1210 Lab2.2

In: Computers and Technology

Submitted By davidratliff71
Words 437
Pages 2
UNIT 2
2.1.1
All are essential for connecting networks successfully
■ Media: This is the physical structure on which the signal will transmit (in wireless networks, this is
The open air). ■ Interface: This is the means by which the computer can access the media. ■ Signal: This is the means of transmission of information, such as electrical signals on copper wire. ■ Pattern: This is the established format for the signals to be interpreted by the computing device; a
Protocol is a more complex pattern that houses the individual bit patterns. ■ Timing: This is the established synchronization between the communicating devices so that each
Knows precisely when a pattern starts and ends.
2.1.2
A network allows sharing of files, data, and other types of information giving authorized users may access information stored on other computers on the network. A network allows sharing of network and computing resources.
2.1.3
Nothing I could not get it to open
2.1.4
Because crossover cables are older technoligy and not useed very often. Wireless is the way to go
2.1.5
Ittesi and unknown
2.2.1
Having a single printer for that many workers could cause delays especialy if there is maintenance being performed on the printer. It would cost 6600 for individual printers, it would be more cost effective to buy 3 total 500 printers for a total of 1500 every 10 people could havea printer

2.2.2
That’s a total of 660 pages per hour . if a total of 3 printers are shared that should be sufficient
2.2.3
When I went to where the lesson directed I saw I could access any letter drive but when I clicked the browse button the ok button would not highlight no matter what I selected
2.2.4
1. .You can run into drive letter collisions. 2. there might be too many commonly-used network shares to assign drive letters to all of them, and in a large organization, not everyone…...

Similar Documents

Nt 1210

...NT-1210 Unit Name Lab l Labs Date 1-l Reading Binary Convert the following decimal numbers to binary equivalents: 89 1011001 776 10110000 Convert the following Binary values to their decimal equivalent: 101_0100L 169 11101010 234 Lab 1-2 Binary Math and Logic Draw the graphical symbol Explain the logical operations (give a truth table) for each: AND OR NOT Lab 1.3 Bit and Byte Structure - (see page 15 of lab manual) How many bits are in a byte? 8 1 Kilobyte is equal to: 1024 55,296 23,552 bytes Kilobytes Megabytes Terabytes 54 Megabyte is equalto: 23 Gigabyte is equalto: 5 Terabyte is equal to 5,120 120MB = 16GB= 125,829,120 16,384 bytes MBytes Lab 1.4 ASCII (See page 20 of Lab manual) 1. Decode the simple numerical sentences into one English paragraph. You may use Google to find an ASCII table. Use the keywords-Binary to text conversion; Hexadecimatto text conversion; ASGllto text conversion-to aid the decoding process: Code"Tvoe ASC llcodes Numeric Message 87 101 1 08 1 08 44 32 116 104 97 116 32 109 97 107 101 115 32 111 117 114 32 49 48 32 110 117 109 98 101 114 32 100 101 99 105 109 97'108 3247 3297 115 99 105 10532115121115116 101 '10932 106 117 11511632114105103104 11633148 Translation Well, that makes our 10 number decimal / ASCII system just right! Lab 1.5 Creating a File System Follow the procedures outlined in the Lab Manual on pages 231o27......

Words: 918 - Pages: 4

Nt 1210 Lab 1.1

...NT1210 LAB 1.1 1.1.1 2931 103 102 101 100 1000 100 10 1 2 9 3 1 ___________________ 2000 + 900 + 30 + 1 = 2931 1.1.2 1102 22 21 20 4 2 1 1 1 0 ________________ 4 + 2 + 0 = 6 1.1.3 112 21 20 2 1 1 1 __________ 2 + 1 = 3 1.1.4 Exercise 1.1.4:   Create an expanded mapping for binary number 10010 subscript 2.      2^7 | 2^6 | 2^5 | 2^4 | 2^3 | 2^2 | 2^1 | 2^0 | 128 | 64 | 32 |   16 | 8 | 4 | 2 | 1 | x | x | x | x | x | x | x | x | 0 | 0 | 0 | 1 | 0 | 0 |     1 | = 18 = 18 0 | 0 | 0 | 0 | 16 + |   0 + |     0 + | 2 + | 0 | Exercise 1.1.5:   Create an expanded mapping for the binary number 11100010 subscript 2. 2^7 |...

Words: 484 - Pages: 2

Nt 1210 Presention

...NT1210 Introduction to Networking Introduction to Computer Networking 1 Objectives  Identify the major needs and stakeholders for computer networks and network applications.  Identify the classifications of networks and how they are applied to various types of enterprises.  Explain the functionality and use of typical network protocols.  Use preferred techniques and necessary tools to troubleshoot common network problems. 2 Objectives  Define a computer network.  Identify the primary needs for computer networks and network applications.  Draw the four major physical network topologies: bus, star, ring, and mesh. 3 Computer Networking  Use large variety of components that must work together.  Move bits from one device to another.  Bit: Smallest unit of data, binary 1 or 0.  Focuses on copying bits on one device to another.  Computing devices include computers, gaming systems, televisions, phones, tablets, GPS navigation systems, watches, etc. 4 Defining a Network with User Applications  Examples: Digital advertising, online/video games, text messages, websites, social media, and email.  Network diagrams often use cloud to identify what part of network to ignore for a particular discussion.  LAN vs WAN 5 Defining a Network with User Applications Computer Networks: Cloud Representing Hidden Parts of the Network 6 Figure 2-1 An Informal General Definition of a Computer Network  Telecom: Short for telephone......

Words: 4305 - Pages: 18

Nt 1210

...ITT Technical Institute NT1210 Introduction to Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to......

Words: 4400 - Pages: 18

Nt 1210 Chapter 2 Vocab

...Richard Rowe (17400103) July 1, 2014 NT 1210 Prof. Williams Chapter 2 Vocabulary Computer networking – The gerund form of the term computer network. Computer network - A combination of many components that work together so that many different devices can communicate. Application – generally, a function on any kind of computer or electronic device that is useful to the user, which can give the user a reason to want to own and use the device. Email – An application in which the user can type, text and attach other files to create the electronic equivalent of a postal letter. Voice mail – A more modern term for a telephone call that does not use the word telephone. Voice frame – A grid of pixel locations of chosen width by height that contains the lights/colors to be shown in a video at single point in time. Web server – Literally, software that stores web pages and web objects, listens for requests for those pages, and send the contents of those pages/objects to clients. Web browser – literally, software controlled directly by a user that requests web pages from a web server, and after receiving a page, displays the web page in a window. Web address – text that identifies details about one object in a network so that a client can request that object from a server. Web page – in a web browser, all the text, images, video, and sound that fill the window of the browser when the user opens a link to some web address. Protocol –a set rules that different devices......

Words: 479 - Pages: 2

Music 1210 Essay

...Hixenbaugh 1 Kyle Hixenbaugh English 1510 Professor Drew April 25,2013 Personal Essay The piece that I will compare my life to is “Serving in Florida.” This piece is about a woman named Barbara Ehrenreich, who moves to Florida to work unglamorous jobs as a type of “experiment.” Barbra meets very many people and starts to understand the struggles within working low-waged jobs .Although Barbara wasn’t forced to work these jobs, she funds the readers with a great backround of the jobs that she works. In this piece, I will compare my experiences within working low-waged jobs and share my relationships that I have made within these jobs. Working low-waged jobs isn’t a career someone should ever aim for in life. Low-waged jobs can be great for a short term or summer job, but I don’t recommend this as a career. I have worked at three low-waged jobs throughout my lifetime. The most unglamorous, was working in the fast food industry. While working at Wendy’s, I witnessed theft, drug use, and many other different types of crimes. As a minor working under these conditions, I learned that I wanted to make something of myself, and didn’t want to be a worker under these conditions anymore. Unlike Barbara, I was actually working these jobs to maintain my bills. Working these jobs wasn’t an “experiment” for me, it was a short term job to raise money before I went off to college. Working at Wendy’s really broadened my perspective about making myself successful. After walking in on...

Words: 1756 - Pages: 8

Nt 1210

...Play in a WAN APPLY Activity 2: Lab 7.2: WAN Connections Estimated Time: 25 minutes Exploring the Use of Leased Lines and Multiplexing APPLY Activity 3: Lab 7.3 Communication Paths Estimated Time: 15 minutes Exploring Linux and Linux Networking Commands APPLY Activity 4: Lab 2.5 Linux man Pages Estimated Time: 30 minutes APPLY Activity 5: Lab 7.4 Linux Networking Estimated Time: 20 minutes Lesson Plan Week 7 In-Class Activities * Lab 7.1 Review, Question 1, Page 136 * Lab 7.2 Review, Question 1, Page 140 * Lab 7.3 Review, Question 1, Page 143 * Lab 7.4 Review, Question 1, Page 146 Materials Needed: * Weekly printouts of each students’ Dashboard/grade report * Sign-in sheets for both NT 1210 sections * Tutor Request Forms Procedures: * Students that attend NT1210 during a schedules time are to work in the presence of the NT1210 facilitator * Facilitator will go over the student’s grade report and assignments that are due this week * Facilitator will check off assignments that students submit in class * Facilitator will get the student’s commitment regarding when they will submit any remaining assignments for the week, and write that date on the grade report for follow-up * Students that do not attend NT1210 section are to be called by the Facilitator * If the student is current with their assignments and maintaining a passing grade they can be marked present * If the......

Words: 799 - Pages: 4

Nt 1210

...NT 1210 Lab 3.1.1, 3.2.1, 3.3.1 The Purpose of Reference Models Exercise 3.1.1 What would happen if wireless devices were not governed by the Wi-Fi Alliance and each vendor had its own standards and protocols? What impact would this have on your personal life or business communications? The process of marketing the wireless devices would be much slower than if the Wi-Fi Alliance wasn’t governing them. This would impact my personal life or business communications in a big way. The reason is Wi-Fi Alliance certifies the products through pre-standard rules thus insuring the speed of product market and quality. The OSI Reference Model Exercise 3.2.1 Define each layer of the OSI Model and state what each layer provides. Physical – transmission and reception of the unstructured raw bit stream over a physical medium. Carries signals for higher layers and describes the electrical /optical , mechanical and functional interfaces. Data link – Error free transfer of data frames from node to node over the physical layer , allowing the higher layers to assume virtually error –free transmission over the link. Network - is the third layer, which controls the subnet operation by deciding which physical path data should take based on network conditions and priority of service with other factors. Transport - is the fourth layer, which ensures the error-free delivery of messages in sequence and with no losses or duplications. Higher layer protocols are relieved from concerns with......

Words: 473 - Pages: 2

Nt 1210

...Casey Alexander Unit 2 Assignment 2 Multiple choice 1) C 11) A 2) B 12) A, D 3) B, D 13) B 4) C, D 14) C 5) A 15) A, D 6) D 16)D 7) C 17)D 8) C 18)D 9) A, C, D 19) A 10) C, D 20) B Key terms 1) Computer networking – A combination of many components that work together so that many different devices can communicate. 2) Computer network - A combination of many components that work together so that many different devices can communicate. 3) Application – Software that performs some useful function for a user. 4) Email - Electronic mail. An application in which the user can type text and attach other files to create the electronic equivalent of a postal letter, and send the email to another person using his or her email address. 5) Voice call – A more modern term for a telephone call that emphasizes the fact that the traffic flows between the endpoints is voice. 6) Video frame – A grid of pixel locations of a chosen width by height that contains the light/colors......

Words: 402 - Pages: 2

Nt 1210

...1. Which of the following terms is the closest synonym to the term computer networking? a. Telecom b. Protocol c. Datacom d. Stuff 2. Ann uses her email address, me@here.com, to send an email to Bob, whose email address is you@there.com. The message contains a few paragraphs of text. Which of the following will be important to the process of making sure that Bob receives this email? a. Ann’s incoming email server b. Bob’s incoming email server c. Bob’s outgoing email server d. Ann’s compression algorithm e. The A/D converter near Ann 3. According to this chapter, which of the following concepts happens in a modern-day, end-to-end voice call between two business telephones sitting in the same office building in the United States? (Choose two answers.) a. The call uses only analog electrical signals. b. The call uses only digital electrical signals. c. The call uses both analog and digital electrical signals. d. The call represents short sounds as a unique set of bits. e. The call represents each spoken word as a unique set of bits. 4. According to this chapter, which of the following concepts happens in a modern-day, end-to-end voice call between two home telephones in the United States? (Choose two answers.) a. The call uses only analog electrical signals. b. The call uses only digital electrical signals. c. The call uses both analog and digital electrical signals. d. The call represents short......

Words: 1376 - Pages: 6

Nt 1210 Introduction to Networking

...John Holbrook Step by Step Installation of a Secure Linux Web, DNS and Mail Server Feb 10, 2004 GIAC GSEC Practical – Version 1.4b, Option 1 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46. 1 Table of Contents Abstract................................. Introduction.........................................................................................................................4 Current Setup..................................................................................................................4 Reasons for new install ..................................................................................................4 Sudo...............................................................................................................................5 Security Comparison of Redhat 9.0 and Openna 1.0..........................................................7 Default Installed Services...............................................................................................7 Configuration Notes............................................................................................................8 The New Setup...............................................................................................................8 Layers of Protection........................................................................................................9 Verifying Integrity of Downloaded Files.................................

Words: 16169 - Pages: 65

Nt 1210

...Emmanuel Reyes NT 1210 S. 8:00-12:55 Unit 2 Lab 6.3: 1) SSID can be more diverse be unique to the users of the network 2) ASUS RT-AC68U, the LAN and Wireless 2.4 GHz MAC Addresses are the same because is the same device providing hard-line and wireless internet connection. The IP Address is 192.168.1.1. IP Range of 192.168.1.2 – 192.168.1.255. 3) Firmware updates help keep the device running with the latest software needed. Restoring to defaults/loading settings help re-acquire in case something happens to the router. 4) Reyes Home Network Guest. You can add security to sign on to the guest network. You increase the number of wireless networks found within range of the router. 2.1: 1) Media is needed for the signal to pass on, Interface is needed to connect media and access the signal, Signal is what is transported on the media, Pattern is used so signals can be recognized, Timing helps determine the patterns and thus the signal being passed. Without any one of these, the signal will not get to the destination and a link will not occur. 2) Plug and Play, Device Discovery, Driver Updates 3) I cannot add programs by searching on my laptop 4) Peer-to-peer devices allow like devices to communicate without special hardware. 5) Local Area Network, Wireless, Bluetooth 2.1 Review: 1) Network devices can operate through the network and by more than one computer, peripheral devices may be internal or external, but must be connected to a computer with the proper cables. ...

Words: 569 - Pages: 3

Nt 1210 Unit 9 Exercise

...Unit 9. Exercise 1. Print Server Assignment Requirements Respond to the following email: -- FROM: Rebop Pakulah, Acme Engineering Company RE: Printers are multiplying like rabbits. Hello most esteemed US computer guru, Thank you for setting up our branch office in the US. However, our data center has a problem. It seems that everyone there is in love with Office Depot and has a printer on their desk. We employ 150 people. This is too many printers. The ink is so expensive. I hear many people come in of Saturdays and print baseball schedules, shopping list, and photos of their family. What can you suggest to help me? Thank you! From: AA To Rebop Pakulah Hello Rebop; glad to hear your company has increased in employees and volume. Rebop I cannot believe almost every user in cubicle has their own printer. This must stagnate your network, not to mention office expenses for toner and repair calls. Here is what I am suggesting for your 150 employees; you should have 3 multipurpose printers HP4555mfp printers. Then perhaps keep about 10 small HP printers that may belong to your admin staff, such as HR, Recievers, accounts payable team, and those employees that use a printer for 75% percent of their duties. All of these printers would be added to the network server, the subnet, gateway, and IP would be assigned to each printer. After that rules can be added to these printers, such as standard settings, if a user needed to use a portrait printer......

Words: 319 - Pages: 2

Nt 1210 Unit 1 Assignment

...Unit 1 assignment 1. C 2. All of them are wrong the smallest measurement in the answers is a kilobyte and that is actually 1024 bytes not 106. 3. C 4. A,E 5. A 6. C 7. D 8. A 9. A,B,D 10. A 11. A 12. B,D 13. A,C 14. A,D 15. A 16. D 17. B 18. C 19. C,D 20. A,B Lab 1.1 Exercise 1.1.1 103 > 1000 x 2 = 2000 102 > 100 x 9 = 900 101 > 10 x 3 = 30 100 > 1 x 1 = 1 2931 Exercise 1.1.2 22 > 4 x 1 = 4 21 > 2 x 1 = 2 20 > 1 x 0 = 0 4+2+0= 6 Exercise 1.1.3 21 > 2 x 1 =2 20 > 1 x 1= 1 2+1= 3 Exercise 1.1.4 24 > 16 x 1 = 16 23 > 8 x 0 = 0 22 > 4 x 0 = 0 21 > 2 x 1 = 2 20 > 1 x 0 = 0 16+0+0+2+0=18 Exercise 1.1.5 11100010 27 > 128 x 1 = 128 26 > 64 x 1 = 64 25 > 32 x 1 = 32 24 > 16 x 0 = 0 23 > 8 x 0 = 0 22 > 4 x 0 = 0 21 > 2 x 1 = 2 20 > 1 x 0 = 0 128+64+32+0+0+0+2+0=226 > Exercise 1.1.6 156 156 > 27 > 128 x 1 = 128/ 156-128= 28 28 > 26 > 64 x 0 = 0 28 > 25 > 32 x 0 =0 28 > 24 > 16 x 1 = 16/ 28-16=12 12 > 23 > 8 x 1 = 8/ 12-8=4 4 > 22 > 4 x 1 = 4/ 4-4=0 0 > 21 > 2 x 0 = 0 0 > 20 > 1 x 0 =0 100111002 = 156 Exercise 1.1.7 255 255 > 27 > 128 x 1 = 128/ 255-128=127 127 > 26 > 64 x 1 = 64/ 127-64=63 63 > 25 > 32 x 1 = 32/ 63-32=31 31 > 24 > 16 x 1 = 16/ 31-16=15 15 > 23 > 8 x 1 = 8/ 15-8=7 7 > 22 > 4 x 1 =......

Words: 2960 - Pages: 12

Nt 1210 Definitions

...Jason Tester 08/10/2015 NT1210 Introduction to Networking Switched circuit —A circuit created by the phone company in reaction to signaling (the user tapping telephone keys or a modem sending in the same digits), with the telco tearing down the circuit when the user is finished. Dedicated circuit —An electrical circuit created by a telco on behalf of a customer, with the circuit staying up all the time, dedicated for use by the one customer that ordered the circuit. Also known as a leased line, leased circuit, and point-to-point line. Circuit switching —The overall process by which a series of telco devices called circuit switches connect a circuit from one customer device to the other, with the device’s logic taking incoming bits on one segment in the link and forwarding those bits out the matching outgoing segment, without storing the bits. Packet Switching- The process of forwarding customer data in a WAN by looking at the header of the messages sent into the WAN by customer and making a per-message (per-packet) decision as to where to forward each message. Leased Line - is a dedicated telephone connection between two points that is set up for a company or other organization by a telecommunications common carrier. Time Division Multiplexing – a technique for transmitting two or more signals over the same telephone line, radio channel, or other medium. Each signal is sent as a series of pulses or packets, which are interleaved with those of the other signal or...

Words: 381 - Pages: 2

Thám Tử Lừng Danh Conan chap 61 | Deine Märchenwelt - Märchen, Geschichten Sagen | Selfie Games [TV]: Group Draw and Guess Party Game 1.0.1