Unit 3 Assigment 1

In: Computers and Technology

Submitted By renesantiago1
Words 932
Pages 4
Define the following terms:

1. Horizontal Cable : A type of inside cable designed for horizontal use in non-plenum areas. While horizontal cable must be fire retardant, the National Electrical Code (NEC) specifications are not as demanding as those governing the use of plenum cable or riser cable. See also NEC, plenum, plenum cable, and riser cable.

2. Backbone Cable : Backbone cabling is the inter-building and intra-building cable connections in structured cabling between entrance facilities, equipment rooms and telecommunications closets. Backbone cabling consists of the transmission media, main and intermediate cross-connects and terminations at these locations. This system is mostly used in data centers.

3. Patch Cords: a short cord with a plug at each end, or a plug at one end and a pair of clips at the other, used for temporarily connecting two pieces of equipment or signal paths.

4. Connectors: A device for holding two parts of an electrical conductor in contact.

5. Conduit: A tube or duct for enclosing electric wires or cable.

6. Racks: A computer rack (commonly called a rack) is a metal frame used to hold various hardware devices such as servers, hard disk drives, modems and other electronic equipment. Some may refer to a rack as "LAN or network furniture" as resembles a shelving structure where components can be attached vertically, stacked on top of one another. A computer rack can also be called a relay rack or open rack.

7. Punch-Down Blocks: is a type of electrical connection often used in telephony. It is named because the solid copper wires are "punched down" into short open-ended slots which are a type of insulation-displacement connectors. These slots, usually cut crosswise (not lengthwise) across an insulating plastic bar, contain two sharp metal blades which cut through the wire's insulation as it is…...

Similar Documents

Unit 3 Assignment 1

...Short Answer: 1. What two things must you normally specify in a variable declaration? a. variable type b. identifier i. int n; // type - int, identifier - n 2. What value is stored in uninitialized variables? c. is a variable that is declared but is not set to a definite known value before it is used. Algorithm Workbench Review: 3. Write assignment statements that perform the following operations with the variables a, b, and c. d. Adds 2 to a and stores the result in b e. Multiplies b times 4 and stores the result in a f. Divides a by 3.14 and stores the result in b g. Subtracts 8 from b and stores the result in a ii. b = a + 2 iii. a = b * 4 iv. b = a / 3.14 v. a = b - 8 4. Assume the variables result, w, x, y, and z are all Integers, and that w=5, x=4, y=8, and z=2. What value will be stored in result in each of the following statements? h. Set result= x+y i. Set result= z*2 j. Set result=y/x k. Set result=y-z vi. result = x++ - y; vii. Answer -4 viii. result = 4 – 8 = -4 ix. result = ++w + y; x. Answer xi. w = w + 1 = 5 + 1 = 6 xii. result = 6 + 8 = 14 5. Write a pseudo code statement that declares the variable cost so it can hold real numbers. * Declare Real price= 0.00 * Display "the original price." * Input item......

Words: 731 - Pages: 3

Unit 3 Ass 1

...10-11-13 Unit 3. Assign 1 – Ipv6 Addressing a) ARIN –Provides services related to the technical coordination and management of Internet number resources. Supports the operation of the internet through the management of internet number resources and coordinates the development of policies for the management of IP number resources. They provide services for technical coordination and management of internet number resources in its respective service region. This includes IP address space allocation & ASN allocation, transfer and record maintenance. b) IANA – They are responsible for the allocation of globally unique names and numbers that are used in Internet protocols that are published as rfc documents and for coordinating some of the key elements that keep the internet running smoothly. Allocates and maintains unique codes and numbering systems that are used in the technical standards/protocols that drive the internet. This includes Domain names, number resources and Protocol assignments. c) APNIC – An organization that manages the assignment of internet number resources within the Asian continent. Provides number resource allocation and registration services that support the global operation of the Internet. 2. Approximately how many Ipv4 addresses are possible? An IPv4 uses 32 bit IP address and with 32 bits the maximum number of IP addresses is approximately four billion IPv4 addresses 3. Approximately how many IPV6 addresses are possible...

Words: 398 - Pages: 2

Unit 6 Assigment 1

...Michael Wilson| MBA6004 | February 13, 2014 Michael Wilson| MBA6004 | February 13, 2014 Unit 6 Assignment 1 Strategy recommendation Unit 6 Assignment 1 Strategy recommendation Identifying a Business 2 CURRENT USE OF THE WEB _________________________________________________________2 IMPLICATIONS OF THE WEB_________________________________________________________2 ETHICS OF USING THE WEB _________________________________________________________4 CONCLUSION_______________________________________________________________________5 Identifying a Business For my pre-writing strategy recommendation business will be Wal-Mart. As a retail giant, many people use Wal-Mart for many different reasons, such reasons are: grocery shopping, appliance shopping, electronics and other goods offered at the store. With so many ways to peak consumers interest Wal-Mart has to be diversified on how it reaches it consumers. Today Wal-Mart has television commercials, ads in newspapers and on the radio, plus a website for ways they entice consumers to shop at their stores. I chose Wal-Mart because of its vast potential in its use for the internet. Current Use of the Web Wal-Mart’s easy to use website also allows customers to pay their Wal-Mart cards on-line as well as purchase items from its on-line store. Currently Wal-Mart uses the web for inventory, re-ordering items that running low in supply. According to Karpinski (2002), “Wal-Mart mandated that all its suppliers begin to move......

Words: 1331 - Pages: 6

Unit 3 Assignment 1

...Jennifer Schneider – NT 1230 – Client-Server Networking – Unit 3; Assignment 1 IPv6 Addressing 1.) Research the following organizations and explain their involvement with the Internet Public IP Addresses a. American Registry for Internet Numbers: Allocates, transfers and records maintenance of IP addresses as well as reverse DSN. b. Internet Assigned Numbers Authority: Allocates IP addresses from the pools of unallocated addresses to the RIRs according to their needs as described by global policy and to document protocol c. Asia-Pacific Network Information Center: Distributes and maintains IPv6 addresses 2.) Approximately how many IPv4 addresses are possible? There are approximately 4.3 billion IPv4 addresses available. 3.) Approximately how many IPv6 addresses are possible? There are 340,282,366,920,938,463,463,374,607,431,768,211,456 Ipv6 addresses available 4.) Why do you think the world is running out of IPv4 addresses? The internet really started in the 70s as a DARPA research project. At the time, there were 60 or so institutions expected to connect. As the interested research community grew, the addressing scheme was expanded from 8 bits (256 addresses in the predecessor to Internet Protocol (IP) known as Network Control Protocol (NCP)) to 32 bits (the IPv4 addresses we have today). At the time, it was still expected that the internet would serve largely defense, research, and educational institutions. It was essentially a laboratory experiment on a really......

Words: 411 - Pages: 2

Unit 3 Assignment 1

...IS3340-WINDOWS SECURITY | Encryption and BitLocker Activity | Unit 3 Assignment 1 | | | 5/1/2014 | | 1. One of the shop floor computers that is connected to your network is commonly used by the floor manager. You want the floor manager’s files to be encrypted on that computer. Although the floor manager’s documents folder is on a central server, there are some local temporary files that could contain sensitive information and should be encrypted at all times. Which Windows encryption feature would best provide encryption for all of the floor manager’s local files while leaving other users’ files unencrypted? Folder Encryption: EFS 2. The human resource (HR) manager stores a spreadsheet with sensitive personal information on her local workstation. The spreadsheet is the only file with sensitive data and the name of the spreadsheet does not change. Which Windows encryption feature would ensure this one file is always stored on the disk in encrypted format? File Encryption: EFS 3. The chief executive officer (CEO) wants to copy confidential sales projection information from her workstation to her laptop via a universal serial bus (USB) device. What is the best option to ensure the confidential information is secure during the copying process? BitLocker To Go 4. You want to encrypt your main file server’s disk that stores confidential information for several users. Which Windows encryption feature encrypts an entire disk and is not......

Words: 294 - Pages: 2

Unit 1 Assigment 1

...1. Which of the following is true about 1 bit? A. Can represent decimal values 0 through 9 B. Can be used to represent one character in the lowercase English alphabet C. Represents one binary digit D. Represents four binary digits 2. Which of the following terms means approximately 106 bytes? A. Terabyte B. Megabyte C. Gigabyte D. Kilobyte 3. Which answer lists the correct number of bits associated with each term? A. 8 bits per double word B. 32 bits per word C. 64 bits per quadruple word D. 4 bits per byte 4. Which of the following answers are true about random-access memory (RAM) as it is normally used inside a personal computer? (Choose two answers.) A. Used for short-term memory B. Used for long-term memory C. Used to process data D. Connects to the CPU over a bus using a cable E. Is installed onto the motherboard 5. This chapter describes the concepts behind how a CPU reads the contents from RAM. Which of the following is true about the process of read data, as described in the chapter? A. The CPU tells the RAM which address holds the data that the CPU wants to read. B. The CPU reads all RAM sequentially, beginning with the first byte, until it happens to read C. the byte that the CPU wanted to read. D. The smallest unit of data that RAM supplies back to the CPU is 1 bit. E. The CPU must first find the file in the file system before reading the data. 6. A user has......

Words: 1428 - Pages: 6

Unit 3 Assignment 1

...Unit 3 Assignment 1: Compare Windows 8 and Windows RT Course Objectives and Learning Outcomes Identify the characteristics of popular mobile operating systems. Compare mobile operating systems to their related desktop operating systems. Identify the characteristics of Windows Phone. Identify differences and similarities between Windows 8 and Windows Phone 8. Assignment Requirements Research Windows 8 and Windows RT on the Microsoft website and write a paper that discusses the implications of an integrated platform. Required Resources Web browser Windows RT website http://windows.microsoft.com/en-us/windows/rt Submission Requirements Submit a one-page paper that compares Windows 8 and Windows RT. The paper should identify five similarities and five differences between the platforms. You should also discuss how an integrated platform affects users and developers. Which operating system is required for mobile application development? Why? Evaluation Criteria Category | # | Criteria | CONTENT, 90% | 1.1 | The paper should identify 5 similarities between Windows 8 and Windows RT. Up to 20 points for this element | | 1.2 | The paper should identify 5 differences between Windows 8 and Windows RT. Up to 20 points for this element | | 1.3 | The paper should discuss how an integrated platform impacts users. Up to 20 points for this element | | 1.4 | The paper should discuss how an integrated platform impacts developers. Up to 20 points for this......

Words: 283 - Pages: 2

Unit 6. Assigment 1. Cable Testers

...UNIT 6. ASSIGMENT 1. CABLE TESTERS. THE THREE CABLES TESTERS I WOULD PICK IN MY LINE UP WOULD BE THE OPTICAL LOSS TEST SET AND TEST KIT, THE TDR, AND THE TONE GENERATORS. THE OPTICAL LOSS TEST SET AND KITS WORKS MORE SO IN A LAB BASED SET UP THEN OUT ON THE FIELD BUT THE TEST KITS IS MORE FAVORABLE BY FIBER TECHS BECAUSE IT HAS A POWER METER AND LIGHT SOURCE THAT ARE MADE TO WORK TOGETHER. THE TDR (TIME DOMAIN REFLECTOR) IS A TOOL THAT IS USED BE SENDING A TONE OR / BEAM OF LIGHT (WITH A DATA ON IT SOME TIMES) AND WILL MEASURE HOW LONG IT TOOK FOR THAT TONE TO REACH THE DESTINE PLACE AND OR BACK TO THE SENDER FROM WHICH IT CAME. AND DEPENDING ON HOW LONG IT TAKES TO COME BACK (IF IT EVER DOES) WILL USUALLY LET YOU KNOW WHERE YOUR FAULT IS IN TYOU NETWORK CABLING THE TONE GENERATOR IS USED BY GENERATING A CERATIN TONE ALONG THE CABLING TO LET YOU KNOW WHERE EXACTLY YOU INCOSISTANCIES ARE WITH IN THAT SPECIFIC CABLE. THE OPTICAL LOSS TEST SET AND TEST KITS WILL SEEM TO WORK BEST WITH FIBER BASED LAYOUT, THE TIME DEFLECTIVE DOMAIN WILL WORK BEST ON THICKNET CABLING SET UPS AND THE TONE GENERATOR WILL WORK BEST ON COPPER/COAXIL LIKE SET UPS. THE TWO TESTER I THINK SHOULD BE IN EVER TECHS INSTALL KITS WILL BE THE TDR AND THE OPTICAL LOSS TEST SET AND TEST KITS THE REASON WHY IS THAT BOTH OF THESE TESTERS CAN SEND TESTING SIGNALS DOWN A CABLE THAT GOES IN OR THRU WALL OR TIGHT SPACES THAT THE HUMAN HAND CANT REACH NOT THE EYE CAN SEE, ALSO MOST OF THESE TESTERS WILL GIVE......

Words: 312 - Pages: 2

Unit 3 Assignment 1

...Unit 3 Assignment 1: Networking Models Review 1. Which of the following is true about a TCP/IP network? 2. Which of the following terms is not a common synonym for TCP/IP model? (Choose two answers.) A.D. 3. Think generically about the idea of a networking standard, ignoring any particular standard or standards group. Which of the following is typically true of a standard? (Choose two answers.) B.C. 4. Contrast an international standard as compared to a de facto standard. (Choose two answers.) A.D. 5. Which of the following are true about the commonly used version of the TCP/IP model as shown in this chapter? (Choose two answers.) A.C. 6. The TCP/IP model refers to standards other than those the IETF defines in RFCs. Which of these standards groups is typically the source of external LAN standards? (Choose two answers.) B.D. 7. Which of the following is not a typical reason for a group of ten companies to start a vendor group, for the purpose of pushing a new networking technology? C. 8. The TCP/IP and OSI models have some obvious differences, like the number of layers. Think about the more commonly used version of the TCP/IP model discussed in this chapter, and then think about how to talk about TCP/IP using OSI terms. Which of the following is a correctly phrased statement for how to use OSI terminology? B. 9. Historically, which of the following models were the earliest models used in corporate networks? A. 10. Which of the......

Words: 592 - Pages: 3

Unit 1 Task 3

...'doing' for example 'being' drunk in charge of a vehicle (Duck v Peacock 1949) or 'being' an illegal alien (R v Larsonneur 1933). Occasionally an omission can amount to the actus reus of a crime. The general rule regarding omissions is that there is no liability for a failure to act for example if you see a child drowning in shallow water and you don't do anything to save that child you will not incur criminal liability for your inaction no matter how easy it may have been for you to save the child's life. This general rule however, is subject to exceptions like these: 1. Statutory duty: In some situations there is a statutory duty to act for example to provide details of insurance after a traffic accident or to notify DVLA when you sell a vehicle. 2. Contractual duty: If a person owes a contractual duty to act, then a failure to meet this contractual duty may result in criminal liability: R v Pittwood (1902) 3. Duty imposed by law: The actus reus can be committed by an omission where there exists a duty imposed by law. There are three situations in which a duty may be imposed by law. These are where the defendant creates a dangerous situation, where there has been a voluntary assumption of responsibility and misconduct in a public office. Additionally an omission may be classified as part of a continuing act. Creating a dangerous situation and failing to put it right: R v Miller (1983) Second element is the Mens rea which translates as 'to have in mind’ from Latin. It......

Words: 2256 - Pages: 10

Unit 3 Assignment 1

...October 1, 2014 NT2580 Unit 3 Assignment 1 There are three key parts I will have to take into account while designing a Remote Access Control Policy for Richman Investments. These three parts (Identification, Authentication and Authorization) will not be all for the Remote Access Control Policy, I will need to include the appropriate access controls for systems, applications and data access. I will also need to include my justification for using the selected access controls for systems, applications and data access. The first part I need to implement for this Remote Access Control Policy is Identification, which is defined in this sense as: physical keys or cards, smart cards, and other physical devices that might be used to gain access to something. What needs to be done for the Remote Access Control Policy is a group member policy needs to be setup which uniquely identifies each user. Users should be identified by rank with higher ranking users requiring more authentications. Each individual user should be assigned to a group based on rank with special permissions. Using this system for Identification will make our company more secure in day to day operations. The second part I need to implement for this remote access control policy is Authentication, which is defined as: what you know or passwords, numeric keys, PIN numbers, secret questions and answers. For remote access, there must be proof that the person is who they say they are every time they attempt to......

Words: 364 - Pages: 2

Unit 3 Assignment 1

...October 1, 2014 NT2580 Unit 3 Assignment 1 There are three key parts I will have to take into account while designing a Remote Access Control Policy for Richman Investments. These three parts (Identification, Authentication and Authorization) will not be all for the Remote Access Control Policy, I will need to include the appropriate access controls for systems, applications and data access. I will also need to include my justification for using the selected access controls for systems, applications and data access. The first part I need to implement for this Remote Access Control Policy is Identification, which is defined in this sense as: physical keys or cards, smart cards, and other physical devices that might be used to gain access to something. What needs to be done for the Remote Access Control Policy is a group member policy needs to be setup which uniquely identifies each user. Users should be identified by rank with higher ranking users requiring more authentications. Each individual user should be assigned to a group based on rank with special permissions. Using this system for Identification will make our company more secure in day to day operations. The second part I need to implement for this remote access control policy is Authentication, which is defined as: what you know or passwords, numeric keys, PIN numbers, secret questions and answers. For remote access, there must be proof that the person is who they say they are every time they attempt to......

Words: 364 - Pages: 2

Unit 3 Assignment 1

...Craig Roxbury Unit 3 Assignment 1 Erica Lanier Video Summary 1 In video 1.07 the lesson is on ports and connectors. There are three different types of ports, those are serial port, parallel port and game port. The serial port is usually male and have 9 or 25 pins. The parallel port is usually female and has 25 pins. The game ports are female and have 15 pins. All of those ports have been replaced by USB ports. The video also discusses how the modem connects to a phone line and converts digital to analog. It explains there are two types of SCSI narrow and wide SCSI, the narrow SCSI has 50 pins and the wide has 68 pins. Video 1.09 teaches that there are two types of monitors, you have CRT and LCD. CRT stands for cathode ray tube and LCD stands for liquid crystal display. The CRT is similar to an old television and the LCD uses thin film transistors and the back lighting is through polarized panels. Your specifications of a monitor include screen size, contrast ratio, refresh rate, response time, interfacing, dot pitchand pixel pitch. Video 1.11 focuses on types of printers and the types of problems that come with each. There is the Dot Matrix, Ink Jet and the laser printers. Overall the videos covered your computer basics and the parts that make it productive. I could comprehend the objective of the videos but they all covered a plethora of information in a matter of minutes, so I feel there was a lot that I missed. Fortunately what I did not catch in the video......

Words: 322 - Pages: 2

Unit 3. Assignment 1

...Unit 3. Assignment 1. IPv6 Addressing 1. Research the following organizations and explain their involvement with the Internet public IP addresses a. American Registry for Internet Numbers (ARIN) ARIN, a nonprofit member-based organization, supports the operation of the Internet through the management of Internet number resources throughout its service region; coordinates the development of policies by the community for the management of Internet Protocol number resources; and advances the Internet through informational outreach. IP address space allocation, transfer, and record maintenance http://www.arin.net/about_us/overview.html b. Internet Assigned Numbers Authority (IANA) IANA is responsible for global coordination of the Internet Protocol addressing systems, as well as the Autonomous System Numbers used for routing Internet traffic. http://www.iana.org/numbers c. Asia-Pacific Network Information Center (APNIC) The Asia Pacific Network Information Centre (APNIC) is an organization that manages the assignment of Internet number recourses within the Asian continent. APNIC sets the rules, regulations and standards that all designated organizations must abide by and implement. End-user organizations and Internet service providers take direction from Regional Internet Registries (RIRs) like APNIC to provide Internet resources within certain regions. The Internet number resources include antonymous system numbers as well as IP addresses that assist in clearly......

Words: 577 - Pages: 3

Unit 3 Pass 1

...Unit 3: Introduction to Marketing Pass 1 Marketing is the activities of a company associated with buying and selling a product or service. It includes advertising, selling and delivering products to people. People who work in marketing departments of companies try to get the attention of target audiences by using slogans, packaging design, celebrity endorsements and general media exposure. The four 'Ps' of marketing are product, place, price and promotion. Mini cooper It is determined that Mini’s marketing strategy has shifted in terms of targeting and brand positioning. As previously it was an affordable iconic British car, now it has become a cool luxury car dominantly for a young segment. Its international marketing strategy is differentiated in a way that a brand is built up on the historical iconic image of Mini for the UK and associated market. The business strategy of the mini is based on having a powerful brand image. This strategy forms the foundation of the success of the mini Group. Mini believes in maintain core values as technology, innovation, performance, quality, reliability, exclusivity and customer satisfaction. The company slogans of mini in English i.e. “The Ultimate Driving Machine” and “Sheer Driving Pleasure” give us an overview of the marketing strategy it adopts. The strategy of mini is clearly defined on the homepage of the company i.e. “Identify potential and encouraging growth. Knowing what we represent. Recognizing where our strengths lie and......

Words: 3865 - Pages: 16