SlideShare a Scribd company logo
Task1. Creating
Peer to Peer
Network
To create a peer network, follow these steps for each computer
connected to the network:
1. Shut down the computer and install the network card and
appropriate cabling for each computer.
NOTE: For information about how to configure your network
adapters and physically connect your computers, consult the
documentation included with your network adapters or
contact the manufacturer(s) of your network adapters.
2. Start Windows and install the network drivers. Windows
may detect your network card and install the drivers when
you start the computer. If the network card drivers are not
included with Windows, follow the manufacturer's
instructions about how to install the network drivers.
3. Choose a client and a common protocol for each computer. To
do this, follow these steps:
a. Click Start, point to Settings, click Control Panel, and then
double-click Network.
b. Click Add, click Client, and then click Add.
c. In the Manufacturers box, click the appropriate manufacturer,
click the appropriate client in the Network Clients box, and then
click OK.
d. Click Add, click Protocol, and then click Add.
e. In the Manufacturers box, click the appropriate manufacturer,
click the appropriate protocol in the Network Protocol box, and
then click OK.
4. Configure a peer server. Each computer that is
configured for File and Printer Sharing can act as a
server. To configure a computer for File and Printer
Sharing, use the following steps:
a. Click Start, point to Settings, click Control
Panel, and then double-click Network.
b. Click File and Print Sharing, click one or both
options to share files and printers, click OK, and
then click OK again.
c. Click Yes when you are prompted to restart your
computer.
5. Give each computer a unique computer name. To do
this, use the following steps:
a. Click Start, point to Settings, click Control
Panel, and then double-click Network.
b. On the Identification tab, type a unique name
in the Computer name box.
c. Click OK, and then click Yes when you are
prompted to restart your computer.
Task 2. Using the
Internet for
Research
In this activity, you will learn how useful the Internet can be
for a PC support technician.
1. Using your own or computer laboratory, pretend that the
motherboard manual is not available and you need to replace
a faulty processor. Identify the manufacturer and model of the
motherboard by looking for the manufacturer name and
model number stamped on the board. Research the Web site
for that manufacturer. Print the list of processors the board
can support.
2. Research the Web site for your motherboard and print the
instructions for flashing BIOS.
3. Research the Abit Web site
(www.abit.com.tw) and print a
photograph of a motherboardthat has a
riser slot. Also print the photograph of
the riser card that fits this slot. What
isthe function of the riser card?
Task 1. Setting
Windows
Network
Connection
Equipment, Tools and
Materials Required:
- UTP cables
- 4 Computer units
- 1 hub
Given the following materials, set-up a
network connection on four computers.
More Security for
Remote Desktop
Task2. Analyze the situations
below and answer the questions
that follow.
When Enzo travels on company business, he finds it’s a
great help to be able to access his office computer from
anywhere on the road using Remote Desktop. However, he
wants to make sure his office computer as well as the entire
corporate network is as safe as possible. One way you can
help Enzo to add more security is to change the port that
Remote Desktop uses. Knowledgeable hackers know that
Remote Desktop uses port 3389, but if you change this port
to a secret port, hackers are less likely to find the open port.
Search the Microsoft Knowledge Base articles
(support.microsoft.com) for a way to change the port that
Remote Desktop uses. Practice implementing this change
by doing the following:
1. Set up Remote Desktop on a computer to be the host computer. Use
another computer (the client computer) to create a Remote Desktop
session to the host computer. Verify the session works by transferring
files in both directions.
2. Next, change the port that Remote Desktop uses on the host
computer to a secret port. Print a screen shot showing how you made
the change. Use the client computer to create a Remote Desktop
session to the host computer using the secret port. Print a screen shot
showing how you made the connection using the secret port. Verify
the session works by transferring files in both directions.
3. What secret port did you use?

More Related Content

What's hot

ComputerAssembly
ComputerAssemblyComputerAssembly
ComputerAssemblyjay decelo
 
System unit
System unitSystem unit
System unit
Grace Espago
 
Basic Computer Operation And Troubleshooting
Basic  Computer  Operation And  TroubleshootingBasic  Computer  Operation And  Troubleshooting
Basic Computer Operation And Troubleshooting
Praveen Sudarsan
 
Specialized Computer Systems
Specialized Computer SystemsSpecialized Computer Systems
Specialized Computer Systems
MLG College of Learning, Inc
 
Building a computer in virtual desktop.
Building a computer in virtual desktop.Building a computer in virtual desktop.
Building a computer in virtual desktop.
OriginalGSM
 
CSS L07 - Preparing the Installer
CSS L07 - Preparing the InstallerCSS L07 - Preparing the Installer
CSS L07 - Preparing the Installer
Marvin Bronoso
 
Computer Assembly
Computer AssemblyComputer Assembly
Computer Assembly
Michael Corcino
 
CSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEM
CSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEMCSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEM
CSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEM
Marvin Bronoso
 
CSS L05 - Computer System Assembly
CSS L05 -  Computer System AssemblyCSS L05 -  Computer System Assembly
CSS L05 - Computer System Assembly
Marvin Bronoso
 
2.2
2.22.2
Computer hardware basic -shashank
Computer hardware basic  -shashankComputer hardware basic  -shashank
Computer hardware basic -shashank
techbed
 
Operating system windows XP
Operating system windows XPOperating system windows XP
Operating system windows XP
Rohan Bhatkar
 
Project on computer assembling
Project on computer assemblingProject on computer assembling
Project on computer assembling
Subhojit Paul
 

What's hot (18)

ComputerAssembly
ComputerAssemblyComputerAssembly
ComputerAssembly
 
System unit
System unitSystem unit
System unit
 
Basic Computer Operation And Troubleshooting
Basic  Computer  Operation And  TroubleshootingBasic  Computer  Operation And  Troubleshooting
Basic Computer Operation And Troubleshooting
 
Specialized Computer Systems
Specialized Computer SystemsSpecialized Computer Systems
Specialized Computer Systems
 
Building a computer in virtual desktop.
Building a computer in virtual desktop.Building a computer in virtual desktop.
Building a computer in virtual desktop.
 
UNIT 2 P8
UNIT 2 P8UNIT 2 P8
UNIT 2 P8
 
Usb
UsbUsb
Usb
 
CSS L07 - Preparing the Installer
CSS L07 - Preparing the InstallerCSS L07 - Preparing the Installer
CSS L07 - Preparing the Installer
 
Computer Assembly
Computer AssemblyComputer Assembly
Computer Assembly
 
Virginiatools
VirginiatoolsVirginiatools
Virginiatools
 
CSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEM
CSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEMCSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEM
CSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEM
 
Installation guide_Rajeev
Installation guide_RajeevInstallation guide_Rajeev
Installation guide_Rajeev
 
CSS L05 - Computer System Assembly
CSS L05 -  Computer System AssemblyCSS L05 -  Computer System Assembly
CSS L05 - Computer System Assembly
 
2.2
2.22.2
2.2
 
Computer hardware basic -shashank
Computer hardware basic  -shashankComputer hardware basic  -shashank
Computer hardware basic -shashank
 
P1 unit 2
P1 unit 2P1 unit 2
P1 unit 2
 
Operating system windows XP
Operating system windows XPOperating system windows XP
Operating system windows XP
 
Project on computer assembling
Project on computer assemblingProject on computer assembling
Project on computer assembling
 

Viewers also liked

Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks Venkatesh Iyer
 
Peer to peer network schemes and finding algorithms
Peer to peer network schemes and finding algorithmsPeer to peer network schemes and finding algorithms
Peer to peer network schemes and finding algorithms
Mohamed El Sharnoby
 
Computer Architecture - Hardware - Lesson 3 - Electricity - Eric Vanderburg
 Computer Architecture - Hardware - Lesson 3 - Electricity - Eric Vanderburg Computer Architecture - Hardware - Lesson 3 - Electricity - Eric Vanderburg
Computer Architecture - Hardware - Lesson 3 - Electricity - Eric Vanderburg
Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 8B - Display - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8B - Display - Eric VanderburgComputer Architecture - Hardware - Lesson 8B - Display - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8B - Display - Eric Vanderburg
Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric Vanderburg
Computer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric VanderburgComputer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric Vanderburg
Computer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric Vanderburg
Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 4 - Motherboard - Eric Vanderburg
 Computer Architecture - Hardware - Lesson 4 - Motherboard - Eric Vanderburg Computer Architecture - Hardware - Lesson 4 - Motherboard - Eric Vanderburg
Computer Architecture - Hardware - Lesson 4 - Motherboard - Eric Vanderburg
Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 12 - Portables - Eric Vanderburg
Computer Architecture - Hardware - Lesson 12 - Portables - Eric VanderburgComputer Architecture - Hardware - Lesson 12 - Portables - Eric Vanderburg
Computer Architecture - Hardware - Lesson 12 - Portables - Eric Vanderburg
Eric Vanderburg
 
Power point lesson 02
Power point lesson 02Power point lesson 02
Power point lesson 02
heidirobison
 
Computer Architecture - Hardware - Lesson 8A - I/O Devices - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8A - I/O Devices - Eric VanderburgComputer Architecture - Hardware - Lesson 8A - I/O Devices - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8A - I/O Devices - Eric Vanderburg
Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 13 - Printers - Eric Vanderburg
Computer Architecture - Hardware - Lesson 13 - Printers - Eric VanderburgComputer Architecture - Hardware - Lesson 13 - Printers - Eric Vanderburg
Computer Architecture - Hardware - Lesson 13 - Printers - Eric Vanderburg
Eric Vanderburg
 
1.4 network
1.4 network1.4 network
1.4 network
Frya Lora
 
Computer Architecture - Hardware - Lesson 10 - Modems - Eric Vanderburg
Computer Architecture - Hardware - Lesson 10 - Modems - Eric VanderburgComputer Architecture - Hardware - Lesson 10 - Modems - Eric Vanderburg
Computer Architecture - Hardware - Lesson 10 - Modems - Eric Vanderburg
Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 5 - Memory - Eric Vanderburg
Computer Architecture - Hardware - Lesson 5 - Memory - Eric VanderburgComputer Architecture - Hardware - Lesson 5 - Memory - Eric Vanderburg
Computer Architecture - Hardware - Lesson 5 - Memory - Eric Vanderburg
Eric Vanderburg
 
Peer to-peer networks
Peer to-peer networksPeer to-peer networks
Peer to-peer networks
Nkosinathi Lungu
 
Quick Faq - Erasure Coding
Quick Faq - Erasure Coding Quick Faq - Erasure Coding
Quick Faq - Erasure Coding
Western Digital
 
Introducing ppt 2010
Introducing ppt 2010Introducing ppt 2010
Introducing ppt 2010
Frya Lora
 
Kto12 tle ict computer hardware servicing
Kto12 tle ict computer hardware servicingKto12 tle ict computer hardware servicing
Kto12 tle ict computer hardware servicing
Alvin Francisco
 
K-12 Grade 9 - Computer Hardware Servicing ICT Learning Material
K-12 Grade 9 - Computer Hardware Servicing ICT Learning MaterialK-12 Grade 9 - Computer Hardware Servicing ICT Learning Material
K-12 Grade 9 - Computer Hardware Servicing ICT Learning Material
paragatol258
 
Computer Architecture - Hardware - Lesson 11 - Networking - Eric Vanderburg
Computer Architecture - Hardware - Lesson 11 - Networking - Eric VanderburgComputer Architecture - Hardware - Lesson 11 - Networking - Eric Vanderburg
Computer Architecture - Hardware - Lesson 11 - Networking - Eric Vanderburg
Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...
Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...
Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...
Eric Vanderburg
 

Viewers also liked (20)

Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks
 
Peer to peer network schemes and finding algorithms
Peer to peer network schemes and finding algorithmsPeer to peer network schemes and finding algorithms
Peer to peer network schemes and finding algorithms
 
Computer Architecture - Hardware - Lesson 3 - Electricity - Eric Vanderburg
 Computer Architecture - Hardware - Lesson 3 - Electricity - Eric Vanderburg Computer Architecture - Hardware - Lesson 3 - Electricity - Eric Vanderburg
Computer Architecture - Hardware - Lesson 3 - Electricity - Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 8B - Display - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8B - Display - Eric VanderburgComputer Architecture - Hardware - Lesson 8B - Display - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8B - Display - Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric Vanderburg
Computer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric VanderburgComputer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric Vanderburg
Computer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 4 - Motherboard - Eric Vanderburg
 Computer Architecture - Hardware - Lesson 4 - Motherboard - Eric Vanderburg Computer Architecture - Hardware - Lesson 4 - Motherboard - Eric Vanderburg
Computer Architecture - Hardware - Lesson 4 - Motherboard - Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 12 - Portables - Eric Vanderburg
Computer Architecture - Hardware - Lesson 12 - Portables - Eric VanderburgComputer Architecture - Hardware - Lesson 12 - Portables - Eric Vanderburg
Computer Architecture - Hardware - Lesson 12 - Portables - Eric Vanderburg
 
Power point lesson 02
Power point lesson 02Power point lesson 02
Power point lesson 02
 
Computer Architecture - Hardware - Lesson 8A - I/O Devices - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8A - I/O Devices - Eric VanderburgComputer Architecture - Hardware - Lesson 8A - I/O Devices - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8A - I/O Devices - Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 13 - Printers - Eric Vanderburg
Computer Architecture - Hardware - Lesson 13 - Printers - Eric VanderburgComputer Architecture - Hardware - Lesson 13 - Printers - Eric Vanderburg
Computer Architecture - Hardware - Lesson 13 - Printers - Eric Vanderburg
 
1.4 network
1.4 network1.4 network
1.4 network
 
Computer Architecture - Hardware - Lesson 10 - Modems - Eric Vanderburg
Computer Architecture - Hardware - Lesson 10 - Modems - Eric VanderburgComputer Architecture - Hardware - Lesson 10 - Modems - Eric Vanderburg
Computer Architecture - Hardware - Lesson 10 - Modems - Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 5 - Memory - Eric Vanderburg
Computer Architecture - Hardware - Lesson 5 - Memory - Eric VanderburgComputer Architecture - Hardware - Lesson 5 - Memory - Eric Vanderburg
Computer Architecture - Hardware - Lesson 5 - Memory - Eric Vanderburg
 
Peer to-peer networks
Peer to-peer networksPeer to-peer networks
Peer to-peer networks
 
Quick Faq - Erasure Coding
Quick Faq - Erasure Coding Quick Faq - Erasure Coding
Quick Faq - Erasure Coding
 
Introducing ppt 2010
Introducing ppt 2010Introducing ppt 2010
Introducing ppt 2010
 
Kto12 tle ict computer hardware servicing
Kto12 tle ict computer hardware servicingKto12 tle ict computer hardware servicing
Kto12 tle ict computer hardware servicing
 
K-12 Grade 9 - Computer Hardware Servicing ICT Learning Material
K-12 Grade 9 - Computer Hardware Servicing ICT Learning MaterialK-12 Grade 9 - Computer Hardware Servicing ICT Learning Material
K-12 Grade 9 - Computer Hardware Servicing ICT Learning Material
 
Computer Architecture - Hardware - Lesson 11 - Networking - Eric Vanderburg
Computer Architecture - Hardware - Lesson 11 - Networking - Eric VanderburgComputer Architecture - Hardware - Lesson 11 - Networking - Eric Vanderburg
Computer Architecture - Hardware - Lesson 11 - Networking - Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...
Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...
Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...
 

Similar to Creating peer to peer network nadia perandos bisnar

B Sc IT II Sem NHSB Networking For Home And Small Business Amity University
B Sc IT II Sem NHSB Networking For Home And Small Business Amity UniversityB Sc IT II Sem NHSB Networking For Home And Small Business Amity University
B Sc IT II Sem NHSB Networking For Home And Small Business Amity University
Kanhaiya Murarka
 
Bluetooth quick start_guide / Controlanything India
Bluetooth quick start_guide / Controlanything IndiaBluetooth quick start_guide / Controlanything India
Bluetooth quick start_guide / Controlanything India
Dcube Tech Ventures
 
Taishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_LabTaishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_LabTaishaun Owens
 
manual vvtk camera_st7501
manual vvtk camera_st7501manual vvtk camera_st7501
manual vvtk camera_st7501
TSOLUTIONS
 
Step by-step guide-to_getting_started_with_hyper-v
Step by-step guide-to_getting_started_with_hyper-vStep by-step guide-to_getting_started_with_hyper-v
Step by-step guide-to_getting_started_with_hyper-vPSD Solutions .....
 
Wfc878r eop hwsg_npd6407-00_en
Wfc878r eop hwsg_npd6407-00_enWfc878r eop hwsg_npd6407-00_en
Wfc878r eop hwsg_npd6407-00_en
HerrySyafitri
 
Installing modem,printer.47
Installing modem,printer.47Installing modem,printer.47
Installing modem,printer.47myrajendra
 
Pc hardware course work
Pc hardware course workPc hardware course work
Pc hardware course work
Ismail Mukiibi
 
Final exam results
Final exam resultsFinal exam results
Final exam resultsDale Vick
 
Chapter 12 - Computer Trouble Shooting Purchase a PC.ppt
Chapter 12 - Computer Trouble Shooting Purchase a PC.pptChapter 12 - Computer Trouble Shooting Purchase a PC.ppt
Chapter 12 - Computer Trouble Shooting Purchase a PC.ppt
RadziahSalleh4
 
Dreamweaver cs5.5 read me
Dreamweaver cs5.5 read meDreamweaver cs5.5 read me
Dreamweaver cs5.5 read mejosephegojocruz
 
Girl Gets Ring
Girl Gets RingGirl Gets Ring
Girl Gets Ring
isabellaroseyrr
 
Troubleshooting guide
Troubleshooting guideTroubleshooting guide
Troubleshooting guidejameszzzzz
 
Troubleshooting guide
Troubleshooting guideTroubleshooting guide
Troubleshooting guidejameszzzz
 
itft_Installing windows 2003
itft_Installing windows 2003 itft_Installing windows 2003
itft_Installing windows 2003
Swati Aggarwal
 

Similar to Creating peer to peer network nadia perandos bisnar (20)

B Sc IT II Sem NHSB Networking For Home And Small Business Amity University
B Sc IT II Sem NHSB Networking For Home And Small Business Amity UniversityB Sc IT II Sem NHSB Networking For Home And Small Business Amity University
B Sc IT II Sem NHSB Networking For Home And Small Business Amity University
 
Bluetooth quick start_guide / Controlanything India
Bluetooth quick start_guide / Controlanything IndiaBluetooth quick start_guide / Controlanything India
Bluetooth quick start_guide / Controlanything India
 
Taishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_LabTaishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_Lab
 
manual vvtk camera_st7501
manual vvtk camera_st7501manual vvtk camera_st7501
manual vvtk camera_st7501
 
Computer Problems
Computer ProblemsComputer Problems
Computer Problems
 
SCCM HOw to
SCCM HOw toSCCM HOw to
SCCM HOw to
 
Step by-step guide-to_getting_started_with_hyper-v
Step by-step guide-to_getting_started_with_hyper-vStep by-step guide-to_getting_started_with_hyper-v
Step by-step guide-to_getting_started_with_hyper-v
 
computing networks and operating system
computing networks and operating system computing networks and operating system
computing networks and operating system
 
Presentation1
Presentation1Presentation1
Presentation1
 
Wfc878r eop hwsg_npd6407-00_en
Wfc878r eop hwsg_npd6407-00_enWfc878r eop hwsg_npd6407-00_en
Wfc878r eop hwsg_npd6407-00_en
 
Installing modem,printer.47
Installing modem,printer.47Installing modem,printer.47
Installing modem,printer.47
 
Pc hardware course work
Pc hardware course workPc hardware course work
Pc hardware course work
 
Final exam results
Final exam resultsFinal exam results
Final exam results
 
Chapter 12 - Computer Trouble Shooting Purchase a PC.ppt
Chapter 12 - Computer Trouble Shooting Purchase a PC.pptChapter 12 - Computer Trouble Shooting Purchase a PC.ppt
Chapter 12 - Computer Trouble Shooting Purchase a PC.ppt
 
Dreamweaver cs5.5 read me
Dreamweaver cs5.5 read meDreamweaver cs5.5 read me
Dreamweaver cs5.5 read me
 
Girl Gets Ring
Girl Gets RingGirl Gets Ring
Girl Gets Ring
 
Troubleshooting guide
Troubleshooting guideTroubleshooting guide
Troubleshooting guide
 
Troubleshooting guide
Troubleshooting guideTroubleshooting guide
Troubleshooting guide
 
MDT Step public
MDT Step publicMDT Step public
MDT Step public
 
itft_Installing windows 2003
itft_Installing windows 2003 itft_Installing windows 2003
itft_Installing windows 2003
 

More from Perla Pelicano Corpez

Adjusted ESIP FINAL 2016-2019
Adjusted ESIP FINAL 2016-2019Adjusted ESIP FINAL 2016-2019
Adjusted ESIP FINAL 2016-2019
Perla Pelicano Corpez
 
Training design on SIM development
Training design on SIM developmentTraining design on SIM development
Training design on SIM development
Perla Pelicano Corpez
 
Project VILMA of Tinago NHS
Project VILMA of Tinago NHSProject VILMA of Tinago NHS
Project VILMA of Tinago NHS
Perla Pelicano Corpez
 
Silvestre T. Lumarda - The Working Mayor of the Booming Municipality of Inopacan
Silvestre T. Lumarda - The Working Mayor of the Booming Municipality of InopacanSilvestre T. Lumarda - The Working Mayor of the Booming Municipality of Inopacan
Silvestre T. Lumarda - The Working Mayor of the Booming Municipality of Inopacan
Perla Pelicano Corpez
 
27. nature of directing
27. nature of directing27. nature of directing
27. nature of directing
Perla Pelicano Corpez
 
24. movements of employees
24. movements of employees24. movements of employees
24. movements of employees
Perla Pelicano Corpez
 
21. compensation and wages
21. compensation and wages21. compensation and wages
21. compensation and wages
Perla Pelicano Corpez
 
16. theories of organization
16. theories of organization16. theories of organization
16. theories of organization
Perla Pelicano Corpez
 
10. scope+and+nature+of+planning
10. scope+and+nature+of+planning10. scope+and+nature+of+planning
10. scope+and+nature+of+planning
Perla Pelicano Corpez
 
9. forms of business organization
9. forms of business organization9. forms of business organization
9. forms of business organization
Perla Pelicano Corpez
 
8. pestle analysis
8. pestle analysis8. pestle analysis
8. pestle analysis
Perla Pelicano Corpez
 
6. internal and external analysis
6. internal and external analysis6. internal and external analysis
6. internal and external analysis
Perla Pelicano Corpez
 
2. personal swot analysis
2. personal swot analysis2. personal swot analysis
2. personal swot analysis
Perla Pelicano Corpez
 
1 c. functions, roles and skills of a manager2
1 c. functions, roles and skills of a manager21 c. functions, roles and skills of a manager2
1 c. functions, roles and skills of a manager2
Perla Pelicano Corpez
 
1 b. functions of manager
1 b. functions of manager1 b. functions of manager
1 b. functions of manager
Perla Pelicano Corpez
 
1 a. functions of management
1 a. functions of management1 a. functions of management
1 a. functions of management
Perla Pelicano Corpez
 
1. external factors that affects business environment
1. external factors that affects business environment1. external factors that affects business environment
1. external factors that affects business environment
Perla Pelicano Corpez
 
Organizing
 Organizing Organizing
Two letter scrabble words
Two letter scrabble wordsTwo letter scrabble words
Two letter scrabble words
Perla Pelicano Corpez
 
7 letter scrabble q words
7 letter scrabble q words7 letter scrabble q words
7 letter scrabble q words
Perla Pelicano Corpez
 

More from Perla Pelicano Corpez (20)

Adjusted ESIP FINAL 2016-2019
Adjusted ESIP FINAL 2016-2019Adjusted ESIP FINAL 2016-2019
Adjusted ESIP FINAL 2016-2019
 
Training design on SIM development
Training design on SIM developmentTraining design on SIM development
Training design on SIM development
 
Project VILMA of Tinago NHS
Project VILMA of Tinago NHSProject VILMA of Tinago NHS
Project VILMA of Tinago NHS
 
Silvestre T. Lumarda - The Working Mayor of the Booming Municipality of Inopacan
Silvestre T. Lumarda - The Working Mayor of the Booming Municipality of InopacanSilvestre T. Lumarda - The Working Mayor of the Booming Municipality of Inopacan
Silvestre T. Lumarda - The Working Mayor of the Booming Municipality of Inopacan
 
27. nature of directing
27. nature of directing27. nature of directing
27. nature of directing
 
24. movements of employees
24. movements of employees24. movements of employees
24. movements of employees
 
21. compensation and wages
21. compensation and wages21. compensation and wages
21. compensation and wages
 
16. theories of organization
16. theories of organization16. theories of organization
16. theories of organization
 
10. scope+and+nature+of+planning
10. scope+and+nature+of+planning10. scope+and+nature+of+planning
10. scope+and+nature+of+planning
 
9. forms of business organization
9. forms of business organization9. forms of business organization
9. forms of business organization
 
8. pestle analysis
8. pestle analysis8. pestle analysis
8. pestle analysis
 
6. internal and external analysis
6. internal and external analysis6. internal and external analysis
6. internal and external analysis
 
2. personal swot analysis
2. personal swot analysis2. personal swot analysis
2. personal swot analysis
 
1 c. functions, roles and skills of a manager2
1 c. functions, roles and skills of a manager21 c. functions, roles and skills of a manager2
1 c. functions, roles and skills of a manager2
 
1 b. functions of manager
1 b. functions of manager1 b. functions of manager
1 b. functions of manager
 
1 a. functions of management
1 a. functions of management1 a. functions of management
1 a. functions of management
 
1. external factors that affects business environment
1. external factors that affects business environment1. external factors that affects business environment
1. external factors that affects business environment
 
Organizing
 Organizing Organizing
Organizing
 
Two letter scrabble words
Two letter scrabble wordsTwo letter scrabble words
Two letter scrabble words
 
7 letter scrabble q words
7 letter scrabble q words7 letter scrabble q words
7 letter scrabble q words
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 

Creating peer to peer network nadia perandos bisnar

  • 1. Task1. Creating Peer to Peer Network
  • 2. To create a peer network, follow these steps for each computer connected to the network: 1. Shut down the computer and install the network card and appropriate cabling for each computer. NOTE: For information about how to configure your network adapters and physically connect your computers, consult the documentation included with your network adapters or contact the manufacturer(s) of your network adapters. 2. Start Windows and install the network drivers. Windows may detect your network card and install the drivers when you start the computer. If the network card drivers are not included with Windows, follow the manufacturer's instructions about how to install the network drivers.
  • 3. 3. Choose a client and a common protocol for each computer. To do this, follow these steps: a. Click Start, point to Settings, click Control Panel, and then double-click Network. b. Click Add, click Client, and then click Add. c. In the Manufacturers box, click the appropriate manufacturer, click the appropriate client in the Network Clients box, and then click OK. d. Click Add, click Protocol, and then click Add. e. In the Manufacturers box, click the appropriate manufacturer, click the appropriate protocol in the Network Protocol box, and then click OK.
  • 4. 4. Configure a peer server. Each computer that is configured for File and Printer Sharing can act as a server. To configure a computer for File and Printer Sharing, use the following steps: a. Click Start, point to Settings, click Control Panel, and then double-click Network. b. Click File and Print Sharing, click one or both options to share files and printers, click OK, and then click OK again. c. Click Yes when you are prompted to restart your computer.
  • 5. 5. Give each computer a unique computer name. To do this, use the following steps: a. Click Start, point to Settings, click Control Panel, and then double-click Network. b. On the Identification tab, type a unique name in the Computer name box. c. Click OK, and then click Yes when you are prompted to restart your computer.
  • 6. Task 2. Using the Internet for Research
  • 7. In this activity, you will learn how useful the Internet can be for a PC support technician. 1. Using your own or computer laboratory, pretend that the motherboard manual is not available and you need to replace a faulty processor. Identify the manufacturer and model of the motherboard by looking for the manufacturer name and model number stamped on the board. Research the Web site for that manufacturer. Print the list of processors the board can support. 2. Research the Web site for your motherboard and print the instructions for flashing BIOS.
  • 8. 3. Research the Abit Web site (www.abit.com.tw) and print a photograph of a motherboardthat has a riser slot. Also print the photograph of the riser card that fits this slot. What isthe function of the riser card?
  • 10. Equipment, Tools and Materials Required: - UTP cables - 4 Computer units - 1 hub
  • 11. Given the following materials, set-up a network connection on four computers.
  • 12.
  • 13. More Security for Remote Desktop Task2. Analyze the situations below and answer the questions that follow.
  • 14. When Enzo travels on company business, he finds it’s a great help to be able to access his office computer from anywhere on the road using Remote Desktop. However, he wants to make sure his office computer as well as the entire corporate network is as safe as possible. One way you can help Enzo to add more security is to change the port that Remote Desktop uses. Knowledgeable hackers know that Remote Desktop uses port 3389, but if you change this port to a secret port, hackers are less likely to find the open port. Search the Microsoft Knowledge Base articles (support.microsoft.com) for a way to change the port that Remote Desktop uses. Practice implementing this change by doing the following:
  • 15. 1. Set up Remote Desktop on a computer to be the host computer. Use another computer (the client computer) to create a Remote Desktop session to the host computer. Verify the session works by transferring files in both directions. 2. Next, change the port that Remote Desktop uses on the host computer to a secret port. Print a screen shot showing how you made the change. Use the client computer to create a Remote Desktop session to the host computer using the secret port. Print a screen shot showing how you made the connection using the secret port. Verify the session works by transferring files in both directions. 3. What secret port did you use?