TGA 2
.pptx
keyboard_arrow_up
School
University of Phoenix *
*We aren’t endorsed by this school
Course
MANAGEMENT
Subject
Computer Science
Date
Apr 28, 2024
Type
pptx
Pages
6
Uploaded by DukeCrown8553 on coursehero.com
TGA 2: Domain 1.5-3.2 •
Download this PowerPoint file on your computer. •
Save to your computer. •
Use your file on your computer to complete TGA.
Make sure to READ the directions on each slide as they might change from slide to slide. Complete all slides for full credit. Upload completed PowerPoint TGA file to the OLS.
Complete the graphic by moving the correct characteristic to the matching operating system.(Domain 1, Lesson 3) Linux
Windows
macOS
Open Source
Proprietary
Proprietary
Can run on any hardware and sometimes free to use
Designed to be used on a Macintosh computer
Users determine which computer operating system best suits their needs by looking at what each operating system offers. Open-source operating systems provide users with the ability to modify and distribute the software. The owner maintains full control of proprietary software. Users cannot modify and distribute the software.
These are some of the hardware and software requirements to connect to network. Match the image with the name of the network requirement. (Domain 1, Lesson 3) Router Modem Networ
k Adapte
r Operating System
Web Browser
Network infrastructure is the hardware and software connected and working together to create network connectivity, communication, operations, and management. Hardware and internet connectivity create a communication path and connectivity. When the hardware is run with the appropriate software, this creates the operation and management of the network.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
15. A company has approached you for their product testing, and you agree to do it.
First, you have to install the necessary plugins for the software through the browser,
install the software, and run the software again.
What procedure should you adopt to ensure that you don't compromise the browser
and the computer's operating system?
C
C
C
Make sure that the browser's CSP policy is set, then quarantine the software file,
then access the software using an active directory, use a sandbox to run the
software.
Make sure that the antivirus/antispyware is run on the plugins, run the software in
the sandbox, check the CSP options before running the software, and send a
secure cookie to the server.
16. A cybercriminal attempts to trick a computer's user into sharing their personal
information by implementing content to discreetly capture user information over the
actual webpage.
What should the user implement to avoid this situation?
C
Making sure that the OS's security options are deployed,…
arrow_forward
A user interface can be extremely constraining in its functionality. For example, the interface design may prevent a user from exiting to a Windows desktop or from logging on to the Internet if the user is using a Mac. Should such limitations be incorporated into a user interface? What is the reason for this or why is it not?
arrow_forward
True/False: Blockchain is primarily used in
operating systems for graphical user interface
enhancements.
arrow_forward
BIOS Configuration Menus
Instructions:
Turn off your computer. Then turn on your computer, and quickly press a special key (computer manufacturer and model specific) to stop at the BIOS user interface.
For Windows 10 computers, press the F12 key. For earlier Windows computers it could be the F8 key.
Many newer machines use the Unified Extensible Firmware Interface (UEFI) which has replaced the BIOS interface. It still performs essentially the same functions.
Question: Use your phone to take several photos of the various screens. You should include all visible menu options. The purpose is to help you understand what you can do using the BIOS user interface. If you want to boot from a CD instead of a hard disk or an SSD, how would you change your BIOS configuration? If you want to prevent anyone from changing your BIOS settings and setting a password, what BIOS configuration would you change? How would you boot into Safe Mode? If your system does not allow this, what would be the…
arrow_forward
Please elaborate on the significance you place on file extensions. Select any three file extensions from any folder on your hard drive. It's possible to find the manufacturing equipment, too. In the Microsoft Windows operating system, you may see the file extension in the properties window by right-clicking on the file and selecting the option from the context menu that displays.
arrow_forward
UIDs and GIDs are system-specific and cannot be recycled after they have been used. Is this statement true or false?
arrow_forward
Computer Science
Please thoroughly document your thought process and any references you use to solve this problem. Thanks for your time!
You receive a chat from a user asking questions about a newly released feature on Brightspace. As this is a new feature, you still don't have much knowledge on how to troubleshoot the issue the client is discussing. Provide an explanation of what you would do to attempt to find the answer as well as any comments/questions to the client through the chat.
arrow_forward
A. Suggest an appropriate computer for each of the following scenario. You should
attach technical specifications of the computer.
i)
Person A works mostly on image editing. He requires the latest Adobe Photoshop
software as well as a large storage to store a huge collection of digital images.
ii)
Person B is a student and is looking for a low-cost computer below RM1500. He
just needs the computer for surfing the Internet and doing his assignments by
using a free office suite such as Apache Open Office.
iii)
Person C wants a small, portable computer to read e-books while on the go.
arrow_forward
Book reference: Windows PowerShell Step by Step 3rd Edition - Ed WilsonChapter 15
11. What is the reason for the below(image attached) error?
12. What are two methods of correcting the above(image attached) error?
arrow_forward
9. Within this document, embed an image of the basic troubleshooting utility in Windows.
(Hint: with a desktop or laptop computer using the Windows OS, use the Snipping Tool or
Alt *Print Screen).
arrow_forward
plz help with the following:
First try to locate and use an uninstall routine provided by the software. If this works, you are done and can skip the next steps. Delete the program folders and files that hold the software.Delete the registry entries used by the software.
Remove the entries in the Start menu and delete any shortcuts on the desktop.
Remove any entries that launch processes at startup.
arrow_forward
using C# asp.net web application
1.1) Design and create a dynamic Web site which allows the user to book a concert.1.2) Use the components as in the example above.This exercise focussed on postback. You have learned about session this week and you shouldenhance your solution for this program by using session. Use a session to store information aboutthe booking and display the booking information when button Book is clicked.
arrow_forward
Section: Debugging Define and describe 1. What a bug is. 2. What debugging is and why debugging is challenging. 3. What a debugger is. Provide a screenshot image of your desktop where you are debugging the providedC++code that clearly shows breakpoints that will stop the execution of the program when an alert is sent, and when the blood pressure is determined. Provide details to the reader of the report detailing how each of your breakpoints will allow the reader of the report to understand about the program. To place breakpoints use any IDE such as Visual Studio, or an online C++ debugger such as https://www.onlinegdb.com/onlinec++debugger. Section: Bugs in hospital project Review the flowchart, pseudocode, andC++
arrow_forward
This page gives an in-depth look at the Access Control List.
arrow_forward
How does Windows handle multi-monitor setups regarding mouse control, and what options are available for customizing mouse behavior across multiple displays?
arrow_forward
Demonstrate the process of configuring mouse settings in Windows, including pointer speed and button customization.
arrow_forward
An iOS app can be in one of five states:
- The app has not been launched or was running but was terminated by the system.
- The app is running in the foreground but is currently not receiving events. An app usually stays in this state only briefly as it transitions to a
different state.
- The app is running in the foreground and is receiving events. This is the normal mode for foreground apps.
The app is in the background and executing code. Most apps enter this state briefly on their way to being suspended. However, an app that
requests extra execution time may remain in this state for a period of time. (An app being launched directly into the background enters this state instead of the
inactive state.)
- The app is in the background but is not executing code. The system moves apps to this state automatically and does not notify them before doing
so. While suspended, an app remains in memory but does not execute any code. When a low-memory condition occurs, the system may purge…
arrow_forward
2- if y=sin(t), where (-4≤t≤4) could you plot (t,y) as shown below:
Figure 1
File Edit View Insert Iools Desktop Window Help
4.0
Graph of the sine function
1
0.8
0.6
0.4
0.2
0
-0.2
-0.4
0.6
-0.8
-1
Y axis
4
3
2
-1
0
X axis
Sine function
1
2
arrow_forward
lwc (lightning web component)
I need to make a calendar so late on I can populate it with my database!
arrow_forward
In the context of network printing, what is the purpose of a print server, and how does it function in a Windows environment?
arrow_forward
Determine a solution to the problems in these exercises by a discussion:
1. Slow Computer Performance: Your computer is running exceptionally slow. Not only does it take the operating system a long time to start, but programs also are not performing as well as they used to perform. How might you resolve this?
2 . Potential Virus Infection: While using your laptop, a message is displayed stating that your computer is infected with a virus and you should tap or click a link to download a program designed to remove the virus. How will you respond?
3.Excessive Phone Heat While using your smartphone, you notice that throughout the day it gets extremely hot, making it difficult to hold up to your ear. What steps can you take to correct this problem?
arrow_forward
How can I find out which thread models my operating system (Windows 7) uses (one-one, one-many, or many many)? Is there a specific location on my computer where I can see this?
arrow_forward
Please provide the screenshots of the cmd and examples of it.
Part 2
Create and delete user accounts and groups using the Ubuntu terminal window.
a) Create three user accounts with passwords (testuser1, testuser2 and testuser3).
Verify with special command what you have created.
Please provide your screen shot.
b) Add all user accounts to the group testuser10.
Verify with special command what you have created.
Please provide your screen shot.
c) Delete users from the assigned group. Verify with special command what you have deleted.
Please provide your screen shot.
d) Delete user accounts. Verify with special command what you have deleted.
Please provide your screen shot.
arrow_forward
What is the importance of printer drivers in the context of printing on Windows operating systems?
arrow_forward
Fill this table for me
B. In 1-2 sentences which product would you prefer for your home use at
this point? Why?
Support for SCSI virtual disks
Support for ISO image files
Support for USB devices
Support for saving machine state
Support for multiple snapshots
Support for parenting/ cloning
Support for shared (NAT) networking
Support for bridged networking
Support for teams
Support for additional virtual machine
tools
Support for non-Windows guest systems
Support for 64-bit guest OSs
Requires a 64-bit processor
Requires each virtual machine OS to have
its own license
arrow_forward
Photo Gallery Scenario
Develop a System Sequence Diagram for the scenario below:
A user enters a website’s address to the system.
If the address is correct, the system takes the user to the main page.
If the user enters an incorrect address the system displays an error message.
The user selects the photo gallery option from the main page.
From the photo gallery page, the user selects a photo by the photo’s name.
According to the website’s configuration, it takes 5 seconds for the system to display any selected photo.
If the time limit is not exceeded, the system displays the photo.
If the time limit is exceeded, the system displays photo not available.
The user can request to destroy the interaction with the photo gallery page.
Note: The photo selection process can be repeated.
DIAGRAM
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Microsoft Windows 10 Comprehensive 2019
Computer Science
ISBN:9780357392607
Author:FREUND
Publisher:Cengage
Related Questions
- 15. A company has approached you for their product testing, and you agree to do it. First, you have to install the necessary plugins for the software through the browser, install the software, and run the software again. What procedure should you adopt to ensure that you don't compromise the browser and the computer's operating system? C C C Make sure that the browser's CSP policy is set, then quarantine the software file, then access the software using an active directory, use a sandbox to run the software. Make sure that the antivirus/antispyware is run on the plugins, run the software in the sandbox, check the CSP options before running the software, and send a secure cookie to the server. 16. A cybercriminal attempts to trick a computer's user into sharing their personal information by implementing content to discreetly capture user information over the actual webpage. What should the user implement to avoid this situation? C Making sure that the OS's security options are deployed,…arrow_forwardA user interface can be extremely constraining in its functionality. For example, the interface design may prevent a user from exiting to a Windows desktop or from logging on to the Internet if the user is using a Mac. Should such limitations be incorporated into a user interface? What is the reason for this or why is it not?arrow_forwardTrue/False: Blockchain is primarily used in operating systems for graphical user interface enhancements.arrow_forward
- BIOS Configuration Menus Instructions: Turn off your computer. Then turn on your computer, and quickly press a special key (computer manufacturer and model specific) to stop at the BIOS user interface. For Windows 10 computers, press the F12 key. For earlier Windows computers it could be the F8 key. Many newer machines use the Unified Extensible Firmware Interface (UEFI) which has replaced the BIOS interface. It still performs essentially the same functions. Question: Use your phone to take several photos of the various screens. You should include all visible menu options. The purpose is to help you understand what you can do using the BIOS user interface. If you want to boot from a CD instead of a hard disk or an SSD, how would you change your BIOS configuration? If you want to prevent anyone from changing your BIOS settings and setting a password, what BIOS configuration would you change? How would you boot into Safe Mode? If your system does not allow this, what would be the…arrow_forwardPlease elaborate on the significance you place on file extensions. Select any three file extensions from any folder on your hard drive. It's possible to find the manufacturing equipment, too. In the Microsoft Windows operating system, you may see the file extension in the properties window by right-clicking on the file and selecting the option from the context menu that displays.arrow_forwardUIDs and GIDs are system-specific and cannot be recycled after they have been used. Is this statement true or false?arrow_forward
- Computer Science Please thoroughly document your thought process and any references you use to solve this problem. Thanks for your time! You receive a chat from a user asking questions about a newly released feature on Brightspace. As this is a new feature, you still don't have much knowledge on how to troubleshoot the issue the client is discussing. Provide an explanation of what you would do to attempt to find the answer as well as any comments/questions to the client through the chat.arrow_forwardA. Suggest an appropriate computer for each of the following scenario. You should attach technical specifications of the computer. i) Person A works mostly on image editing. He requires the latest Adobe Photoshop software as well as a large storage to store a huge collection of digital images. ii) Person B is a student and is looking for a low-cost computer below RM1500. He just needs the computer for surfing the Internet and doing his assignments by using a free office suite such as Apache Open Office. iii) Person C wants a small, portable computer to read e-books while on the go.arrow_forwardBook reference: Windows PowerShell Step by Step 3rd Edition - Ed WilsonChapter 15 11. What is the reason for the below(image attached) error? 12. What are two methods of correcting the above(image attached) error?arrow_forward
- 9. Within this document, embed an image of the basic troubleshooting utility in Windows. (Hint: with a desktop or laptop computer using the Windows OS, use the Snipping Tool or Alt *Print Screen).arrow_forwardplz help with the following: First try to locate and use an uninstall routine provided by the software. If this works, you are done and can skip the next steps. Delete the program folders and files that hold the software.Delete the registry entries used by the software. Remove the entries in the Start menu and delete any shortcuts on the desktop. Remove any entries that launch processes at startup.arrow_forwardusing C# asp.net web application 1.1) Design and create a dynamic Web site which allows the user to book a concert.1.2) Use the components as in the example above.This exercise focussed on postback. You have learned about session this week and you shouldenhance your solution for this program by using session. Use a session to store information aboutthe booking and display the booking information when button Book is clicked.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Microsoft Windows 10 Comprehensive 2019Computer ScienceISBN:9780357392607Author:FREUNDPublisher:Cengage
Microsoft Windows 10 Comprehensive 2019
Computer Science
ISBN:9780357392607
Author:FREUND
Publisher:Cengage