Lab 2.4

In: Computers and Technology

Submitted By smoynihan
Words 370
Pages 2
Steven Moynihan
PT1420
LAB 6
July 21, 2014

6.1
Declare integer mobileProvider = 0
Declare integer dataOption = 0
Declare Boolean dataPackage = True

Module inputOptions( Ref Integer mobileProvider, Ref Integer dataOption, Ref Boolean dataPackage)
Display “Enter 1 for ATT, 2 for SPRINT, 3 for VERIZON”
Input mobileProvider

Display “ Enter 1 if you want a data package, OR 2 if you do not”
Input dataOption

If dataOption = 1 then dataPackage = True else dataPackage = FALSE

end module

Module displayProvider (Ref integer mobileProvider)
Case = mobileProvider
Case1
Display “ You Selected ATT “
Case2
Display “ You Selected SPRINT”
Case3
Display “ You Selected VERIZON”
Case Else
Display “ You Didn’t Select A Valid Option“

End module
Module userDisplay (byVal mobileProvider, byVal Boolean dataPackage)
If mobileProvider = 1 and dataPackage = True then
Display “ You Have Selected ATT With A Data Package”
If mobileProvider = 2 and dataPackage = True Then
Display “ You Have Selected SPRINT With A Data Package”

Else if mobileProvider =3 and dataPackage = false then
Display “ You Have Selected VERIZON And No dataPackage”

End module

6.3
Module Module1

Sub Main() Dim mobileProvider As Integer = 0 Dim dataOption As Integer = 0 Dim dataPackage As Boolean = True

inputOptions(mobileProvider, dataOption, dataPackage) displayProvider(mobileProvider) userDisplay(mobileProvider, dataPackage) Console.ReadLine()

End Sub Sub inputOptions(ByRef mobileProvider As Integer, ByRef dataOption As Integer, ByRef dataPackage As Boolean) Console.WriteLine(" Enter 1 For ATT, 2 For SPRINT Or 3 For VERIZON ") mobileProvider = Console.ReadLine()

Console.WriteLine(" Enter 1 If You Would Like A Data Package Or 2 If You Decline A Data Package") dataOption = Console.ReadLine()

If dataOption…...

Similar Documents

Labs

...POINT LISAS CAMPUS Esperanza Road, Brechin Castle, Couva www.utt.edu.tt LAB 1 Decomposition reaction Aim: Determination of the number of moles of water molecules of crystallization present in hydrated Magnesium Sulphate (MgSO4.xH2O) Apparatus: Mass balance, test tube, test tube holder, heat-proof mat and bunsen burner. Reagents: Hydrated sodium carbonate. Theory: Chemical decomposition, analysis or breakdown is the separation of a chemical compound into elements or simple compounds. A more specific type of decomposition is thermal decomposition or thermolysis, which is caused by heat. ABA+B, the reaction is endothermic, since heat is required to break the chemical bonds. Most decomposition reaction require energy either in the form of heat, light or electricity. Absorption of energy causes the breaking of the bonds present in the reacting substance which decomposes to give the product. When a hydrated salt is heated it decomposes into a pure form of the salt and water. MgSO4.xH2O MgSO4 + H2O Procedure: Refer to Handout Results: A. Mass of test tube/g = 21.77 B. Mass of the tube and salt/g = 24.0 A table showing the mass of the test tube and salt after 3 consecutive heating: Heating | Mass of the test tube and salt/g | 1st | 23.96 | 2nd | 23.81 | 3rd | 23.81 | Calculations: G. Mass of anhydrous magnesium sulphate/g = F - A = 23.81 – 21.77= 2.04 H. Mass of water of crystallization......

Words: 2572 - Pages: 11

Labs

...and Code of Conduct Preface LAB #1 ix vii Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Introduction Deliverables Hands-On Steps 1 1 3 14 15 2 Learning Objectives 1 Evaluation Criteria and Rubrics LAB #1 AssessmeNt WoRksheet LAB #2 Perform a Vulnerability Assessment scan Using Nessus Introduction Deliverables Hands-On Steps 19 19 21 31 32 20 Learning Objectives 19 Evaluation Criteria and Rubrics LAB #2 AssessmeNt WoRksheet LAB #3 enable Windows Active Directory and User Access Controls Introduction Deliverables Hands-On Steps 35 35 37 49 50 36 Learning Objectives 35 Evaluation Criteria and Rubrics LAB #3 AssessmeNt WoRksheet LAB #4 Configure Group Policy objects and microsoft® Baseline security Analyzer (mBsA) Introduction Deliverables Hands-On Steps 53 53 55 63 64 54 Learning Objectives 53 Evaluation Criteria and Rubrics LAB #4 AssessmeNt WoRksheet iii 38351_FMxx_Pass4.indd 3 23/04/13 5:13 AM iv Contents LAB #5 Perform Protocol Capture and Analysis Using Wireshark and NetWitness Investigator 67 Introduction Deliverables Hands-On Steps 67 67 69 80 81 68 Learning Objectives Evaluation Criteria and Rubrics LAB #5 AssessmeNt WoRksheet LAB #6 Perform Business Continuity Implementation Planning Introduction Deliverables Hands-On Steps 85 85 86 87 90 91 Learning Objectives and Outcomes 85 Evaluation Criteria and Rubrics LAB #6 AssessmeNt WoRksheet LAB #7 Relate Windows......

Words: 26285 - Pages: 106

Labs

...36 LAB #3 | Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) LAB #3 – ASSESSMENT WORKSHEET Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Course Name and Number: Student Name: Instructor Name: Lab Due Date: Overview In this lab, you used the Zenmap Graphical User Interface (GUI) for the free Nmap Security Scanner application to perform network discovery and security scans. After the initial IP network reconnaissance task, you identified the IP hosts, servers, operating systems, and applications. You identified the risks, threats, and vulnerabilities within the IT infrastructure. This utility is essential for information systems security practitioners to perform routine tasks, such as taking network inventory, managing service upgrade schedules, and monitoring host or service uptime. Lab Assessment Questions & Answers 1. What interfaces on LAN Switch 1 and LAN Switch 2 are configured with Telnet, and which interfaces are configured with SSH for remote terminal connectivity? Assessment Worksheet 2. Explain both the information systems security practitioner and hacker perspectives of using a security 37 scanning application such as Zenmap GUI (Nmap). 3. How many tests did your Intense Scan definition perform? List them all after reviewing the scan report. 4. Describe what each of these tests displays within the Zenmap GUI (Nmap) scan report. 3 Network Discovery and Reconnaissance Probing Using......

Words: 303 - Pages: 2

Lab Manual

...and Code of Conduct Preface LAB #1 ix vii Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Introduction Deliverables Hands-On Steps 1 1 3 14 15 2 Learning Objectives 1 Evaluation Criteria and Rubrics LAB #1 AssessmeNt WoRksheet LAB #2 Perform a Vulnerability Assessment scan Using Nessus Introduction Deliverables Hands-On Steps 19 19 21 31 32 20 Learning Objectives 19 Evaluation Criteria and Rubrics LAB #2 AssessmeNt WoRksheet LAB #3 enable Windows Active Directory and User Access Controls Introduction Deliverables Hands-On Steps 35 35 37 49 50 36 Learning Objectives 35 Evaluation Criteria and Rubrics LAB #3 AssessmeNt WoRksheet LAB #4 Configure Group Policy objects and microsoft® Baseline security Analyzer (mBsA) Introduction Deliverables Hands-On Steps 53 53 55 63 64 54 Learning Objectives 53 Evaluation Criteria and Rubrics LAB #4 AssessmeNt WoRksheet iii 38351_FMxx_Pass4.indd 3 23/04/13 5:13 AM iv Contents LAB #5 Perform Protocol Capture and Analysis Using Wireshark and NetWitness Investigator 67 Introduction Deliverables Hands-On Steps 67 67 69 80 81 68 Learning Objectives Evaluation Criteria and Rubrics LAB #5 AssessmeNt WoRksheet LAB #6 Perform Business Continuity Implementation Planning Introduction Deliverables Hands-On Steps 85 85 86 87 90 91 Learning Objectives and Outcomes 85 Evaluation Criteria and Rubrics LAB #6 AssessmeNt WoRksheet LAB #7 Relate Windows......

Words: 26285 - Pages: 106

Labs

...ISSC362 Week 1 Lab #2: Implement Hashing and Encryption for Secure Communications Instructor Name: ________________ Lab Assessment Questions 1. Compare the hash values calculated for example.txt that you documented during this lab. Explain in your own words why the hash values will change when the data is modified. 2. Why are the MD5sum and SHA1sum hash values the same every time you calculate for the “example.txt” sample file? What if they were different when you re-calculated the hash value at the other end? 3. 2 4. 3. If you were using corporate e-mail for internal and external communications but did not want to encrypt an e-mail message, what other security countermeasure can you deploy to ensure message integrity? 4. If you are using corporate e-mail for external communications that contain confidential information, what other security countermeasure can you deploy to maximize confidentiality of e-mail transmissions through the Internet? 5. What is the difference between MD5sum and SHA1sum hashing calculations? Which is better and why? 6. Where can you store your public keys or public certificate fi les in the public domain? Is this the same thing as a public key infrastructure (PKI) server? 7. What do you need if you want to decrypt encrypted messages and fi les from a trusted sender? 8. What encryption mechanisms are built into Microsoft® Windows XP Professional? 9. Which Windows encryption......

Words: 296 - Pages: 2

Lab to Worksheet

...B 2 WORKSHEET WORKING WITH DISKS AND DEVICES Exercise 2.1 Creating a Basic Disk Partition Overview In Exercise 2.1, you create a new basic partition for Alice where she can store her data. Completion time 10 minutes 7. Based on the information in the Disk Management snap-in, fill out the information in Table 2-1 on your lab worksheet. Table 2-1 Disk information Disk 0 Disk type (basic or dynamic) Basic Total disk size 450 MB Number and type of partitions Amount of unallocated space 450 MB Disk 1 Disk type (basic or dynamic) Basic Total disk size 931.51 GB Number and type of partitions Amount of unallocated space 931.51 GB Exercise 2.2 Extending a Basic Disk Partition Overview A few days later, you receive another call at the help desk from Alice. She has been diligently moving her data files to the special partition you created for her, but she has now run out of disk space. The partition was not big enough! To address the problem, you decide to extend the Alice1 partition, using some of the unallocated space left on the disk. For this task, you intend to use the Diskpart.exe command line utility. Completion time 15 minutes 1. Consult the Disk Management snap-in, and fill out Table 2-2 with the amount of unallocated space left on the drives in gigabytes and megabytes. Table 2-2 Disk 0 Disk 1 Unallocated space left (in gigabytes) .45 gb .51 Unallocated space left (in megabytes) 1Mbps 9Mbps Question 1 What......

Words: 831 - Pages: 4

Case 2.4

...Case Study 2.4 Ethics and Airbus September 26th, 2014 1. In each of the cases described, who benefits and who suffers from the alleged ethical and legal lapses of Airbus? The people who benefitted from the ethical and legal lapses of Airbus was, the middlemen involved in all of this, the government, and Airbus. The ones who suffered from these unethical decisions were the taxpayers, consumers, and even Boeing. However I believe that Sabena Air suffered the most. In the case Kuwaiti Kickbacks, the Kuwait government suffered, as did Airbus Company because Kuwait Airways didn’t honor the order that it had planned to place with the company. According to the textbook, “behaving in an ethically and socially responsible way should be the hallmark of every businessperson’s behavior, domestic or international” (Pg. 153). My dad always taught my siblings and me that we cannot sin in a vacuum. When we sin, although it may benefit us at the time, we always hurt other people and they suffer because of our selfishness. In the Bible it says, “Remember, it is sin to know what you ought to do and then not do it” (James 4:17). With sin comes consequences, and God always has the final say. 2. How should the public relations staff at Airbus respond to the articles appearing in The Economist, The Guardian, and Reuters News? Both companies possess political influence on how they conduct their sales and it is crucial that both companies do something to secure their market share for......

Words: 855 - Pages: 4

Case 2.4

...Case 2.4 Asher Farms Inc. 1. First part: 1). Economic factors: A. Exchange rates can affect an exporter's competitiveness. When inflation occurs in the U.S., currency goes down in value market and profit growth in Asia. It causes an increase in exports. 2). Technological factors: A. The development of infrastructure and technologies will help Asher to save production costs. B. Genetic engineering will help the poultry industry to improve the nutritional value of feedstuff and cause broiler chickens to grow very quickly. This is beneficial for reducing the cost of goods sold. 3) Social factors: A. People are beginning to be aware of health issues associated with meat, so they are changing their eating habits. In recent years, people would prefer to choose a balanced diet rather than a low fat diet. Hence, the demand for poultry meat has consistently increased. 4). Environmental factors: Mass poultry production could cause water pollution, so the poultry industry has to pay significant amount of money to clean up wastewater. 5). Legal factors: Congress enacted the Food Safety Modernization Act in order to avoid foodborne outbreaks and regulate the food industry. Hence, poultry processing companies must comply with the law’s requirements. 6). Political factors: The stability of the American polities can help the poultry industry to achieve sustainable development because the poultry industry do not need to worry that war will destroy the building and equipment....

Words: 625 - Pages: 3

Lab Report of Respiration

...Timers * 2 Lab Quest Minis * 2 Laptops Risk Assessment: Procedure: Put 4 worms in a biochamper inside the classroom. Set up O2 sensor and Co2 sensor in the biochamper. Set up O2 sensor, Co2 sensor and thermometer on the Lab Quest Mini, and then on the laptop. Wait for 2-3 minutes for Co2 inside to be even. Start the timer for 40 minutes and record the data. Put other 4 worms in another biochamper outside the classroom. Set up O2 sensor and Co2 sensor in the biochamper. Set up O2 sensor, Co2 sensor and thermometer on the Lab Quest Mini, and then on the laptop. Wait for 2-3 minutes for Co2 inside to be even. Start the timer for 40 minutes and record the data. Results & Data: Temperature (℃) | Amount of O2 before (ppt) | Amount of O2 after (ppt) | Amount of Co2 before (ppt) | Amount of Co2 after (ppt) | 21 | 200 | 193 | 2.6 | 4.3 | 12 | 203 | 203 | 2.5 | 2.4 | Discussion: My hypothesis is correct according to the date we collected, which the rate of respiration increases as the temperature increases, on the contrary, the rate of respiration is lower as temperature is lower. From the graph, the amount of O2 in the biochamper decreases from 200 ppt to 193 ppt in 40 minutes, and the amount of Co2 increases from 2.6 ppt to 4.3 ppt in the biochamper when the worms are inside the classroom with the temperature of 21℃. When the worms are outside the classroom with the temperature of 12℃, the amount of Co2 decrease from 2.5 ppt to 2.4 ppt,......

Words: 668 - Pages: 3

Labs

...Tissues The Integumentary System 35 43 The Cell: Transport Mechanisms and Permeability–Wet Lab Classification of Covering and Lining Membranes 49 Overview of the Skeleton: Classification and Structure of Bones and Cartilages 53 The Axial Skeleton The Fetal Skeleton 59 67 81 87 93 103 77 The Appendicular Skeleton Articulations and Body Movements Microscopic Anatomy and Organization of Skeletal Muscle Gross Anatomy of the Muscular System Histology of Nervous Tissue 113 119 125 Exercise 16A Skeletal Muscle Physiology: Frogs and Human Subjects Exercise 18A Neurophysiology of Nerve Impulses: Wet Lab Gross Anatomy of the Brain and Cranial Nerves Electroencephalography Human Reflex Physiology General Sensation 153 157 167 177 173 Special Senses: Vision 133 Spinal Cord, Spinal Nerves, and the Autonomic Nervous System 145 137 Special Senses: Hearing and Equilibrium Special Senses: Olfaction and Taste Functional Anatomy of the Endocrine Glands iii Exercise 28A Role of Thyroid Hormone, Pituitary Hormone, Insulin, and Epinephrine: Wet Lab 183 Exercise 29A Blood Exercise 30 Exercise 31 Exercise 32 189 199 205 209 Anatomy of the Heart Conduction System of the Heart and Electrocardiography Anatomy of Blood Vessels Exercise 33A Human Cardiovascular Physiology: Blood Pressure and Pulse Determinations 217 Exercise 34A Frog Cardiovascular Physiology: Wet Lab Exercise 36 Exercise 38 Exercise 40 Exercise 42 Exercise 43 Exercise 44 Exercise 45 Exercise......

Words: 120457 - Pages: 482

Lab 6.1

...Exercise 6.1.1 * Basic Service Sets (BSS) - In computer networking a service set is a set consisting of all the devices associated with a consumer or enterprise IEEE 802.11 Wireless local area network. The service set can be local, independent, extended, or mesh * Extended Services Sets (ESS) - Extended service sets is a component of the IEEE 802.11 WLAN architecture that extends the range of mobility to a single basic service set. An extended service set is a set of two or more BSSs that form a single sub network. Exercise 6.1.2 Standard | Frequency | Max Tran Rate | St indoor TR | St outdoor TR | 802.11a | 5 GHz | 54 Mbps | 35 | 120 | 802.11b | 2.4 GHz | 11 Mbps | 35 | 140 | 802.11g | 2.4 GHz | 54 Mbps | 38 | 140 | 802.11n | 2.4/5 GHz | 300/600 Mbps | 70 | 250 | Lab 6.1 Review 1.) IBSS works with devices only without an AP. Each device sends its data directly to the other device. SSID doesn’t exist because the communication is device to device. 2.) With beaming, the IR ports have to be facing one another, which in an office or other greater distance is not efficient. Beaming requires both devices to face one another and clear path. 3.) WLAN is appealing to home use because there aren’t any extra wires showing up everywhere. Also, it’s convenient when the user wants to sit on the couch instead of the desk. So the tradeoff is lower speed , but you can be anywhere in the house....

Words: 258 - Pages: 2

Labs

...Sonia Graham Normal Lab Values   | REFERENCE RANGE | SI REFERENCE INTERVALS | BLOOD, PLASMA, SERUM | | | Alanine aminotransferase (ALT) | 8-20 U/L | 8-20 U/L | Amylase, serum | 25-125 U/L | 25-125 U/L | Aspartate aminotransferase (AST) | 8-20 U/L | 8-20 U/L | Bilirubin, serum (adult) Total // Direct | 0.1-1.0 mg/dL // 0.0-0.3 mg/dL | 2-17 µ mol/L // 0-5 µ mol/L | Calcium, serum (Total) | 8.4-10.2 mg/dL | 2.1-2.8 mmol/L | Cholesterol, serum | < 200 mg/dL | < 5.2 mmol/L | Cortisol, serum | 0800 h: 5-23 µ g/dL // 1600 h: 3-15 µ g/dL | 138-635 nmol/L // 82-413 nmol/L | | 2000 h: ≤ 50% of 0800 h | Fraction of 0800 h: ≤ 0.50 | Creatine kinase, serum (at 30 ° C) ambulatory | Male: 25-90 U/L | 25-90 U/L | | Female: 10-70 U/L | 10-70 U/L | Creatinine, serum | 0.6-1.2 mg/dL | 53-106 µ mol/L | Electrolytes, serum | Sodium | 135-145 mEq/L | 136-145 mmol/L | Chloride | 95-105 mEq/L | 95-105 mmol/L | Potassium | 3.5-5.0 mEq/L | 3.5-5.0 mmol/L | Bicarbonate | 22-28 mEq/L | 22-28 mmol/L | Magnesium | 1.5-2.0 mEq/L | 1.5-2.0 mmol/L | Gases, arterial blood (room air) | pH | 7.35-7.45 | [H + ] 36-44 nmol/L | PCO 2 | 33-45 mm Hg | 4.4-5.9 kPa | PO 2 | 75-105 mm Hg | 10.0-14.0 kPa | Glucose, serum | Fasting: 70-110 mg/dL | 3.8-6.1 mmol / L | | 2-h postprandial: < 120 mg/dL | < 6.6 mmol/L | Growth hormone - arginine stimulation | Fasting: < 5 ng/mL | < 5 µ g/L | | provocative stimuli: 7 ng/mL | > 7 µ g/L | Immunoglobulins, serum |...

Words: 635 - Pages: 3

Labs

...On the Insert tab, the galleries include items that are designed to coordinate with the overall look of your document. You can use these galleries to insert tables, headers, footers, lists, cover pages, and other document building blocks. When you create pictures, charts, or diagrams, they also coordinate with your current document look. You can easily change the formatting of selected text in the document text by choosing a look for the selected text from the Quick Styles gallery on the Home tab. You can also format text directly by using the other controls on the Home tab. Most controls offer a choice of using the look from the current theme or using a format that you specify directly. Germany Room 102 * 4 Dell Pentium 4, 2.4 Ghz – 512 MB RAM * 8 Gateway 1.8 Pentium 3, 1.0 Ghz – 256 MB RAM * 5 IBM Pentium 2, 450 Mhz – 256 MB RAM * 5 Custom Celeron, 1.0 Ghz – 128 MB RAM Room 101 2 Custom Celeron, 1.0 Ghz – 256 MB RAM 1 Dell Pentium 4, 2.0 Ghz – 256 MB RAM 4 IBM Pentium 3, 1.2 Ghz – 512 MB RAM 1 Custom Celeron, 1.0 Ghz – 128 MB RAM You can also format text directly by using the other controls on the Home tab. You can also format text directly by using the other controls on the Home tab. The Star The Insert Tab On the Insert tab, the galleries include items that are designed to coordinate with the overall look of your document. You can use these galleries to insert tables, headers, footers, lists, cover pages, and other document......

Words: 509 - Pages: 3

Labs

...© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones Bartlett Lab #2© Jones &SALE ORLearning, LLC Vulnerabilities to &SALE ORLearning, LL AligningBartlett DISTRIBUTION Risks, Threats, and NOT FOR DISTRIBUT NOT FOR COBIT P09 Risk Management Controls © Jones & Bartlett Learning, LLC Introduction © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION NOT FOR SALE OR DISTRIBUTION Ask any IT manager about the challenges in conveying IT risks in terms of business risks, or about translating business goals into IT goals. It’s a common difficulty, as the worlds of business and IT do not inherently align. This lack of alignment was unresolved until ISACA developed a framework called COBIT, © Jones & Bartlett Learning, LLC first released in 1996.Jones & Bartlett Learning, LLC © ISACA is an IT professionals’ association centered on auditing and IT governance. This NOT FOR SALE OR DISTRIBUTION The lab lab will focus on the COBIT framework. NOT FOR SALE OR DISTRIBUTION uses the latest two versions: COBIT 4.1, which is currently the most implemented version, and COBIT 5, which is the latest version released in June 2012. Because COBIT 4.1 is freely available at the time of this writing, the lab uses this version to © Jones & Bartlett Presentation is done making use of a © Jones & Bartlett Learning, LL present handling of risk management. Learning, LLC set of COBIT......

Words: 2487 - Pages: 10

Networking Labs for Unit 6

...Brandon Hellbach Unit 6 Labs Lab 6.1: Wireless Broadcast Domains Exercise 6.1.1 – A Basic Service Set does exactly what its name says; basic wireless service, one and only one AP creates the wireless LAN. Extended Service Set extends the wireless functions of a Basic Service Set. The difference is that in a BBS uses one AP to create one wireless LAN while an ESS uses more than one AP to create one wireless LAN. Exercise 6.1.2 – IEEE 802.11 Standards Standard | Frequency (GHz) | Maximum Transmission Rate (Mbps) | Standard Indoor Transmission Range (m) | Standard Outdoor Transmission Range (m) | 802.11a | 5 | 54 | 40 | 100 | 802.11b | 2.4 | 11 | 70 | 150 | 802.11g | 2.4 | 54 | 38 | 140 | 802.11n | 2.4 or 2.5 | 600 | 75 | | Lab 6.1 Review 1. It uses a beacon like transmission to find other devices on IBSS mode and on the same SSID to connect and share. 2. Infrared has a very short range and cannot penetrate walls and other objects making radio frequency superior. 3. Although WLANs have a lower speed they are more convenient than wired LANs. So the trade-off is speed for convenience of not having wires everywhere which is why WLANs are more common in households. Lab 6.2: Identifying WLANs Exercise 6.2.1 - What information about the wireless networks is available using the utility? The utility provides the name, signal strength, and MAC address of the available wireless networks. What information is given on the wireless networks with the......

Words: 574 - Pages: 3

Facebook | bustadu95 | Katie Stevens