Nt 1210

In: Other Topics

Submitted By GriffDogg404
Words 918
Pages 4
NT-1210 Unit
Name
Lab

l Labs
Date

1-l

Reading Binary

Convert the following decimal numbers to binary equivalents:
89

1011001

776

10110000

Convert the following Binary values to their decimal equivalent:

101_0100L

169

11101010

234

Lab 1-2 Binary Math and Logic

Draw the graphical symbol Explain the logical operations (give a truth table) for each:
AND

OR

NOT

Lab 1.3 Bit and Byte Structure - (see page 15 of lab manual)

How many bits are in a byte?

8

1 Kilobyte is equal to:

1024
55,296 23,552

bytes Kilobytes Megabytes Terabytes

54 Megabyte is equalto:
23 Gigabyte is equalto:
5 Terabyte is equal to

5,120

120MB =
16GB=

125,829,120
16,384

bytes MBytes

Lab 1.4 ASCII (See page 20 of Lab manual)

1.

Decode the simple numerical sentences into one English paragraph. You may use Google to find an ASCII table. Use the keywords-Binary to text conversion; Hexadecimatto text

conversion; ASGllto text conversion-to aid the decoding process:
Code"Tvoe
ASC

llcodes

Numeric Message 87 101 1 08 1 08 44 32 116 104 97 116 32 109 97 107 101 115 32 111 117 114 32 49 48 32 110 117 109 98 101 114 32 100 101 99 105 109 97'108 3247 3297 115 99 105 10532115121115116 101 '10932 106 117 11511632114105103104 11633148

Translation

Well, that makes our 10 number decimal / ASCII system just right!

Lab 1.5 Creating a File System

Follow the procedures outlined in the Lab Manual on pages 231o27 Exercise 1.5.1 (P. 24)

C:\Users\Junior\Desktop\Classes

Exercise 1.5.2 (P. 25)

The myname.txt file has been relocated to the Networking folder. The path to access the myname.txt file is C:\Users\Junior\Desktop\Classes\Networking.

Exercise 1.5.3

C:
Classes
Math Computing English Networking

Lab Unit 1 Lab Unit 2 Lab Unit 3
Exercise 1.5.4

Lab Unit 4 Lab Unit 5

Yes. When a…...

Similar Documents

Nt 1210 Lab 1.1

...NT1210 LAB 1.1 1.1.1 2931 103 102 101 100 1000 100 10 1 2 9 3 1 ___________________ 2000 + 900 + 30 + 1 = 2931 1.1.2 1102 22 21 20 4 2 1 1 1 0 ________________ 4 + 2 + 0 = 6 1.1.3 112 21 20 2 1 1 1 __________ 2 + 1 = 3 1.1.4 Exercise 1.1.4:   Create an expanded mapping for binary number 10010 subscript 2.      2^7 | 2^6 | 2^5 | 2^4 | 2^3 | 2^2 | 2^1 | 2^0 | 128 | 64 | 32 |   16 | 8 | 4 | 2 | 1 | x | x | x | x | x | x | x | x | 0 | 0 | 0 | 1 | 0 | 0 |     1 | = 18 = 18 0 | 0 | 0 | 0 | 16 + |   0 + |     0 + | 2 + | 0 | Exercise 1.1.5:   Create an expanded mapping for the binary number 11100010 subscript 2. 2^7 |...

Words: 484 - Pages: 2

Nt 1210 Presention

...NT1210 Introduction to Networking Introduction to Computer Networking 1 Objectives  Identify the major needs and stakeholders for computer networks and network applications.  Identify the classifications of networks and how they are applied to various types of enterprises.  Explain the functionality and use of typical network protocols.  Use preferred techniques and necessary tools to troubleshoot common network problems. 2 Objectives  Define a computer network.  Identify the primary needs for computer networks and network applications.  Draw the four major physical network topologies: bus, star, ring, and mesh. 3 Computer Networking  Use large variety of components that must work together.  Move bits from one device to another.  Bit: Smallest unit of data, binary 1 or 0.  Focuses on copying bits on one device to another.  Computing devices include computers, gaming systems, televisions, phones, tablets, GPS navigation systems, watches, etc. 4 Defining a Network with User Applications  Examples: Digital advertising, online/video games, text messages, websites, social media, and email.  Network diagrams often use cloud to identify what part of network to ignore for a particular discussion.  LAN vs WAN 5 Defining a Network with User Applications Computer Networks: Cloud Representing Hidden Parts of the Network 6 Figure 2-1 An Informal General Definition of a Computer Network  Telecom: Short for telephone......

Words: 4305 - Pages: 18

Nt 1210

...ITT Technical Institute NT1210 Introduction to Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to......

Words: 4400 - Pages: 18

Nt 1210 Chapter 2 Vocab

...Richard Rowe (17400103) July 1, 2014 NT 1210 Prof. Williams Chapter 2 Vocabulary Computer networking – The gerund form of the term computer network. Computer network - A combination of many components that work together so that many different devices can communicate. Application – generally, a function on any kind of computer or electronic device that is useful to the user, which can give the user a reason to want to own and use the device. Email – An application in which the user can type, text and attach other files to create the electronic equivalent of a postal letter. Voice mail – A more modern term for a telephone call that does not use the word telephone. Voice frame – A grid of pixel locations of chosen width by height that contains the lights/colors to be shown in a video at single point in time. Web server – Literally, software that stores web pages and web objects, listens for requests for those pages, and send the contents of those pages/objects to clients. Web browser – literally, software controlled directly by a user that requests web pages from a web server, and after receiving a page, displays the web page in a window. Web address – text that identifies details about one object in a network so that a client can request that object from a server. Web page – in a web browser, all the text, images, video, and sound that fill the window of the browser when the user opens a link to some web address. Protocol –a set rules that different devices......

Words: 479 - Pages: 2

Nt 1210

...Play in a WAN APPLY Activity 2: Lab 7.2: WAN Connections Estimated Time: 25 minutes Exploring the Use of Leased Lines and Multiplexing APPLY Activity 3: Lab 7.3 Communication Paths Estimated Time: 15 minutes Exploring Linux and Linux Networking Commands APPLY Activity 4: Lab 2.5 Linux man Pages Estimated Time: 30 minutes APPLY Activity 5: Lab 7.4 Linux Networking Estimated Time: 20 minutes Lesson Plan Week 7 In-Class Activities * Lab 7.1 Review, Question 1, Page 136 * Lab 7.2 Review, Question 1, Page 140 * Lab 7.3 Review, Question 1, Page 143 * Lab 7.4 Review, Question 1, Page 146 Materials Needed: * Weekly printouts of each students’ Dashboard/grade report * Sign-in sheets for both NT 1210 sections * Tutor Request Forms Procedures: * Students that attend NT1210 during a schedules time are to work in the presence of the NT1210 facilitator * Facilitator will go over the student’s grade report and assignments that are due this week * Facilitator will check off assignments that students submit in class * Facilitator will get the student’s commitment regarding when they will submit any remaining assignments for the week, and write that date on the grade report for follow-up * Students that do not attend NT1210 section are to be called by the Facilitator * If the student is current with their assignments and maintaining a passing grade they can be marked present * If the......

Words: 799 - Pages: 4

Nt 1210

...NT 1210 Lab 3.1.1, 3.2.1, 3.3.1 The Purpose of Reference Models Exercise 3.1.1 What would happen if wireless devices were not governed by the Wi-Fi Alliance and each vendor had its own standards and protocols? What impact would this have on your personal life or business communications? The process of marketing the wireless devices would be much slower than if the Wi-Fi Alliance wasn’t governing them. This would impact my personal life or business communications in a big way. The reason is Wi-Fi Alliance certifies the products through pre-standard rules thus insuring the speed of product market and quality. The OSI Reference Model Exercise 3.2.1 Define each layer of the OSI Model and state what each layer provides. Physical – transmission and reception of the unstructured raw bit stream over a physical medium. Carries signals for higher layers and describes the electrical /optical , mechanical and functional interfaces. Data link – Error free transfer of data frames from node to node over the physical layer , allowing the higher layers to assume virtually error –free transmission over the link. Network - is the third layer, which controls the subnet operation by deciding which physical path data should take based on network conditions and priority of service with other factors. Transport - is the fourth layer, which ensures the error-free delivery of messages in sequence and with no losses or duplications. Higher layer protocols are relieved from concerns with......

Words: 473 - Pages: 2

Nt 1210

...Casey Alexander Unit 2 Assignment 2 Multiple choice 1) C 11) A 2) B 12) A, D 3) B, D 13) B 4) C, D 14) C 5) A 15) A, D 6) D 16)D 7) C 17)D 8) C 18)D 9) A, C, D 19) A 10) C, D 20) B Key terms 1) Computer networking – A combination of many components that work together so that many different devices can communicate. 2) Computer network - A combination of many components that work together so that many different devices can communicate. 3) Application – Software that performs some useful function for a user. 4) Email - Electronic mail. An application in which the user can type text and attach other files to create the electronic equivalent of a postal letter, and send the email to another person using his or her email address. 5) Voice call – A more modern term for a telephone call that emphasizes the fact that the traffic flows between the endpoints is voice. 6) Video frame – A grid of pixel locations of a chosen width by height that contains the light/colors......

Words: 402 - Pages: 2

Nt 2640

...Stacie Rollins Thursday, January 8, 2015 NT 2640 Unit 1 Assignment 1 Network IDs used to be divided into classes, which were Class A, B, and C. These classes were allowed to have a range of addresses. This class-based system would work well for a while, but the rapid growth of the Internet it becomes evident that this addressing scheme had to be changed in order to support the many networks that were being created. A class full system would be created and still used the IP addressing fundament of a classless system. This 32-bit IP addressing system is subdivided into two portions; the network address space are the host address space. Class A addresses were created for a very large network with few logical network segments and many hosts that have the high-order bit set to zero. The first octet is used to define the network ID. Class A address cannot be greater than 127 because a value of 128 would require the left-most bit be set to 1. Class B addresses always have the first two high-order bits that are set to 10 and are used for medium-sized networks that have a moderate number of hosts connected to them. The Class B network ID, will utilize the first two octets for the network ID, which allows more network IDs and fewer hosts than a Class A network, because it uses an additional octet for the network. Class C addresses are for small networks with few hosts. These addresses have the first three high-order bits set to 110, because Class C addresses use the first......

Words: 294 - Pages: 2

Nt 1210

...1. Which of the following terms is the closest synonym to the term computer networking? a. Telecom b. Protocol c. Datacom d. Stuff 2. Ann uses her email address, me@here.com, to send an email to Bob, whose email address is you@there.com. The message contains a few paragraphs of text. Which of the following will be important to the process of making sure that Bob receives this email? a. Ann’s incoming email server b. Bob’s incoming email server c. Bob’s outgoing email server d. Ann’s compression algorithm e. The A/D converter near Ann 3. According to this chapter, which of the following concepts happens in a modern-day, end-to-end voice call between two business telephones sitting in the same office building in the United States? (Choose two answers.) a. The call uses only analog electrical signals. b. The call uses only digital electrical signals. c. The call uses both analog and digital electrical signals. d. The call represents short sounds as a unique set of bits. e. The call represents each spoken word as a unique set of bits. 4. According to this chapter, which of the following concepts happens in a modern-day, end-to-end voice call between two home telephones in the United States? (Choose two answers.) a. The call uses only analog electrical signals. b. The call uses only digital electrical signals. c. The call uses both analog and digital electrical signals. d. The call represents short......

Words: 1376 - Pages: 6

Nt 1210 Unit 5 Assignment 2

...GS 1145 Strategies Unit 11 Assignment 1 Reflection Kelly S Draney This class has been an eye opener for me in respect that I was a real procrastinator. It has helped to open my eyes to the fact that I need to get my homework done and in on time. With the assignment on scheduling I found that I wasted a lot of time during the day, when I could be getting things done. Breaking down my schedule into blocks showed me that I had a lot of wasted time watching TV when I could be more productive. Having to juggle time for work and school was something I was not accustomed to. I have a greater respect for my students now seeing what they have to go through. The other thing this class helped me with, was learning how to use the Microsoft Office Suites programs better. I had no idea how to use Power Point before this class. Gratefully we were put into small groups to work on these projects. The good thing about these projects was it gave me a chance to learn about Power Point. I was surprised how easy it really is to use. It also helped to learn the different rules about completing a Power Point Presentation. I enjoyed being in your class. I heard a lot of good comments from students who felt you were tough, but fair. You created a fun learning environment in class. I look forward to having you again for an instructor later on in my studies. ...

Words: 259 - Pages: 2

Nt 1210 Introduction to Networking

...John Holbrook Step by Step Installation of a Secure Linux Web, DNS and Mail Server Feb 10, 2004 GIAC GSEC Practical – Version 1.4b, Option 1 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46. 1 Table of Contents Abstract................................. Introduction.........................................................................................................................4 Current Setup..................................................................................................................4 Reasons for new install ..................................................................................................4 Sudo...............................................................................................................................5 Security Comparison of Redhat 9.0 and Openna 1.0..........................................................7 Default Installed Services...............................................................................................7 Configuration Notes............................................................................................................8 The New Setup...............................................................................................................8 Layers of Protection........................................................................................................9 Verifying Integrity of Downloaded Files.................................

Words: 16169 - Pages: 65

Nt 1210

...Emmanuel Reyes NT 1210 S. 8:00-12:55 Unit 2 Lab 6.3: 1) SSID can be more diverse be unique to the users of the network 2) ASUS RT-AC68U, the LAN and Wireless 2.4 GHz MAC Addresses are the same because is the same device providing hard-line and wireless internet connection. The IP Address is 192.168.1.1. IP Range of 192.168.1.2 – 192.168.1.255. 3) Firmware updates help keep the device running with the latest software needed. Restoring to defaults/loading settings help re-acquire in case something happens to the router. 4) Reyes Home Network Guest. You can add security to sign on to the guest network. You increase the number of wireless networks found within range of the router. 2.1: 1) Media is needed for the signal to pass on, Interface is needed to connect media and access the signal, Signal is what is transported on the media, Pattern is used so signals can be recognized, Timing helps determine the patterns and thus the signal being passed. Without any one of these, the signal will not get to the destination and a link will not occur. 2) Plug and Play, Device Discovery, Driver Updates 3) I cannot add programs by searching on my laptop 4) Peer-to-peer devices allow like devices to communicate without special hardware. 5) Local Area Network, Wireless, Bluetooth 2.1 Review: 1) Network devices can operate through the network and by more than one computer, peripheral devices may be internal or external, but must be connected to a computer with the proper cables. ...

Words: 569 - Pages: 3

Nt 1210 Unit 9 Exercise

...Unit 9. Exercise 1. Print Server Assignment Requirements Respond to the following email: -- FROM: Rebop Pakulah, Acme Engineering Company RE: Printers are multiplying like rabbits. Hello most esteemed US computer guru, Thank you for setting up our branch office in the US. However, our data center has a problem. It seems that everyone there is in love with Office Depot and has a printer on their desk. We employ 150 people. This is too many printers. The ink is so expensive. I hear many people come in of Saturdays and print baseball schedules, shopping list, and photos of their family. What can you suggest to help me? Thank you! From: AA To Rebop Pakulah Hello Rebop; glad to hear your company has increased in employees and volume. Rebop I cannot believe almost every user in cubicle has their own printer. This must stagnate your network, not to mention office expenses for toner and repair calls. Here is what I am suggesting for your 150 employees; you should have 3 multipurpose printers HP4555mfp printers. Then perhaps keep about 10 small HP printers that may belong to your admin staff, such as HR, Recievers, accounts payable team, and those employees that use a printer for 75% percent of their duties. All of these printers would be added to the network server, the subnet, gateway, and IP would be assigned to each printer. After that rules can be added to these printers, such as standard settings, if a user needed to use a portrait printer......

Words: 319 - Pages: 2

Nt 1210 Unit 1 Assignment

...Unit 1 assignment 1. C 2. All of them are wrong the smallest measurement in the answers is a kilobyte and that is actually 1024 bytes not 106. 3. C 4. A,E 5. A 6. C 7. D 8. A 9. A,B,D 10. A 11. A 12. B,D 13. A,C 14. A,D 15. A 16. D 17. B 18. C 19. C,D 20. A,B Lab 1.1 Exercise 1.1.1 103 > 1000 x 2 = 2000 102 > 100 x 9 = 900 101 > 10 x 3 = 30 100 > 1 x 1 = 1 2931 Exercise 1.1.2 22 > 4 x 1 = 4 21 > 2 x 1 = 2 20 > 1 x 0 = 0 4+2+0= 6 Exercise 1.1.3 21 > 2 x 1 =2 20 > 1 x 1= 1 2+1= 3 Exercise 1.1.4 24 > 16 x 1 = 16 23 > 8 x 0 = 0 22 > 4 x 0 = 0 21 > 2 x 1 = 2 20 > 1 x 0 = 0 16+0+0+2+0=18 Exercise 1.1.5 11100010 27 > 128 x 1 = 128 26 > 64 x 1 = 64 25 > 32 x 1 = 32 24 > 16 x 0 = 0 23 > 8 x 0 = 0 22 > 4 x 0 = 0 21 > 2 x 1 = 2 20 > 1 x 0 = 0 128+64+32+0+0+0+2+0=226 > Exercise 1.1.6 156 156 > 27 > 128 x 1 = 128/ 156-128= 28 28 > 26 > 64 x 0 = 0 28 > 25 > 32 x 0 =0 28 > 24 > 16 x 1 = 16/ 28-16=12 12 > 23 > 8 x 1 = 8/ 12-8=4 4 > 22 > 4 x 1 = 4/ 4-4=0 0 > 21 > 2 x 0 = 0 0 > 20 > 1 x 0 =0 100111002 = 156 Exercise 1.1.7 255 255 > 27 > 128 x 1 = 128/ 255-128=127 127 > 26 > 64 x 1 = 64/ 127-64=63 63 > 25 > 32 x 1 = 32/ 63-32=31 31 > 24 > 16 x 1 = 16/ 31-16=15 15 > 23 > 8 x 1 = 8/ 15-8=7 7 > 22 > 4 x 1 =......

Words: 2960 - Pages: 12

Nt 1210 Definitions

...Jason Tester 08/10/2015 NT1210 Introduction to Networking Switched circuit —A circuit created by the phone company in reaction to signaling (the user tapping telephone keys or a modem sending in the same digits), with the telco tearing down the circuit when the user is finished. Dedicated circuit —An electrical circuit created by a telco on behalf of a customer, with the circuit staying up all the time, dedicated for use by the one customer that ordered the circuit. Also known as a leased line, leased circuit, and point-to-point line. Circuit switching —The overall process by which a series of telco devices called circuit switches connect a circuit from one customer device to the other, with the device’s logic taking incoming bits on one segment in the link and forwarding those bits out the matching outgoing segment, without storing the bits. Packet Switching- The process of forwarding customer data in a WAN by looking at the header of the messages sent into the WAN by customer and making a per-message (per-packet) decision as to where to forward each message. Leased Line - is a dedicated telephone connection between two points that is set up for a company or other organization by a telecommunications common carrier. Time Division Multiplexing – a technique for transmitting two or more signals over the same telephone line, radio channel, or other medium. Each signal is sent as a series of pulses or packets, which are interleaved with those of the other signal or...

Words: 381 - Pages: 2