Sunday, December 29, 2019

Essay on Introduction to Computing

Essay on Introduction to Computing Networking computers Introduction Computer networking is a term that is used to refer to the interconnection of computers so as to facilitate communication and share resources. Computer networks can be classified according to a variety of characteristics such as the medium which is used to transport data. Networks can also be classified depending on the method of connection used. We can have wired computer networks or wireless computer networks. A wired computer network uses cables to interconnect different computers in the setup while the wireless networks do not use any kind of physical connection. In wireless networks we can use Bluetooth, infrared rays and other forms of radio waves to send signals across the networks. Networks can also be classified according to the type of topology which is used for the connection. There are several types of topologies which can be used. They include: Types of topologies Network topology is the layout which is used for the interconnections of the computer nodes in a network. The most common types of layouts which are in use include: A bus network – in this setup, all nodes are connected to a common medium. The medium then interconnects all the other computers in the network. Star network – all the nodes are connected to a central node. The node serves as the core of the network whereby all communications to the rest of the network must pass through. Ring network – in this setup, each node is connected to its adjacent neighbor. The communications can be either leftwards or rightwards of each node. Mesh network – this is a situation whereby each node is connected to an arbitrary number of neighbors so that there is more than one channel of communication for every node in the network. There are two types of networking namely: Peer-to-peer networking A network can be referred to as peer-to-peer if most of the computers in the network are similar and run workstation operating systems. In a Peer-to-peer networking, each computer holds its files and resources. Other computers in the network can then be able to access these resources through a wired or a wireless channel. A computer containing some given set of information has to be turned on so that other computers can be able to access these resources. Client/Server Networking A computer network can be called a client/server if at least on of the computers in the network is being used to serve other computers in the network. The server must have higher specifications than the clients that it is to serve. In this setup, each computer will still hold its resources but there are some files that are centralized and they are usually found in the server. This type of setup has very many advantages over the peer-peer network since controlling and managing of resources is made very easy. In our case we are not going to use this type of networking since the computers that need to be connected are similar and we just want to make it possible to share resources on those four computers across the network. A workstation is a computer on which a person performs regular assignments. Any modern computer can be used as a work station. Before beginning to build a computer network you need to lay down proper plans on how the network is going to operate. When planning, you need to check the hardware parts of the computer and ensure that they meet the minimum specifications for them to operate in the network. Processor – the processor should have at least 300 MHZ. checking the processor speed of the computer you can perform the following. When the computer starts, press F2 or F8 depending on the computer model you are using so as to access the BIOS. The processor speed can be seen at the BIOS setup. When the computer is running on Windows 95 or a later version of Microsoft operating system, right click on the My Computer Icon and choose Properties. You will be able to see the processor speed there. You can also open the control panel and double-click on System RAM (Random Access Memory) – the RAM for every computer must be above 64 MB. Checking the computer’s RAM is similar to checking the computer’s processor speed. To check the computer memory perform either of the following: When the computer starts, press F2 or F8 depending on the computer model you are using so as to access the BIOS. The processor speed can be seen at the BIOS setup. When the computer is running on Windows 95 or a later version of Microsoft operating system, right click on the My Computer Icon and choose Properties. You will be able to see the processor speed there. You can also open the control panel and double-click on System Hard Drive – There should be enough space in the computer’s hard drive so that it can be possible for the installation of Windows XP. To check the remaining space open My computer and write click on the icon for computer hard drive. Choose properties and you will be able to see the remaining space on the hard drive. The hard drive space should be at least 10 GB so as to allow for the installation of the Windows XP and some basic software. In order to connect computers on the network, we can use either cable to connect or connect them using a wireless technique. Using cables is much easier and less expensive since it does not require the purchase of additional hardware. A well laid conduit for the passage of cables can be very organized that a person may not know that the connection is done using a wired method. The following items need to be purchased. RJ 45 Cat 5cable A crimping tool (though you can ask the crimping job be done for you at the store where you purchase the network cables and the RJ 45 clips) The connection can be done via serial ports. However, in case whereby you need to use more than two computers, serial connections may not be practical. Since in your case you need to interconnect four PCs, a central device like a switch, a router or a hub can be used for the connection of the computers. I would recommend the use of a switch since it’s is relatively cheaper than a router and also more intelligent than a hub. A router would be more ideal if you want to have some form of internet connection. After the installation of the operating system, you need to connect the computers so that you can be able to share resources. The cables should already have been crimped. Check the back of each computer for the NIC card. Plug the cables to the NIC card at the RJ 45 slot. The other end of the cable should be connected to a switch or a router. After connecting all the four computers, the setup should be similar to the representation shown below: Switch on all the computers and the switch. You need to change the work group name for the computers so that you have a common work group name. to change the work group name, perform the following: Right click on the MY Computers Icon on the desktop hoose properties Click on Computer Name Click on Change On the box labeled work group, rename the workgroup to a name of you choice Click okay and you will be required to restart the computer Restart the computer whenever prompted to do so Repeat this procedure for all the four computers Once all the computers have been restarted, you can start the configuration for the network Network configuration Right click on the MY Network Places Icon Choose Properties Right Click on the Icon of Local Area Connection and choose properties Click on the Internet Protocol (TCP/IP) and click properties Click on the radio button use the following IP address In the box for IP address, type the following address: 192.168.0.1 for the first computer 192.168.0.2 for the second computer 192.168.0.3 for the third computer 192.168.0.4 for the fourth computer Click OK and the configuration will be saved NB. The last two addresses can be changed to any value of your choice but ensure that the values do not exceed 255. Once you are through with the configuration, you can share resources. To share resources perform the following: Right click on the folder or on the item to be shared Choose sharing and security Click on the link : if you understand the risk Choose the radio button – just enable file sharing Click okay and the configurations will be saved. You are now ready to share resources and access all the shared resources across the network. For wireless connections, the configuration process is the same and you have to use the router address on the box for gateway address. A wireless setup is similar to the diagram shown below: References Shelly, Gary, et al. (2003) Discovering Computers Cisco Systems, Inc., (2003) CCNA: network media types. Wendell Odom,Rus Healy, Denise Donohue. (2010) CCIE Routing and Switching. Indianapolis, IN: Cisco Press Odom, Wendall, (2010) CCNA Certification Guide

Saturday, December 21, 2019

Antifeminist and Feminism within The Scarlet Letter

Antifeminist and Feminism within The Scarlet Letter In Nathaniel Hawthorne’s â€Å"The Scarlet Letter† Hester Prynne is accused and convicted of adultery. During the puritan era women in this society had specific obligations and rights they had to maintain. By Hester having an affair and acting unladylike the community disapproved of her actions causing everyone to isolate her in her town. Due to Hester Prynne’s Isolation and the harsh judgment she received from everyone in her town, she goes through having to deal with Antifeminism acts towards her. Those who lived in the puritan era were not aware that their behavior and actions towards Hester and those who were associated with her were considered sexist. Throughout the story we see Hester deal with criticism and judgment from the community. By her paving her own way and doing what she thinks is best for her self and not sticking to the Status quo, she appeared to be â€Å"fearless† and â€Å"Bold† to those in the puritan era. Because of the action s Hester Prynne’s displayed she would be considered a modern day feminist, one who believes that women and men should have equal rights. In â€Å"The Scarlet Letter† Hester going against what society think is acceptable for a women living during the puritan era shows how she fits the modern expectations of feminism. Once Hester is punished and convicted we slowly start seeing the change in people in her community’s behavior towards her. Throughout â€Å"The Scarlet Letter† Hester goes through theShow MoreRelatedEarly Feminism In The Scarlet Letter1421 Words   |  6 PagesHawthorne highlights the habitual societal conflict of surfacing gender equality ideology throughout The Scarlet Letter. The typical female role in society during the mid-seventeenth century was to be a caretaker. Hester Prynne’s sentence for breaking this stereotype through adultery is to wear a large, red letter A on her chest. Hawthorne uses Hester’s character to add c haracteristics of early feminism. For example, Hester not only takes on the so called male and female role put in place by society atRead MoreEmbracing a Feminist Nature: A Theory Essay1812 Words   |  8 Pagesempowerment for women, in retrospect to the interpretations of his views on feminism of the timeframe, or a woman oppressed by her sins under the tyranny of puritanical injustice. While some argue for Hester’s feminist virtues without closer introspection of her literary creator, much could be discerned regarding Hester’s feminine presence by speculating that Hawthorne wrote Hester as the feminine version of himself trapped within the injustices of a patriarchal world. There is no doubt, that by entertaining

Thursday, December 12, 2019

Ah Are You Digging On My Gra free essay sample

Ah, Are You Diging On My Gra Essay, Research Paper The insignificance of human life compared to the transition of clip and continuance of the life rhythm are explored in both Thomas Hardy # 8217 ; s # 8220 ; Ah, Are You Diging On My Grave # 8221 ; and John Keats # 8220 ; When I Have Fears # 8221 ; . Hardy uses the relationships between a dead adult female and her household, friends and pet to demo this insignificance, while Keats uses the magniloquence of nature. Although the verse forms use different riming techniques, similarities are found in their constructions. Hardy writes in a manner of his ain creative activity but uses four of the six poetries to foreground different illustrations of the adult female # 8217 ; s relationships with those left buttocks. The fifth is used as a edifice up of hope, and the concluding poetry is used to demo both the storyteller and the reader how shortly what we consider of import and meaningful in life, can be diminished or forgotten in the lives and day-to-day modus operandis of those left buttocks. Keats, meanwhile, uses a standard sonnet signifier, utilizing his three quatrains to each give a different illustration of what the adult male hopes to carry through in life. The concluding rhyming pair shows his credence of his life as little and undistinguished as compared to the breadth of nature and the universe as a whole ; # 8220 ; -then in the shore Of the broad universe I stand entirely, and believe Till Love and Fame to nothingness make sink. # 8221 ; These verse forms are written from different point of views ; Hardy writes as a adult female already in her grave, and Keats as a adult male still alive. Yet both storytellers come to the decision that what we consider to be of great importance in our lives, is frequently of small to no importance after we die. Time will go through, and life will travel on merely as will without us. However, both of the storytellers figure this fact out in really different ways. The adult male in Keats # 8217 ; verse forms, while alive, has given clip to halt and see how his concerns are proved fiddling, and hence forestall his badgering. Assumeably this will assist him to bask his life, and to be thankful for whatever clip he is left with. The adult female in Hardy # 8217 ; s verse form, nevertheless, is still preoccupied with her life, even after she is dead and buried in her grave. It takes the # 8220 ; day-to-day jog # 8221 ; of her Canis familiaris to do her recognize how small she genuinely has affected the lives of those around her. The insignificance of the adult female in Hardy # 8217 ; s verse form is shown in four separate illustrations. The first examines the relationship with her hubby. Alternatively of goi nanogram to her sedate site with flowers and unhappiness, he has merely wed another, richer adult female. While she lies in her grave, and still thinks of her hubby as her â€Å"loved one† , he is acquiring on with his life and giving the love that he one time had for her to another adult female. Her kids are besides seeking to travel on, recognizing that no flowers or attention for her grave will of all time convey her dorsum to life, and hence believing that there is no usage brooding on what was. Even the 1 who was her enemy in life no longer hates her, believing that to detest her is a waste of attempt. Finally, the woman’s pet Canis familiaris, the â€Å"one true heart† , who likely stuck by her loyally in life, and loved her above any other, has forgotten all about her, merely retrieving her and her grave as he by chance starts to delve a hole in her grave site to bury a bone to eat on a day-to-day walk. Meanwhile, the adult male in Keats # 8217 ; poem recognize his insignificance in a far gentler, and easier manner. When he starts to worry about deceasing before he has written down everything his head is full of, or about whether or non he # 8217 ; s traveling to see the adult female he loves once more, he takes himself to # 8220 ; the shore of the broad universe # 8221 ; , and shows himself how fiddling such concerns are. He realizes that when he is gone, the universe will maintain turning, life will go on to travel on, and it # 8217 ; s a instead demeaning experience for him. The two characters come to the realisation of there insignificance through wholly different ways. The adult female in Hardy # 8217 ; s verse form, seemed to be instead vain and likely considered her life to be unrealized. Unfortunately she was forced to recognize the truth through the fore-mentioned events. On the other manus, the adult male in the Keats # 8217 ; verse form is in awe of nature and the universe around him. He is happy that he found love, and is able to come to footings with the fact that life will travel on without him. Because of the sad and unfortunate subjects to both verse forms, I truly didn # 8217 ; t bask either of them all that much, but if I were to see one to be my front-runner over the other, it would hold to be John Keats # 8217 ; # 8220 ; When I Have Fears # 8221 ; . I found that the construction ( the fact that it was written in the sonnet manner ) , and the rhyming form, made it a drum sander and easier read. I found Thomas Hardy # 8217 ; s # 8220 ; Ah, Are You Diging On My Grave? # 8221 ; to be slightly humdrum. I had a job with maintaining my attending during the verse form and felt he could hold got his point across in a much shorter or possibly less insistent manner. 341