You are on page 1of 4

Books and Articles and Printed Materials:

Amy Hisson, Computer Assembly and Configuration- Lab and Assignments


David Anfinson, Ken Quamme IT Essentials: PC Hardware and Software
Companion Guide 3rd Edition- 2008 at 800 East 96th Street
Indianapolis, Indiana 46240 USA
Efraim Turban, R. Kelly Rainer Jr., Richarrd Potter Introduction to
Information Technology 3rd Edition- 2005 at Rosewood Drive, Denver,
John Wisley and Sons(Asia) Pte. Ltd
Marigen N. Leosala, Bobby P. Caoagdan, Ronaldo V. Ramilo, and Rosalie
P. Lujero Technology and Livelihood Education- Information and
Communications Technology Learners Manual Grade 7 & 8
Rosalie P. Lujero, Ronaldo V. Ramilo Technology and Livelihood EducationInformation and Communications Technology Learners Manual
Computer Hardware Servicing Grade 9
Electronic Resources:
Definition of Configuration Retrieved from
http://www.webopedia.com/TERM/C/configuration.html
File Sharing Retrieved from
http://www.techopedia.com/definition/16256/file-sharing
Fundamentals of PC repair Retrieved from http://www.ustudy.in/ce/hard/u1
Hardware and Software Troubleshooting Tips | Virus Removal Tips | Best
Anti-virus | Speeding Up Windows XP/Windows Vista/Windows 7 |
Networking Tips | UNIX and LINUX Usability | Installation Procedure Of
Various Operating Systems | computer repair | computer problems
Retrieved from http://101-computertroubleshooting.blogspot.com/2009/09/directx-diagnostic-tooldxdiag.html-

317

How to configure peer to peer workgroup network step by step Guide


Retrieved from http://computernetworkingnotes.com/basic-workgroupnetworking/workgroup-set-up.htmlHow to make an Ethernet cross over cable Retrieved from
http://www.makeuseof.com/tag/ethernet-crossover-cable/
Occupational Safety Precautions Retrieved from
peer to peer networking Retrieved from
http://h10025.www1.hp.com/ewfrf/wc/document?cc=us&lc=en&dlc=en
&docname=bph05694Ping Tim Fisher Retrieved from
http://pcsupport.about.com/od/commandlinereference/p/pingcommand.htmPuzzles for Activities Retrieved from
http://puzzlemaker.discoveryeducation.com/CrissCrossSetupForm.asp
System Configuration utility Retrieved from
http://moderncomputerskillsandtraining.com/?page_id=2950Turn On the Windows Firewall Retrieved from
http://windows.microsoft.com/en-ph/windows/turn-windows-firewall-onoff#turn-windows-firewall-on-off=windows-7
Windows Registry Retrieved from
http://pcsupport.about.com/od/termsr/p/registrywindows.htm-http://info.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture%20Slides/ITE
_PC_v40_Chapter2.pdf

318

Client/serverNetwork- a computer network in which one centralized, powerful


computer called server is a hub to which many less powerful personal
compters or workstations called clients are connected.
Coaxial cable- a type of wire that consists of a center wire surrounded by
insulation and then a grounded shield of braided wire which minimizes
electrical interference.
Configuration- the way a system is set up. Configuration can refer to either
hardware or software, or the combination of both.
Cross-over- is a cable used to connect two network devices directly.
Direct X- a set of APIs developed by Microsoft that enables programmers to
write programs that access hardware features of a computer without
knowing exactly what hardware will be installed on the machine where
the program eventually runs.
Fiber optic- is a technology that uses glass (or plastic) threads (fibers) to
transmit data. Fiber optics has several advantages over traditional metal
communications lines.
IP Address- is a number that is used to identify a device on the network.
IP config- is a command used to find out the IP address of a certain network.
Network- is a group of two or more computer systems linked together.
Peer-to-peer Network- a type of network in which each workstation has
equivalent capabilities and responsibilities.
Ping- a command prompt used to test the ability of the source computer to
reach a specified destination computer.

319

Protocol- is the special set of rules that end points in a telecommunication


connection use when they communicate.
Registry- is a database used by
store configuration information.

Windows

operating

system

to

RJ45- short for Registered Jack-45, it is an eight-wire connector used


commonly to connect computers onto a Local-Area Network (LAN).
Security- techniques for ensuring that data stored in a computer cannot be
read or compromised by any individuals without authorization
Straight-through- is used in local area network to connect a PC to a network
hub and router.
Subnet mask- is used to determine what subnet an IP address belongs to. An
IP address has two components, the network address and the host
address.
Twisted pair- is a type of cable that consists of two independently insulated
wires twisted around one another.
Virus- is a program or piece of code that is loaded onto your computer without
your knowledge and runs against your wishes.

320