CISCO 12 - IT Essentials


Chapter 8 - Advanced Networking

This chapter provides an overview of network principles, standards, and purposes. The following types of networks will be discussed in this chapter:

  • Local Area Network (LAN)
  • Wide Area Network (WAN)
  • Wireless LAN (WLAN)

The different types of network topologies, protocols, and logical models as well as the hardware needed to create a network will also be discussed in this chapter. Configuration, troubleshooting, and preventive maintenance will be covered. You will also learn about network software, communication methods, and hardware relationships.

After completing this chapter, you will meet these objectives:

  • Explain the principles of networking.
  • Describe types of networks.
  • Describe basic networking concepts and technologies.
  • Describe the physical components of a network.
  • Describe LAN topologies and architectures.
  • Identify standards organizations.
  • Identify Ethernet standards.
  • Explain OSI and TCP/IP data models.
  • Describe how to configure a NIC and a modem.
  • Identify names, purposes, and characteristics of other technologies used to establish connectivity.
  • Identify and apply common preventive maintenance techniques used for networks.
  • Troubleshoot a network.

1. Complete the following Chapter 8 Review Questions (download here)

2. Complete the Chapter 8 practice quiz on the CISCO website.

Watch





Chapter 9 - Fundamentals of Security

Fundamentals of Security

Technicians need to understand computer and network security. Failure to implement proper security procedures can have an impact on users, computers, and the general public. Private information, company secrets, financial data, computer equipment, and items of national security are placed at risk if proper security procedures are not followed.

After completing this chapter, you will meet these objectives:

  • Explain why security is important.
  • Describe security threats.
  • Identify security procedures.
  • Identify common preventive maintenance techniques for security.
  • Troubleshoot security.

Activity 1:
In this activity you will use the Internet to gather information to help 
you become familiar with computer crime and security attacks in your area. Be prepared to 
present your research with the class.   

1. Briefly describe one article dealing with computer crime or a security attack (place description and a link to the article on your website)
2. Based on your research, could this incident have been prevented? List the precautions 
that might have prevented this attack.

Activity 2:
   
1. Using the Internet research 2 different anti-virus software 
applications. Based on your research, complete the table below. 

  Software 1Software 2
 Company Name   
 Website URL          
 Software Features  
 Subscription Length (month, year, lifetime)      
 Cost  
                                                         
2. Which anti-virus software would you purchase? List reasons for your selection. 

Activity 3:

Complete the Chapter 9 review questions - hand them into the hand-in folder




Chapter 10 - Communication Skills


What is the relationship between communication skills and troubleshooting? As a computer technician, you will not only fix computers but will also interact with people. In fact, troubleshooting is as much about communicating with the customer as it is about knowing how to fix a computer. In this chapter, you will learn to use good communication skills as confidently as you use a screwdriver.

After completing this chapter, you will meet these objectives:

  • Explain the relationship between communication and troubleshooting.
  • Describe good communication skills and professional behavior.
  • Explain ethics and legal aspects of working with computer technology.
  • Describe the call center environment and technician responsibilities.


1. Complete the Chapter 10 Study Guide and post finished copy on your website.

view video on: Call Centre Communication

2. Complete Chapter 10 Practice quiz






Chapter 11 - Advanced Personal Computers

In your career as a technician, you may have to determine if a component for a customer's computer should be upgraded or replaced. It is important that you develop advanced skills in installation procedures, troubleshooting techniques, and diagnostic methods for computers. This chapter discusses the importance of component compatibility across hardware and software. It also covers the need for adequate system resources to efficiently run the customer's hardware and software.

After completing this chapter, you will meet these objectives:

  • Give an overview of field, remote, and bench technician jobs.
  • Explain safe lab procedures and tool use.
  • Describe situations requiring replacement of computer components.
  • Upgrade and configure personal computer components and peripherals.
  • Identify and apply common preventive maintenance techniques for personal computer components.
  • Troubleshoot computer components and peripherals.

Read the Chapter 11 Power Point

Complete the Chapter 11 Anticipation Guide




Computer Hardware Labs



Building a Custom Computer System

You work in a computer store building computers. Customers ask you to recommend the components of their new computers that you will then build. Please recommend computers for two of the following four customers using this format:


Type of Component Brand & Model Place of purchase Price
Example:
DVD Player Sony x16 / x40 Future Shop $116
This DVD player was chosen because of Sony’s record of reliability. It is a fast drive and the price is within budget. PC Magazine states that “the Sony DVD player is the best buy” in their July issue.

Build Easy PC is a very good resource to help you choose components and guides you on how to build a computer.

These sites are good places to find prices on components:

NCIX - Atic - Tiger Direct - New Egg - Future Shop - or use any other site as long as you site your source with a link

Choose 2 of the following system types and make sure your entire system falls within the budget

1. Home user: 
Budget: $500
“I use my computer mainly for the Internet, e-mail, and word processing. I would like to be able to edit and print photos with my new digital camera. My children like to play games but I’m not worried if they cannot play the newest games.”

2. Entertainment Center:
Budget: $800
“My computer is my entertainment center. I do not have a TV or a stereo. I want to be able to play music and DVD movies on my computer with full surround sound. I also want to burn CDS of music to play on my car stereo.”

3. Multi-Media Developer:
Budget: $1200
“I develop multi-media applications for a living including: CD-ROMs, Web Cites, Brochures, Videos, Music, and Posters. I need to run Adobe Photoshop, Illustrator, Premier, and PageMaker, as well as Macromedia’s web development package. Often I need to run several applications at the same time. I must scan client’s photos and print high quality samples for them. I will also have to burn copies of CD-ROMs, DVDs, and files for the print house.”

4. Gamer:
Budget: Unlimited
“I want the ultimate gaming machine. Money is no object since I made a fortune buying and selling dot com stock before the bottom dropped out of the market. I want to be able to play the latest games from flight simulations to first person shooters. I also enjoy playing older arcade games. I want great sound and I want joysticks for the different types of games I play. I have a different computer for office tasks so this machine will be strictly for fun.”

Each Computer Should Include At Least the Following Items:

  • Motherboard
  • CPU
  • RAM
  • Hard Drive
  • Optical Drives
  • Case / Power Supply
  • Video Card
  • Sound Card / Onboard Sound
  • Network Card / Onboard Network
  • Monitor
  • Speakers
  • Keyboard
  • Mouse
  • Operating System

Mark Sheet 

Description1234
Knowledge / Understanding



Student includes all necessary computer components.



Student uses current technology.



Sources are cited correctly.



Communication



Writing is neat and organized.



Writing is concise and easy to understand.



Application



Systems are within budget.



Systems meet users’ needs.



Thinking / Inquiry



Reasonable explanation for each component.



Component choices are based on reasonable research.





Computer Assembly Workshops

We will be working in teams of 3.

The hardware tech will be doing the actual physical dismantling of the system.

The procedural manager will be following the instructions and making sure each step is completed.

The secretary will be recording the steps and taking notes of any relevant information.

Each group member should have a turn at each role so you will need to rotate positions throughout the lab time.

You are required to do a complete disassembly and re-assembly of a desktop computer system.

We will be working in 4 stations with 4 teams building at a time. You will be required to complete the Computer Assembly Guide and document all of your steps in the process.

Those teams not building will be updating their sites with their advanced predictions on the steps they will take once they begin their assignment.

Include the following information on your site:
  • step by step instructions for how to disassemble the computer system
  • precautions to take during the workshop
  • solutions to troubleshoot potential problems. i.e. what would you do if it doesn't turn on?
  • guide on how to put the system back together safely, in sequence
Make sure you properly identify the names of all components.





ICT Writing Assignment


Write a 750 word paper (3 pages) following the APA Style Guide

Use Microsoft Word. Font: Arial  Font size: 12

Your paper must include at least 4 references, properly cited in the paper and at the end.

Consider using Google Scholar as your search tool.

Topic(s):  The Role of Technology in Education

Questions to address: 
  • How has technology affected your education? (both positive and negative factors)
  • How has the role of technology in education changed since you were in elementary school?
  • Where do you see technology going in the future of education?
  • What are the advantages and/or disadvantages of a connected classroom?
  • Should every student have a laptop or ipad at school? Why or why not?
  • Other
Finished Draft copies of the paper need to be submitted into the hand-in folder by end of the day on Thursday.
Finished papers need to be submitted in the class hand-in folder by the end of the day on Monday.


How your paper will be graded
Qualities & CriteriaPoor (0-80)Good (80-90)Excellent (90-100)
Format/Layout
  • Presentation of the text
  • Structuring of text
  • Follows require-ments of length, font and style
(Weight 15%)
Follows poorly the requirements related to format and layout.Follows, for the most part, all the requirements related to format and layout. Some requirements are not followed.Closely follows all the requirements related to format and layout.
Content/Information
  • All elements of the topics are addressed
  • The information is technically sound
  • Information based on careful research
  • Coherence of information

(Weight 50%)

The essay is not objective and addresses poorly the issues referred in the proposed topic. The provided information is not necessary or not sufficient to discuss these issues.The essay is objective and for the most part addresses with an in depth analysis most of the issues referred in the proposed topic. The provided information is, for the most part, necessary and sufficient to discuss these issues.The essay is objective and addresses with an in depth analysis all the issues referred in the proposed topic. The provided information is necessary and sufficient to discuss these issues.
Quality of Writing
  • Clarity of sentences and paragraphs
  • No errors and spelling, grammar and use of English
  • Organization and coherence of ideas
(Weight 20%)
The essay is not well written, and contains many spelling errors, and/or grammar errors and/or use of English errors. The essay is badly organized, lacks clarity and/or does not present ideas in a coherent way.The essay is well written for the most part, without spelling, grammar or use of English errors. The essay is for the most part well organized, clear and presents ideas in a coherent way.The essay is well written from start to finish, without spelling, grammar or use of English errors. The essay is well organized, clear and presents ideas in a coherent way.
References and use of references
  • Scholarly level of references
  • How effective the references are used in the essay
  • Soundness of references
  • APA style in reference list and for citations

(Weight 15%)

Most of the references used are not important, and/or are not of good/scholarly quality. There is not a minimum of 4 scholarly resources, and/or they are not used effectively in the essay. References are not effectively used, and/or correctly cited and/or correctly listed in the reference list according to APA style.Most of the references used are important, and are of good/scholarly quality. There is a minimum of 4 scholarly resources that are for the most part used effectively in the essay. Most of the references are effectively used, correctly cited and correctly listed in the reference list according to APA style.All the references used are important, and are of good/scholarly quality. There is a minimum of 4 scholarly resources that are used effectively in the essay. All the references are effectively used, correctly cited and correctly listed in the reference list according to APA style.
Overriding criterion: 0riginality and authenticity. If the essay is identified as not being original, and/or not done by the student, the instructor has the right to grade the paper as an F.




Back to CISCO



Chapter 12 - Advanced Operating Systems

The installation, configuration, and optimization of operating systems are examined in greater detail in this chapter.

Various brands of operating systems are available on the market today, including Microsoft Windows, Apple Mac OS, UNIX, and Linux. A technician must consider the current computer system when selecting an operating system. Additionally, there are several versions or distributions of an operating system. Some versions of Microsoft Windows include Windows 2000 Professional, Windows XP Home Edition, Windows XP Professional, Windows Media Center, Windows Vista Home Basic, Windows Vista Business, and Windows Vista Premium.

Each of these operating systems offers many of the same features with a similar interface. However, some functions necessary for specific customer needs may not be available in all of them. You must be able to compare and contrast operating systems to find the best one based on your customer's needs.

After completing this chapter, you will meet these objectives:

  • Select the appropriate operating system based on customer needs.
  • Install, configure, and optimize an operating system.
  • Describe how to upgrade operating systems.
  • Describe preventive maintenance procedures for operating systems.
  • Troubleshoot operating systems.
Answer the following study guide and place in the hand-in folder by Friday.

Download & Complete: Chapter 12  Study Guide

Research Microsoft's upcoming  Windows 8 release.

List on your website, 10 new features that Windows 8 will offer upon it's official release.




Chapter 13 - Servicing Laptops


Cisco 12 Students

Chapter 13 - Servicing Laptops

After completing this chapter, you will meet these objectives:

  • Describe wireless communication methods for laptops and portable devices.
  • Describe repairs for laptops and portable devices.
  • Select laptop components.
  • Describe preventive maintenance procedures for laptops.
  • Describe how to troubleshoot a laptop.

Place completed answers in the Chapter 13 hand-in folder







Chapter 14 - Advanced Printing Techniques

This chapter explores the functionality of printers and scanners. You will learn how to maintain, install, and repair these devices in both local and network configurations. The chapter discusses safety hazards, configuration procedures, preventive maintenance, and printer and scanner sharing.

After completing this chapter, you will meet these objectives:

  • Describe potential safety hazards and safety procedures associated with printers and scanners.
  • Install and configure a local printer and scanner.
  • Describe how to share a printer and a scanner on a network.
  • Upgrade and configure printers and scanners.
  • Describe printer and scanner preventive maintenance techniques.
  • Troubleshoot printers and scanners.
Complete the following Chapter 14 Questions and place in the hand-in folder by Thursday.

See your Chapter 14 Answer Key

Study the Chapter 14 Quiz Preview



How can you help a customer choose between inkjet or laser printing?





Chapter 15 - Advanced Networking

Advanced Networks

This chapter focuses on advanced networking topics, including network design, network component upgrades, and e-mail server installations. Basic networking topics, such as safety, network components, and preventive maintenance, are also discussed.

To meet the expectations and needs of your customers and network users, you must be familiar with networking technologies. You must understand the basics of how a network is designed and why some components affect the flow of data on a network. Troubleshooting advanced network situations is also described in this chapter.

After completing this chapter, you will meet these objectives:

  • Identify potential safety hazards and implement proper safety procedures related to networks.
  • Design a network based on the customer's needs.
  • Determine the components for your customer's network.
  • Implement the customer's network.
  • Upgrade the customer's network.
  • Describe installation, configuration, and management of a simple mail server.
  • Describe preventive maintenance procedures for networks.
  • Troubleshoot the network.
Chapter 15 Assignment - place in the hand-in folder by Tuesday, June 5th

View your Chapter 15 Answer Key






Cisco Chapter 16 - Advanced Security

Congratulations, you've made it to the last chapter!

This chapter reviews the types of attacks that threaten the security of computers and the data contained on them. A technician is responsible for the security of data and computer equipment in an organization. This chapter describes how you can work with customers to ensure that the best possible protection is in place.

Risks to computers and network equipment come from both internal and external sources. Risks include physical threats, such as theft or damage to equipment, and data threats, such as the loss or corruption of data.

After completing this chapter, you will meet these objectives:

  • Outline security requirements based on customer needs.
  • Select security components based on customer needs.
  • Implement customer's security plan.
  • Perform preventive maintenance on security.
  • Troubleshoot security.

Complete the Chapter 16 Review worksheet and place in the hand-in folder by the end of class on Friday

Chapter 16 Answer Key





Chapter 11 - 16 Review Questions

Exam is on Monday - good luck!


Comments