A Sample Logbook of Computer Hardware and Software Architecture
University: WWW University
College : Rabins XP
Semester: Autumn
Module code : CT1044NP
Submitted By : Ma Prasad
Group: RXPWEB01
ID No : 98776941
Submitted To: Mr. Guru Ba and Mrs. Guru Ma
Date: 2nd September 2016
Table of Contents
Table of Abbreviations:Table of Figures
Week 1: Introduction to Computer System
1.1 Introduction
1.2 Objectives
1.3 Activities
1.3.1 Lecture
1.3.2 Tutorial
1.3.3 Workshop
1.4 Findings
1.5 Conclusion
Week 2 – Safe Lab Procedures and Tool Use
2.1 Introduction
2.2 Objectives
2.3 Activities
2.3.1 Lecture
2.3.2 Tutorial
2.3.3 Workshop
2.4 Findings
2.5 Conclusion
Week 3 – Computer Assembly
3.1 Introduction
3.2 Objectives
3.3 Activities
3.3.1 Lecture
3.3.2 Tutorial
3.3.3 Workshop
3.4 Findings
3.5 Conclusion
Week 4 – Computer Maintenance and Troubleshooting
4.1 Introduction
4.2 Objectives
4.3 Activities
4.3.1 Lecture
4.3.2 Tutorial
4.3.3 Workshop
4.4 Findings
4.5 Conclusion
Week 5- Fundamental Operating System
5.1 Introduction
5.2 Objectives
5.3 Activities
5.3.1 Lecture
5.3.2 Tutorial
5.3.3 Workshop
5.4 Findings
5.5 Conclusion
Week 6 – Advanced Operating System
6.1 Introduction
6.2 Objectives
6.3 Activities
6.3.1 Lecture
6.3.2 Tutorial
6.3.3 Workshop
6.4 Findings
6.5 Conclusion
Week 7- Fundamental Network
7.1 Introduction
7.2 Objectives
7.3 Activities
7.3.1 Lecture
7.3.2 Tutorial
7.3.3 Workshop
7.4 Findings
7.5 Conclusion
Week 8- Advanced Networks
8.1 Introduction 23
8.2 Objectives 23
8.3 Activities 24
8.3.1 Lecture 24
8.3.2 Tutorial 24
8.3.3 Workshop 24
8.4 Findings 24
8.5 Conclusion 25
Week 9 – Computer Security 25
9.1 Introduction
9.2 Objectives
9.3 Activities
9.3.1 Lecture
9.3.2 Tutorial
9.3.3 Workshop
9.4 Findings
9.5 Conclusion
Table of Abbreviations
| S.N. | Abbreviated Form | Extended Form |
| 1. | IT | Information Technology |
| 2. | CompTIA | Computing Technology Industry Association |
| 3. | EUCIP | European Certification of Informatics Professional |
| 4. | CCNA | Cisco Certified Networking Associate |
| 5. | CCNP | Cisco Certified Networking Professional |
| 6. | CCIE | Cisco Certified Internetworking Expert |
| 7. | CISSP | Certified Information Systems Security Professional |
| 8. | MCP | Microsoft Certified Systems Administrator |
| 9. | MCSA | Microsoft Certified Systems Administrator |
| 10. | MCSE | Microsoft Certified Systems Engineer |
| 11. | Network+ | CompTIA Network Certification |
| 12. | Linux+ | CompTIA Linux Certification |
| 13. | USB | Universal Serial Bus |
| 14. | SCSI | Small Computer System Interface |
| 15. | PS | Personal System |
| 16. | CD | Compact Disk |
| 17. | DVD | Digital Versatile Disk |
| 18. | RAM | Random Access Memory |
| 19. | ROM | Read Only Memory |
| 20. | CPU | Central Processing Unit |
| 21. | UPS | Uninterruptible Power Supply |
| 22. | SMPS | Switch Model Power Supply |
| 23. | SPS | Surge Power Supply |
| 24. | ZIF | Zero Insertion Force |
| 25. | ATX | Advance Technology Extended |
| 26. | SATA | Serial ATA |
| 27. | PATA | Parallel ATA |
| 28. | DOS | Disk Operating System |
| 29. | GUI | Graphical User Interface |
| 30. | OS | Operating System |
| 31. | NOS | Network Operating System |
| 32. | OSI | Open Systems Interface |
| 33. | TCP/ IP | Transmission Control Protocol/ Internet Protocol |
| 34. | LAN | Local Area Network |
| 35. | WAN | Wide Area Network |
| 36. | WLAN | Wireless LAN |
| 37. | DHCP | Dynamic Host Configuration Protocol |
| 38. | IP | Internet Protocol |
| 39. | CAT 5 | Category 5 |
| 40. | RJ45 | Registered Jack 45 |
| 41. | RDC | Remote Desktop Connection |
| 42. | NetBUI | NetBIOS Extended User Interface |
| 43. | IPX/ SPX | Internetwork Packet Exchange/ Sequenced Packed Exchange |
| 44. | POTS | Plain Old Telephone Service |
| 45. | ISDN | Integrated Services Digital Network |
| 46. | DSL | Digital Subscriber Line |
| 47. | ADSL | Asymmetric Digital Subscriber Line |
| 48. | MAC | Media Access Control |
| 49. | IPV4 | Internet Protocol Version 4 |
| 50. | DoS | Denial –of- Service |
| 51. | AT | Advanced Technology |
| 52. | PC | Personal Cmputer |
| 53. | RISC | Reduced Instruction Set Computer |
| 54. | CISC | Complex Instruction Set Computer |
| 55. | RAM | Random Access Memory |
| 56. | ROM | Read Only Memory |
| 57. | NIC | Network Interface Card |
| 58. | MODEM | Modulator Demodulator |
| 59. | ESD | Electro Static Discharge |
| 60. | CLI | Command Line Interface |
| 61. | GUI | Graphical User Interface |
| 62. | NTFS | New Technology File System |
| 63. | FAT32 | File Allocation Table 32-Bit |
| 64. | HTTP | Hyper Text Transfer Protocol |
| 65. | FTP | File Transfer Protocol |
| 66. | POP | Post Office Protocol |
| 67. | DNS | Domain Name Server |
| 68. | DHCP | Dynamic Host Configuration Protocol |
| 69. | SSID | Service Set Identification |
| 70. | WEP | Wired Equivalent Privacy |
| 71. | WPA | Wi-Fi Protected Access |
Table of Figures
Figure 1- Computer System………………………………………………………………………………………. 7
Figure 2- Case form factors……………………………………………………………………………………… 8
Figure 3- PSU output………………………………………………………………………………………………. 8
Figure 4- Hazards…………………………………………………………………………………………………. 10
Figure 5- Anti- Static Wrist Band………………………………………………………………………………. 10
Figure 6- Safety Guidelines……………………………………………………………………………………… 11
Figure 8- Installing the PSU…………………………………………………………………………………….. 13
Figure 7- Computer Assembly………………………………………………………………………………….. 13
Figure 9- Hardware Maintenance…………………………………………………………………………….. 15
Figure 10- Software Maintenance……………………………………………………………………………. 16
Figure 11- Different OS………………………………………………………………………………………….. 18
Figure 12- Different NOS……………………………………………………………………………………….. 18
Figure 13- Upgrading OS………………………………………………………………………………………… 21
Figure 14- File Systems………………………………………………………………………………………….. 21
Figure 15- Features of different OS…………………………………………………………………………… 22
Figure 16- LAN topologies……………………………………………………………………………………… 24
Figure 17- UTP cable…………………………………………………………………………………………….. 25
Figure 18- Fiber Optics Cable…………………………………………………………………………………… 25
Figure 19- Different Ports………………………………………………………………………………………. 27
Figure 20 ……………………………………………………………………………………………………………. 28
Figure 21- Common TCP/IP attacks………………………………………………………………………….. 30
Figure 22- Wireless Security Techniques…………………………………………………………………….. 31
Links will be added one by one when posts being published.

Recent Comments