2. To create a peer network, follow these steps for each computer
connected to the network:
1. Shut down the computer and install the network card and
appropriate cabling for each computer.
NOTE: For information about how to configure your network
adapters and physically connect your computers, consult the
documentation included with your network adapters or
contact the manufacturer(s) of your network adapters.
2. Start Windows and install the network drivers. Windows
may detect your network card and install the drivers when
you start the computer. If the network card drivers are not
included with Windows, follow the manufacturer's
instructions about how to install the network drivers.
3. 3. Choose a client and a common protocol for each computer. To
do this, follow these steps:
a. Click Start, point to Settings, click Control Panel, and then
double-click Network.
b. Click Add, click Client, and then click Add.
c. In the Manufacturers box, click the appropriate manufacturer,
click the appropriate client in the Network Clients box, and then
click OK.
d. Click Add, click Protocol, and then click Add.
e. In the Manufacturers box, click the appropriate manufacturer,
click the appropriate protocol in the Network Protocol box, and
then click OK.
4. 4. Configure a peer server. Each computer that is
configured for File and Printer Sharing can act as a
server. To configure a computer for File and Printer
Sharing, use the following steps:
a. Click Start, point to Settings, click Control
Panel, and then double-click Network.
b. Click File and Print Sharing, click one or both
options to share files and printers, click OK, and
then click OK again.
c. Click Yes when you are prompted to restart your
computer.
5. 5. Give each computer a unique computer name. To do
this, use the following steps:
a. Click Start, point to Settings, click Control
Panel, and then double-click Network.
b. On the Identification tab, type a unique name
in the Computer name box.
c. Click OK, and then click Yes when you are
prompted to restart your computer.
7. In this activity, you will learn how useful the Internet can be
for a PC support technician.
1. Using your own or computer laboratory, pretend that the
motherboard manual is not available and you need to replace
a faulty processor. Identify the manufacturer and model of the
motherboard by looking for the manufacturer name and
model number stamped on the board. Research the Web site
for that manufacturer. Print the list of processors the board
can support.
2. Research the Web site for your motherboard and print the
instructions for flashing BIOS.
8. 3. Research the Abit Web site
(www.abit.com.tw) and print a
photograph of a motherboardthat has a
riser slot. Also print the photograph of
the riser card that fits this slot. What
isthe function of the riser card?
11. Given the following materials, set-up a
network connection on four computers.
12.
13. More Security for
Remote Desktop
Task2. Analyze the situations
below and answer the questions
that follow.
14. When Enzo travels on company business, he finds it’s a
great help to be able to access his office computer from
anywhere on the road using Remote Desktop. However, he
wants to make sure his office computer as well as the entire
corporate network is as safe as possible. One way you can
help Enzo to add more security is to change the port that
Remote Desktop uses. Knowledgeable hackers know that
Remote Desktop uses port 3389, but if you change this port
to a secret port, hackers are less likely to find the open port.
Search the Microsoft Knowledge Base articles
(support.microsoft.com) for a way to change the port that
Remote Desktop uses. Practice implementing this change
by doing the following:
15. 1. Set up Remote Desktop on a computer to be the host computer. Use
another computer (the client computer) to create a Remote Desktop
session to the host computer. Verify the session works by transferring
files in both directions.
2. Next, change the port that Remote Desktop uses on the host
computer to a secret port. Print a screen shot showing how you made
the change. Use the client computer to create a Remote Desktop
session to the host computer using the secret port. Print a screen shot
showing how you made the connection using the secret port. Verify
the session works by transferring files in both directions.
3. What secret port did you use?