SlideShare a Scribd company logo
NETWORKING
01:00 PM
Mrs Syed Nasir give us a short briefing on networking
01:20 PM
Tutorial leader CP3T18 Timothy Lampung asked us to decided
who will be doing wiring and searching for tutorial of
networking
01:30 PM
Four laptop have been used to doing set up
Four student choosen as wiring
( Timothy Lampung,Evan Ang,Uzaida,Jeremy)
Others was searching for tutorial
01:35 PM
The four laptop was try to connect at the access point
Student that use Premium,Ultimate,Professional,Starter and
home basic does not used
01:40 PM
One student from CP3T17 make a list the window’s that
student used
The wire was not arrange properly,so Mrs Syed Nasir told us
to improve it
01:50 PM
The four laptop still not connect
02:00 PM
All student still struggling for connection because at first some
student use windows 8 that will disturb the connection
02:05 PM
One laptop is connected
02:10 PM
One laptop is being changed with another student’s laptop
02:15 PM
Only three laptop are connected
02:20 PM
Administrator check every student’s laptop in the laboratory
To make everybody connect one by one
Administrator give us the password and teach how to connect
02:25 PM
Only eleven laptop connected including the four laptop that
connect to access point
Other laptop failed to connect after many times tried
02:30 PM
Student open the homegroup
Start to share file with the homegroup
Enjoying watching other files
02:40 PM
 Conclusion, if windows 8 want to connect,it must be a leader

More Related Content

Viewers also liked

Cp3 t18 words assignment1 group a
Cp3 t18 words assignment1 group aCp3 t18 words assignment1 group a
Cp3 t18 words assignment1 group a
alfyealvera
 
Group 1 [special group] kakom & academic
Group 1 [special group]   kakom & academicGroup 1 [special group]   kakom & academic
Group 1 [special group] kakom & academic
alfyealvera
 
BLACK HOLE FOR FYBA STUDENTS
BLACK HOLE FOR FYBA STUDENTS BLACK HOLE FOR FYBA STUDENTS
BLACK HOLE FOR FYBA STUDENTS
aksshaypara
 
911
911911
Unemployment
UnemploymentUnemployment
Unemployment
Putri Minartiningtyas
 
Teoría duscursiva guía 4 paragraph __ nelson guiza & loris nagles
Teoría duscursiva guía 4    paragraph __ nelson guiza & loris naglesTeoría duscursiva guía 4    paragraph __ nelson guiza & loris nagles
Teoría duscursiva guía 4 paragraph __ nelson guiza & loris nagles
Loreth Nagles
 
Jiebah, lol
Jiebah, lolJiebah, lol
Jiebah, lol
alfyealvera
 
911
911911
Unemployment
UnemploymentUnemployment
Unemployment
Putri Minartiningtyas
 
Lab report alfye alvera
Lab report   alfye alveraLab report   alfye alvera
Lab report alfye alvera
alfyealvera
 
Testing out slideshare
Testing out slideshareTesting out slideshare
Testing out slideshare
hisunshiine
 
black hole
 black hole black hole
black hole
aksshaypara
 
How to create a blog (CP students)
How to create a blog (CP students)How to create a blog (CP students)
How to create a blog (CP students)
IES Llorenç Garcias i Font
 
Vodafone service
Vodafone serviceVodafone service
Vodafone service
Suma Lima
 
Sprite ppt
Sprite pptSprite ppt
Sprite ppt
Suma Lima
 

Viewers also liked (16)

Cp3 t18 words assignment1 group a
Cp3 t18 words assignment1 group aCp3 t18 words assignment1 group a
Cp3 t18 words assignment1 group a
 
Class5
Class5Class5
Class5
 
Group 1 [special group] kakom & academic
Group 1 [special group]   kakom & academicGroup 1 [special group]   kakom & academic
Group 1 [special group] kakom & academic
 
BLACK HOLE FOR FYBA STUDENTS
BLACK HOLE FOR FYBA STUDENTS BLACK HOLE FOR FYBA STUDENTS
BLACK HOLE FOR FYBA STUDENTS
 
911
911911
911
 
Unemployment
UnemploymentUnemployment
Unemployment
 
Teoría duscursiva guía 4 paragraph __ nelson guiza & loris nagles
Teoría duscursiva guía 4    paragraph __ nelson guiza & loris naglesTeoría duscursiva guía 4    paragraph __ nelson guiza & loris nagles
Teoría duscursiva guía 4 paragraph __ nelson guiza & loris nagles
 
Jiebah, lol
Jiebah, lolJiebah, lol
Jiebah, lol
 
911
911911
911
 
Unemployment
UnemploymentUnemployment
Unemployment
 
Lab report alfye alvera
Lab report   alfye alveraLab report   alfye alvera
Lab report alfye alvera
 
Testing out slideshare
Testing out slideshareTesting out slideshare
Testing out slideshare
 
black hole
 black hole black hole
black hole
 
How to create a blog (CP students)
How to create a blog (CP students)How to create a blog (CP students)
How to create a blog (CP students)
 
Vodafone service
Vodafone serviceVodafone service
Vodafone service
 
Sprite ppt
Sprite pptSprite ppt
Sprite ppt
 

Recently uploaded

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 

Recently uploaded (20)

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 

Report cp3 t18 cerollida

  • 1. NETWORKING 01:00 PM Mrs Syed Nasir give us a short briefing on networking 01:20 PM Tutorial leader CP3T18 Timothy Lampung asked us to decided who will be doing wiring and searching for tutorial of networking 01:30 PM Four laptop have been used to doing set up Four student choosen as wiring ( Timothy Lampung,Evan Ang,Uzaida,Jeremy) Others was searching for tutorial
  • 2. 01:35 PM The four laptop was try to connect at the access point Student that use Premium,Ultimate,Professional,Starter and home basic does not used 01:40 PM One student from CP3T17 make a list the window’s that student used The wire was not arrange properly,so Mrs Syed Nasir told us to improve it
  • 3. 01:50 PM The four laptop still not connect 02:00 PM All student still struggling for connection because at first some student use windows 8 that will disturb the connection
  • 4. 02:05 PM One laptop is connected 02:10 PM One laptop is being changed with another student’s laptop 02:15 PM Only three laptop are connected
  • 5. 02:20 PM Administrator check every student’s laptop in the laboratory To make everybody connect one by one Administrator give us the password and teach how to connect 02:25 PM Only eleven laptop connected including the four laptop that connect to access point Other laptop failed to connect after many times tried
  • 6. 02:30 PM Student open the homegroup Start to share file with the homegroup Enjoying watching other files
  • 7. 02:40 PM  Conclusion, if windows 8 want to connect,it must be a leader