Wednesday, March 10, 2010
C# class 3/8/10
Today we talked about the midterm and worked on a program that my brother and I were having problems with. Our biggest problem was not the code but our logic. Tip: Remember when you are programming, you compiler will only read the syntax to make sure it is OK. It is still up to you to make sure the logic is in place. When I say logic, check the sequence of your program and see if it logically follows right.
Sunday, March 7, 2010
Week 3 A+ homework: How to check memory on your computer
One way to check memory on your computer is by going to the "Control Panel" as seen below:

Then click on "Systems and Maintenance":

Then click on "Systems":

Another way you can do this is by going to your "Utilities Setup". To get here you have to reboot your computer. When the screen first comes on then hit the F2 button and a blue screen should pop up showing you some information about your computer and your memory will be one of them.
The sure way to know what your system has and can upgrade to is to keep your paperwork when you purchased it. If you do not have that then you can get on the Internet and type in the brand and model of your computer and you should get the results.
My computer can expand up to a 4 GB RAM, the reason that this information is important is because if you want to up grade you need to know what you already have to do that. But remember DO NOT exceed the recommended max memory of your operating system.
Then click on "Systems and Maintenance":
Then click on "Systems":
Another way you can do this is by going to your "Utilities Setup". To get here you have to reboot your computer. When the screen first comes on then hit the F2 button and a blue screen should pop up showing you some information about your computer and your memory will be one of them.
The sure way to know what your system has and can upgrade to is to keep your paperwork when you purchased it. If you do not have that then you can get on the Internet and type in the brand and model of your computer and you should get the results.
My computer can expand up to a 4 GB RAM, the reason that this information is important is because if you want to up grade you need to know what you already have to do that. But remember DO NOT exceed the recommended max memory of your operating system.
Network+ class 3/3/10
Today we took our Midterm, and gave a presentation on network security. Please look for the power point on my blog for network security.
A+ class 3/2/10
Today we did a lab where we found out how to optimize Windows Operating System. There are 3 ways that you can do this.
1) Increase you virtual memory by selecting the custom size on the virtual memory window and put in the recommended MB (megabytes) in both textboxes and click “set” then “Okay”. Restart your system for the affects to take place.
2) Go to your command prompt and type in “msconfig”, select the startup tab and disable all.
3) Increase the swap files. To do this you go to your command prompt then;
a. Type “regedit”
b. System folder
c. Current Control Set
d. Control
e. Session Manager
f. Memory Management
g. On the right side, slick Large System Cache
h. Change zero to 1 (0 to 1)
1) Increase you virtual memory by selecting the custom size on the virtual memory window and put in the recommended MB (megabytes) in both textboxes and click “set” then “Okay”. Restart your system for the affects to take place.
2) Go to your command prompt and type in “msconfig”, select the startup tab and disable all.
3) Increase the swap files. To do this you go to your command prompt then;
a. Type “regedit”
b. System folder
c. Current Control Set
d. Control
e. Session Manager
f. Memory Management
g. On the right side, slick Large System Cache
h. Change zero to 1 (0 to 1)
A+ class 2/25/10
Today we did our presentation. Please look at my blog under “Storage Devices” for the PowerPoint.
Network + class 2/24/10
Today we continued our discussion on security and did some preparation for the midterm. The parts that we talked about in security dealt with some of the hardware and software that are used to secure a network:
1) Firewall
2) IDS/IPS
3) DMZ
4) Honey pots
5) Proxy servers
6) Practical analyzers
1) Firewall
2) IDS/IPS
3) DMZ
4) Honey pots
5) Proxy servers
6) Practical analyzers
A+ class 2/23/10
Today we were assigned parts in our current chapter and worked on them during class for a presentation on 2/25/10.
C# class 2/22/10
Today we started to talk about control statements. We focused on the counter controlled repetition rules.
1) Control variable(or loop counter)
2) The value of the control variable
3) The increment or decrement which increases or decreases the value
4) Loop-continuation condition, this determines whether to continue looping
1) Control variable(or loop counter)
2) The value of the control variable
3) The increment or decrement which increases or decreases the value
4) Loop-continuation condition, this determines whether to continue looping
Network+ class 2/17/10
Today we talked about network security. Our discussion started off with information assurance. Within information assurance there are 4 main parts:
1) Confidentiality- Keeping those who are suppose to be out, out.
2) Integrity- Making sure the data hasn’t changed from point A to point B.
3) Authentication- Something you know (your password), something you are (finger print scan), something have in your possession (bank card).
4) Availability- Similar to confidentiality except it makes the appropriate data available.
We then talked about the 8 types of threats:
1) Viruses- These attack that particular computer.
2) Trojan horse- A program that hides on your computer and waits to be executed.
3) Logic bomb- Distributed primarily by worms and viruses.
4) Worms- is like a virus except it doesn’t need a person there to execute in and can spread from one system to another.
5) Adware & Spyware- Adware is a program that monitors the types of websites that you visit frequently and uses that information to generate targeted advertisements. Spyware is any program that sends information about your systems or your actions across the Internet.
6) Root Kit- A type of back door program that is inserted into application software.
7) Botnets- Short for robot network, this is a group of computers under the control of one operator, used for malicious purposes.
8) Privileged escalation- Software applications that contain bugs. An unauthorized user exploits these bugs to gain privileged access to a computer system.
1) Confidentiality- Keeping those who are suppose to be out, out.
2) Integrity- Making sure the data hasn’t changed from point A to point B.
3) Authentication- Something you know (your password), something you are (finger print scan), something have in your possession (bank card).
4) Availability- Similar to confidentiality except it makes the appropriate data available.
We then talked about the 8 types of threats:
1) Viruses- These attack that particular computer.
2) Trojan horse- A program that hides on your computer and waits to be executed.
3) Logic bomb- Distributed primarily by worms and viruses.
4) Worms- is like a virus except it doesn’t need a person there to execute in and can spread from one system to another.
5) Adware & Spyware- Adware is a program that monitors the types of websites that you visit frequently and uses that information to generate targeted advertisements. Spyware is any program that sends information about your systems or your actions across the Internet.
6) Root Kit- A type of back door program that is inserted into application software.
7) Botnets- Short for robot network, this is a group of computers under the control of one operator, used for malicious purposes.
8) Privileged escalation- Software applications that contain bugs. An unauthorized user exploits these bugs to gain privileged access to a computer system.
A+ Class 2/16/10
Today we started to talk about storage devices. Our discussion started off with the HDD which is the Hard Disk Drive or hard drive for short. The HDD is used for your permanent storage. This storage is convenient in the matter that you don’t have to put in a USB memory stick or CD RW to save your work, all you have to do is click save and you are good to go. There are three critical components to a hard drive:
1) the controller, this controls the hard drive
2) the hard disk, this is the physical storage medium
3) the host adapter, this is the translator
1) the controller, this controls the hard drive
2) the hard disk, this is the physical storage medium
3) the host adapter, this is the translator
Monday, March 1, 2010
2/11/10 A+ Class
Today we recapped on the last class and then we went on to add a dual boot to the operating system.
2/10/10 Network + class
Today we had a quiz over the OSI model and cabling. After the quiz we continued to practice more on subnetting.
2/9/10 A+ Class
Today we focused on Operating Systems. We first discussed the steps for loading an operating system.
1) Partitioning: this is the process of assigning part or all of the hard drive.
2) File System: Fat 32 or NTFS
a. Fat32 does not offer encryption or password protection
b. NTFS offers encryption and password protection
3) Formatting
4) Load System Files
5) Check device drivers: if there is a yellow exclamation point that is a driver that is missing and needs to be installed.
2/2/10 A+ class
Today we talked more on the different functions and components that are found on a motherboard. For instance, the keyboard connectors are the most important input device. The evolution of the keyboard connectors went from the AT connectors (which was a 5 pin DIN) to a PS/2 connector (6 pin DIN). Some computers still have the PS/2 connector (you can identify these connectors easily because the end tips are purple), but the newer computers use USB. So what does that mean? It means that the keyboard connectors are now using USB to connect to the computers. The one bad thing about USBs is that if one goes bad, then they all go bad! Then next was the MIDI, which is Musical Instrument Digital Interface. This was used for a game port. This was used to connect your joystick, but now a USB is used. If you have a MIDI you can replace it with another MIDI by adding a sound card.
Then we talked about the BIOS. BIOS = Basic Input/Output System, this is the most important chip on the motherboard aside from the processor. The BIOS is a ROM (Read Only Memory) chip and contains the information for the system.
Then we talked about the BIOS. BIOS = Basic Input/Output System, this is the most important chip on the motherboard aside from the processor. The BIOS is a ROM (Read Only Memory) chip and contains the information for the system.
2/1/10 C# class
Today we started to talk about LINQ( Language INtegrated Query). LINQ is a prepackaged data structure that is a part of the .Net Framework. It is similar to SQL and it allows you to retrieve data from different sources such as arrays, databases lists and variables. The syntax for LINQ is built in to C#. The libraries are called providers.
Subscribe to:
Comments (Atom)


.bmp)