Premium Essay

Unit 7 Lab 1

In: Other Topics

Submitted By mrjohnson1987
Words 472
Pages 2
Gerald Johnson
NT1310T Unit 1 Exercise Local Exchange

The purpose of a Network is to share data. To make this possible, you have to be able to connect to other computers. To make this enticing to people to want to take advantage of this technology, it has to be simple not so complex. This sounds a little difficult to understand as far as a qualified answer, but to sum things up that is it. The question to ask and that many people don’t consider is how data is transferred from one computer to another computer? Transferring data that is being sent by the user who has created and initialized the transfer of information using a source such as an email service for example. How do you get information from one computer to another, and how do you make it simple and easy to do this? Companies that succeeded at doing this have a great profit with exponential growth possibilities and revenue. For example Cisco company who has made billions by allowing different groups of networks to share data across what we call the internet. Games take advantage of this technology to connect to other computers. Networking companies have succeeded so well in allowing people to connect across their internal networks and the internet that pretty much any app. is able to send data to another computer. There is a physical connection running between two computers that want to connect. This is made possible because phone lines that run from houses to switches to other houses that the phone company lets dial to each other. Or another alternative it could be network cables going to hubs and other computers. Also, it could be cable lines running to fiber optic lines, through routers. And lastly it could be radio waves that computers can broadcast and receive. There are physical devices that connect the computer to the network of lines that you use to communicate…...

Similar Documents

Premium Essay

Database Unit 1 Lab 1

...Lab 1 1. A collection of information accessible from a computer or server 2. DBMS is a Database Management System that organizes information internally. 3. Dbms stores information, spreadsheet runs formulas 4. Product | Use | Where it was used | Cost | DB2 | Open database environment | A small single-user application to a large multi-user system. | $598 + $99 additional user | Microsoft Access | Relational databases that have tables of data. | Software developers and data architects | $199 (Amazon) | Microsoft SQL Server | primary function is to store and retrieve data as requested by other software applications | workloads ranging from small single-machine applications to large Internet-facing applications with many concurrent users | Vary (Different Prices for different purposes) | Filemaker Pro | database engine with a GUI-based interface | ??? | $329.00 | Oracle | transfer any customer info from one location to any other in the world | larger organizations and small chain stores | ??? (Couldn’t find anything) | Mysql | database for use in web applications | Personal and commercial use | $2k-$10k/year | 5. “DBMS stands for database management system whereas RDBMS stands for relational database management system; these softwares are created to maintain and utilize large scale collection of data in an efficient manner.” 6. 290 7. Peng J Wu 8. Footlocker:......

Words: 447 - Pages: 2

Premium Essay

Is 3120 Unit 1 Lab 1

...Use the internet to help you answer the following questions: 1. What is the current state of IPv6? Estimate what percentage of the network infrastructure is running IPv6 traffic. What percentage of the network is running IPv4 traffic? IPv6 - Reports in November 2008, indicated that penetration was still less than one percent of Internet traffic in any country. The leaders were Russia (0.76%), France (0.65%), Ukraine (0.64%), Norway (0.49%), the United States (0.45%), and China: 0.24%). IPv4 - Of the 4.3 billion Internet addresses possible with today's Net mainstream technology, 95 percent are gone. That is a 90% use across the worlds internet use IPv4 2. Find a company that offers unified communications. a. What technologies are being used? i. Microsoft • Audio, video, and Web conferencing • Instant messaging • Unified messaging • Voice-over Internet Protocol (VoIP) • Secure communication • Mobility • Provide IT control with failover, redundancy, and scalability • Manage compliance, and archiving policies for messaging and telephony systems b. What type of network infrastructure is being used? IPTV – Internet Protocol Television 3. Find the following models on the internet: a. B2C – Groupon, Livingsocial, Amazon Local. b. B2B – Adobe, Cisco, American Express (Other CC companies) c. B2G – Construction and Infrastructure, Information Technology 4. Look up the general definitions of the following acronyms that relate to unified......

Words: 324 - Pages: 2

Premium Essay

Unit 1 Lab

...Students will be provided with a copy of the VMware image of the Linux distribution and tools that will be used through out this course when I return to class on September 25, 2012. Accompanying this lab students will need to answer the questions from the Security Strategies in Linux Platforms and Applications lab book. To accomplish the lab assignment below, students will need to obtain a copy of the Fedora Image provided to you by the Substitute Instructor and complete a basic VMware installation of Fedora. The questions in the lab book will be based on the installation experience. Assigned Pages: 6-10 Questions: 1 through 15. This assignment is due by the end of class for Unit 1. 1. During the install, the option to sync with a NTP (Network Time Protocol) server was checked. From a security perspective, why is it important for a system to keep accurate time? Accurate time is important because of the date/time stamps (records) that occur on both log-in's and any changes that were made. This allows the logs to be checked to see what individual made the changes, or was logged-in at the time the changes were implemented. 2. During the install, a password has been set for the "root" user. What is the "root" user, and when is it appropriate to use this account? The "root" user is name or account that by default has access to all commands and files. It is also referred to as the root account, root user and the superuser. It would be appropriate to use this......

Words: 1655 - Pages: 7

Free Essay

Unit 1 Lab

...1. The CPU is what actually runs the programs. 2. 1, 0 3. Digital data, and/or digital device 4. Key words, or reserved words 5. Nmeumonics 6. A compiler translates a high-level language program into a separate machine language program. An interpreter both translates and executes the instructions of a high-level program. 7. Operating system Popular Programming languages 1970s: Pascal: Niklaus Wirth. 1970, and was developed for use in education to teach programming. C: Dennis Ritchie. Developed between 69 and 73. It was designed to encourage cross-platform programming, and to be used by straight forward compliers. Smalltalk: Alan Kay, Dan Ingalls, Adele Goldberg. Developed between 69 and 72. It was designed primarily for educational use. Scheme: Guy L. Steele and Gerald Jay Sussman. Developed in 1975 for educational uses. SQL: Donald D. Chamberlin and Raymond F. Boyce. Appeared in 1974. Designed to manipulate and retrieve data. 1980s: C++: Bjarne Stroustrup. Appeared in 1983. Developed for systems programming. Ada: Jean Ichbiah. Developed in 1980 for the Department of Defense as a unified language for embedded and real-time systems. Eiffel: Bertrand Meyer. Appeared in 1986. Developed to eliminate bookkeeping instructions to make code more readable and easier to program. Objective-C: Brad Cox and Tom Love in1983. Perl: Larry Wall. Appeared in 1987. Developed as a general purpose Unix coding mechanism. 1990s: Python: Guido van Rossum,......

Words: 457 - Pages: 2

Premium Essay

Unit 1 Lab 1 Nt1230

...Student # Date Assignment Requirements Follow the directions in the Lab Manual for Lab 1, and complete all Exercises. Answer all the questions. Submission Requirements Microsoft Word. 1-2 pages. Self-Assessment Checklist I followed the directions in the lab manual for all exercises. | * | I submitted answers to all of the questions for this lab. | * | I used critical thinking. | * | I have followed the submission requirements:File Format: Microsoft Word (.doc /.docx)Length: 1-2 pagesFont: Times New Roman 12 point sizeLine Spacing: Double | * | Lab 1 worksheet Preparing a Virtual Workstation Image Exercise 1.3 | Exploring Windows 7 | Overview | In order to familiarize yourself with the new Operating System being rolled out in your organization, you decide to manipulate some common features to see how they differ from previous Windows versions. In this exercise you will work with screen saver and other display properties. | Completion time | 30 minutes | Question 1 | What is the current screen resolution? 800x600 | Question 2 | What security advantages does displaying the login screen on resume offer? Offers security from anyone coming along and taking a look at what your doing | Question 3 | How did changing the theme affect your display? It gave a different background | Exercise 1.4 | Creating an .iso Image From Windows 7 Installation Media (Optional) | Overview | Carrying around......

Words: 275 - Pages: 2

Free Essay

Nt1310 Unit 7 Lab 1

...Unit 7 Lab 1 New Building Safety Plan In my safety plan the first things that I’m going to cover are the PPE for working on a construction site where a new building is being placed. First you’re going to need a hard hat so that when anything falls from above, it keeps your brains where they belong like in your head. Second steel toed shoes or boots, preferably boot for a little extra ankle support. But the steel toes to protect your feet from anything being dropped or lowered in case your foot gets in the way. Safety goggles, pretty self-explanatory on this one, just need to keep things out of your eyes! Long pants (blue jeans) protect your legs from different object that could hurt your skin but with pants on you might just get a bruise. Next on the list gloves are always a good idea to wear so that you don’t rip your hands up while you’re working! A water cooler is a must in this situation because it’s going to be hot out and hydration is key to survival! There will also be no running on the job site. Hurry to quickly can cause more accidents than any amount of production you’re getting for running that thirty foot. Only work on the parts of the job that you know, if someone ask for help go ahead and give them a hand but if you’re a plumber then just let the electrician handle his own job. Back to PPE for a sec a back brace would be a good idea to wear also. Once you have a back injury it will be a problem for the rest of your life in most cases. In case of an......

Words: 392 - Pages: 2

Premium Essay

Unit 5 Lab 1 do so. Network Recommendation My recommendation would be to go with a wired network over a wireless network. Wireless only has one major advantage over wired networks and that is convenience, everything else is a negative. Wireless is more complex, slower, increases latency, less reliable, requires more maintenance, more expensive, less secure, etc. If using wire was always practical, no one in their right mind would opt for wireless. I have seen a few nice, clean places that have a wireless network that has crappy internet speeds and maintenance issues. When it all boils down, wired beats wireless in the long run. References PACE University. (n.d.). Network Troubleshooting and Resource Site for School IT Staff. Retrieved November 7, 2014, from PACE University:

Words: 1042 - Pages: 5

Free Essay

Unit 9 Lab 1

...Task 1 1. The Cisco RV220W Firewall is a hardware firewall that doubles as a router. It has VPN security to allow safe access from remote computers and offices. It also protects against cloud based threats. ZoneAlarm is a software two-way firewall and also comes with backup software. It monitors your programs constantly and should a virus or malicious program make it through it catches it immediately. Task 2 1. Panda, Norton, and Kapersky all offer free trial versions of their products. AVG is the only full-fledged free anti-virus software in the group. McAfee does not offer trial versions or a free version, only purchasable options. 2. A Trojan horse is an application that appears benign but is really a destructive program. A user will think they are downloading something beneficial to their computer and when they do the Trojan horse begins to corrupt their system. Phishing is when a person receives an email that directs them to a false website that appears to be legit and then has the user enter sensitive personal information such as credit card numbers, social security number, etc. A drive-by download occurs when a user visits a website, doesn’t have to click any links or anything, and malicious software automatically begins to download in the background without the users knowledge. Task 3 1. A full backup backs up all the files and folders on a specific drive every time you use that file set. It takes longer and uses up more file space. An incremental......

Words: 586 - Pages: 3

Premium Essay

Nt1130 Unit 1 Lab

...Unit 1 Assignment 1: Windows 2008 Network Services Most networks out there will take advantage of DNS and DHCP services. These services make managing a network an easier task for the administrator. While they are not always required for a network to function, most cases they will be used. Knowing what these services do will help the administrator determine if they are required for the network. DNS stands for Domain Name System. What this service does is help convert IP addresses into names easily remembered by the user. Instead of having to remember an IP address for every device on the network an administrator could set up DNS so names can be assigned to all the devices. Most users will find remembering a name easier than trying to recall a string for 12 numbers. DHCP stands for Dynamic Host Configuration Protocol. What DHCP does is assign IP addresses to devices. Without DHCP an administrator would have to assign IP addresses to each device on the network. Maybe in a small network this wouldn’t be a problem, but a network with more than 10 devices this may become a large task for one person. DHCP can be configured with a range of IP addresses for a network and it will assign each device an address that is not being used. It keeps track of what devices are using IP addresses and which ones are not. Knowing how each of these services work will help an administrator decide if they want to use them. In a network with say 5 devices the administrator may want to manually assign...

Words: 357 - Pages: 2

Free Essay

Unit 7 Assignment 1

...Unit 7 Assignment 1: AD Password Policy Planning TO: Client I can understand you’re concerned with your company’s security after all information on competitors can be invaluable or very harmful to a company and this is why it must be protected from prying eyes. This does not have to mean that you have to lose productivity over trying to secure your networks information. I’m going to give you some tips on how to better secure your network with the tools that you already have at hand, keep in mind that you can also buy better security items to better protect you network things like; smart card, finger print scanners, and retinal scanners.   I only recommend these for really sensitive information and only for certain users in your company. On the server that is the DC log in to the administrator account and in the “Active Directory Users and Computers” in the Domain icon in the left pane click on the “Users” icon, you’ll be able to see all of the users in that domain. From here you can click on any user and make changes as necessary, for user names I recommend you use the following format; using capital and lower case letters the first letter of their name, their whole last name and their employee number, if someone tried to hack the account and all that they knew was the person name and the domain name they could not get in because it is very unlikely that they would know that person employee number and if they do then you have a spy in your company. As for passwords I......

Words: 388 - Pages: 2

Premium Essay

Unit 7. Lab 1. New Building – Safety Plan

...Unit 7. Lab 1. New Building – Safety Plan Making safety a priority may be as simple as sending a letter to all employees outlining your plans to make safety as important as quality. Your employees should believe just as strongly as you do in safety. Hire the safest employees, starting in the interview process. Get a sense of how prospective employees feel about a total commitment to safely. Have they worked in other organizations where safety is a top priority? Always make the prospect aware of the physical demands the job entails. Review your workers compensation losses and ask your insurance carrier for a list of all of your workers compensation claims for the past 6 years. Look for trends, note the type of injury, the job the employee was performing when hurt, the name of the employee and the equipment or tools being used . Focus on the common causes that are responsible for the greatest number of you claims. Get all employees involved in the safety effort. Solicit employee suggestions on what they think can be done to prevent accidents and take action on these suggestions. Many businesses have regulations imposed on them by state and federal agencies. Your state’s insurance department or labor department may have employer requirements related to workers compensation and the provision of medical services OSHA has several volumes of rules and regulations that may affect your business. You should contact your trade association, chamber of commerce or state business and......

Words: 1431 - Pages: 6

Premium Essay

Level 7 Unit 1

...Unit 1: Strategic Management and Leadership Muhammad Salman Saleem 2015   CONTENTS Acknowledgement: 1 Research Methodology: 3 Task number 01 5 1.1 5 Link between strategic management and leadership is following: 5 1.2 6 Management and leadership styles impact on the strategic management: 6 For instance there are different leadership styles useful in different situations which are following; 6 1.3 7 Evaluation of leadership styles used in different situations: 7 Task number 02 8 2.1 8 Impacts of management and leadership theories on organization strategy: 8 2.2 9 Creating the leadership strategy that will support the organization structure: 9 Task number 03 11 3.1 11 Methods to review the leadership styles: 11 3.2 12 Plan for the development of future situations requiring leadership: 12 Task number 04 13 4.1 13 Plan the development of leadership skills for a specific requirement: 13 4.2 14 Methods use to plan the development of the leadership skills and their usefulness for the organization: 14 References: 15 1.1: LINK BETWEEN STRATEGIC MANAGEMENT AND LEADERSHIP IS FOLLOWING: Leadership is a skill which will involve motivating people towards the achievement of goals through a proper and positive way. This will involve to influence and inspire people and follow their leader so that they will act in his directions. (investopedia, n.d.). While Strategic management is concern with making, implementing and evaluating different decisions......

Words: 4025 - Pages: 17

Premium Essay

Unit 5 Lab 1

...Physical Networking Unit 5 Lab 1 Wired and Wireless Networks The biggest difference between these two types of networks is one uses network cables and one uses radio frequencies. A wired network allows for a faster and more secure connection and can only be used for distances shorter than 2,000 feet. Several other disadvantage of a wired network such as the “need to run cables in difficult environments through walls, floors and ceilings. Cables need to be run from computer to computer and switch to switch. Process can be time consuming. Loose cables likely remain the single most common and annoying source of failure in a wired network.” (PACE University, n.d.) While a wireless network is a very useful and convenient networking device, however these types of networks a lot less secure and transmission speeds can suffer from outside interference. Although wireless networking is a lot more mobile than wired networking the range of the network is usually 150- 300 indoors and up to 1000 feet outdoors depending on the terrain. The cost for wired networking has become rather inexpensive. Ethernet cables, hubs and switches are very inexpensive. Broadband routers cost more, but these are optional components of a wired network, and their higher cost is offset by the benefit of easier installation and built-in security features. The primary parts of a wired network are the cables, network adapters, and routers.......

Words: 315 - Pages: 2

Free Essay

Pt1420 7 1 Lab

...Unit 7 lab Short Answer Module main () // Declare variable Declare String clientName Declare Real feetUTP=0 Declare Real subtotal=0 Declare Real totalCost=0 Declare String keepgoing=“y” Display “Do you want to make a call?” Type y for yes. Input keepgoing While keepgoing == “y” // Module Calls Call Call Call End Module 7.2 7.3 // Declare loop control variable Declare Integer toPower=2 Declare Integer number=2 Declare Integer counter=0 Do ToPower=number^2 Display “2 to the power of”, number, “is” toPower Counter=counter+1 Number=number+1 While counter < 8 Lab7.4 Declare integer counter = 1 Declare integer toPower = 2 Declare integer number = 2 counter < 7 Display “2 to the power of”, number, “is”, toPower counter = counter + 1 False toPower = 2 ^ number True   Lab7.5 Module Module1 Sub Main() Dim keepGoing As Integer = 1 Dim Count As Integer = 5 pingMe() openWebsite() finalOutput() While Count > 0 Console.WriteLine("Count down ..." & Count) Count -= 1 End While Console.ReadLine() End Sub Sub pingMe() Shell("Ping.exe", , True) End Sub Sub openWebsite() Dim myTargetURL As String = "" System.Diagnostics.Process.Start(myTargetURL) End Sub Sub finalOutput() Console.WriteLine("Complete and explanation of what this program does.") Console.WriteLine("The Shell function and ping.exe check for a response from the web......

Words: 298 - Pages: 2

Premium Essay

Unit 1 Labs

...ITT TECHNICAL INSTITUTE NT1210 Introduction to Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes Identify the major needs and major stakeholders for computer networks and network applications. Describe how digital devices store data. Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): Respond to the multiple-choice questions. Complete the List the Words inside Acronyms table. Required Resources Odom textbook Computer with word processing software Internet access Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they......

Words: 16182 - Pages: 65