It Unit 6 Exercise 1

In: Other Topics

Submitted By kippphillips
Words 339
Pages 2
1. You triangulate your research by looking for looking for information from three different and three sources are considered reliable. 2. Primary sources are actual records or artifacts while secondary sources are writings from knowledgeable people who have studied the topic. 3. Three strategies that help to narrow an internet search are using exact words, using quotations, and using plus or minus signs. 4. A few of the questions researchers should ask is if the source can be trusted, what will the author get out of this publication and do the sources clearly define fact and fiction? 5. Researchers can use documentaries, television, and radio if they are reliable sources; you use quotes and cite the sources. 6. A wiki is a more fact based source while the blog and podcast tend to be more opinion based. 7. Three of the periodical indexes available in the ITT Virtual Library are academic journals, magazines, and newspapers. 8. The information that can be found in these publications is usually more exact and current. 9. Empirical sources include observations, experiments, surveys, and interviews. Researchers use them to confirm and to challenge online and print sources. 10. One of the best benefits of conducting an interview is to gather quotes that you can use for the text of your research. 11. The strategies for conducting a follow up interview is to write down what you remember, get your quotes right, check facts, and most importantly, send a thank you for their time. 12. An informal survey is used to generate data and to gather the views of many people on the same topic. 13. Researchers conduct field observations by watching something closely and taking detailed notes. 14. The purpose of an annotated bibliography is a way to collect and better understand the sources on your topic. 15. The parts of the…...

Similar Documents

Exercise 6 Activity 1

...Exercise 6: Cardiovascular Physiology: Activity 1: Investigating the Refractory Period of Cardiac Muscle Lab Report Pre-lab Quiz Results You scored 100% by answering 4 out of 4 questions correctly. 1. The cardiac muscle is capable of which of the following? You correctly answered: c. autorhythmicity 2. Phase 2 of the cardiac action potential, when the calcium channels remain open and potassium channels are closed, is called the You correctly answered: a. plateau phase. 3. Which of the following is true of the cardiac action potential? You correctly answered: b. The cardiac action potential is longer than the skeletal muscle action potential. 4. The main anatomical difference between the frog heart and the human heart is that the frog heart has You correctly answered: c. a single, fused ventricle. 06/04/13 page 1 Experiment Results Predict Question: Predict Question 1: When you increase the frequency of the stimulation, what do you think will happen to the amplitude (height) of the ventricular systole wave? Your answer : a. The amplitude will increase. Predict Question 2: If you deliver multiple stimuli (20 stimuli per second) to the heart, what do you think will happen? Your answer : d. neither wave summation nor tetanus Stop & Think Questions: 1. Watch the contractile activity from the frog heart on the oscilloscope. Enter the number of ventricular contractions per minute (from the heart rate display) in the field below and then click Submit Data to record your......

Words: 699 - Pages: 3

Unit 10 Exercise 1

...1. Forward biased LED-a semiconductor device that emits a narrow spectrum of light. 2. Incoherent Light- light in which the electric and magnetic fields of photons are completely random in orientation 3. Laser- acronym for light amplification by stimulated emission of radiation 4. Output pattern-the pattern of light produced in fiber optic that translate in the data 5. Output power – the amount of light produced by a fiber optic device 6. Modulation speed- the speed of which data is transferred over light 7. Core diameter mismatch- occurs when there is a difference in the core diameter of two optic fibers. 8. Current- the flow of electrons in a conductor 9. PIN photodiode- alight sensitive diode that conducts current in one direction only   10. Avalanche photodiode-  is a highly sensitive semiconductor electronic device that exploits the photoelectric effect to convert light to electricity. 11. Responsivity-the ratio of a detector output to input usually measured in unit of amperes per watt 12. Optical subassembly- the portion of a fiber optic receiver that guides light from the optical fiber to the photodiode 13. Dynamic range- the difference between the maximum and minimum optical input power that an optical receiver can accept 14. Operating wavelength- the wavelength at which a fiber optic receiver is designed to operate 15. Fiber optic couple- a device that connect two piece of fiber for the purpose of......

Words: 469 - Pages: 2

Unit 7 Exercise 1

...Physical Networking Unit 7 Exercise 1 Crosstalk Unwanted transfer of signals between communication channels or cabling. Waveguides A metal tube or other device confining and conveying microwaves. FTTH Fiber to the x is a generic term for any broadband network architecture using optical fiber to provide all or part of the local loop used for last mile telecommunications. The term is a generalization for several configurations of fiber deployment, ranging from FTTN to FTTD. Simplex Composed of or characterized by a single part or structure. Half-Duplex Allows the transmission of signals in both directions but not simultaneously. Full-Duplex Refers to the transmission of data in two directions simultaneously. Photodiode A semiconductor diode that, when exposed to light, generates a potential difference or changes its electrical resistance. Amplitude Modulation The modulation of a wave by varying its amplitude, used chiefly as a means of radio broadcasting, in which an audio signal is combined with a carrier wave. Analog Transmission Analog (or analogue) transmission is a transmission method of conveying voice, data, image, signal or video information using a continuous signal which varies in amplitude, phase, or some other property in proportion to that of a variable. Digital Transmission Data transmission, digital transmission, or digital communications is the physical transfer of data (a digital bit stream) over a point-to-point or point-to-multipoint......

Words: 527 - Pages: 3

Unit 1 Exercise 1

...NT1310 Unit 1 Exercise 1 6/17/14 The world is connected more than ever through the use of the internet. From paying bills to shopping or enjoying leisure time on the web; taking advantage of the internet has become second nature to society. Focusing in on one specific type of networking entertainment, online gaming has become a major league sport in its own right. Online gaming allows people from all around the world to connect together to team up or fight against one another. Behind the scenes is where the real magic happens. Between the gamers sits countless devices and hardware not to mention miles and miles of land. Using Call of Duty as an example, each gamer has a copy of the map being played on installed onto their local computer. Every time the gamer moves the direction of their character, their data is sent from their machine to their router, and then out past the demarc point. On the other side of the demarc is where the service provider picks up the data and moves the data from local network to the central office (better known as the local exchange). The central office then sends the data over the MAN (metro area network) or WAN (wide area network) to continue the data to game server. If the data hasn’t reached the server yet (for example the gamer lives in Michigan and the server is in California) the data will be passed over the core (also known as long-haul) network which connects MANs and WANs of different geographies together. On the off......

Words: 398 - Pages: 2

Unit 4 Exercise 1

...NT1310 Physical Networking Unit 4 Exercise 1: Cabling – Definitions Horizontal Cable- The cabling between and including the telecommunications outlet and the horizontal cross-connect. Backbone Cable- A cable connection between telecommunications or wiring closets, floor distribution terminals, entrance facilities, and equipment rooms either within or between buildings. Patch Cords- Any flexible piece of cable that connects one network device to the main cable run or to a patch panel that in turn connects to the main cable run. Connectors- With respect to cabling, a device attached to the end of a cable, receiver, or light source that joins it with another cable, device or fiber. A connector is a mechanical device used to align and join two conductors or fibers together to provide a means for attaching and decoupling it to a transmitter, receiver, or another fiber. Conduit- A rigid or flexible metallic or nonmetallic raceway of circular cross section in which cables are housed for protection and to prevent burning cable from spreading flames or smoke in the event of a fire. Racks- A frame-like structure where patch panels, switches, and other network equipment are installed. The typical dimension is 19 inches. Punch-Down Blocks- A generic name for any cross-connect block where the individual wires in UTP are placed into a terminal groove and “punched down” with a special tool. The groove pierces the insulation and makes contact with the inner conductor. Consolidation Points-......

Words: 799 - Pages: 4

Unit 1 Exercise 1

...Composition 1 Composition 1Composition 1didnt didn’t didn’t didn’t did nt didi did did did did did did did did did did did did did did did did did idid id idi did idid did did did dmdidi didid idid idid didid didid didi didididid didiid dididid iediddjiiiiiiiiiii did did didi did idid didi dd didi didii didid didid dddid didid didid diid idid idid idid ididididi did ididi idid ddi didi didi didi idid didid did dididi didid didid didi diid didid didi did idi did id id id I I did id id id id id I ii ii I I I I j j j j j j j d djdjd jdj du dudu dudu dud dud ud dudu dudud dudu dudud dud didi didi diid did idid didi didi did did idd didi diid d idid idi didi idi diid idi did did did id did did id di did did idid ddi didi didi didi did did did did did did did did didid didid didid didid didid did did did dd did id did did did di did di did did did did didi did didid did didid didi did d did did did dd didid did did did did di did did did did did did did did did did did did did did did didid did id did did did did dd did did d did did did did did did did did did did ddid did di didid id diidi di did idid dd ...

Words: 253 - Pages: 2

Unit 6, Exercise 1: Guided Reading - Finding Sources and Creating a Portfolio

...Chapter 25 1. Research by looking for information from three different types of sources: * Online sources * Print sources * Empirical sources Triangulation is used by researches in order to find out if the information is reliable from all three sources. If not, say only two sources are reliable, there leaves room from some doubt. 2. Primary sources – Actual records of artifacts, like letter, photographic, videos, memoirs, books, or personal papers that were created by the people involved in the issues and events you are researching. Secondary sources – Writings of scholars, experts, and other knowledgeable people who have studied the topic you are researching. Both college students, who rely on Secondary sources for their topic, should always look to Primary sources for opportunities to get closer to the topic they are researching. 3. 1. Use exact words 2. Use quotation marks for specific phrase 3. Use the plus (+) sign in front of a word or phrase 4. - Can you identify and trust the author(s) of the source? - What organization is this source associated with and why is it publishing this information? - Does the source clearly distinguish between opinions and independent facts? - Has the web site been updated recently? 5. If the material is trust worth, you can take quotes and cite these kinds of electronic sources in your own work. 6. Wikis – Allow their users to add and revise content, and they rely......

Words: 593 - Pages: 3

Byp 1-6 Exercise

...BYP1-6 Exercise ACC/349 Jan 26, 2015 BYP1-6 Exercise A. Who are the stakeholders in this situation? The stakeholders would include the President and Vice President of Robbin Industries, Wayne Terrago, Robbin Industries controller as well as shareholders, and creditors, specifically ones involved in the bond offering. Other stakeholders would be employees of the company-for if this advertising expense is reported as inventory, this can be classified as unethical by the SOX Act and is not acceptable in accordance with the GAAP to where the company can be in violation and have hefty fines which would affect the jobs of the present employees of the company. B. What are the ethical issues involved in this situation? One issue is that the excessive advertising is being reported as inventory, or at least the President of the company and some of the board members are wanting it to be. In accordance with the SOX Act, managers must be able to verify all internal controls that ensure all financial reporting’s are accurate. If this is reported per the President’s recommendation then this is unethical. Another issue is where others wanted the extensive advertising costs be classified as prepaid advertising and a current asset. This is not acceptable per GAAP and the company show that they have more assets than they have to make them look better on their financial statements for creditors and shareholders C. What would you do if you were Wayne Terrago? This......

Words: 459 - Pages: 2

Nt1330 Unit 1 Exercise 1

...IP Addressing Scenario Unit 1 Exercise 1 ITT Technical Institute Floyd Washington Jr. April 4, 2015 When setting up a network that will consist of many host computers, one of the first things that an administrator must do is to determine what class of networks that they must administer to a given business. This is the point where every administrator must know how to implement classful and classless IP addressing. A classful network is a network addressing architecture used in the internet from 1981 until the introduction of Classless Inter-Domain Routing (CIDR) in 1993. Classful IP addressing divides the addtess space on the internet into five address classes. Each class is coded in the first four bits of the address. Today the classful network concepts remain in play only limited scope of the default configuration parameters. There are 32 bits contained in any IPv4 IP address. A Class A network has eight bits in the network number field and 24 bits in the rest of the field and covers a range of 0-126 in the leading field. There are 128 Class A networks with 16,777,216 hosts capability per network. The range of the Class A networks are 0.0.0.0 to 127.255.255.255. A Class B network has 16 bits in the network number field and has 16 bits in the rest of the fields and covers a range from 128.0.0.0 to 191.255.255.255. There are 16,385 Class B networks and each network has the capability of having 65,536 network hosts. A Class C network has 24bits in the network......

Words: 756 - Pages: 4

Unit 6 Exercise

...problems and/or complaints. This way we may implement a proper plan of action and I agree that a ticket escalation policy is the way to go to achieve this. I will start drafting a policy for how support requests will be prioritized in the immediate future according to what you have requested. Each end-user or department head may call me, email me or both stating what department they are with and the technical issue that is occurring and at what workstation it is occurring. Each technical issue will receive a work order number, each work order will contain all information that they have provided and the date and time received. I will assign each work order a level of urgency as they arrive 1-4, 1 being the most urgent and 4 being the least. These will be prioritized by department as requested as follows 1: Customer Service 2: Sales 3: Accounting 4: Marketing. Each department head will receive a copy of said work order as well. The new policy should be a great way to manage both business and end-user expectations. I believe we can better manage these requirements by not only each department but each employee receiving a copy of the policy as well once it is finalized. Thank you again and please let me know if there is anything you would like me to add to the policy....

Words: 253 - Pages: 2

Nt1430 Unit 1 Exercises

...Unit 1 exercises Chapter 1 1. What is free software? List three characteristics of free software. • Software may be used for any purpose • The sources may be studied and changed • The software may be distributed arbitrarily 4. What is the Free Software Foundation/GNU? What is Linux? Which parts of the Linux operating system did each provide? Who else has helped build and refine this operating system? • The Free Software Foundation is the principal organization sponsored by the GNU Project. GNU developed multiple of tools, which included the C compilers that are part of the GNU/Linuc Operation System. • Linux is a name of the operating system kernel developed by Linus • Torvald’s kernel and a GNU’s tools work together as GNU/Linus Operation System Chapter 2 1. Briefly, what does the process of installing an operating system such as Fedora/RHEL involve? • Installing Fedora/RHEL is the process of copying operating system files from a CD, DVD, or USVB flash drive to hard disk(s) on a system and setting up configuration files so Linux runs properly on the hardware. Several types of installations are possible including fresh installations, upgrades from older releases of Fedora/ RHEL, and dual-boot installations. Chapter 3 1. What is a live system? What advantages does it have over an installed system? • A computer that runs the Wide Area Progressive games and displays the main system window. The advantages are Customization, cost, free market, stability,......

Words: 498 - Pages: 2

Nt1310 Unit 6 Exercise 1

...work is to be completed based on the dates from the attached schedule. Dates on the attached schedule include walk-through dates, bid submission dates, and expected project-start and completion dates. Questions and comments are welcomed; prospective contractors are encouraged to submit these questions in writing. (a) All bids are to be submitted in triplicate. (b) Each bid is to list all labor, material, and hardware costs in an itemized fashion. The detail is to include itemized unit pricing, cost per unit, and extended prices for each of the material and hardware components as well as the specific labor functions. (c) A cost, per outlet, to add or delete outlet locations is to be included in the pricing format. This cost is not to include any changes in hardware or patch-panel quantities. (d) There is also to be a scope of work provided that details all of the functions to be provided by the contractor for the project. (e) Quote optional Category 5e patch cables and station cables on a per-unit cost basis. List pricing for 3-foot, 5-foot, 7-foot, 9-foot, and 14-foot patch cables. (f) Quote optional network cutover assistance on a per-hour basis per technician....

Words: 596 - Pages: 3

Pt1230 Unit 6 Exercise

...and handled accordingly. I have taken the liberty to draw up a policy regarding how to prioritize support requests, and have included it here for you to review. Each department will get in contact with me, either by email or phone call, and provide the following information. * Their respective department * The technical issue they are having * The workstation that is experiencing the issue. Each technical issue will receive their own ticket number, with each ticket containing the information from above along with the date, time, and level of the technical issue. The department supervisors, as well as myself will also have a copy of the ticket on file for future reference. The issues will have levels assigned, 1-3, depending on severity. Level 1 would be simple and normal concerns that don’t require urgent and immediate attention. Level 3 would be high-priority issues that need immediate attention. Level 3 issues will be dealt with ASAP, with lower levels prioritized by department in this order: * Customer Service * Sales * Accounting * Marketing Once you’ve reviewed the proposal and finalized it, each department will receive a copy of the policy. I would suggest each employee receive a copy as well, as to avoid any confusion going forward. If I can be of any further assistance, feel free to call on me any time....

Words: 280 - Pages: 2

Unit 8 Exercise 1

...Unit 8 Exercise 1 Ja’Martay Bentley GE375 Tami Gary May 16, 2016 Freud’s psychoanalytic perspective emphasized unconscious and unresolved past conflicts (Carpenter & Huffman, 2011). Freud believed the psyche (mind) contained three levels of consciousness: conscious, preconscious, and the unconscious (Carpenter & Huffman, 2011). Conscious is the thoughts or motives that a person is currently aware of or is remembering (Carpenter & Huffman, 2011). Preconscious are thoughts or motives that are just beneath the surface of awareness and can be easily brought to the mind (Carpenter & Huffman, 2011). The unconsciousness are thoughts and motives that lie beyond a person’s normal awareness, which still exert great influence (Carpenter & Huffman, 2011). Freud believed that most psychological disorders originate from repressed memories and instincts (sexual and aggressive) that are hidden in the unconscious (Carpenter & Huffman, 2011). Freud also believed that personality was composed of three mental structures: id, ego, and superego (Carpenter & Huffman, 2011). The id is totally unconscious and serves as a reservoir of mental energy (Carpenter & Huffman, 2011). The id is made up of innate, biological instincts and urges. It is immature, impulsive, and irrational (Carpenter & Huffman, 2011). The id wants what it wants and when it wants it – pleasure principle (Carpenter & Huffman, 2011). As a child grows older, the ego develops......

Words: 901 - Pages: 4

Nt1310 Unit 6 Exercise 1

...NT1310 Physical Networking Unit 6 Exercise 1 Thomas Westbrook Due Date: Unit 6 Exercise 1: Connector Installation Twisted -Pair Cable * Measure the cable you want to put ends on, using a cable cutter trim off the excess * Use a cable stripper to strip about 1 ½ inches of the jacket from the end, then rotate the stripper around the cable twice to cut through the jacket * Remove the stripper and pull the trimmed jacket from the cable, so that you can see the inner conductors. Separate any visible jacket slitting cords that are present, trim it backto the edge of the jacket. * Untwist all the inner conductor pairs and spread them apart so that you can see each individual conductor * Line up the individual conductors so that the color matches the color-coding standard you are using * Trim the conductors so that the ends are even with each other, make sure that the jacketof the cable will be inside the connector. The total length of the exposed connectors after trimming should be no longer then ½ inch to 0.625 inches * Insert the conductors into the connector, make sure that all conductors line up properly with the pins as they were in the previous step. If they don’t line up, try again. Make sure to do this step carefully, it’s the last one before crimping * Carefully insert the connector and cable into the crimping tool. It has two dies that will press into the connector. Push the pins in the connector into the conductorsinside the......

Words: 421 - Pages: 2