SlideShare ist ein Scribd-Unternehmen logo
1 von 22
P5- Connect hardware safely to a
  computer system, testing for
         functionality
This is a motherboard (inside a tower
           of a computer.)
This is the ram slots.
This is the back of the tower where the
              nic is located.
This pen like tool is used to detected whether
   the nic is wireless or not. (green means
           wireless, red means not.)
I have turned off the computer and
         turned it on again.
This means the wireless nic works.
I am now checking the ram.
I have gone to the windows task
manger to performance to check the
               cpu.
Set up wizard for wireless nic.
I changed the language to English.
I am agreeing to the software license
            agreement.
Follow the onscreen intructions.
I have changed the network name.
I am changing the pre-shared key
             name.
I am pre-shared key again.
I am now looking to see if the wireless
        network is working.
I am typing in the network security key
               password.
Checking to see if the internet is
           working.
Backing up the computer memory.
Seeing if the files are in the right place.

Weitere ähnliche Inhalte

Andere mochten auch

ICT BTEC UNIT 2 P4 and M2
ICT BTEC UNIT 2 P4 and M2ICT BTEC UNIT 2 P4 and M2
ICT BTEC UNIT 2 P4 and M2OriginalGSM
 
P7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksP7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksJamesBennett15
 
Graphic design presentation
Graphic design presentationGraphic design presentation
Graphic design presentationSilverr3aver
 
How to install avast on a desktop
How to install avast on a desktop How to install avast on a desktop
How to install avast on a desktop lukecisco1
 
P3 - Represent how Data flows around a Computer System
P3 - Represent how Data flows around a Computer SystemP3 - Represent how Data flows around a Computer System
P3 - Represent how Data flows around a Computer SystemJamesBennett15
 
UNIT 2 P6 part 2
UNIT 2 P6 part 2UNIT 2 P6 part 2
UNIT 2 P6 part 2OriginalGSM
 
P2 - Describing the Purposes of Different types of Computer Systems
P2 - Describing the Purposes of Different types of Computer SystemsP2 - Describing the Purposes of Different types of Computer Systems
P2 - Describing the Purposes of Different types of Computer SystemsJamesBennett15
 
P3 dataflow around pc
P3   dataflow around pcP3   dataflow around pc
P3 dataflow around pcAjay Jassi
 
How does data flow around a computer system p3 1
How does data flow around a computer system p3 1How does data flow around a computer system p3 1
How does data flow around a computer system p3 1lukecisco1
 
ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1OriginalGSM
 
The purpose of different types of computer systems
The purpose of different types of computer systemsThe purpose of different types of computer systems
The purpose of different types of computer systemslukasgoda456
 
Data flow in a computer
Data flow in a computerData flow in a computer
Data flow in a computerOriginalGSM
 
Chapter 1 computer hardware and flow of information
Chapter 1 computer hardware and flow of informationChapter 1 computer hardware and flow of information
Chapter 1 computer hardware and flow of informationFrankie Jones
 
Types of computer
Types of computerTypes of computer
Types of computerOnline
 
Different Types of Computers
Different Types of ComputersDifferent Types of Computers
Different Types of ComputersDanielAtkinson96
 
Computer Hardware Servicing Learning Module v.2.0
Computer Hardware Servicing Learning Module v.2.0Computer Hardware Servicing Learning Module v.2.0
Computer Hardware Servicing Learning Module v.2.0Bogs De Castro
 
Software utilities p3 - unit 2
Software utilities   p3 - unit 2Software utilities   p3 - unit 2
Software utilities p3 - unit 2Jack Bishop
 

Andere mochten auch (20)

ICT BTEC UNIT 2 P4 and M2
ICT BTEC UNIT 2 P4 and M2ICT BTEC UNIT 2 P4 and M2
ICT BTEC UNIT 2 P4 and M2
 
P7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksP7 – Identify Potential Security Risks
P7 – Identify Potential Security Risks
 
Graphic design presentation
Graphic design presentationGraphic design presentation
Graphic design presentation
 
How to install avast on a desktop
How to install avast on a desktop How to install avast on a desktop
How to install avast on a desktop
 
P7 unit 3
P7 unit 3 P7 unit 3
P7 unit 3
 
P3 - Represent how Data flows around a Computer System
P3 - Represent how Data flows around a Computer SystemP3 - Represent how Data flows around a Computer System
P3 - Represent how Data flows around a Computer System
 
UNIT 2 P6 part 2
UNIT 2 P6 part 2UNIT 2 P6 part 2
UNIT 2 P6 part 2
 
P2 - Describing the Purposes of Different types of Computer Systems
P2 - Describing the Purposes of Different types of Computer SystemsP2 - Describing the Purposes of Different types of Computer Systems
P2 - Describing the Purposes of Different types of Computer Systems
 
p3 unit 2
p3 unit 2p3 unit 2
p3 unit 2
 
P3 dataflow around pc
P3   dataflow around pcP3   dataflow around pc
P3 dataflow around pc
 
How does data flow around a computer system p3 1
How does data flow around a computer system p3 1How does data flow around a computer system p3 1
How does data flow around a computer system p3 1
 
ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1
 
The purpose of different types of computer systems
The purpose of different types of computer systemsThe purpose of different types of computer systems
The purpose of different types of computer systems
 
Data flow in a computer
Data flow in a computerData flow in a computer
Data flow in a computer
 
Chapter 1 computer hardware and flow of information
Chapter 1 computer hardware and flow of informationChapter 1 computer hardware and flow of information
Chapter 1 computer hardware and flow of information
 
Types of computer
Types of computerTypes of computer
Types of computer
 
Different Types of Computers
Different Types of ComputersDifferent Types of Computers
Different Types of Computers
 
Types of computers
Types of computersTypes of computers
Types of computers
 
Computer Hardware Servicing Learning Module v.2.0
Computer Hardware Servicing Learning Module v.2.0Computer Hardware Servicing Learning Module v.2.0
Computer Hardware Servicing Learning Module v.2.0
 
Software utilities p3 - unit 2
Software utilities   p3 - unit 2Software utilities   p3 - unit 2
Software utilities p3 - unit 2
 

Ähnlich wie P5 connect hardware safely to a computer system

How to Install an Ethernet Driver Without Internet Access.pdf
How to Install an Ethernet Driver Without Internet Access.pdfHow to Install an Ethernet Driver Without Internet Access.pdf
How to Install an Ethernet Driver Without Internet Access.pdfVisag E C
 
Netreg Presentation
Netreg PresentationNetreg Presentation
Netreg Presentationpetertrevino
 
My virtual firewall
My virtual firewallMy virtual firewall
My virtual firewallBrian Drew
 
Puppet@Citygrid - Julien Rottenberg - PuppetCamp LA '12
Puppet@Citygrid - Julien Rottenberg - PuppetCamp LA '12Puppet@Citygrid - Julien Rottenberg - PuppetCamp LA '12
Puppet@Citygrid - Julien Rottenberg - PuppetCamp LA '12Puppet
 
My practical installation
My practical installationMy practical installation
My practical installationCammieSarah51
 
Nagios Conference 2011 - Mike Weber - Training: Choosing Nagios Plugins To Use
Nagios Conference 2011 - Mike Weber  - Training: Choosing Nagios Plugins To UseNagios Conference 2011 - Mike Weber  - Training: Choosing Nagios Plugins To Use
Nagios Conference 2011 - Mike Weber - Training: Choosing Nagios Plugins To UseNagios
 
How to WRAPS like Snoop Dogg
How to WRAPS like Snoop DoggHow to WRAPS like Snoop Dogg
How to WRAPS like Snoop DoggAlex Kim
 
connectivity utility
connectivity utilityconnectivity utility
connectivity utilitytumetr1
 
Test Table for Wireless NIC
Test Table for Wireless NIC Test Table for Wireless NIC
Test Table for Wireless NIC Ajay Jassi
 
Hardware and software installation (m2)
Hardware and software installation (m2)Hardware and software installation (m2)
Hardware and software installation (m2)Drew7Williams
 
Positive Hack Days. Pavlov. Network Infrastructure Security Assessment
Positive Hack Days. Pavlov. Network Infrastructure Security AssessmentPositive Hack Days. Pavlov. Network Infrastructure Security Assessment
Positive Hack Days. Pavlov. Network Infrastructure Security AssessmentPositive Hack Days
 
Kautilya: Teensy beyond shell
Kautilya: Teensy beyond shellKautilya: Teensy beyond shell
Kautilya: Teensy beyond shellNikhil Mittal
 

Ähnlich wie P5 connect hardware safely to a computer system (20)

How to Install an Ethernet Driver Without Internet Access.pdf
How to Install an Ethernet Driver Without Internet Access.pdfHow to Install an Ethernet Driver Without Internet Access.pdf
How to Install an Ethernet Driver Without Internet Access.pdf
 
Netreg Presentation
Netreg PresentationNetreg Presentation
Netreg Presentation
 
Lewis unit 3
Lewis unit 3 Lewis unit 3
Lewis unit 3
 
My virtual firewall
My virtual firewallMy virtual firewall
My virtual firewall
 
Presentation1
Presentation1Presentation1
Presentation1
 
computing networks and operating system
computing networks and operating system computing networks and operating system
computing networks and operating system
 
Puppet@Citygrid - Julien Rottenberg - PuppetCamp LA '12
Puppet@Citygrid - Julien Rottenberg - PuppetCamp LA '12Puppet@Citygrid - Julien Rottenberg - PuppetCamp LA '12
Puppet@Citygrid - Julien Rottenberg - PuppetCamp LA '12
 
internet security77
internet security77internet security77
internet security77
 
My practical installation
My practical installationMy practical installation
My practical installation
 
Nagios Conference 2011 - Mike Weber - Training: Choosing Nagios Plugins To Use
Nagios Conference 2011 - Mike Weber  - Training: Choosing Nagios Plugins To UseNagios Conference 2011 - Mike Weber  - Training: Choosing Nagios Plugins To Use
Nagios Conference 2011 - Mike Weber - Training: Choosing Nagios Plugins To Use
 
Optimizing Spark
Optimizing SparkOptimizing Spark
Optimizing Spark
 
Inforamtion work
Inforamtion workInforamtion work
Inforamtion work
 
How to WRAPS like Snoop Dogg
How to WRAPS like Snoop DoggHow to WRAPS like Snoop Dogg
How to WRAPS like Snoop Dogg
 
connectivity utility
connectivity utilityconnectivity utility
connectivity utility
 
Test Table for Wireless NIC
Test Table for Wireless NIC Test Table for Wireless NIC
Test Table for Wireless NIC
 
Hardware and software installation (m2)
Hardware and software installation (m2)Hardware and software installation (m2)
Hardware and software installation (m2)
 
Jacks unit 3
Jacks unit 3Jacks unit 3
Jacks unit 3
 
Positive Hack Days. Pavlov. Network Infrastructure Security Assessment
Positive Hack Days. Pavlov. Network Infrastructure Security AssessmentPositive Hack Days. Pavlov. Network Infrastructure Security Assessment
Positive Hack Days. Pavlov. Network Infrastructure Security Assessment
 
Kautilya: Teensy beyond shell
Kautilya: Teensy beyond shellKautilya: Teensy beyond shell
Kautilya: Teensy beyond shell
 
embedded report
embedded reportembedded report
embedded report
 

P5 connect hardware safely to a computer system