Posts

L3 computer network

Network devices workstation a workstation is a computer intended for individual use that is faster and more capable than a personal computer. it's intended for business or professional use. workstations and applications designed for them are used by small engineering companies. NIC.  a Network interface card (NIC) is a computer hardware component that  allows a computer to connect to a network. most new computer have either ethernet capabilities integrated into the motherboard chipset, or use an inexpensive dedicated ethernet chip connected through the PCI Express bus. Print the printer features are capabilities that can be controlled by the unidrv. by listing a feature and its characteristics in a GPD file, each printer feature can assigned to one or more state and printer options are used to define the possible states. the function of a printer is to provide the user with a copy if what is input into the printer via your computer. the multi-function printer, input/output c
Image
network models OSI model and TCP/IP a OSI model is a conceptual framework for understanding relationships. the purpose of the OSI reference model is to guide vendors and developers so the difital communication products. the physical layer (layer 1) layer 1 of the OSI model is named the physical layer because it is responsible for the transmission and reception of wire level. for example, the physical layer is where it is dictated how bits are represented across a specific networking medium. the data link layer (layer 2) layer 2 of the OSI model is named the data link layer and is responsible for link establishment and termination, frame traffic control, sequencing, acknowledgement, error checking, and media accress management. the network layer (layer 3) layer 3 of the OSI model is named the network layer and is where routing of network traffic begins. the network layer not only makes the traffic routing decisions but also provides traffic control, fragmentation, and logica

lo 4 gather and process information

Image

lo4, be able to use it tools to produce management information

Image
Tools database A database is a collection of  information  that is organized so that it can be easily accessed, managed and updated. artificial intelligence Artificial Intelligence (AI) is a field that has a long history but is still constantly and actively growing and changing. In this course, you’ll learn the basics of modern AI as well as some of the representative applications of AI. Along the way, we also hope to excite you about the numerous applications and huge possibilities in the field of AI, which continues to expand human capability beyond our imagination. spreadsheets A spreadsheet is a sheet of paper that shows accounting or other data in rows and columns; a spreadsheet is also a computer  application program  that simulates a physical spreadsheet by capturing, displaying, and manipulating  data  arranged in rows and columns. The spreadsheet is one of the most popular uses of the personal computer. internet the  Internet  was initially develo

lo3 MIS company

MIS management information systems amazon were a company of builders. of pioneers. it's our job to make bold bets and we get our energy from inventing on behalf of customers. here are just some of the innovations pioneered by amazon, and were always looking for the next one. refrences   https://www.amazon.com/p/feature/tv76jef8gz289rm

lo3 know the features and functions of information systems

lo3 know the features and functions of information systems features of information systems data: Data  is information stored in its raw (or most basic) form. The reason why information is stored like this is so that only the information that is needed for specific functions can be used. people: The first group of people we are going to look at play a role in designing, developing, and building information systems. These people are generally very technical and have a background in programming and mathematics. hardware: software: Application software  are programs that direct the performance of a particular use, or application, of computers to meet the information processing needs of end users. They include  A off-the-shelf @  software such as word processing and spreadsheet packages, as well as internally or externally developed software that is designed to meet the specific needs of an organization. telecommunications. many MIS may are delivered across an intranet within a c

computer codes of pratice

here's a sample of a code of practice for a business. feel free to adapt adapt and use it for your own organization. ensure that you check it with your legal department or legal advisor before establishing and issuing a code of practice, as this type of document will almost certainly have contractual implications for your organization. involving customers in the drafting of a code practice is also useful. during world war ll, the germans used enigma, a cipher machine, to develop unbreakable codes for sending messages. enigma's settings offered 158,000,000,000,000,000,000 possible solutions yet the allies were eventually able to crack code. Accesss computing facilities are provided by uodit for the university as a whole and by schools and departments for their members access to facilities is normally arranged by the allocation of a unique user identifier (often called a username or login name). for some facilities the presentation of a university ID card or other form of