Computer Lab Would Be To Term Paper

PAGES
1
WORDS
305
Cite

¶ … computer lab would be to support the computing needs of all classes in the school on a fixed schedule and offer learning activities across the entire curriculum. The activities will make learning fun and provide students with opportunities to incorporate technology into projects and demonstrate their abilities in a different way. It will also help the faculty to better facilitate presentation and new concepts and ideas. The computer lab should include the following:

Workstations for the students which includes the basic operating system, productivity software, and all in one computer security

Computer Station for the teacher which includes an operating system, productivity software, all in one computer security and software for monitoring the students

Smartboard

Ethernet crimping kit with 1000' of cable and 50 plugs.

Hub with 24 ports 10/100 fast Ethernet + 2 ports video splitter to connect a monitor and the Smartboard to one computer black and white laser networked printer

Wireless network cards

Wireless Connection for SMART Board

Switches

1000 feet of CAT 5e Cable

(50-count) pack of RJ 45 Ethernet connectors

Minimum Hardware Requirements (www.dell.com)

Small Desktop Computer (Intel® Pentium® 4 Processor 2.80GHz, 1M/533MHz FSB, Microsoft® Windows® XP Professional Operating System, 256MB DDR SDRAM, 60GB Hard Drive, 17" Flat Panel Display (E152), Dell AS500 Sound Bar Speakers, Integrated Intel Extreme Graphics 2 Graphics Card, 48X32 CDRW/DVD, Integrated 5.1 Channel Audio Sound Card, PCMCIA Type II slot, 1.44MB 3.5" Floppy Drive, Windows XP Office Standard)

Network Computer Printer (Monochrome Laser, 1200 x 1200 dpi, 25 ppm, 160 MB RAM, 10/100 BaseT Ethernet built-in for Networking, TCP/IP Setup Utility, 100 to 127 volts (V) at 50 to 60 hertz (Hz), Power cable included with, 3,000-page Toner cartridge and 250-sheet standard drawer)

Wireless-G Access Point

Wireless Network PC Card

Smart Board 580 72"/182.9 diagonal with Smart Board Floor Stand 570

Ethernet Switch

CAT-5 E, UTP, White, Bulk Cable 1000 feet, 350 MHz, Stranded, 24 AWG, 1000 ft Part

RJ 45 Ethernet Connectors Pack of 50

Cite this Document:

"Computer Lab Would Be To" (2008, November 15) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/computer-lab-would-be-to-26779

"Computer Lab Would Be To" 15 November 2008. Web.25 April. 2024. <
https://www.paperdue.com/essay/computer-lab-would-be-to-26779>

"Computer Lab Would Be To", 15 November 2008, Accessed.25 April. 2024,
https://www.paperdue.com/essay/computer-lab-would-be-to-26779

Related Documents

Similar to the suggestions offered by Gahala (2001), Brody (1995) identified several traits to be considered when developing a comprehensive professional development program. Among those traits include the reputation of the trainer, the rewards available to the participants, both tangible and intangible, and the support of the administration. Traditional staff development models have required everyone to participate at the same time and in the same location creating problems such

Kinshuk, Liu, T., & Graf, S. (2009). Coping with mismatched courses: Students' behaviour and performance in courses mismatched to their learning styles. Educational Technology Research and Development, 57(6), 739-752. Retrieved from ERIC database. Kinshuk and Graf first establish the fact that students are often required to learn material that is not adaptive to their preferred learning style. The work then goes on to analyze how an interactive adaptive online/computer aided system

Computer Adult Learner An employee is terminated after 23 years of service. Suddenly thrust into the work arena without the skills to make a smooth transition. In order to make a transition into the computerized workforce it will be necessary to get educational skills up to speed. (The employee has never had the need to learn the basics such as the use of a mouse, word, excel, power point or even

In some areas it will be used for more populist applications such as, in schools to introduce students to the discipline and within an environment that will give opportunity for participation of non-academics in academic discussion. Conclusion Computer has in a great deal widened the world's knowledge. As the fastest technology that has ever evolved, it has given opportunity for the children and adults, for personal, academic and commercial use. It

Using Perl LWP Library scripting and data harvesting tools, data is quickly collected, aggregated and used to launch a phishing attack with a stunning success rate of 72%. The rapid nature of how this attack was planned and executed shows how lethal from a privacy standpoint phishing can be when based on social network-based data. There is an implied higher level of trust with any e-mail originating from social

This particular instance was significant as the attackers used a generic approach instead of a site specific or application specific exploitation by devising tools that used the web search engines to identify ASP applications that are vulnerable. SQL injection attack was used to propagate the malicious code that exploited zero day vulnerability in Microsoft Internet explorer last year. [Symantec, (2009 ) pg. (47)] the aim of the attackers employing