Nt 1210 Unit 5 Assignment 2

In: Computers and Technology

Submitted By kdraney
Words 259
Pages 2
GS 1145 Strategies
Unit 11 Assignment 1 Reflection
Kelly S Draney

This class has been an eye opener for me in respect that I was a real procrastinator. It has helped to open my eyes to the fact that I need to get my homework done and in on time. With the assignment on scheduling I found that I wasted a lot of time during the day, when I could be getting things done. Breaking down my schedule into blocks showed me that I had a lot of wasted time watching TV when I could be more productive. Having to juggle time for work and school was something I was not accustomed to. I have a greater respect for my students now seeing what they have to go through.
The other thing this class helped me with, was learning how to use the Microsoft Office Suites programs better. I had no idea how to use Power Point before this class. Gratefully we were put into small groups to work on these projects. The good thing about these projects was it gave me a chance to learn about Power Point. I was surprised how easy it really is to use. It also helped to learn the different rules about completing a Power Point Presentation.
I enjoyed being in your class. I heard a lot of good comments from students who felt you were tough, but fair. You created a fun learning environment in class. I look forward to having you again for an instructor later on in my studies.…...

Similar Documents

Nt 1210

...NT-1210 Unit Name Lab l Labs Date 1-l Reading Binary Convert the following decimal numbers to binary equivalents: 89 1011001 776 10110000 Convert the following Binary values to their decimal equivalent: 101_0100L 169 11101010 234 Lab 1-2 Binary Math and Logic Draw the graphical symbol Explain the logical operations (give a truth table) for each: AND OR NOT Lab 1.3 Bit and Byte Structure - (see page 15 of lab manual) How many bits are in a byte? 8 1 Kilobyte is equal to: 1024 55,296 23,552 bytes Kilobytes Megabytes Terabytes 54 Megabyte is equalto: 23 Gigabyte is equalto: 5 Terabyte is equal to 5,120 120MB = 16GB= 125,829,120 16,384 bytes MBytes Lab 1.4 ASCII (See page 20 of Lab manual) 1. Decode the simple numerical sentences into one English paragraph. You may use Google to find an ASCII table. Use the keywords-Binary to text conversion; Hexadecimatto text conversion; ASGllto text conversion-to aid the decoding process: Code"Tvoe ASC llcodes Numeric Message 87 101 1 08 1 08 44 32 116 104 97 116 32 109 97 107 101 115 32 111 117 114 32 49 48 32 110 117 109 98 101 114 32 100 101 99 105 109 97'108 3247 3297 115 99 105 10532115121115116 101 '10932 106 117 11511632114105103104 11633148 Translation Well, that makes our 10 number decimal / ASCII system just right! Lab 1.5 Creating a File System Follow the procedures outlined in the Lab Manual on pages 231o27......

Words: 918 - Pages: 4

Nt 1430 Unit 2 Assignment 2

...NT1430 Unit 2 Assignment 2 Chapter Exercise p. 182 (1,3,4,8,10) 1) What commands can you use to determine who is logged in on a specific terminal? who, whoami, who am i, finger and w 3) What happens if you give the following commands when the file ‘done’ already exists? $cp to_do done ‘done’ is overwritten with contents of ‘to_do’ $ mv to_do done ‘done’ is overwritten with contents of ‘to_do’ ‘to_do’ no longer exists after the command 4) How can you find out which utilities are available on your system for editing files? Which utilities are available for editing on your system? You can use the which. whereis, and locate utilities to search for files. The VIM 8) What is the result of giving the ‘which’ utility the name of a command that resides in a directory that is not in your search path? command not found 10) Experiment by calling the ‘file’ utility with names of files in /usr/bin. How many different types of files can you find there? file /usr/bin/* | awk –F: ‘{print $2}’ | sort –u 9 different file types p.221 (1,2,3,4,6) 1) Is each of the following an absolute pathname, a relative pathname, or a simple filename? a) milk_co simple filename b) correspond/business/milk_co relative pathname c) /home/alex absolute pathname d) /home/alex/literature/promo/ absolute pathname e) .. relative pathname f) letter.0210 simple filename 2) List the commands you can use to perform these functions. cd: and pwd 3) If......

Words: 575 - Pages: 3

Nt 2580 Unit 7 Assignment 2

...Unit 7 assignment 2 design an encryption strategy Richman Investment needs and new enterprise encryption strategy. This is for a more secure network. They are wanting to grow to 10,000 employees worldwide. Richman Investment wants to operate out of 20 different countries in the future. This is very easy to do but to have a secure network there are many things that would have to happen which will make this more difficult to do. Have a secure network takes a lot of work and has to be monitored 24 hours a day 7 days a week. There are many different ways to go about this topic the one I am going to pick is a public key infrastructure (PKI).  One of the security options that we are going to use is Privacy or confidentiality. This will keep all information secret from all people unless you are authorized to see it. This will help with employee’s not finding things that they should not see like social security numbers, address, and sensitive documents for the company and so on. Having this as a security options is great. I would implement this on all of the networks that I would manage.  The next feature that I will suggest to Richman Investment would be Access control. Access control restricts access to network resources and would require the user to have privileges to the resources. This would go hand and hand with the first feature that I suggested. You will need this for the first feature that I picked to give the users proper permissions to resources and this will help......

Words: 338 - Pages: 2

Unit 5 Assignment 2

...IS3340-WINDOWS SECURITY | Security Audit Procedure Guide | Unit 5 Assignment 3 | | [Type the author name] | 5/1/2014 | | This document outlines the required steps to follow, inorder to properly scan the necessary hardware (servers and workstations) in the Ken 7 Windows Limited Domain for security vulnerabilities. 1) Acquire and install MBSA •Download MBSA. Download MBSA from the MBSA home page, and then install it to the default directory. •Updates for MBSA. If both the computer you will be scanning and the computer with MBSA installed have Internet access, the latest security catalog (.cab file), authentication files, and WUA installer files will be automatically downloaded, if needed. If either the target computer or the computer with MBSA installed does not have Internet access, download the following files and place them in the C:\Documents and Settings\<username>\Local Settings\Application Data\Microsoft\MBSA\2.0\Cache\ directory on the computer that is performing the scan. 2) Scan computers Run MBSA and clear the Check for security updates check box when performing the scan. Using the Graphical Interface Tool The following procedure describes how to use the MBSA GUI tool. To use the MBSA GUI tool to scan for updates and patches 1. On the Programs menu, click Microsoft Baseline Security Analyzer. 2. Click Scan a computer. 3. Make sure that the following options are not selected, and then click Start scan. * Check for Windows......

Words: 487 - Pages: 2

Nt 1210

...Professional GS1140 Problem Solving Theory MA1210 College Math I MA1310 College Math II Mobile Communication Courses Networking Technology Courses Electronics Technology Courses Programming Technology Courses General Education / General Studies NOTE: Refer to the catalog for the state-specific course and program information, if applicable. 2 Date: 3/11/2013 Introduction to Networking Syllabus Course Summary Major Instructional Areas 1. Hardware and Software Used in Data Networks 2. The OSI and TCP/IP Models and Their Applications 3. Classifications of Networks 4. Network Addressing (IPv4 and IPv6) 5. Physical and Logical Connectivity of Networks 6. Tools for Designing, Managing, and Troubleshooting Networks Course Objectives 1. Identify the major needs and major stakeholders for computer networks and network applications. 2. Identify the classifications of networks and how they are applied to various types of enterprises. 3. Compare and contrast the OSI and TCP/IP models and their applications to actual networks. 4. Explain the functionality and use of typical network protocols. 5. Analyze network components and their primary functions in a typical data network from both logical and physical perspectives. 6. Differentiate among major types of LAN and WAN technologies and specifications and determine how each is used in a data network. 7. Explain basic security requirements for networks. 8. Install a network (wired or wireless),......

Words: 4400 - Pages: 18

Nt 1210 Chapter 2 Vocab

...Richard Rowe (17400103) July 1, 2014 NT 1210 Prof. Williams Chapter 2 Vocabulary Computer networking – The gerund form of the term computer network. Computer network - A combination of many components that work together so that many different devices can communicate. Application – generally, a function on any kind of computer or electronic device that is useful to the user, which can give the user a reason to want to own and use the device. Email – An application in which the user can type, text and attach other files to create the electronic equivalent of a postal letter. Voice mail – A more modern term for a telephone call that does not use the word telephone. Voice frame – A grid of pixel locations of chosen width by height that contains the lights/colors to be shown in a video at single point in time. Web server – Literally, software that stores web pages and web objects, listens for requests for those pages, and send the contents of those pages/objects to clients. Web browser – literally, software controlled directly by a user that requests web pages from a web server, and after receiving a page, displays the web page in a window. Web address – text that identifies details about one object in a network so that a client can request that object from a server. Web page – in a web browser, all the text, images, video, and sound that fill the window of the browser when the user opens a link to some web address. Protocol –a set rules that different devices......

Words: 479 - Pages: 2

Nt1210 Unit 5 Assignment 2

...Roy Mejia Introduction to Networking Week 5 Assignment 2 1. Which of the following types of LANs was a competitor of Ethernet LANs from the earliest days of wired LANs in the 1980s and into the 1990s? c. Token Ring Which of the following types of LANs is the strongest competitive option to be used instead of Ethernet LANs today? d. 802.11 LANs 3. Which of the following speeds are not defined as a speed by some Ethernet LAN standard? b. 4 Gbps 4. Think back to the information listed for Gigabit Ethernet for maximum cabling distances. Which of the answers matches the correct standard with the cabling type and maximum cable length? A. 1000BASE-LX, MM fiber, 550 meters 5. A campus LAN drawing shows hundreds of user devices cabled to LAN switches on various floors of a building. The per-floor edge switches have a cable connected to other switches that sit on the first floor of the building. All the links from the edge switches to the end-user devices use 100BASE-T. A PC on floor 2 sends an Ethernet frame to a PC on floor 3, with the frame passing through the switches on the first floor as part of the journey. Which of the following statements is true about the links between the switches in this Ethernet LAN? b. The links could use any Ethernet LAN standard. 6. Which of the following shortcut names defines an IEEE standard that runs at 10,000,000,000 bits per second, and includes some fiber cabling options? . None of the answers is correct. 7. Which of......

Words: 1244 - Pages: 5

Nt 1210

...Objectives and Assignments Week 7 Instructor: Thomas W. Chappell, PhD. Office Hours (For appointments): Monday, Tuesday, Wednesday, Thursday 3:30 – 6:00 PM Objectives: Complete current week’s assignments submissions Important Notes: Attendance in class is critical to your accomplishments Missing class is missing valuable information that will help you succeed and accomplish your goals Please attend every class for success in your field! Grading Policy: * Please read the last page of your syllabus which will be covered in week one. * Missing labs will be made up at 80% after the first week, 70% the after the second week and 0% the third week. * Quizzes will not be made up. * Students can potentially be dropped by the Dean of Academic Affairs after missing 4 or 5 cumulative classes. * Students who miss three consecutive class will be dropped by the Dean of Academic Affairs * Assignments and Labs will be counted at 0% after three weeks. Course Objectives Covered by This Unit * CO1 Identify the major needs and stakeholders for computer networks and network applications * CO2 Identify the classifications of networks and how they are applied to various types of enterprises * CO3 Compare and contrast the OSI and TCP/IP models and their applications to actual networks * CO4 Explain the functionality and use of typical network protocols * CO5......

Words: 799 - Pages: 4

Nt 1210

...NT 1210 Lab 3.1.1, 3.2.1, 3.3.1 The Purpose of Reference Models Exercise 3.1.1 What would happen if wireless devices were not governed by the Wi-Fi Alliance and each vendor had its own standards and protocols? What impact would this have on your personal life or business communications? The process of marketing the wireless devices would be much slower than if the Wi-Fi Alliance wasn’t governing them. This would impact my personal life or business communications in a big way. The reason is Wi-Fi Alliance certifies the products through pre-standard rules thus insuring the speed of product market and quality. The OSI Reference Model Exercise 3.2.1 Define each layer of the OSI Model and state what each layer provides. Physical – transmission and reception of the unstructured raw bit stream over a physical medium. Carries signals for higher layers and describes the electrical /optical , mechanical and functional interfaces. Data link – Error free transfer of data frames from node to node over the physical layer , allowing the higher layers to assume virtually error –free transmission over the link. Network - is the third layer, which controls the subnet operation by deciding which physical path data should take based on network conditions and priority of service with other factors. Transport - is the fourth layer, which ensures the error-free delivery of messages in sequence and with no losses or duplications. Higher layer protocols are relieved from concerns with......

Words: 473 - Pages: 2

Nt 1210 Unit 5 Research Project 1.Docx

...Major needs and major stakeholders for computer and network applications Classification of Networks A system convention characterizes standards and contracts for correspondence between network devices. Versatile, few progressions, few elements, high data transfer capacity, CPU power, repetition, port thickness, reasonableness, security highlights The Advantages of using Layer 2 economical, adaptable and versatile, simple to introduce and keep up. Advantages of Ethernet technology Thicknet >(10BASE5)- uses a thicker coaxial link with a transport topology. Thinnet-(>10BASE2) uses a more slender coaxial link with a transport topology. >Ethernet-(10BASE-T) - star topology & UTP cabling >Quick Ethernet (100BASE-T) - convey movement at the ostensible rate of 100 Mbit/s, star topology utilizes UTP .>Gigabit Ethernet (1000BASE-T) - utilizes four sets of Category 5 unshielded contorted pair to accomplish the gigabit information rate of 1000 Mbits/s Define Ethernet concepts Classifiedness- Protection from exposure to unapproved individuals. Confirmation- User names and passwords. Trustworthiness- Maintaining information consistency. Firewalls-an instrument that controls advanced data that comes into and goes out of the system. Antivirus-infection programming intended to recognize and demolish infections. Basic security requirements LAN (Local Area Network)-WLAN (Wireless Area Network)CAN (Campus Area Network)MAN (Metropolitan Area Network)WAN (Wide......

Words: 453 - Pages: 2

Nt 1210

...Reyes NT 1210 S. 8:00-12:55 Unit 2 Lab 6.3: 1) SSID can be more diverse be unique to the users of the network 2) ASUS RT-AC68U, the LAN and Wireless 2.4 GHz MAC Addresses are the same because is the same device providing hard-line and wireless internet connection. The IP Address is IP Range of – 3) Firmware updates help keep the device running with the latest software needed. Restoring to defaults/loading settings help re-acquire in case something happens to the router. 4) Reyes Home Network Guest. You can add security to sign on to the guest network. You increase the number of wireless networks found within range of the router. 2.1: 1) Media is needed for the signal to pass on, Interface is needed to connect media and access the signal, Signal is what is transported on the media, Pattern is used so signals can be recognized, Timing helps determine the patterns and thus the signal being passed. Without any one of these, the signal will not get to the destination and a link will not occur. 2) Plug and Play, Device Discovery, Driver Updates 3) I cannot add programs by searching on my laptop 4) Peer-to-peer devices allow like devices to communicate without special hardware. 5) Local Area Network, Wireless, Bluetooth 2.1 Review: 1) Network devices can operate through the network and by more than one computer, peripheral devices may be internal or external, but must be connected to a computer with the proper cables. 2) You......

Words: 569 - Pages: 3

Nt 1210 Unit 9 Exercise

...Unit 9. Exercise 1. Print Server Assignment Requirements Respond to the following email: -- FROM: Rebop Pakulah, Acme Engineering Company RE: Printers are multiplying like rabbits. Hello most esteemed US computer guru, Thank you for setting up our branch office in the US. However, our data center has a problem. It seems that everyone there is in love with Office Depot and has a printer on their desk. We employ 150 people. This is too many printers. The ink is so expensive. I hear many people come in of Saturdays and print baseball schedules, shopping list, and photos of their family. What can you suggest to help me? Thank you! From: AA To Rebop Pakulah Hello Rebop; glad to hear your company has increased in employees and volume. Rebop I cannot believe almost every user in cubicle has their own printer. This must stagnate your network, not to mention office expenses for toner and repair calls. Here is what I am suggesting for your 150 employees; you should have 3 multipurpose printers HP4555mfp printers. Then perhaps keep about 10 small HP printers that may belong to your admin staff, such as HR, Recievers, accounts payable team, and those employees that use a printer for 75% percent of their duties. All of these printers would be added to the network server, the subnet, gateway, and IP would be assigned to each printer. After that rules can be added to these printers, such as standard settings, if a user needed to use a portrait printer......

Words: 319 - Pages: 2

Unit 5 Assignment 2

...Unit 5 Assignment 2 Ethernet Local Area Networks Review PT1210 Introduction to Networking Christopher B. Young ITT Tech – Tempe Campus Instructor: Mr. Larry Douglas Oct 16, 2015 1.C | 11.C | 2.D | 12.C | 3.B | 13.C | 4.A | 14.A | 5.B | 15.A | 6.E | 16.A | 7.D | 17.D | 8.A | 18.C | 9.A | 19.B | 10.A | 20.C | Ethernet LAN: A collection of devices including user devices, LAN switches, routers, old hubs and cables all of which use IEEE Ethernet standards at the physical and data link layers so that the devices can send Ethernet frames to each other 802.3: The name of the original IEEE Ethernet standard as well as the overall base name of all IEEE Ethernet LAN working committees Fast Ethernet: The informal name for one particular Ethernet standard originally defined formally as 803.3u which was the first Ethernet Standard to surpass the original 10-Mbps speed to run at 100 Mbps. Gigabit Ethernet: The informal name for one particular Ethernet standard defined formally in 802.3z(for fiber) and 802.3ab(for UTP) with a speed of 1 Gbps Autonegotiation: A process defined by the IEEE so that nodes on the same etherent link can exchange messages for the purpose of choosing the best speed and duplex option that both nodes support Ethernet Frame: The bytes of data that flow in an Ethernet LAN which begins with the Ethernet header followed by data and ends with the Ethernet trailer. Ethernet LANs deliver Ethernet frames from one Etherent device to......

Words: 327 - Pages: 2

Nt1210 Unit 5 Assignment 2

...Multiple Choice 1. C - Token Ring 2. D - 802.11 LANs 3. B – 4 Gbps 4. A – 1000BASE-LX, MM Fiber, 550 Meters 5. B – The links could use any Ethernet LAN Standard 6. E – None of the answers is correct 7. A – 802.3ab 8. C – The introduction of 1000BASE-T products into the market 9. A – Autonegotiation works on the switch-to-PC A link, causing PC A to run at 100 Mbps C – Autonegotiation fails to work on the switch-to-PC B link, causing the switch to run at 10 Mbps 10. A – PC A uses full duplex as the result of the autonegotiation process working C – Switch port G2 uses half duplex because autonegotiation fails, making the switch use the default duplex setting 11. C – UTP typically supports a maximum cable length of 100 meters across all UTP standards at all speeds. 12. A UTP link from a PC to a switch 13. C – the Type field identifies the data as an IP Packet. 14. A – Any nodes in the branch LAN that receive this frame use the FCS field to help detect errors. C – The Preamble and SFD fields both come before the Destination Address field in the header 15. A – 48 bits in length 16. B – Ethernet Vendors 17. D – The OUI 18. C – Forwards the frame out port G4 only 19. B – Floods the frame out ports G1,G2,G3 and G4 20. D – SW1 received a frame sent to MAC address 0000.1234.5678 in Port G3 Key Terms 1. Ethernet LANs – A collectoion of devices, including user devices, LAN switches, routers, old......

Words: 538 - Pages: 3

Nt 1210 Unit 1 Assignment

...Unit 1 assignment 1. C 2. All of them are wrong the smallest measurement in the answers is a kilobyte and that is actually 1024 bytes not 106. 3. C 4. A,E 5. A 6. C 7. D 8. A 9. A,B,D 10. A 11. A 12. B,D 13. A,C 14. A,D 15. A 16. D 17. B 18. C 19. C,D 20. A,B Lab 1.1 Exercise 1.1.1 103 > 1000 x 2 = 2000 102 > 100 x 9 = 900 101 > 10 x 3 = 30 100 > 1 x 1 = 1 2931 Exercise 1.1.2 22 > 4 x 1 = 4 21 > 2 x 1 = 2 20 > 1 x 0 = 0 4+2+0= 6 Exercise 1.1.3 21 > 2 x 1 =2 20 > 1 x 1= 1 2+1= 3 Exercise 1.1.4 24 > 16 x 1 = 16 23 > 8 x 0 = 0 22 > 4 x 0 = 0 21 > 2 x 1 = 2 20 > 1 x 0 = 0 16+0+0+2+0=18 Exercise 1.1.5 11100010 27 > 128 x 1 = 128 26 > 64 x 1 = 64 25 > 32 x 1 = 32 24 > 16 x 0 = 0 23 > 8 x 0 = 0 22 > 4 x 0 = 0 21 > 2 x 1 = 2 20 > 1 x 0 = 0 128+64+32+0+0+0+2+0=226 > Exercise 1.1.6 156 156 > 27 > 128 x 1 = 128/ 156-128= 28 28 > 26 > 64 x 0 = 0 28 > 25 > 32 x 0 =0 28 > 24 > 16 x 1 = 16/ 28-16=12 12 > 23 > 8 x 1 = 8/ 12-8=4 4 > 22 > 4 x 1 = 4/ 4-4=0 0 > 21 > 2 x 0 = 0 0 > 20 > 1 x 0 =0 100111002 = 156 Exercise 1.1.7 255 255 > 27 > 128 x 1 = 128/ 255-128=127 127 > 26 > 64 x 1 = 64/ 127-64=63 63 > 25 > 32 x 1 = 32/ 63-32=31 31 > 24 > 16 x 1 = 16/ 31-16=15 15 > 23 > 8 x 1 = 8/ 15-8=7 7 > 22 > 4 x 1 =......

Words: 2960 - Pages: 12