What openings are on the front of the computer

Assignment Help Computer Engineering
Reference no: EM131391211

Assignment: Hardware Lab

DIRECTIONS: You will be assigned to a group. Work with Group Members to gather information and take required pictures. If you designate one person to take pictures, make sure that person shares the pictures with everyone in the group. OR you may decide that everyone in the group takes their own pictures. Make sure you work together and help one another explore the system unit given to you. Take notes as you answer the questions so that you can prepare your Outside of Class Hardware Report, which is submitted individually. Scroll down to see guidelines for the Outside of Class Hardware Report.

1. Take pictures of the following

• Your team (ask someone to help so you can get everyone in the picture)
• Front of System Unit
• Back of System Unit
• Motherboard
• Picture installing memory
• CPU
• Adapter card(s)
• Other hardware pieces of interest

2. Front of System Unit:

• What openings are on the front of the computer?
• What kinds of storage media can be used with this computer?
• Are there any openings for inserting new hard drives?

3. Document Ports on Front and Back:

• Create table listing the name of each port, number available, and what they are used for. Keep careful records since you'll need to document this for the lab report. To save time, you may want to lookup what the port is used for later.

4. Open computer case with group.

i. Memory

• Your goal is to remove and insert memory.

• Keep track of the steps that you used to do this - everything from opening the case to closing it back up. You'll need to document these steps later. Should be detailed enough that someonewho is unfamiliar with computers canfollow.

ii. Adapter Cards

• What adapter cards are in your computer? What are they used for?

• How much space does the motherboard have for additional adapter cards?

5. Download all the pictures from your team's camera. Make sure everyone on your team has access to these pictures.

Outside of class: Hardware Lab Report

Each individual in the team needs to createhis/her own Lab Report using Microsoft Word. Hardware Lab Report due date is in the calendar.Submit this report to the course dropbox. The report should contain the following components:

6. Report Cover listing the name of the person creating this report.

7. Outside of the System Unit

• Front: document your answers to 2 above
• Ports: document your answers to 3 above

8. Inside the System Unit

• Motherboard: Include the picture of the motherboard. Label the CPU, adapter slots, memory modules, and at least 2 other items.
• Adapter card: document your answers to 4.ii

9. Memory

• Include your steps for installing memory (from step 4.i above). Include and label at least one of the provided pictures to help illustrate your points.

10. Glossary

• Create a table that has two columns. In the first column, list the term. In the second column, provide its definition from your textbook.
• Terms to be included in the glossary: port, adapter card, memory, system unit, drive bay, motherboard, adapter slot, hard drive
• Sort the table alphabetically (A to Z) by the first column.

11. Table of Contents (generated by Word)

• Apply heading 1 style to text that you want in the table of contents. On the Home tab, in the Styles group, click the style that you want (like Heading 1).

• Place your cursor where you want the Table of Contents to appear in your document.

• On the References tab, in the Table of Contents group, click Table of Contents, and then click the table of contents style that you want.

Reference no: EM131391211

Questions Cloud

Explain the key inherent dangers of the chosen threats : SEC 420- Explain the key inherent dangers of the chosen threats, and indicate the key reasons why you believe such threats pose more of a risk than other current ones in existence. Justify your answer.
Discuss about the post given below : Do these statistics contradict the belief that the average body temperature is 98.6? If the true average temperature is indeed 98.6° F and we obtain a sample of n = 130 healthy adults, we would not expect the sample mean to come out exactly equal ..
Process of photosynthesis : What major molecules are being reduced and oxidized in the process of photosynthesis?
Possibility of the toxicant being a carcinogen : Select a toxicant that can be classified as an air,water or soil pollutant or an organic solvent .Discuss the exposure limits of this toxicant ,how an individual may be exposed and toxic effects .Also discuss the possibility of the toxicant being ..
What openings are on the front of the computer : What openings are on the front of the computer? What kinds of storage media can be used with this computer? Are there any openings for inserting new hard drives?
Find the mass flow rate of air : Electricity and process heat requirements of a manufacturing facility are to be met by a cogeneration plant consisting of a gas turbine and a heat exchanger for steam production.
Explanation and application of concepts : Explain why a sea star that lives in the ocean (3.5 % salt) would not survive long if you took it home and put it in a bathtub filled with tap water (0.0 % salt).
Explain how enzymes speed up chemical reactions : Explain how enzymes speed up chemical reactions. What is a factor that could speed up or slow down enzyme speed?
State the conclusion in non-technical terms : Test the claim that for the adult population of one town, the mean annual salary is givenbyμ= 30,000. Sample data are summarized as n= 17, = $22,298, and s= $14,200. Use asignificance level of α= 0.05.State the null and alternative hypotheses.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Supply supporting evidence for the decision

Now that you have a normal plan and have identified the information that you need for this program, you feel you are ready to start development. You told your uncle that you would need to purchase software for this program. Since your uncle is in ..

  What stack elements remain

suppose a stack-oriented processor that includes the stack operations PUSH and POP. Arithmetic operations automatically involve the top one or two stack elements. Begin with an empty stack.

  Suppose the network is packet-switched virtual circuit

there is a wide area network in which a special route was selected.propagation delay is so small that it could be

  Suppose you present overview of computers and software to

suppose you present overview of computers and software to individuals who have not utilized computers extensively and

  Why would a system designer wish to make unicode

Why would a system designer wish to make Unicode the default character set for their new system? What reason(s) could you give for not using Unicode as a default?

  How you format outputs that involve floating point

Discuss how you format outputs that involve floating point. Provide examples - Many programs require the use of an input mechanism to get data into the program and an output mechanism to present results and guidance.

  Using a while structure for designing pseudocode

By using a WHILE structure for designing the pseudocode in order to prepare a monthly report for the legal clinic.

  In a separate word document reflect on the writing process

you work at top line manufacturing and your boss has asked you to confirm a commitment made by a motivational speaker

  Why the user clicks the read file button to read the file

What I need help with is to get the dice to roll 100 times instead of just one. So read file results will show the results of 100 rolls of the dice. The file tab also has instructions as to how program should work.

  Which of the following schemes is a cryptosystem what is

which of the following schemes is a cryptosystem? what is the plaintext space the ciphertext space and the key space?a

  Describe any user data inputs and outputs your application

What items you will be able to create and how you will create them? List and describe any user data inputs and outputs your application will require and produce.

  Describe a modification to the random port scan as describe

1. show how to defend against the dos attack of you are the system administrator for an provider that owns a large

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd