It220 Chapter 7and8

In: Computers and Technology

Submitted By nubsmcgee
Words 2495
Pages 10
1. What is a routing table? Routing tables consist of being used to route data to a specific path and also keeps track of the routes for where the data can travel to.

2. What is the most common static route used in a host computer? The most common static route used in a host computer is the default gateway.

3. What command is used to view a PC computers routing table? The command to used to view a pc computer routing table is netstat –r.

4. What is meant by a 0.0.0.0 network address entry with a subnet mask of 0.0.0.0 in a PC’s routing table? It’s the default routing table path for data.

5. What is the 127.0.0.1 IP address and what is it used for? It is known as a loopback to the host computer. This mean the data is routed directly back to the source which is known as the network interface card.

7. What is the difference between a routers running configuration and startup configuration? The difference between running configuration and startup is that in config doesn’t show what is currently saved in the routers nonvolatile memory whereas startup shows the saved configuration in the nonvolatile memory.

8. What is the router command used to view the routes entered into the router’s routing table? The command to use in order to see the routes entered into the routers routing table is show ip route. 9. What is the router command used to configure a static route for a router? The command you would use is ip route in order to configure the router.

14. What is the difference between a static and a dynamic routing protocol? The differences are that static has you enter in ip address information whereas dynamic routing protocol allows the router to be dynamically updated to account for loss or changes in routes or changes in data traffic.

15. What are the four key issues in dynamic routing protocols? The four key issues in dynamic routing…...

Similar Documents

Chapter

...CHAPTER ONE INTRODUCTION STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME One of the minimum graduation requirements in certain University academic areas is passing through a Student Industrial Work Experience Scheme (SIWES) unit. The scheme is aimed at providing opportunities for to put into practice their practical and theoretical knowledge acquired in the classroom. The scheme is also aimed at readying students for certain employment opportunities after graduation and also improves the knowledge of academic contents taught in schools. The SIWES unit coordinates the participation of students in professional discipline in the mandatory industrial attachment. The unit further serves as a link between National University Council (NUC), Industrial Training Fund (ITF) and the university relating to SIWES. It places students on the scheme in industries and establishments and supervise students during industrial training. VISION STATEMENTS OF SIWES To be the foremost Human Resource Development (HRD) organization in providing dynamic need-base and quality-driven intervention for industrial skills training and development in Nigeria and one of the best in the world. MISSSION STATEMENT To set and control standards of excellence and effectiveness and offer direct training of professionals, technicians, technologists and entrepreneurs to meet the human resource needs for rapid industrialization and sustainable economic development of Nigeria, relying on a corp of highly motivated and......

Words: 285 - Pages: 2

It220- Assignment 9

...Assignment 9.1: Chapter 12 1. List five advantages of an optical communications link. • Enormous Bandwidths • Low transmission loss • Immunity to cross talk • Electrical Isolation • Small size and weight 2. Define refractive index • Ratio of the speed of light in free space to its speed in a given material. 3. What are the commonly used wavelengths in fiber optic systems? • Dense Wavelength division Multiplexing. 4. What are the typical core/cladding sizes (in microns) for multimode fiber? • The two types of fiber are multimode and single mode. Within these categories, fibers are identified by their core and cladding diameters expressed in microns (one millionth of a meter), e.g. 50/125 micron multimode fiber. • Most fibers are 125 microns in outside diameter - a micron is one one-millionth of a meter and 125 microns is 0.005 inches- a bit larger than the typical human hair. 5. Define mode field diameter. • The Diameter base protocol is intended to provide an Authentication, Authorization and Accounting (AAA) framework for applications such as network access or IP mobility. 6. What are the four factors that contribute to attenuation? • Scattering • Absorption • Macrobending • Microbending 7. What are the three types of dispersion? • Modal dispersion • Chromatic dispersion • Polarization mode dispersion 8. What is a dispersion compensating fiber? • A fiber that acts like an equalizer, negative dispersion canceling positive dispersion. 9. What is......

Words: 877 - Pages: 4

It220 Assignment 2.1

...Assignment 2.1 Chapter 5 1-37 odd | | | | * What are the four layers of the TCP/IP model? Application layer, Transport layer, Internet layer, and Network Interface layer. * What are well-known ports? Ports reserved by ICANN (1 – 1023) * Define the purpose of a connection oriented protocol. It establishes a connection, manages the delivery of data, and terminates the connection. * What is the purpose of a sequence number (SEQ=) in TCP data packets? The sequence number is used to keep track of the data packets being transferred from host A to host B. * Describe how a TCP connection is terminated. The Host B sends a FIN (finish) packet to host A. Host A then sends an ACK packet acknowledging the reception of the FIN packet. Host A sends a FIN packet, then Host B responds with an ACK packet. * What is the purpose of the Internet layer in the TCP/IP protocol suite? Defines the protocol used for addressing and routing data packets. * What is the purpose of an ARP reply? The protocol that contains the hardware address for the destination host. * When is IGMP used? It’s used to control the flow of data in the network, for reporting errors, and for preforming diagnostics. * Convert the following 8-bit binary number to decimal: 10010011. 147. * Convert the following 8-bit number to decimal: 1111100. 252. * Convert the number 192 to its binary equivalent. 11000000. * Convert the number 96 to its binary equivalent.......

Words: 343 - Pages: 2

Chapter

...Title A Research Paper presented to Mr. Ghio Magtibay Reyes Canossa Academy Lipa City In partial fulfillment of the requirements in English IV Aeron Glenold R. Almoite Aldreah Krisol P. Dinglasan Christian Paolo R. Dumlao Cleo O. Vergara December 2013 Chapter I Introduction It took a power outage for me to see the light Of what it is I am really like To hear the words that you said without the noise I could listen close, without distraction of toys I saw the darkness of how I felt surround me The candle that you lit, so profound within me Safety, security, as well as desire Lit so lovingly by that fire “Power outage” a poem by Deanna Repose (September 23, 2009 (blog.deannarepose.com) Electricity is an imperative necessity and essential to modern life; one basically depends on the use of electricity with almost every task. People suppose that it will be present when they need it to power the engines and systems which on the other hand are also involved in practically everything we do. In Lipa City, the residents expect their power supply to be always ready and available every time considering that theirs are busy and rushed lives. In exchange, they compensate for that power, depending on how much they use. That's about as much as most of us think about in the process. Unfortunately, BATELEC does not always meet the expectations for minimized power outage in most places of Lipa. In order to meet the problems in power shortages,......

Words: 3084 - Pages: 13

Chapter

...Chapters | Characters involved | Key points of important things | Quotes | Importance in terms of relationships | 1 | Dr Iannis, Pelagia, | Dr Iannis has doubts in himself as a writer | "This would never do; why could he not write like a writer of histories? Why could he not write without passion? Without anger? Without the sense of betrayal and oppression?" | | | | Pelagia appears a very dynamic woman who is ahead of her society | "Papas, she said, it still is your day. You aren't dead yet, are you? Anyway, the goat is fond of you.' | It is important in terms of relationships as it alludes on the reasons that she is a good match with captain Corelli. | Chapters | Characters involved | Key points of important things | Quotes | Importance in terms of relationships | 2 | Mussolini | Mussolini is presented as vein, boastful, self-centered, pompous, arrogant, megalomaniac, racist. He appears very arrogant and is very concerned of how he looks. Imperialism is also reinforced. De Bernier also ridicules Mussolini. | "Which is my best profile, right or left?" Yes it is very important and also very natural that the people should perceive in me an apotheosis of the Italian ideal. "What do you mean, it saves on mousetraps? | The first person narration renders the story more realistic as we get a direct insight as to Mussolini's thoughts and feelings. It is also easier for the reader to criticize him through his own words. | 3 | Pelagia | Pelagia is not a typical......

Words: 1407 - Pages: 6

Chapter

...Chapter 5 Pricing strategies LEARNING OBJECTIVES After reading this chapter you will: n n appreciate the strategic significance of pricing decisions in marketing strategy understand the approaches to pricing of the economist and accountant, together with their contributions and limitations in the context of the price setting process n apply a framework to pricing decisions based around the key inputs to these decisions n understand the main pricing methods and their relative advantages and disadvantages 160 Pricing strategies INTRODUCTION The price of a company’s products and services represents the vehicle for that company to achieve its financial objectives. It is through price and volume that revenue is generated. Price equates to the financial sacrifice that the customer is willing to make to purchase the product or service desired. The important criterion of pricing is problematical to marketers. This is attributed to the uncertainty associated with pricing decisions as it is a complicated area of decision making. It is with a view to examining this problem and the ways in which it can be resolved that his chapter is framed. The pressures of today’s market environment place increasing burdens on management. It is important, therefore, that the decision maker has a framework for making pricing decisions. We start by examining the traditional economist’s view of price to illustrate both the shortcomings and potential contributions of this approach as a prelude to......

Words: 13457 - Pages: 54

Networking and Protocols Chapter 2

...Samantha Dema Zagadinow 6/24/14 IT220 Network Standards and Protocols Chapter 2 Review Answers: 1. C - Datacom 2. B - Bob's incoming email server 3. B - The call uses only digital signals. D - The call represents short sounds as a unique set of bits. 4. C - The call uses both analog and digital electrical signals. D - The call represents short sounds as a unique set of bits. 5. A - A character se 6. D - Compress the video 7. C - Books 8. C - The web server sees the request for the web address, dynamically creates a single graphical image of the entire web page and sends that one graphical image to the web browser. 9. A - A website typically contains many web objects. C - A web page typically contains many web objects. D - A website typically contains many web pages. 10. C - The operating system on the PC. D - The PC's NIC 11. A - 16 HTTP GET request messages with 16 matching HTTP GET reply messages. 12. D - The GET request 13. D - None of the answers is correct, 14. C - Node 15. A - Router D - Switch 16. D - SMB network 17. D - Switch 18. D - The Internet 19. A - Internet Service provider 20. B - Any ISP's network Key Terms Definitions: Computer Networking – the gerund form of the term computer network. Computer Network – a combination of many components that work together so that many different devices can communicate. Application – generally a function in any kind of computer or electronic device that is useful to the user which can give the user a reason to want to own......

Words: 687 - Pages: 3

Lab 5 It220

...LAB 5 IT220 Exercise 5.1.1 * The 802.1 standard defines the 802 family of standards, describes the local area network, and defines the LAN address format. Exercise 5.1.2 * The 802.3af standard originally defined PoE functionality. The standard was enhanced in the year 2009, the name of it is 802.3at. Exercise 5.1.3 * 500 meters * 185 meters * 100 meters * Fiber Optic * UTP, 100 Meters * UTP, 100 Meters * Multi-Mode-Fiber Optic, 550 Meters * Single Mode- Fiber Optic * UTP 4 Pairs, 100 Meters Exercise 5.1.4 * The numeric prefix before BASE means the speed in Mbps. The inclusion of a postfix of -T means that the cable is a twisted pair standard. Lab 5.1 Review 1. The maximum speed of traffic would be between 10Mbps, and 100Mbps because they would have to negotiate the amount of bandwidth to send the node in between the two different network standards. 2. It is possible by also using a negotiation to uphold the maximum speed of the lesser UTP wire for example if Cat3 and Cat5e had to negotiate the Cat5e would have to meet Cat3’s standard maximum speed. Exercise 5.2.1 * A MAC address must be unique for every NIC card produced because they are being compared to all other unicast MAC addresses in the same LAN. The effect would be that the MAC address would be duplicated. Exercise 5.2.2 * It gives information on the connection its physical address and DHCP status. Exercise 5.2.3 * The......

Words: 845 - Pages: 4

It220 Chapter 11 Pg 443-444 # 1-39 Odd

...Harry lary IT220 Chapter 11 pg 443-444 # 1-39 odd 1. List two advantages of wireless networking. 3. What is an ad hoc network? 5. What are the four physical layer technologies being used in 802.11 wireless networking? 7. Define a pseudorandom sequence as it applies to FHSS. 9. What is the frequency range used by 802.11a, and what modulation technique is used? 11. Define MIMO as it applies to 802.11n. 13. What is the purpose of an access point? 15. What is an association, and what is its purpose? 17. Draw a picture of a point-to-point wireless connection 19. In what frequency band does Bluetooth operate? 21. What is a piconet? 23. What is the purpose of the paging procedure in Bluetooth? 25. What are the three parameters that define an RFID system? Means of powering the tag, Frequency of operation, Communications protocol (also called the air interface protocol) 27. Cite three advantages for using an active RFID tags? 29. What is the WiMax frequency standard for the United States? 3.5 GHz 31. How does WiMax differ from Wi-Fi? Wimax using as a wireless 'MAN' for broad band Internet connection, between 30 and 40 miles Wi-fi using as a wireless 'LAN' to connect access point or PC in network, between 25 and 40 meeter 33. What is the purpose of wireless beacons? Beacon's flexible technology platform is ideally suited for custom applications 35. What is the purpose of......

Words: 324 - Pages: 2

It220 Chapter 1

...1. State whether the following network descriptions are describing a MAN, WAN, or LAN: a. A network of users that share computer resources in a limited area. b. A network of users that share computer resources across a metropolitan area. c. A network that connects local area networks a. LAN b. MAN c. WAN 2. Expand the acronym NIC. i. “Network Interface Card” 3. Expand the acronym MAC. i. “Media Access Control” 4. Expand the acronym LAN. i. “Local Area Network” 5. Expand the acronym WAN. i. “Wide Area Network” ------------------------------------------------------------------------------------------------------- Section 1-2 6. Define the term protocol. i. Set of rules established for users to exchange information. 7. Define the term topology. i. Architecture of a network. 8. Define the term deterministic. i. Access to the network is provided at fixed time intervals 9. A disadvantage of the token-ring system is that if an error changes the token pattern, it can cause the token to stop circulating. This can be eliminated by adding a . . . d. Token-ring hub (A hub that manages the passing of the token in a Token-Ring network.) 10. State the network topology being used in the following figures (Bus, Star, Ring, or Mesh). a. Mesh b. Bus c. Ring d. Star 11. What......

Words: 2004 - Pages: 9

Chapter

...Chapter 1: The Role of BR I. The Nature of Research A. BR defined B. Applied & basic BR C. The scientific method II. Managerial Value of BR A. Identifying problems or opportunities B. Diagnosing & assessing problems or opportunities C. Selecting & implementing a course of action D. Evaluating the course of action III. When is BR Needed? A. Time constraints B. Availability of data C. Nature of the decision D. Benefits vs costs IV. BR In The 21st Century A. Communication technologies B. Global BR Chapter 3: Theory Building I. Introduction A. What is a theory? B. What are the goals of theory? II. Research Concepts, Constructs, Proposition, Variables & Hypotheses A. Research concepts & constructs B. Research proposition & hypotheses III. Understanding Theory A. Verifying theory B. Theory building Chapter 5: The Human Side of BR: Organizational & Ethical Issue I. Introduction II. Ethical issue in BR A. Ethical qs are philosophical qs B. General rights & obligation of concerned parties C. Rights & obligation of the research participant * The obligation to be truthful * Participants’ right to privacy * Active & Passive research * Deception in research designs & the right to be informed * Experiment designs * Descriptive research * Protection from harm D. Rights & obligation of......

Words: 1429 - Pages: 6

Chapter

...CHAPTER 1 INTRODUCTION Today’s society belongs to the information age where information is considered to be a valuable asset with this, different technologies are made so as to ensure the proper handling of information. There are databases and computer to name a few. The above-mentioned however are bulky and thus, their use is limited to offices and/or house only. People nowadays need to get and manage information whenever they want it. This is why, handheld devices or smaller versions of database and computers are developed. Mobile class records belong to this category. Android Mobile phones are increasing in popularity, not solely for business and personal but also for educational use. At all educational levels, android mobile phones are being use in the classroom to increase student’s organization, fasten collaboration, and maximize portability of technology. The teacher, being one of the major sources of information has to make sure that the pieces of information they impart and handle are systematic and organized. They have to strictly record attendance and monitor the performance of their students. Proper classroom management is therefore very vital to a teacher. Not being able to do so will greatly affect the effectiveness and efficiency of the teacher which would, in turn, somehow damage to the development of the student. Having mentioned the potentials of Android mobile phones, it can largely be of help to a teacher. Its portability will help a teacher manage the......

Words: 598 - Pages: 3

Chapter

...Chapter 2 – Review of the Literature Writing Chapter 2: Review of Related Literature 04 NOV A literature review is designed to identify related research, to set the current research project within a conceptual and theoretical context. The second chapter should… start with a brief introductory paragraph concerning the researcher’s exploration of related literature and studies on the research problem; state the main coverage of said chapter; should be organized thematically to confirm to the specific problems; should synthesize evidence from all studies reviewed to get an overall understanding of the state of the knowledge in the problem area; should be limited within the last ten years; should include a clinching statement showing how the related materials had assisted the researchers in the present study at the last part. How to Write the Introduction of a Review of Related Literature Identify the general topic of the sources under discussion. Thus, you will provide the context of your review of related literature; Discuss what was already presented about the topic of your paper: conflicts in a theory, conclusions, gaps in research and scholarship, etc. Explain why the literature used is worth reviewing. How to Write the Body of a Review of Related Literature Group the sources according to their common dominators (approaches, objectives or any specific chronologies); Give the examples of how to sort out these groups. Use quotations, evidences, data...

Words: 365 - Pages: 2

Chapter

...CHAPTER 4 SECTION 1 & 2 VOCABULARY TEST A. treadle B. folkways C. bulk D. seaboard E. blacksmiths F. coffle G. meager H. superstitions i. brick masons J. supplemented K. antebellum NAME ____________________________________________________ # ______ 1. _______________ large quantity 2. _______________ added to 3. _______________ period before the Civil War 4. _______________ foot peddles 5. _______________ a train of animals or slaves fastened together 6. _______________ by the sea 7. _______________ people who build with bricks 8. _______________ beliefs about magic and the super natural 9. _______________ ways of thinking, feeling, and acting that are shared by a group of people 10. _______________ a small amount 11. _______________ those who make horse shoes, plows and other metal items L. sparsely M. yeoman N. plantations O. navigable P. yearlings Q. bale R. isolated S. homespun T. statewide elections U. self-sufficient V. commercial agriculture 12. _______________ a loosely woven fabric usually made of linen or wool 13. _______________ a large bundle packaged for shipping, storage, or sale; often hay or cotton 14. _______________ large farms or estates often dedicated primarily to growing one primary crop 15. _______________ producing what one needs 16. _______________ large scale production of food or livestock for sale 17.......

Words: 292 - Pages: 2

Chapter

...chapter Eric Futran/Foodpix/Jupiterimages In the SPOTLIGHT Leidenheimer Baking Company http://www.leidenheimer.com andy Whann is the fourth generation of Leidenheimer men to run [the Leidenheimer Baking Company], which was founded in 1896 in the city of New Orleans by Sandy’s greatgrandfather, George Leidenheimer of Germany. The bakery produces French bread made famous by traditional local dishes like the muffaletta and po boy sandwiches that originated in the heart of the French Quarter. As a lifetime citizen of New Orleans, Sandy has experienced many evacuations and has become adept at hurricane planning through the years. When the hurricane alert [for Katrina] was issued on Saturday, August 27, 2006, this veteran immediately put his family emergency plan into effect as his wife and two children prepared to leave the city. Sandy remained near the plant to keep a close eye on his 110-year-old company and keep production working at a minimal capacity. With his family out of the city, Sandy uncharacteristically decided to shut the bakery down, secure its exterior, gas lines and doors and encouraged his employees to prepare their own homes and loved ones for the storm and potential evacuation. Both Sandy and the Leidenheimer management team keep home phone numbers and emergency evacuation contact information for all employees. 23 LOOKING AHEAD Managing Risk in the Small Business S After most of his employees had left, only Sandy, his plant manager, and chief......

Words: 13829 - Pages: 56