Assessing “hands on” skills on CS1 computer & network technology units

Author(s):  
D. Veal ◽  
S. P. Maj ◽  
Rick Duley
2001 ◽  
Vol 33 (1) ◽  
pp. 381-385
Author(s):  
D. Veal ◽  
S. P. Maj ◽  
Rick Duley

Author(s):  
L. S. Chumbley ◽  
M. Meyer ◽  
K. Fredrickson ◽  
F.C. Laabs

The Materials Science Department at Iowa State University has developed a laboratory designed to improve instruction in the use of the scanning electron microscope (SEM). The laboratory makes use of a computer network and a series of remote workstations in a classroom setting to provide students with increased hands-on access to the SEM. The laboratory has also been equipped such that distance learning via the internet can be achieved.A view of the laboratory is shown in Figure 1. The laboratory consists of a JEOL 6100 SEM, a Macintosh Quadra computer that acts as a server for the network and controls the energy dispersive spectrometer (EDS), four Macintosh computers that act as remote workstations, and a fifth Macintosh that acts as an internet server. A schematic layout of the classroom is shown in Figure 2. The workstations are connected directly to the SEM to allow joystick and computer control of the microscope. An ethernet connection between the Quadra and the workstations allows students seated there to operate the EDS. Control of the microscope and joystick is passed between the workstations by a switch-box assembly that resides at the microscope console. When the switch-box assembly is activated a direct serial line is established between the specified workstation and the microscope via the SEM’s RS-232.


2013 ◽  
Vol 433-435 ◽  
pp. 1720-1723
Author(s):  
Jun Ruan ◽  
Pan Zhang ◽  
Hong Bi Ding

With the rapid development of computer network technology, global information has become mega-trend of modern social development. But due to all kinds of defects existing in the network itself and variety and openness of network interconnection form, network security has become the focus of social attention. So in this paper, a lot of current advanced network security technologies and products are used in order to make network security, which is under the general principles of network security situation.


Sign in / Sign up

Export Citation Format

Share Document