Nt1210 Itt Tech Case Study 2

In: Computers and Technology

Submitted By CaptainTaco
Words 441
Pages 2
Switch Name Vendor Cost Reason
Dell CompUSA $325 High performance, lifetime warranty, wiring closet solutions, desktop connectivity
Cisco Axiontech $565 Lifetime warranty, software, layer support 2,mounting hardware
Juniper Discount Computer Super Store $850 High performance, lifetime warranty, layer 2 & layer 3, low power consumption

Case Study 2

2. Our company had to upgrade the NIC, the reason for this is they needed faster speeds to communicate with the other locations throughout the world in and out of the state. When connecting to the three other business’ states it is very important to stay connected to the network.
3. It is very important we have time to train Karla with different job duties. With Karla’s new position as administrator she needs to know how to handle the business side of the network. In order to be the right person for the job it critical she learned different steps on troubleshooting and problem solving techniques to resolve any issue. It is very well justified and will pay off in the future for Karla’s training and business expertise for the company. She is now under way and understanding the importance of network administering and will soon have the knowledge and experience to take her further in this business. 4. It is very good to attend different kinds of seminars to build your knowledge for helping out the company. Technology changes almost everyday and it is imperative to stay up to date when it comes to different programs, hardware, techniques, and other valuable assets to enhance and improve your company’s future.
5. Everyone wants to grow and succeed in their job. Life is about being successful and evolving in your position where you work. Business grows, times change, and goals grow for the best interest of the business. It is a must to have a crew and staff you can…...

Similar Documents

Itt Tech

...graphing as a problem solving technique? Answer: Calculating the differences in the data. Skill Level II Answer: Skill Level III Answer: Hints: Research the Internet and/or the ITT Tech Virtual Library for the information required in the assignment. Summarize your data in a table, and then build a graph. Remember: you must provide your references (the format of your reference list is to be determined by your instructor). ----------------------- Problem Acquire the necessary data, and compile it in an effective format, to compare the batting careers of Babe Ruth, Hank Aaron, and Mark McGwire. Problem Whereas batters are often judged by the number of home runs they hit, pitchers are judged by statistics such as the number of games they win, their earned run average (ERA), and the number of no-hitters they throw. 1. Execute the necessary research to identify the winning pitcher in the final game of three World Series of your choice. 2. For each of the three pitchers, find the number of games they won during the entire season, their ERA, and the number of no-hitters (if any) they threw during the baseball season in which they won the World Series. 3. Construct one graph that summarizes the data for all three pitchers. Problem One of the most difficult challenges faced......

Words: 719 - Pages: 3

Nt1210 Case Study 10

...In this case study we have been asked to create a report about disaster recovery and the best practices involved for such an incident. There are many types of disaster recovery systems that can be employed. For our purposes I will talk about two of the currently industry standards. First is the "Cloud-Based" disaster recovery. In this type of recovery, SMPR would be required to lease network storage space from a cloud-based DR vendor and SMPR would set up proprietary backup software that would communicate with the vendors system and remotely and securely store SMPR's backup data and network configurations on the Cloud, or in other words in a server farm of hosted SAN devices. This option is typically a little more cost effective because the vendor has to maintain the hardware for storage, and ensure that it can be accessed within an agreed upon SLA. The next method of disaster recover we will talk about is called a Co-Location shorted to Co-Lo in the industry. In a Co-location setting, you pay rental space for a building, you then bring in your own hardware and setup and manage your own connections to this location for your data backups and storage. Typically in a Co-Lo, you will need to worry about how much power you will use, how much rack space will be required, and how much bandwidth you will need between the SMPR offices and Co-Lo. A Co-Location typically has many redundant systems to ensure that your servers do not lose power, or data connection, they generally have......

Words: 520 - Pages: 3

Itt Tech Linux 2 Homework 1.1

...Nicole Lynn Bojko Homework Assignment 1.1 1. List the number and name of each runlevel as used by Fedora/Red Hat Linux. 0 = Halt – Shuts down the system 1 = Single User – Mode for administrative tasks 2 = Multiuser without NFS - Does not configure network interfaces and does not export networks services 3 = Multiuser - Starts the system normally 4 = User defined – For special purposes 5 = Multiuser with X - As runlevel 3 + display manager 6 = Reboot – Reboots the system 2. Which two runlevels should NEVER be set as the default? 0 = halt and 6 = reboot 3. What script contains the default runlevel? /etc/rc 4. The init scripts for each runlevel are contained in which directory tree? /etc 5. What would you name the link to an init script that would start the fictitious bigd daemon early in the boot process? /etc/rc.local and write the script to run at boot time. 6. What would you name the same link to kill the same daemon? Kill 9 7. How would you use the service command to manually kill the bigd daemon? Service bigd stop 8. How would you use chkconfig to set the bigd daemon to start at runlevels 2 and 3? chkconfig bigd --level 2 and 3 on 9. How would you use chkconfig to remove bigd from all runlevels? chkconfig --del bigd 10. How would you use telinit to switch to runlevel 5? Edit the /etc/inittab and Enter : id:5:initdefault: 11. How would you tell Linux to shut down in five minutes ( not delay five minutes) with the message “ The system will......

Words: 276 - Pages: 2

Case Study 1-Itt a&P

...off, hypertension is more commonly known as high blood pressure. It affects your cardiovascular system by forcing the blood against your artery walls throwing off your hearts natural homeostasis. More simply put, the smaller your arteries have become, due to fat and plaque buildup, the harder it is for your heart to push the blood through them, and the more tired it becomes. In order to correct your hearts natural homeostasis we need to work together to get your blood pressure back down to normal. Homeostasis refers to your body’s feedback system, or loop. First a stimulus disrupts your homeostasis, in this case it stimulates your heart and causes your blood pressure rise because of nerves, or exertion. In normal homeostasis, the baroreceptors in the blood vessels would send a message to your brain and your brain would tell your heart to relax. In your case, the high blood pressure isn’t a sudden onset, the plaques in your arteries have been building for years, and at this point your body’s homeostasis can’t not correct the issue on its own. This is where the medication will come into play, it will help fill that gap in the homeostasis process and your body will begin to return to back to normal. Your heart is one of the most important organs in your body, so the tips I will give you may seem like a hassle, but they are very important to maintaining your health. By not making these changes there may be some severe consequences. A few small tips with a lot of......

Words: 1117 - Pages: 5

Data Tech, Inc Case Study

...Assignment 4: Data Tech, Inc. Case Study BUS 515 August 31, 2012 In the real world of facility management (FM), an overabundance of activities fall under the facility manager’s responsibility, causing common lapses into a rash mode in order to respond to all the requests, orders, regulations, deadlines and demands of the organization. Facility managers know that the need to become more proactive and strategic is important, but finding the point in time to dedicate to strategic planning is often a struggle. Strategic facility planning recognizes that every decision made in business planning has a direct impact on an organization’s real estate assets and needs. The purpose of the SFP plan, therefore, is to develop a flexible and implementable plan based on the specific and unique considerations of the individual business. The company of Data Tech, Inc was started by Jeff Styles. Data Tech is a business that transfers hard copies of documents, such as invoices, bills, or mailing lists, onto CDs (John Wiley & Sons, Inc. 2010). As other companies move to a paperless environment, the placing of data on CDs was the wave of the future. Jeff had started the company in his two-car garage three years earlier by purchasing the essential software and signing of two large corporations as his first customers. At this point, he was about to sign on two additional corporate customers. All of a sudden what was a small garage operation was......

Words: 1285 - Pages: 6

Itt Tech

...Michael Knall Date: 6/26/14 Class: Programming Unit 2 Assignment 1: Homework Short Answer 1-4: 1.) What dose a professional programmer usually do first to gain an understanding of a problem? Break the larger problem into independent sub-problems. Seek solution of each sub-problem. Test the solutions of each sub-problem. Combine all the tried and tested solutions together. Apply the solution to the complex problem under consideration 2.) What is Pseudo Code? A notation resembling a simplified programming language, used in program design. 3.) Computer programs typically perform what three steps? Input is received. Some process performed on the input. Output is produced. 4.) What dose the term “user-friendly” mean? The term user-friendly is commonly used in the softwear business to describe programs that are easy to use. Algorithm workbench 1-2: 1.) Design an algorithm that prompts the user to enter his or her height and stores the user’s input in a variable named height. Any height, you just have to be good, i advise you to work on your shot having better than a 60% shot is alot better than any other aspect? In Basketball Rules and Regulations =The official height of an NBA basketball hoop is 10 feet from the floor to the rim. 2.) Design an algorithm that prompts the user to enter his or her favorite color and stores the user’s input in a variable named color. Declare Interger color Display “ what is the color” Input......

Words: 260 - Pages: 2

Itt Tech

...objective for this job is to obtain some people skills from interacting with the customers that come in and learn more about the phone industry, I’m currently a student at ITT Tech majoring in Network Systems Administration and thought this job would be a good start in the tech industry. | Skills & Abilities | | I have been working with Computers since the age of 13 so my computer tech skills are well refined, I can and will adjust to any environment when need be, I am a quick learner regardless of what it may be I can and will learn it as fast as I possibly can, I am extremely patient and have been known to work well with people. | Experience | | Dish washer, Minnesota misonic Homes North ridge March 2013 To May 2013 My duties as the dish washer goes beyond the title I not only made sure all the dishes were clean I also helped with serving the food, my job was a bit stressful at times because we was working with the elderly who’s immune system is much weaker because of aging. Pizza Maker, Pizza Ranch August 2014, Current employer My task are to make and prep the dough in the morning and also make quick but quality pizza’s as fast as possible keeping up with the orders and the Buffet line. | Education | | ITT TECHNICAL INSTATUTE – Brooklyn Center - BA I am currently a student at ITT Tech working on my BA in Network System Administration, I just finish with my first quarter in the summer and now moving on to the second quarter in the fall, I currently......

Words: 415 - Pages: 2

Itt Tech

...Richard D. Murrell II EN1420 04/07/15 Argument and Violence in Video Games The Violence in Video Games The reason why there are ratings on video games is for the simple fact that the violence can be pushed to the extreme for certain ages. Some kids today can’t tell the difference in violent games so therefore there are age restrictions put on games. An eight year old might play a shooter and kill someone in the game but not fully understand what he or she is actually doing in the game. If they are dead then some children might think in real life that what they just did is okay and alright to do. But that’s not the case is it? My opinion for violence in Video Games is alright. Why am I for it is for the simple fact that it is amusing and can be funny at times If I were to play with a group of buddies of mine we most likely would be having a drink and clowning around having fun with whatever we might be playing just to pass the time. So to me it’s relaxing and I enjoy it for the most part. But to our little brothers and sisters we don’t let them stay in the room just because they are too young to understand what they are looking at and have no knowledge of what they are looking at. That’s exactly why there was a age rating invented so that children under the ages of ten can play games related to them and adults can play with no limits to whatever it may be. The point is that most adults want to be able to play something they can enjoy in their free time......

Words: 523 - Pages: 3

Itt Tech

...When running a Windows program with a batch file, the program will need to finish before starting the next task. To command the computer to wait until the program finishes, the start command used with the /wait switch or /w for short is used. For example to install a DNS Server role the command line input would be start /w ocsetup DNS-Server-Core-Role. 2. To remove a Server role the switch /uninstall is used. The switch is typed at the end of a command line input of the start, /w, ocsetup and then name of the role which is to be removed. For an example, if say the Server role of DHCP was needed to be uninstalled the command line input would be start /w ocsetup DHCPServerCore /uninstall. 3. To start and configure the DHCP Server role once it has been installed two commands will be needed. To configure the service the command to input would be sc config dhcpserver start= auto. This command will bring up the ChangeServiceConfig function for the DHCP Server role. To start the DHCP Server role the command line input would be net start dhcpserver. 4. To configure a DNS zone once a DNS Server role has been installed the command line input to use is dnscmd. The dnscmd command is used in conjunction with the / command followed by the DNS configuration that is to be changed. For example if the DNS server cache need to be cleared the command line input would be ......

Words: 254 - Pages: 2

Itt Tech Lesson 2

...Lesson 2 Installing Microsoft Windows Server 2008 Knowledge Assessment Fill in the Blank Complete the following sentences by writing the correct word or words in the blanks provided. 1. The ability to use the installation process to fix problems with an existing Windows Server system is called ___ _______. 2. Installation of just the necessary components for a particular server role, without the GUI and other software features, is called _________ 3. The ____ ______ screen appears by default when the Windows Server 2008 operating system is first installed. 4. A(n) ___ _____ offers the best performance of any multi-disk configuration option within the Disk Management MMC, but does so at the expense of fault tolerance. 5. The feature that allows users on different computers to access the Internet through a single connection is called___ _______. 6. The ___ _______ provides a single point of administration to configure networking and firewall configuration tasks on a Windows Server 2008 computer. 7. The setting describing the network environment, such as home or public network, is called the ____ ______. 8. Unsolicited inbound traffic can be blocked through the use of the ____ ___. 9. The network location setting controls the behavior of __________. 10. Once a disk is converted from a basic disk to a(n) __ _____, it can only be accessed only by......

Words: 803 - Pages: 4

Ethical Case Study for Nursing Roles 1 @ Itt Tech

...“ It is important for nurses to study the development of nursing theory because without an idea of where you have been, how can you know how, why, when, or where to go “ (Cherry and Jacob, 2014, p.75). Theory leads to research, research leads to science, science leads to practice, and practice then cycles back to theory. New theory emerging from practice will generate new studies that will, in turn, produce new knowledge for practice. All of this contributes to improving nursing practice. It is a very sad situation when nurses and nursing students feel that studying and applying nursing theories is irrelevant and a waste of time. Often nurses and nursing students are not very interested in educating themselves about various nursing theories. They much rather be more concerned about the technical and administrative end of nursing. The scenario with Mary Jane and her coworkers is a very good example of how many nurses show lack of interest in the studying and application of nursing theory. I believe Mary Jane should have responded by telling her coworkers that nursing theory is just as important and vital to nursing practice as anything else you learn in nursing school. She should have asked them if they both would agree that the major aim in nursing is to see your client reach his or her highest attainment of health. Next, she should go on to explain how Imogene King’s theory of goal attainment was beneficial to her and her client. Nursing is highly focused on......

Words: 678 - Pages: 3

Itt Tech

...Uyiosa Ehioghae R-N-M NT1110 Unit 3 Student Study Guide 1. What port type has replaced mini-DIN, COM, LPT, and other port types? USB 2. State the speeds of USB 1.1, 2.0. and 3.0. 12 Mbps; 480 Mbps; 4,800 Mbps. 3. What is the standard IRQ range? Which IRQ is for the keyboard? 0-15. 60-6F. 4. List the maximum cable length for USB 1.1, 2.0, and 3.0. Five meters for 1.1 and 2.0. Three meters for 3.0. 5. How many devices does a USB hub appear as in the Windows device manager? Two devices. A USB root hub, and a PCI-to-USB universal host controller. 6. How can USB ports be added to a computer? Motherboard connectors for USB header cables, hubs, and Add-on cards. 7. Name the two generic hub types. Bus powered and self powered. 8. Which port is as versatile as a parallel port? 1284-B port. 9. What are the two serial port forms? IEEE 1394 (Firewire400), IEEE 1394b (Firewire800). 10. List two of the most common serial cables. Null-modem (data transfer) cable. Modem cable. 11. What hardware resources are required by serial ports? IRQ and I/O port addres. 12. What is one of the most versatile ports and also used for printers? The parallel port, or LPT ( Line Printer) port. 13. What was the most common use for SCSI? Servers and mass storage (hard disk, tape backup). 14. Define daisy-chaining Multiple device......

Words: 706 - Pages: 3

Itt Tech

...Niesha Wright Unit 5 Homework SQLCourse: I got through Deleting Record Answers W3school.com: I got through Combining and & OR Which one do you prefer? Why Over all I like them both, because they educate you on writing codes in different ways, but keeps the same format. SQLCourse allows you to try and answer the questions at the end of the course, while W3school lets you try and write code and gives you corrective answers. Over all I like W3school because it allows more hands on teaching. W3school allows you to create your own code and run it, while providing results. When SQLCourse just gives you the answers to code questions. To me, SQLCourse is more like a study guide. I learn a lot better when I complete my work hands on. And W3school.com makes me feel like I’m really learning. Look up the data types for Oracle. How do they differ from SOL Server’s? Number datatype convert from Oracle to SQL Server | Oracle(source) | SQL Server(target) | number | Float | number([1-38]) | numeric([1-38]) | number([0-38],[1-38]) | numeric([0-38],[1-38]) | float | float | float([1-53]) | float([1-53]) | float([54-126]) | float | binary_float | float | binary_double | float(53) | int | numeric(38) | real | float | Number datatype convert from SQL Server to Oracle | SQL Server(source) | Oracle(target) | bigint | NUMBER(19) | int | NUMBER(10) | smallint | NUMBER(5) | tinyint | NUMBER(3) | bit | NUMBER(3) | numeric |......

Words: 359 - Pages: 2

Itt Tech Ap Case Study

...Unit 4 Case Study 2: Skin Cancer Skin cancer is a rather harsh reality for many people that love soaking up the sun, however genetics and gene mutation may be playing a larger role in the development of carcinomas. Almost everyone has experienced a sunburn from staying out at the beach for too long, or not reapplying the appropriate amount of sunscreen. The damage that UVA and UVB rays can do to the integumentary system in a short period of time can cause life changing effects. Genetic mutations are sometimes caused by outside sources such as UVB rays, and other times linked to hereditary factors. In recent studies, direct links have been found between melanoma and specific hereditary genes that they believe are responsible. A gene is mutated when one or more cells change and create an abnormal protein in response to the change. With what I have learned in previous units about DNA replication, once a gene is replicated, it will continue to replicate its adapted form, this is important because this is how the mutated gene is being replicated at a cellular level. The bad cells are now being copied and replicated. The genetic mutations that pose the greatest risk of developing skin cancer are CDK4 and CDKN2A gene mutations. These two mutations effect the tumor suppressor, and stop the cell from performing its normal job. Gene mutations can be germ-line meaning passed from parent to offspring if they are hereditary. Genes can also be mutated by outside sources such a......

Words: 414 - Pages: 2

Itt Tech

...than Cat 5. If a video extender is made for Cat 5e, using Cat 6 may cause you a problem. The electrical properties are different, and the circuitry inside may not be able to reconcile the increased capacitance. You confirm should with the manufacturer before making a substitute in a Category cable. Jacket What type of jacket does your cable need? You have plenum, riser, PVC/non-plenum and direct burial. Plenum cable is often required in commercial work, especially in buildings where there are open-air returns; it is essential to meeting code. Integrators will often use riser grade at the riser, and then transfer to plenum in the plenum space. This saves some cost, but I recommend you second-guess saving that few cents per foot in most cases. The chances of mixing up a box of cable and pulling riser in the plenum space may increase your liability as a company or cause you to re-pull cable when the inspector fails your install. If you only send plenum to site, you eliminate this possibility When performing a cable installation there are a lot of things that you have to put into consideration. You want to draw up a plan first and some things that you would want to include in the plan would be where your telecommunications rooms are located, What is the distance from your leased line to your core router, and what type of cable are you going to be using for your backbone and horizontal lines. The first thing shouldn’t be cost when you are designing a network. You want to......

Words: 772 - Pages: 4