Testing of Hardware
Installation and Testing of Hardware
 
Troubleshooting-computer-system-network-1.pptx
Troubleshooting-computer-system-network-1.pptxTroubleshooting-computer-system-network-1.pptx
Troubleshooting-computer-system-network-1.pptx
 
Installation of a selected piece of hardware
Installation of a selected piece of hardwareInstallation of a selected piece of hardware
Installation of a selected piece of hardware
 
Internet census 2012
Internet census 2012Internet census 2012
Internet census 2012
 
IT Essentials (Version 7.0) - ITE Chapter 6 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 6 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 6 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 6 Exam Answers
 
Student's industrial attachment logbook
Student's industrial attachment logbookStudent's industrial attachment logbook
Student's industrial attachment logbook
 
Commands used in Assessing Network layout & Security
Commands used in Assessing Network layout & SecurityCommands used in Assessing Network layout & Security
Commands used in Assessing Network layout & Security
 
Jacks unit 3
Jacks unit 3Jacks unit 3
Jacks unit 3
 
Netreg Presentation
Netreg PresentationNetreg Presentation
Netreg Presentation
 
P5 connect hardware safely to a computer system
P5  connect hardware safely to a computer systemP5  connect hardware safely to a computer system
P5 connect hardware safely to a computer system
 
Lewis unit 3
Lewis unit 3 Lewis unit 3
Lewis unit 3
 
Network Troubleshooting
Network TroubleshootingNetwork Troubleshooting
Network Troubleshooting
 
Wireless router-setup-manual
Wireless router-setup-manual Wireless router-setup-manual
Wireless router-setup-manual
 
Positive Hack Days. Pavlov. Network Infrastructure Security Assessment
Positive Hack Days. Pavlov. Network Infrastructure Security AssessmentPositive Hack Days. Pavlov. Network Infrastructure Security Assessment
Positive Hack Days. Pavlov. Network Infrastructure Security Assessment
 
Wireless lab4902
Wireless lab4902Wireless lab4902
Wireless lab4902
 
How to WRAPS like Snoop Dogg
How to WRAPS like Snoop DoggHow to WRAPS like Snoop Dogg
How to WRAPS like Snoop Dogg
 
318245866 rating-sheet
318245866 rating-sheet318245866 rating-sheet
318245866 rating-sheet
 

More from Ajay Jassi

Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Ajay Jassi
 
Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT SecurityAjay Jassi
 
Impact on IT system breaches
Impact on IT system breachesImpact on IT system breaches
Impact on IT system breachesAjay Jassi
 
Testing software
Testing softwareTesting software
Testing softwareAjay Jassi
 
Configuring personal desktop
Configuring personal desktopConfiguring personal desktop
Configuring personal desktopAjay Jassi
 
Preaparation for new software application
Preaparation for new software applicationPreaparation for new software application
Preaparation for new software applicationAjay Jassi
 
Software Licences
Software LicencesSoftware Licences
Software LicencesAjay Jassi
 
Hardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware ProviderHardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware ProviderAjay Jassi
 
IT job role description for Technical Support Engineer
IT job role description for Technical Support EngineerIT job role description for Technical Support Engineer
IT job role description for Technical Support EngineerAjay Jassi
 
Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)Ajay Jassi
 
Preparation for Installing Hardware
Preparation for Installing HardwarePreparation for Installing Hardware
Preparation for Installing HardwareAjay Jassi
 
Reasons why Hardware is Installed and Potential Problems and the Precautions
Reasons why Hardware is Installed and Potential Problems and the PrecautionsReasons why Hardware is Installed and Potential Problems and the Precautions
Reasons why Hardware is Installed and Potential Problems and the PrecautionsAjay Jassi
 
Installation of Windows 7 using USB
Installation of Windows 7 using USBInstallation of Windows 7 using USB
Installation of Windows 7 using USBAjay Jassi
 
Potential problems that occur during hardware installation
Potential problems that occur during hardware installationPotential problems that occur during hardware installation
Potential problems that occur during hardware installationAjay Jassi
 
Building Computer System
Building Computer SystemBuilding Computer System
Building Computer SystemAjay Jassi
 
Installation and configuration of Wireless NIC
Installation and configuration of Wireless NICInstallation and configuration of Wireless NIC
Installation and configuration of Wireless NICAjay Jassi
 
Comparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS XComparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS XAjay Jassi
 
Upgrade Invoice
Upgrade InvoiceUpgrade Invoice
Upgrade InvoiceAjay Jassi
 
Personalising Desktop
Personalising DesktopPersonalising Desktop
Personalising DesktopAjay Jassi
 
Health and safety requirements for computer maintenance
Health and safety requirements for computer maintenanceHealth and safety requirements for computer maintenance
Health and safety requirements for computer maintenanceAjay Jassi
 

More from Ajay Jassi (20)

Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
 
Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT Security
 
Impact on IT system breaches
Impact on IT system breachesImpact on IT system breaches
Impact on IT system breaches
 
Testing software
Testing softwareTesting software
Testing software
 
Configuring personal desktop
Configuring personal desktopConfiguring personal desktop
Configuring personal desktop
 
Preaparation for new software application
Preaparation for new software applicationPreaparation for new software application
Preaparation for new software application
 
Software Licences
Software LicencesSoftware Licences
Software Licences
 
Hardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware ProviderHardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware Provider
 
IT job role description for Technical Support Engineer
IT job role description for Technical Support EngineerIT job role description for Technical Support Engineer
IT job role description for Technical Support Engineer
 
Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)
 
Preparation for Installing Hardware
Preparation for Installing HardwarePreparation for Installing Hardware
Preparation for Installing Hardware
 
Reasons why Hardware is Installed and Potential Problems and the Precautions
Reasons why Hardware is Installed and Potential Problems and the PrecautionsReasons why Hardware is Installed and Potential Problems and the Precautions
Reasons why Hardware is Installed and Potential Problems and the Precautions
 
Installation of Windows 7 using USB
Installation of Windows 7 using USBInstallation of Windows 7 using USB
Installation of Windows 7 using USB
 
Potential problems that occur during hardware installation
Potential problems that occur during hardware installationPotential problems that occur during hardware installation
Potential problems that occur during hardware installation
 
Building Computer System
Building Computer SystemBuilding Computer System
Building Computer System
 
Installation and configuration of Wireless NIC
Installation and configuration of Wireless NICInstallation and configuration of Wireless NIC
Installation and configuration of Wireless NIC
 
Comparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS XComparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS X
 
Upgrade Invoice
Upgrade InvoiceUpgrade Invoice
Upgrade Invoice
 
Personalising Desktop
Personalising DesktopPersonalising Desktop
Personalising Desktop
 
Health and safety requirements for computer maintenance
Health and safety requirements for computer maintenanceHealth and safety requirements for computer maintenance
Health and safety requirements for computer maintenance
 

Recently uploaded

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Recently uploaded (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Test Table for Wireless NIC

  • 1. Test Table for Wireless NIC Ajay Jassi Test Number 1 Date 29/11/13 Test Description Test to see if device appears in device manager. Expected Results It will appear as device and driver is installed correctly. Light on back flashing, which means internet connection is connected. I expecting the ping to be around 150 ms. 2 29/11/13 Testing to check if the lights on the wireless NIC are working correct. 3 29/11/13 Ping the machine. 4 29/11/13 Test internet connection is working. There would be a strong connection of internet. 5 29/11/13 Go into CMD and check if the ipconfig/all settings all are active and running. A list of internet information about the ip address, subnet mask, and the default gateway. Actual Results The device was recognizes and appeared in device manager. The green light was flashing so it’s successful. The machine pinged at 168 ms, so it was better than I expected, therefore the ping was successful. The signal strength was low, as it was a far distance away from a wireless router. A list of internet information containing correct information, which was a success.