You are on page 1of 10

ICAS3121B Administer Network Peripherals Patrick Dacayo

ICAS3121B Administer Network Peripherals

Self Check Question 1: Planning the installation of peripherals When planning and connecting peripherals you need to consider a number of points. For each peripheral named in the left column of the table below, choose from the pool of factors that should be considered when attaching the peripheral. A factor may be used more than once. Factors to choose from
Network point Space around peripheral Sturdy, level surface Ventilation Ease of access for users Arrange so the peripheral does not encroach on the users workspace Ensure the user is centred on the screen for the receivers view. Ease of installation and maintenance Direct view point to reduce glare Distance from computer

Table 1: Factors relating to placement of peripheral devices Peripheral Network connected printer Factors relating to peripheral Network point Sturdy, level surface Space around peripheral Ease of access for users Ease of installation and maintenance Host connected printer Arrange so the peripheral does not encroach on the users workspace Ease of access for users Ease of installation and maintenance Distance from computer Scanner Arrange so the peripheral does not encroach on the users workspace Distance from computer Ease of access for users Ease of installation and maintenance Ensure the user is centred on the screen for the receivers view. Distance from computer Ease of access for users Arrange so the peripheral does not encroach on the users workspace Distance from computer

Webcam

Speakers

ICAS3121B Administer Network Peripherals Patrick Dacayo


Network attached storage device hard disk Network point Ease of access for users

Question 2: Peripheral specifications Using the list of peripherals given, match each one to one of the specifications sets in the following table. One peripheral belongs to each of the four specifications.

Peripherals list to choose from


Mouse Keyboard Monitor Printer Speakers Digital camera Scanner External hard disk

Table 2: Peripheral specifications Specification 1 Diagonal size: 43 cm Height/Width/Depth: 39 cm/37.6 cm/20 cm Controls: Volume, brightness, H/V position Max resolution: 1280 x 1024 Dot pitch: 0.264 mm Specification 2 Compatibility: PC, Mac Height/Width/Depth: 3.3 cm/11.4 cm/18.3 cm Software type: Drivers & utilities, automatic backup Capacity: 160 GB Specification 3 Type: 2-way Sensitivity: 90 dB Magnetic shield: Yes THX certified: Yes Specification 4 Compatibility: PC, Mac, Unix, Linux Height/Width/Depth: 49.5 cm/54.61 cm/52 cm Max doc size: 21.5 cm: 35.56 cm Colour copying speed B&W/Colour: 19 char/min Document reduce/enlarge: 25% 400% Auto-duplex copying: Included Monthly duty volume: 10 000 First copy out time: 8 sec Max H-resolution/Max V-resolution: 300 dpi/300 dpi Modem/Comm: Fax/modem Integrated Scanner type: Flatbed scanner integrated Scan mode: Single-pass Interpolated resolution optical/Interpolated resolution: 600dpi/ 9600dpi Sample max grey depth: 8-bit (256 grey levels) Sample max colour depth: 24-bit (16.7M colours) Max output power: 150 Watt Connector type: XLR, TRS, RCA Weight: 6.3 kilograms Feature: Front-firing subwoofer Peripheral Printer Interface type: Hi-speed USB Average seek time: 9 ms Cable included: 1 USB cable external Voltage required: 50/60 Hz Peripheral Speakers Max vertical view angle: +70/-70 Max horizontal view angle: +80/-80 Max sync rate (V x H): 76 Hz x 82 KHz Analogue video signal: RGB Peripheral External Hard Disk Peripheral Monitor

ICAS3121B Administer Network Peripherals Patrick Dacayo


Feeder capacity: 250 sheets

Question 3: Answer true or false - A printer can be attached directly to the network using a parallel cable. FALSE Question 4: Answer true or false - A printer can be attached to a computer using a serial cable. TRUE Question 5: Answer true or false - A scanner can be attached directly to a network. TRUE Question 6: Answer true or false - USB connections eliminate the need for a variety of connections to be made available on a computer to attach peripherals. TRUE Question 7: Answer true or false Firewire is a standard for high-speed communications and data transfer. It was developed by Apple Computer and is similar to USB connections on other computers. TRUE Question 8: Answer true or false - Many peripherals are attached to a host computer through the attachment on an adapter card, which is attached to the computers main board (or motherboard) PCI (Peripheral Component Interface) slot. TRUE Question 9: Answer true or false - The size of the viewing area of a monitor is usually measured by height, and then by width. FALSE

Self Check Question 1: Creating a name system for a printer What do you think could be incorporated in the name of a printer? The DEET of the school, the manufacturer, model name and the location. Question 2: Naming peripherals Assume that the standards below are in use and apply them to answer the questions following.
Part of name First 2 characters Next 2 characters Next 2 characters Describing Type of device Location Department Examples FS File server, WS Work station, PR Printer SY Sydney, HO Hobart, DA Darwin AC Accounts, HR Human resources CC Call centre

For subsequent characters, depends upon item. For file servers and workstations a 3-digit number. For

ICAS3121B Administer Network Peripherals Patrick Dacayo


printers, up to 8 characters can uniquely describe the printer type.

a) What would be the name of the HP8150 used by the HR department in Sydney? PRSYHR HP8150 b) What would be the name of the network-attached storage hard disk device in the IT department in Perth? FSPEIT NAS c) What would be the name of the IBM network printer used by the accounts department in Penrith? PRSYAC Printer Question 3: Advantages in limiting access to a peripheral Why would you want to restrict access to a printer? It allows you to easily control the printing quota and it makes sure that only staffs or any other designated people can use the printer.

Self Check Question 1: When do computer peripherals require maintenance? (Select all that apply) When the technician is prepared. In accord with the instructions in the vendors manual. Printers usually require toner replacements after a specific number of pages have been printed. Every month, everything should be cleaned and consumables replaced in busy organisations.

Question 2: Templates are use to ensure the following (select all that apply): Consistency in the layout and presentation of documents. Everyone can design their own templates to ensure their own work is consistent. Essential information can be included on a template to ensure it is always present when creating a new document. Being stored in personal folders means staff can access them easily.

Question 3: Assigning priorities Thirty staff share a printer. Staff in accounts use it infrequently, but always have urgent jobs. Managers also use it infrequently, but their jobs are not always urgent. Most of the general staff use it heavily, but only two of them print urgent jobs infrequently. What groups would you set up for the printer, and how would you assign priorities

ICAS3121B Administer Network Peripherals Patrick Dacayo to the groups? Accounts Group/high priority; Managers Group/normal priority; Staff Group/normal priority Leave the groups as they are and set no priorities Accounts Group/high priority; Managers Group/normal priority; Staff Group/normal priority; Staff Urgent Group/high priority Accounts Group/high priority; Managers Group/low priority; Staff Group/normal priority

Self Check Question 1: One-to one instruction To provide good instruction, a trainer needs to play many roles, as listed below. Which roles would a one-to-one trainer need to play? (Check the boxes.) Facilitator Evaluator Writer Mentor Advisor needs analyst administrator motivator. Question 2: Answer true or false: One-to-one instruction is most useful when teaching theoretical concepts. FALSE Question 3: Planning a) In the context of providing one-to-one or small group training, what is a training plan? A training plan is the instructors road map to his/her customers training. It contains all the details such as which skills they need to learn and the time frame for the training. b) What information should inform the design of a training plan? What an organisation wants from training What skills they have now and what they need in the future What resources have they set aside for the training

ICAS3121B Administer Network Peripherals Patrick Dacayo What approaches to training are appropriate

Question 4: Getting feedback on training What feedback techniques can an instructor use to evaluate the effectiveness of the training? Ask the clients some questions related to the training and request for an immediate feedback. Get the clients to perform a task related to the training and observe them. Record your observations and results as you can use them to analyse whether they have acquired the necessary skills. Provide surveys/questionnaires for the clients to fill up. You can then analyse the results and you can see which areas of the training can be improved.

Self Check Question 1: SLA stands for: Synchronous language algorithm Service level agreement Standard language acronym Serial line authentication.

Question 2: A preventative maintenance program is used by a business to: Extend the warranty on equipment purchased. Gain extra performance from a piece of equipment Ensure that a piece of equipment meets their needs Maximise the life of equipment in a cost effective manner

Question 3: Answer true or false - An un-interruptible power supply (UPS) does not form part of a preventative maintenance program. FALSE Question 4: Answer true or false - The protecting environment that a computer works in should be part of a preventative maintenance program. TRUE Question 5: Key elements of a maintenance program Identify the key elements of a maintenance program by doing the following drag-and-drop

ICAS3121B Administer Network Peripherals Patrick Dacayo activity. From the Elements column below, identify the four elements that should be part of a maintenance program. Write them down under Maintenance program.

Maintenance program: Meets OH&S guidelines

Elements: Include every device in the organisation

Cost effectiveness Maintenance schedule Meets business needs Only include items out of warranty

Question 6: Preventative maintenance Identify the components of a PC that require preventative maintenance by doing the following drag-and-drop activity. Sort each of the PC components listed below according to whether they require preventative maintenance or do not require preventative maintenance. Write each component in the correct column.

Preventative maintenance required: Hard disk drive Keyboard Optical mouse

PC component:

No preventative maintenance required: DVD/CD drive CPU Floppy disk drive RAM

ICAS3121B Administer Network Peripherals Patrick Dacayo Self Check Question 1: Troubleshooting commands Identify various commands you would enter from a command screen by completing the following table:
Question What commands would you enter, to test a computer to check its own network card? What commands would you enter, to test the connection to another computer on the network? What command would you enter, to find the ip address of the closest google.com.au server? What command would you enter to find the number of hops to the closest google.com.au server? What command would you enter to find the full configuration of your own computer? Enter command IPCONFIG

IPCONFIG PING TRACERT

TRACERT

IPCONFIG (/ALL)

Question 2: User access After you install a peripheral on a host computer to allow other people on the network to access it, what must you do? Give users and groups levels of access. Share the peripheral. Put users into groups. Remove the host computer from the network.

ICAS3121B Administer Network Peripherals Patrick Dacayo Question 3: To allow general users and managers to have different access, what must you do? Create groups, one for users and one for managers and move staff into the appropriate group. Share the peripheral and give everyone full access. Give everyone the same access but put users in one group and managers in another. Create one group for managers only, and leave users as they are.

Question 4: To allow general users to have read access and managers to have full access to a folder, what do you have to do? Share the peripheral and give everyone full access. Create one group for users and one group for managers and move staff into the appropriate group. Give the users group read access and the managers group full access. Create one group for managers only, and leave users as they are. Create one group for users and one group for managers and move staff into the appropriate group. Give the users group share access to the folder and the managers group normal access.

Question 5: Acronyms Identify important acronyms by completing this table of acronyms:


Acronym 1. CPU 2. LAN 3. WAN 4. MB 5. PING 6. TRACERT 7. IPCONFIG 8. FTP 9. TELNET 10. LPT Correct term Possible terms a. Central Processing Unit b. Cyber Principle Unix c. File Transfer Protocol d. Full Tower Processor e. Internal Process Cluster f. Internet Protocol Configuration g. Less Adaptive Notch h. Limited Processing Target i. Line Printer j. Local Area Network k. Magnitude Bezel l. Megabytes m. Packet Internet Groper n. Port Interface Network Genlock o. Telstras National Ethernet p. Telecommunications Network q. Trace Router r. Track Certification s. Wide Area Network t. With Adaptive Notch

Central Processing Unit Local Area Network Wide Area Network Megabytes Packet Internet Groper Trace Router Internet Protocol Configuration File Transfer Protocol Telecommunications Netwok Line Printer (Line Print Terminal)

ICAS3121B Administer Network Peripherals Patrick Dacayo

You might also like