Network Admin

In: Computers and Technology

Submitted By hatam
Words 576
Pages 3
1. What three numbering systems are used in computing?
Decimal, Binary and Hexadecimal 2. What is the BASE of Decimal? How many characters?
10 is the base of Decimal and its 10 characters. 3. What is the base of Binary? How many characters?
2 is the base of Decimal and its 2 characters 4. What number system is used for everyday math? Decimal 5. What number system is used to store data by computers?
Binary 0 and 1 6. List the decimal to binary conversion methods.
Binary conversion charts methods and Division by 2 methods 7. Practice Decimal to Binary conversion. 47÷ 2 = 23 with a reminder of 1 23 ÷2 = 11 with a reminder of 1
11 ÷ 2 = 5 with a reminder of 1
5 ÷ 2 = 2 with a reminder of 1
2 ÷ 2 = 2 with a reminder of 0
1 ÷ 2 = 1 with a reminder of 1 the Binary will be 101111

8. State the powers of 2 from exponent 0 through 7.
27 26 25 24 23 22 21 20 9. What method can be used for Binary to Decimal conversion?
The conversion charts methods. 10. Practice Binary to Decimal conversion.
10011 24 23 22 21 20 16 8 4 2 1 1 0 0 1 1 16 0 0 2 1 16 + 2 + 1 = 19 11. State the basic units of measurements for bytes. Refer to table 2-3
KB Kilobyte, MB megabyte, GB gigabyte, TB terabyte 12. Why there are apparent differences in the way memory usage is calculated?
To save data to hard drive it will use the byte units, But for transfer data it have to use bite per second. 13. What is the base of Hexadecimal? How many characters?
16 and its 16 characters. 14. Practice Hexadecimal…...

Similar Documents

Admin Guide

...first line of the file). A field can be enclosed in double-quotation marks (“). This allows you to enter information that has a comma or double-quotation marks in it. Example: if a User Title is Inside Sales, NE you would type “Inside Sales, NE” in the User Title field. • • Tip: If you are using Microsoft® Excel® to create your file, you only need to enter the User Name, User Email and User Title in different columns and save the file as a CSV file. You do not need to add commas or double-quotation marks in the columns; Excel will automatically do this when you save the file. 2. On the Manage Users page, click New/CSV. 3. Select the CSV file you want to upload by clicking the Browse button, locating the file on your computer or network and clicking Open. 4. Click Submit. The file upload begins. A Submission ID is created and shown in the SubmissionID field. The status of the upload is also shown. Click Refresh to update the status of the upload. The system makes two passes through the CSV data. The first pass is an error scan. If there is an error in the file, the system displays a message with the problem line and the error reason. The second pass, which only occurs if the first pass did not detect any errors, adds the new users and checks for redundancy. Copyright © 2009-2012 DocuSign, Inc. All rights reserved. Account Administration Reference Guide 7 An activation email is sent to the new users in the uploaded file. Note: An access code cannot be added......

Words: 8797 - Pages: 36

Network Systems Admin. (in Training)

...Address Class Historical Significance of the address classes: Class A: the first of the address classes, which is responsible for the value ranges of IP from 0-126 and also has 16,177,214 hosts. It also has 256 networks and the most significant bits are 0000. Class B: The second of the address classes, which is responsible for the value ranges of IP from 128-191. It also has 65,534 hosts and 65,536 networks. The most significant bits are 1000 and it is also a common class among most IP addresses. Class C: the third of the address classes, which is responsible for the value ranges of IP from 192-223 the most significant bits are 1100. It only has 254 hosts but it also has 16,177,216 networks since a lot of people have their IP addresses starting with 192.xxx.xxx.xx. Class D: the fourth of the address classes, which is responsible for the value ranges of IP from 224-239. Its most significant bits are 1110, and it does not have any networks or hosts because this class is rarely considered since the start of IP addresses don’t often start with 224 and above. Class E: the fifth of the address classes, which is responsible for the value ranges of IP from 240 and above. The significant bits of this class are 1111 and just as Class D does not have any hosts or networks, the same is with this class since IP addresses do not go above 192 usually. http://www.inetdaemon.com/tutorials/internet/ip/addresses/classful.shtml Address space A: the value range is from 0-126 so that......

Words: 639 - Pages: 3

Network Systems Admin

...An organization that manages the assignment of internet number resources within the Asian continent. Provides number resource allocation and registration services that support the global operation of the Internet. 2. Approximately how many Ipv4 addresses are possible? An IPv4 uses 32 bit IP address and with 32 bits the maximum number of IP addresses is approximately four billion IPv4 addresses 3. Approximately how many IPV6 addresses are possible? An IPv6 uses 128 bit IP address and with 128 bits the maximum number of IP addresses is approximately 48 billion 4. Why do you think the world is running out of Ipv4 addresses? The central pool of IPv4 addresses officially ran dry on Tuesday, February 1, 2011. From now on, all new networks and services in the region must implement IPv6. 5. How long do you think it will take before the Ipv4 addresses are completely exhausted? Ipv4 addresses are Exhausted 6. Since Ipv6 is the long-term solution for this issue, why do you think we are still using and...

Words: 314 - Pages: 2

Business Admin

...Technologies Engineering Ltd (ST Engineering) is an integrated engineering group providing solutions and services in the aerospace, electronics, land systems and marine sectors. It has more than 100 subsidiaries in 24 countries and 42 cities worldwide. In 2001, the group adopted an integrated approach to business excellence. Their efforts were recognised when ST Engineering won the Singapore Quality Award in 2002 and the Innovation Excellence Award in 2003. In 2007, they became one of two recipients of the inaugural Singapore Quality Award with Special Commendation. TNT Express Worldwide (S) Pte Ltd TNT in Singapore is part of a global transportation and distribution industry, dedicated to providing delivery solutions to customers. Its global network serves more than 200 countries and employs around 152,000 people. Its employees have to work closely and maintain high standards so that parcels and freight are delivered safely and on time. To attain high standards, TNT embraced the business excellence framework, and was rewarded with Singapore Quality Class certification in 2002 and 2005, and the People Developer certification in 2003. In 2009, TNT became one of the first few organisations to achieve the Singapore Quality Class – Star. Case Study Organisations Conrad Centennial Singapore (Conrad) Conrad is a luxury business hotel located in the heart of Singapore’s liveliest and largest business, historical, cultural and shopping districts of Marina Bay, Millenia Walk and......

Words: 14120 - Pages: 57

Admin

...50. Reaching the Unreached• Children in conflict with the Law• Children in Areas of Conflict/Disaster• Children with Disabilities• Street Children, Out-of-School Children & Youth• Children & Youth in IP Communities The State of Basic Education: Gaining Ground | March 28, 2012 | The Tower Club, Makati City * 51. ICTComputerization ProgramDepEd in EducationDepeD Internet Connectivity Program P1.8 B FY 2012 1,500 laptops 7,000 internet connection 3,700 PC packages The State of Basic Education: Gaining Ground | March 28, 2012 | The Tower Club, Makati City * 52. ICTComputerization Program | DepeD Internet Connectivity ProgramDepEd in Education7,274 public high 10 networked PCs 1 server PCschools 1 printer428 no computer lab 1 network switch3,107 for connection 1 modem 38,251 public 1 interactive whiteboard 1 PC as shared computing elementary schools server 1,716 w/ e-Classroom 7 thin client PCs packages 1 printer 1 LCD projector 1 modem The State of Basic Education: Gaining Ground | March 28, 2012 | The Tower Club, Makati City * 53. ICT Initiatives• Unified Information System• Basic Education Information System• Human Resource Information System• Learner Information System• Asset Management System Web Central The State of Basic Education: Gaining Ground | March 28, 2012 | The Tower Club, Makati City * 54. ICT Initiatives• Learning Resource Management Development System• Geographical Information System and School Mapping• Unified Web Interface Web Central......

Words: 6634 - Pages: 27

Network System Admin

...circuit-switching network is the telephone system, which links together wire segments to create a single unbroken line for each telephone call. Packet switching: Refers to protocols in which messages are divided into packets before they are sent. Each packet is then transmitted individually and can even follow different routes to its destination. Leased line: A permanent telephone connection between two points set up by a telecommunications common carrier. Typically, leased lines are used by businesses to connect geographically distant offices. Time-division multiplexing:  a type of multiplexing that combines data streams by assigning each stream a different time slot in a set. TDM repeatedly transmits a fixed sequence of time slots over a single transmission channel. T-carrier system: the name of the combination of different physical line standards(DSO, DSI, DS3 and others), plus circuits switches that use time division multiplexing (TDM) features, that together allowed the phone company to create digital circuits from end to end and create leased line services for customers. DSO: Digital Signal level 0. One of the physical line standards in the T-carrier system, as originally created by the companies of bell system in the united states. DSO runs at 64 Kbps DS1: same as above DS1 runs runs at 1.544 Mbps, with a 193-bit frame, 24 DSO channels, and an 8-Kbps overhead channel. Frame Relay: A packet-switching protocol for connecting devices on a Wide Area Network (WAN).......

Words: 335 - Pages: 2

Admin Control

...increase the overall security, by reducing the attack surface that is available. One of the most vulnerable settings that can be granted to a user is local administrative access. By adding the user account to the local Administrators group, the user is granted ultimate control over their desktop. The user can perform almost any action, even if the network is configured to deny this access. Actions that a user can perform, due to them having local administrative access, include, but are not limited to, the following: remove their computer from the domain, modify any registry setting. modify permissions on any folder or file, modify any system setting, including settings that are in files in the System folder, install any application, uninstall applications, security patches, or service packs, access any website allowed by firewall, and download and install ActiveX controls, Web applications, or other malicious applications downloaded from the Internet. Although there is a need to have users running as administrator to allow certain applications to function, this type of access is very hazardous and endangers the desktop and the entire network to potential security breaches and attacks. It is essential that the local Administrator password is also reset. This is due to the fact that the user may have had administrative privileges before removing them from the local Administrators group, therefore they could have reset the Administrator account password to something they......

Words: 333 - Pages: 2

Network Admin

...Juan J. Morales Network Infrastructure Professor Lambert DB – 2 1 - Explain the concept of a server role in detail. List some of the available server roles, and demonstrate how to configure them. Follow this by a demonstration of adding Windows Server 2008 features how do these features benefit and administrator? A server role is a software program included in a server software that performs a specific function, some of this server roles are as follows. * DNS Server – Provide the IP name resolution to a network * DHCP Server - Provides an Internet Protocol (IP) host with its IP address and other related and configuration information such as the subnet mask and default gateway. Just to name a few. From server manager in the left-hand pane, double-click the Roles node. In the right-hand pane, click add role, and click next to bypass the welcome screen. The add roles wizard windows appears, select the role and click next follow the prompts for the selected role to be install. It makes the management of the server more manageable and integrity of the network.  2 - The installation of Windows Server 2008 can be done in many different methods, list and explain each method in detail. Follow this by stepping through the actual process of this installation of those methods? Minimum Requirement for Installing Windows 2008 Processor 1.4GB – 64 – Bit Rams Minimum 512 MB, Maximum 32 GB Hard disk Requirement Minimum: 32 GB 1. Insert a bootable Windows......

Words: 457 - Pages: 2

It Admin

...Information Risk Management Plan Project Name | Network Vulnerability Colt Manufacturing R&D Server | Document Purpose The Project Information Risk Management Plan formalizes a system's information security and privacy upgrade. During the Project Planning Phase the project team: * works with Colt Manufacturing IT Department to register the data involved in the project and determine the data's classification. * useable resources in this document are reviewed to identify potential areas of information security and privacy risk. * document risks in the project Risk Register. During technical design activities in the Project Implementation phase, prior to purchasing or building an application: * System Proprietor (functional owner) works with the principal System Custodian to complete the Project Information Risk Management Plan. * Project Team submits the Plan to Colt Manufacturing IT Department and System/Network administrators for review and approval. Review & Approval Signature indicates review and approval of the Project Information Security Risk and Privacy Plan, and authorizes the Project Manager/Team to proceed with the detailed planning and execution of the project. Role | Name | Signature | Date | Colt Manufacturing Senior Management |                                                                            |                                                                                    |                      | IT......

Words: 3263 - Pages: 14

Network System Admin

...mobile phone. The original iPhone had a 3.5 inch screen at 320 X480 and 163ppi, a quad-band 2G edge data radio, 802.1b.g Wi-Fi, Bluetooth 2.0 EDR, and a 2 megapixel camera. the iPhone was powered by an ARM-based Samsung 1176 Z-S processor and power VR MBX lite 3D graphics, 128 megabytes of random access memory(RAM), as well as four or eight gigabytes of NAND flash storage, and also could sync to iTunes. The iPhone software was very impressive, Apple used a full version of Safari, based on the exact same web kit HTML rendering engine that powered the desktop version on the Mac. Apple also created the best mobile YouTube and maps implementation ever seen on mobile. Unfortunately the original iPhone didn’t have CDMA and EVDO rev A network compatibility. That meant it couldn’t work on two of the U.S. big four carriers, Verizon and Sprint. This actually didn’t matter; because the original iPhone was exclusive to AT&T. In addition to no hardware keyboard or stylus, the iPhone also didn’t have a removable user replaceable battery, which didn’t please existing power users of the time. By 2012 Apple had released five more iPhones, 3G, 3GS, 4, 4S, and the 5. All these models offered a lot of upgrades from the first iPhone, bigger screen, more memory, better resolution, offered a white model instead of the normal black that everyone was accustomed to, not only did the phone have a camera it also had a camera on the front of the phone which no other smart phone was......

Words: 821 - Pages: 4

Network Admin

...In this lab, you will demonstrate the ability to work with decimal and hexadecimal numbers. Required Setup and Tools In this lab, you will need only paper and pencil to do the required work. However, the use of a calculator is permitted to verify the results of a calculation. The Windows calculator may be used for this purpose. Recommended Procedures Task 1: Convert Decimal Number into Binary Procedure 1. Convert the decimal number 125 into binary. Use the division-by-two method shown in the following example below. Answer is: 1111101 2. Convert your binary result back into decimal to prove your answer is correct. This is also shown in the following example. Solution: 64 + 32 + 16 + 8 + 4 + 1 Example: Convert the decimal number 50 into binary using the division-by-two method. Convert the binary result back into decimal. Solution: 50/2= 25 25/2= 12 remainder 1 12/2= 6 remainder 0 6/2= 3 remainder 0 3/2= 1 remainder 1 1/2= 0 remainder 1 (most significant bit [MSB]) Read the answer from bottom (MSB) to top least significant bit (LSB): 110010 Convert 110010 binary into decimal. Weights 32 16 8 4 2 1 Bits 1 1 0 0 1 0 Adding the weights whose bits are 1: 32 + 16 + 2 = 50 Task 2: Convert Binary Number into Decimal Procedure 1. Convert the binary number 10101101 into decimal. Use the method of adding weights, as shown in the example, from Task 1. 2. Use the Windows calculator to prove your answer is correct. This......

Words: 819 - Pages: 4

Admin

...LOCAL AREA NETWORK TECHNOLOGY Local area network technology is the technology used to make local area network to support data communication by connecting terminals, computers and printers within a small limited geographical area. Examples of LAN Technology include; Token Ring, Fibre Distributed Data Interface (FDDI) and ARCNET. Local Area Network is a data communication network connecting Terminals, Computers and Printers within a building or other geographically limited area. These devices can be connected through wired cables or wireless link. It is also a communication network for computers within a building or small group of buildings. It may be configured as; 1. A bus, a main channel to which nodes or secondary channels are connected in a branching structure. 2. A ring in which each computer is connected to two neighbouring computers to form a closed circuit. 3. A star in which each computer is linked directly to a central computer and indirectly to one another. Each of these has an advantage though a bus configuration has become the most. ETHERNET Ethernet is a standard communications protocol embedded in software and hardware devices, intended for building a local area network (LAN). It was designed by Bob Metcalfe in 1973, and through the efforts of Digital, Intel and Xerox (for which Metcalfe worked), "DIX" Ethernet became the standard model for LANs worldwide EVOLUTOIN OF ETHERNET Ethernet evolved to include higher bandwidth, improved media...

Words: 1134 - Pages: 5

Finance Admin

...of Samsung’s credit card business. As an outsider with deep inside knowledge, Choi took care to fit into the culture and as a result saw none of the assimilation problems that dogged many of his senior-level colleagues. He did not speak positions and, in implementing what they have learned, become important change agents. Squarely in this tradition is Samsung’s regional specialist program, arguably the company’s most important globalization effort. Each year for more than two decades, Samsung has sent some 200 talented young employees through an intensive 12week language-training course followed by one full year abroad. For the first six months, their only job is to become fluent in the language and culture and to build networks by making friends and exploring the country. In the second six months, they carry out one independent project of their choice. Initially sent mainly to developed countries, in the past 10 years they’ve gone English with his Korean colleagues. He showed full respect to subordinates older than he was. He generally behaved as other Korean employees of Samsung did. His advice to his fellow senior-level recruits is to do the same. Choi points to one of his successful protégés, whom he helped Samsung recruit in part because he knew the man would steep himself in Korean culture and be game, for instance, to eat kimchi and drink Korean wine at the dinner party given in his honor on his first day. Still, Choi is clear about......

Words: 4607 - Pages: 19

Network Admin

...Titulo: Development Strategies 1. Describir la tendencia que considera el software como un servicio más que un producto. ¿Qué efecto ha tenido esta tendencia sobre las opciones de adquisición de software? Tendencias de software basadas en la Web se han disparado los proveedores de servicios de aplicaciones (ASP), y las empresas que ofrecen servicios comerciales de Internet (SII) a una prominencia en la industria del software que cree en el software como un servicio en lugar de un producto. Con la popularidad y las ventajas de Internet, las empresas están viendo esta tendencia como una opción para el desarrollo de software estándar y adquisición. En lugar de comprar una aplicación de software de una empresa de desarrollo, producción que en la casa, o la contratación de un consultor o un recurso externo para producir un paquete de software de estas empresas basadas en la Web han proporcionado una nueva alternativa basada en tres modelos distintos. Estos modelos son un modelo de modelo de tarifa fija, el modelo de suscripción o uso. Cuota fija hace exactamente eso, ofrece una tarifa fija o coste basado en un nivel de servicio requerido por el usuario. El modelo de suscripción varía de costes basado en el número de usuarios y estaciones de trabajo con el acceso a la aplicación. El modelo de uso cobra una tarifa en función del volumen de transacciones o el número de operaciones realizadas por las aplicaciones. 2. Explicar la diferencia entre el software de aplicación......

Words: 1686 - Pages: 7

Admin

...complains and applying all of RTA and MOI legalities. * Reporting correspondences with Ministry Of Interior, RTA, Northern Emirates Traffic Dep and all other related parties in both Arabic & English. * Documentation for all of VT Centers layouts, Etisalat site projects and all related documents concerned in launching new Shamil sites. * Organizing meetings between Emarat managers and other companies i.e. IT companies, Construction companies and Maintenance Companies. * Arranging, coordinating and conducting training courses that required to refresh staff customer services and communication skills abilities through Emarat Staff Training Team or external training agencies (Al Futtaim, Al Rostomani, Gargash, , Knowledge Networks and etc….) * Preparing Shamil annual budget plan, profitability presentation and Passed/ Failed tested vehicles charts. * Creating PR & PO which is related to Shamil suppliers and follow up the required approvals, supplying, delivery and payment of each item. * Attending phone calls for Emarat services inquires. * Inventory and invoicing processes including coordinating with Accounts Dep. * Checking income & outcome data related to Shamil Vehicle Testing Centers of Dubai and Northern Emirates. * Providing excellent customer service and handling customers’ complaints and reporting them to the management. * Strong links and relations with VT operators and coordinators all over UAE. * Strong links......

Words: 483 - Pages: 2