Verified Document

Computer Lab Would Be To Term Paper

¶ … computer lab would be to support the computing needs of all classes in the school on a fixed schedule and offer learning activities across the entire curriculum. The activities will make learning fun and provide students with opportunities to incorporate technology into projects and demonstrate their abilities in a different way. It will also help the faculty to better facilitate presentation and new concepts and ideas. The computer lab should include the following:

Workstations for the students which includes the basic operating system, productivity software, and all in one computer security

Computer Station for the teacher which includes an operating system, productivity software, all in one computer security and software for monitoring the students

Smartboard

Ethernet crimping kit with 1000' of cable and 50 plugs.

Hub with 24 ports 10/100 fast Ethernet + 2 ports video splitter to connect a monitor and the Smartboard to one computer black and white laser networked printer

Wireless network cards

Wireless Connection for SMART Board

Switches

1000 feet of CAT 5e Cable

(50-count) pack of RJ 45 Ethernet connectors

Minimum Hardware Requirements (www.dell.com)

Small Desktop Computer (Intel® Pentium® 4 Processor 2.80GHz, 1M/533MHz FSB, Microsoft® Windows® XP Professional Operating System, 256MB DDR SDRAM, 60GB Hard Drive, 17" Flat Panel Display (E152), Dell AS500 Sound Bar Speakers, Integrated Intel Extreme Graphics 2 Graphics Card, 48X32 CDRW/DVD, Integrated 5.1 Channel Audio Sound Card, PCMCIA Type II slot, 1.44MB 3.5" Floppy Drive, Windows XP Office Standard)

Network Computer Printer (Monochrome Laser, 1200 x 1200 dpi, 25 ppm, 160 MB RAM, 10/100 BaseT Ethernet built-in for Networking, TCP/IP Setup Utility, 100 to 127 volts (V) at 50 to 60 hertz (Hz), Power cable included with, 3,000-page Toner cartridge and 250-sheet standard drawer)

Wireless-G Access Point

Wireless Network PC Card

Smart Board 580 72"/182.9 diagonal with Smart Board Floor Stand 570

Ethernet Switch

CAT-5 E, UTP, White, Bulk Cable 1000 feet, 350 MHz, Stranded, 24 AWG, 1000 ft Part

RJ 45 Ethernet Connectors Pack of 50

Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Learning Problems Briihl, D.S. 2001
Words: 995 Length: 2 Document Type: Annotated Bibliography

Kinshuk, Liu, T., & Graf, S. (2009). Coping with mismatched courses: Students' behaviour and performance in courses mismatched to their learning styles. Educational Technology Research and Development, 57(6), 739-752. Retrieved from ERIC database. Kinshuk and Graf first establish the fact that students are often required to learn material that is not adaptive to their preferred learning style. The work then goes on to analyze how an interactive adaptive online/computer aided system

Meeting the Compliance and Computer Needs of the Adult Learner
Words: 3459 Length: 13 Document Type: Term Paper

Computer Adult Learner An employee is terminated after 23 years of service. Suddenly thrust into the work arena without the skills to make a smooth transition. In order to make a transition into the computerized workforce it will be necessary to get educational skills up to speed. (The employee has never had the need to learn the basics such as the use of a mouse, word, excel, power point or even

Computer Security a Second Look
Words: 588 Length: 2 Document Type: Discussion Chapter

Using Perl LWP Library scripting and data harvesting tools, data is quickly collected, aggregated and used to launch a phishing attack with a stunning success rate of 72%. The rapid nature of how this attack was planned and executed shows how lethal from a privacy standpoint phishing can be when based on social network-based data. There is an implied higher level of trust with any e-mail originating from social

Computer Assisted Learning Cal , Once a Novel
Words: 1827 Length: 6 Document Type: Essay

Computer assisted learning (CAL), once a novel concept, is a staple in numerous classrooms across the country, from the primary education to the university level. Computer assisted learning offers both students and teachers a daunting and near-limitless education supplement. However, this paper will examine examples where computer assisted learning is more or less effective and why. It will be revealed that computer assisted learning programs that are most effective are

Computer Security We Have Achieved
Words: 1915 Length: 7 Document Type: Essay

This particular instance was significant as the attackers used a generic approach instead of a site specific or application specific exploitation by devising tools that used the web search engines to identify ASP applications that are vulnerable. SQL injection attack was used to propagate the malicious code that exploited zero day vulnerability in Microsoft Internet explorer last year. [Symantec, (2009 ) pg. (47)] the aim of the attackers employing

Computer Forensics Case Study
Words: 2206 Length: 8 Document Type: Research Paper

Computer Forensics The issue at hand involves the examination of a scene from an office space within Widget Corporation. We find that this is the assigned office for a Mr. Didit. The information we have at hand is digital -- a photograph taken from an approximate distance of 3 feet from the occupant's desk. Using the photograph, we find that there are a number of electronic and non-electronic devices and our

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now