Unit 4 Assignment 1

In: Computers and Technology

Submitted By Tyrell1458
Words 394
Pages 2
Copper-vs-Fiber

Advantages of Structured Copper Cabling

Power over Ethernet (PoE) — This gives you the ability to powerphones, surveillance cameras, Wireless Access Points (WAPs), and many other devices right through the networking cable itself. That means that you don’t have to schedule an electrician in to run power to your surveillance cameras to power them. Another advantage is the ability to have an emergency power supply that will continue powering mission critical devices even if your electricity goes out. Less expensive electronics — If you are going to take fiber to the workspace, realize that most PC’s come with copper NIC cards. Optical ones will cost you between $100-200 each. More Flexible — TDM environments are built to run on copper infrastructures. Fiber can be used, however the electronics that make it work are expensive.

Advantages of Structured Fiber Cabling

Electromagnetic Interference (EMI) — The interference in signal transmission or reception caused by the radiation of electrical and magnetic fields. Optical Fiber is immune to electromagnetic energy because it is a dielectric (not able to conduct electric current). Copper cabling, if not installed properly is vulnerable to the effects of EMI, such as undesirable responses, degradation, or complete system failure. High Bandwidth — Fiber has a higher bandwidth than copper. Example: Category 6A Cable is classified by the Telecommunications Industry Association (TIA) to handle a bandwidth up to 600 MHz over 100 meters, which theoretically, could carry around 18,000 calls at the same time. Multimode Fiber, on the other hand, would have a bandwidth of over 1000 MHz which could carry almost 31,000 simultaneous calls. Less Expensive — fiber cable is actually less expensive than copper, but don’t forget the expensive electronics that it requires. Lightweight — An optical cable weighs less…...

Similar Documents

Unit 4 Assignment 1

...UNIT 4. Assignment 1. Copper vs Fiber As the name suggests, fibre optic technology uses pulses of light to carry data along strands of glass or plastic. It's the technology of choice for the government's National Broadband Network (NBN), which promises to deliver speeds of at least 100Mbps. When we're talking about 'speed' were actually talking about throughput (or capacity) — the amount of data you can transfer per unit time. And fiber optics can definitely transfer more data at higher throughput over longer distances than copper wire. For example, a local area network using modern copper lines can carry 3000 telephone calls all at once, while a similar system using fiber optics can carry over 31,000. So what gives it the technical edge over copper wires? Traditional copper wires transmit electrical currents, while fiber optic technology sends pulses of light generated by a light emitting diode or laser along optical fibers. In both cases you're detecting changes in energy, and that's how you encode data. With copper wires you're looking at changes in the electromagnetic field, the intensity of that field and perhaps the phase of the wave being sent down a wire. With fiber optics, a transmitter converts electronic information into pulses of light — a pulse equates to a one, while no pulse is zero. When the signal reaches the other end, an optical receiver converts the light signal back into electronic information, the throughput of the data is determined by the frequency......

Words: 396 - Pages: 2

Unit 4 Assignment 1

...Motherboards Marc Burzynski Unit 4 Assignment 1 NT1110 07/20/2013 Video 1.04 Summary This video talked about the differences in the different form factors motherboards as well as the similarities. It explains for those of us who prefer to build our own systems that we should select our motherboard before buying the tower and after we have selected the CPU. It also explains about the different types of connectors found on motherboards. List Of Topics, Terms And Definitions * Motherboard – The most important consideration, the size and shape is determined by form factor * ATX Form Factor – Replaced the AT form factor, ATX is smaller, easier to work on, better organization, has support for a wide variety of I/O devices, usually has is the P1 20 pin or 24 pin power connector, on the older ATX form factor motherboards were connected via the PS/2 connector at the back of the case, the newer ATX form factor motherboards connected keyboard and mouse via a USB, usually has between two and four DIMM slots, has either PCI E Oren AGP slot but not both, usually has 2 40 pin IDE slots, and usually 1 to 2 serial ATA slots. The ATA form factor was the first to introduce the soft power switch on the front of the computer; the soft power switch does not immediately cut power but instead allows the computer to go through the normal shutdown procedure. There is however a power switch on the back of the computer, flipping the switch immediately kills power. Another......

Words: 540 - Pages: 3

Unit 6 Assignment 1: Video Summary 4

...Unit 6 Assignment 1: Video Summary 4 Learning Objectives and Outcomes This assignment addresses the learning objective “Identify various computer memories and storage devices based on their purposes and functions.” The expected learning outcomes that will result from completing the assignment are: * You will be able to list the types of RAM memory. Assignment Requirements 1. Watch the following YouTube CompTIA videos: http://www.youtube.com/watch?v=tUhJHUVrcXM http://www.youtube.com/watch?v=ygElbzv1S_w 2. Write a summary of the information presented in the clips. 3. Create a bulleted list of terms used in the video clips with their definitions. 4. Provide a summary of your thoughts on the information presented in the video clips, including what you learned from the presentation, what you may have found confusing, and where you might use the information. Required Resources In addition to having read Chapter 6 to become familiar with the memory and storage technology used with computers, you will need a computer with Internet access to YouTube. Submission Specifications Submit the results of your work meeting the following specifications: File Format: Microsoft Word (.doc /.docx) Length: 1-2 pages Font: Arial 10-point Line Spacing: Double Self-Assessment Checklist The following checklist will help you prepare for the graded activity and/or assess the deliverable(s) as you prepare to submit them. I have read Chapter 6 of......

Words: 257 - Pages: 2

Nt2670 Unit 4 Assignment 1

...1: List and describe three SMTP server security threats. Viruses: Viruses have been around for years, but that doesn't make them any less dangerous or easy to eradicate. New, more destructive viruses and worms are being unleashed at an alarming rate. Spam: Spam is expected to increase to 80 to 90 percent of total email. Moreover, the boundary between spam and viruses is blurring. New viruses turn desktop PCs into spam-spewing "zombies." There is also a new type of spamming technique called "phishing," used to dupe recipients into providing confidential personal identity information. Directory Harvest Attacks (DHAs): Also called "dictionary attacks," this technique steals proprietary information from corporate directories. During a DHA, spammers attempt to deliver messages to multiple addresses, such as johndoe@yourcompany.com, jdoe@yourcompany.com, and john@yourcompany.com. Addresses that are not rejected by the receiving mail server are determined to be valid. A successful DHA can net a spammer thousands of corporate email addresses in just a few minutes. 2: List three suggestions to harden SMTP server security. 1: Disable open relaying on all SMTP virtual servers: Open relay on your Exchange Server allows other Email servers to use your server as a gateway to others. This allows others to send spam Email which appears to be originated from your address, therefore you will be identified as a spam source. 2: Prevent anonymous access on internal SMTP virtual......

Words: 495 - Pages: 2

Unit 4 Assignment 1

...IS3340-WINDOWS SECURITY | Auditing Tools for Windows System | Unit 4 Assignment 1 | | | 5/1/2014 | | 1. You want to schedule a weekly analysis for the Windows servers in your data center. The command should run as a scheduled job and report any available patches for the Windows Server 2008 R2 operating system, Internet information services (IIS) Web server, or structured query language (SQL) server that have not been installed. Which tool would be the best choice?. MBSA command line interface 2. You like the way MBSA presents scan results but you need to scan for vulnerabilities in older Windows products, including Microsoft Office 2000. Which tool provides extended scanning and the ability to use MBSA to view scan reports? Security Configuration and Analysis (SCA) 3. Your organization wants to encourage its employees and contractors to use vulnerability scanners at home as well as at work. You want to select a single vendor that can provide scanner software products for home and enterprise computers. A single vendor product line can streamline coordinating and analyzing scan results from many different computers. Which set of tools would be the best choice? Secunia Security Analyzers 4. You have developed several templates that consist of security settings for several types of computers, including desktop workstations, laptops, and various servers. You want to quickly compare a computer’s settings to its corresponding template to see if......

Words: 271 - Pages: 2

Unit 4 Assignment 1

...even buy a case because sometimes the motherboard will not fit into the case. There are three form factors today. Atx which replaced older AT Motherboards. They are also easier to work on. ATX also has a soft power switch on the front of the computer and a power switch on the back. The second form is the BTX form. This has better air flow for cooling by having an intake vent on the front of the computer and an exhaust vent on the back. The last is an NLX form used on low end computers and is also known as daughter boards. On the bottom of the motherboard there are numerous copper traces know as Buses. A motherboard will have expansion slots. It will have either several PCi slots and one AGP slot or several PCI slots and one PCIe slot. 3 &4. ATX-easy to work on, replace old At form BTX- better cooling for cpu NLX- daughter boards Riser cards- plug into motherboard, and support additional expansion slots Soft power- button on front of computer that does not immediately cut off computer. Allows normal OS shutdown process Wake on LAN- Configured in CMOS any keyboard or network activity will repower your system if it is in standby Motherboard Connectors- P1 Power, 40 pin IDE, 34 pin floppy drive, SATA, 50 or 68 pin SCSI 5. Before choosing anything with your computer you should choose both a cpu and a motherboard. There are three forms to choose from. PCIe or PCI express slots are expected to replace old AG connectors because they are the fastest to date. This information is a......

Words: 313 - Pages: 2

It3220 Unit 4 Assignment 1

...Jake Robinson ET3220 Unit 4 Assignment 1: Unit Review Questions 6.2 The function of a modem is modulation and demodulation. A modem takes a signal and modulates it so that the data can be sent via an audio link such as a phone. Then at the other end of the line another modem demodulates the signal back into the original data that was to be sent. 6.3 Three major advantages of digital transmission over analog transmission are: 1. Digital transmissions cannot get corrupted by noise. 2. Digital signals typically use less bandwidth. 3. Digital transmissions can be encrypted so that only the intended recipient can decode it. 6.4 In ASK or amplitude-shift keying the two binary values are represented by two different amplitudes of the carrier frequency. The limitations of ASK are that it is linear and sensitive to atmospheric noise, distortion, propagation condition on different routes in PSTN. It requires extensive bandwidth and is therefore a waste of power. 6.7 QAM is a popular analog signaling technique that is known as quadrature amplitude modulation. This modulation technique is a combination of ASK and PSK. QAM can also be considered a logical extension of QPSK. QAM takes advantage of the fact that it is possible to send two different signals simultaneously on the same carrier frequency, by using two copies of the carrier frequency, one shifted by 90 degrees with respect to the other. 6.8 The sampling theorem tells us that the......

Words: 260 - Pages: 2

Unit 4 Assignment 1: Visual Elements & Graphics

...SD1240 Unit 4 Assignment 1: Visual Elements & Graphics Course Objectives and Learning Outcomes Use HTML to define the structure of content. Use Cascading Style Sheets (CSS) to format Web pages. Use visual Elements and graphics on Web pages. Create and format lines and borders on Web pages. Decide when to use graphics and what graphics are appropriate. Apply the image element to add graphics to Web pages. Configure images as backgrounds on Web pages. Configure images as hyperlinks. Find free and fee-based graphics sources. Follow recommended Web design guidelines when using graphics on Web pages. Assignment Requirements Complete this assignment by filling in the blanks listed with each question on the following page. This assignment is to be completed and submitted to your instructor before the start of Unit 5. Required Resources Felke-Morris, Chapter 4 Submission Requirements Submit your completed, printed answer sheet to your instructor before the start of the next unit. Unit 4 Assignment 1: Visual Elements & Graphics 1. Providing alternate equivalent text for every non-text element. Accessibility 2. A type of graphic best used for line art or clip art. (GIF) Graphic Interchange Format 3. Image configured with multiple clickable areas. Image map 4. XHTML attribute that configures horizontal alignment. <h/> 5. Graphic file type that supports transparency and millions of colors. (PNG) Portable Network Graphic ...

Words: 450 - Pages: 2

Nt1330 Unit 4 Assignment 1

...NT1330 Unit 4 Assignment 1. AD Design Replication Scenario AD Design Replication Scenario To whom it may concern: I am the IT Administrator for the company and I have been asked to give my recommendations for the Active Directory Replication Design of the two new Branches. The first I can recommend for you is that all the information that is needed for each new site is correctly documented and added to the Root Active Directory through the Active Directory sites and services. This is done because the Root AD automatically builds the inter-site replication topology based on the information provided about the new site connections. Each new site’s AD will have one each domain controller that is known as the inter-site topology generator and they are assigned to build the topology at their sites. To add two new branch offices we will need to find a strategy to design a replication process. To implement this we will need to use inter-site replication. Inter-site replication is needed when adding domain controllers located in different sites. We will also need a site link (Site link is a logical, transitive connection between two sites that allows replication to occur) protocol of Remote Procedure Call (RPC) over Internet Protocol (IP) which is the preferred choice for the replication process. This allows you to communicate with network services on various computers and also keep data secure when being transmitted by using both encryption and......

Words: 580 - Pages: 3

Unit 4 Assignment 1

...Roy Emerson Unit 4 Assignment 1 1.0 Purpose The purpose of this policy is to define standards for connecting to Richman investments' network from any host. These standards are designed to minimize the potential exposure to Richman investments from damages which may result from unauthorized use of Richman investments resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical Richman investments internal systems, etc. 2.0 Scope This policy applies to all Richman investments employees, contractors, vendors and agents with a Richman investments owned or personally-owned computer or workstation used to connect to the Richman investments network. This policy applies to remote access connections used to do work on behalf of Richman investments, including reading or sending an email and viewing intranet web resources. Remote access implementations that are covered by this policy include but are not limited to, dial-in modems, frame relay, ISDN, DSL, VPN, SSH, and cable modems, etc. 3.0 Policy 3.1 General 1. It is the responsibility of Richman investments employees, contractors, vendors and agents with remote access privileges to Richman investments's corporate network to ensure that their remote access connection is given the same consideration as the user's on-site connection to Richman investments. 2. General access to the Internet for recreational use by immediate household members......

Words: 726 - Pages: 3

Nt1210 Unit 4 Assignment 1

...Ryan Jennings NT1210 Unit 4 Assignment 1 1. B,C 11. D 2. A,D 12. D 3. A,C 13. A,D 4. D 14. C 5. A,B 15. C,D 6. B 16. B 7. A,B 17. B 8. C 18. A,D 9. A 19. C 10. C 20. B,C,D Define Key Terms Electrical circuit: A complete loop of material over which electricity can flow. Frequency: To the number of times the entire repeating wave happens in 1 second. Amplitude: the height of the curve above the center line(the X axis). Phase: Different places on the sine-wave curve. Bit time: The number of bits sent over the link per second Encoding scheme: A set of rules that define how to change the pattern of the waveforms of energy to represent binary 0s and 1s UTP: unshielded twisted pair Core: In a fiber-optic cable, the glass fiber in the center of the cable over which light can pass. Cladding: surrounds the core, for the entire length of the cable, and reflects the light in to the core. Radio waves: Electrometric energy in a particular range if frequencies, useful for encoding data in networks Wireless WAN: A type of network that uses no wire, instead using radio waves, with a wide-area network business model of longer distances, a service provider, and a fee structure in which the customer pays a monthly fee to the mobile phone company. Wireless LAN: A group of wireless clients, plus one or more wireless access points, with the access points all using a common SSID. Access point: A wireless LAN device that plays two important......

Words: 308 - Pages: 2

Is3340 Unit 4 Assignment 1

...Identifying Types of Malware Infection 1) You notice that your computer is getting slower each day. You have terminated unneeded programs, disabled unneeded services, and have recently defragmented the disks. Your computer has plenty of memory but it still seems slow. Since it only started getting slow within the last two weeks, you suspect a malware attack. You have carefully examined each of the programs running but there are no unusual programs. However, you do notice that there is substantial disk activity, even when no programs are running that should be using the disk. What kind of malware do you think is present in your computer? Rootkit and likely another type of malware – Closing all programs and still seeing disk usage would suggest that a rootkit has installed and is actively hiding the actual program running. The rootkit would hide the program while a virus or worm is likely behind the scenes wreaking havoc. 2) You download a new program to display the current weather on your desktop. Since you installed the weather application you noticed a lot of network activity and your computer is getting slow. When you terminate the weather application your computer speeds up. What kind of malware do you think is present in your computer? Trojan Horse – Acting as a useful program, it actually infects and runs amuck inside of the pc and network. 3) Within a week after ordering a new widescreen television (TV) from an online retailer, you start getting many......

Words: 407 - Pages: 2

Nt1210 Unit 4 Assignment 1

...Unit 4 Assignment 1. Answer These Questions 1. You have created a simple electrical circuit with a battery, wires, and a light bulb. Which of the following is true about this circuit? (Choose two answers.) a. The battery’s positive lead pushes current away from that lead. b.- The battery’s positive lead pulls current toward that lead. c.- The circuit creates a direct current. d. The circuit creates an alternating current. 2. A PC NIC and a switch port create one electrical circuit to use when sending data. The sender creates a (maximum) 1-volt electrical signal with a frequency of 1000 hertz. Which of the following facts are also true? (Choose two answers.) a.- The period is 1/1000 of a second. b. The phase changes over time. c.- The amplitude changes over time. d. The amplitude is 1 volt. 3. A PC NIC and a switch port create one electrical circuit to use when sending data from the PC to the switch. Which of the following tasks is a function done by the transmitter? (Choose two answers.) a.- Completes the electrical circuit by looping two wires together on its end b. Senses current on the circuit c.- Creates current on the circuit d. Removes noise from the circuit 4. A PC NIC and a switch port create one electrical circuit to use when sending data from the PC to the switch. The transmitter uses a simple encoding scheme that uses a higher amplitude to encode 1 and a lower amplitude to encode 0, sending 1 bit in each bit time. The bit rate is 2000...

Words: 1633 - Pages: 7

Acc555 Assignment 1 Unit 4

...Melanie Waghalter Johnson Unit 4 Assignment 1 Professor Cynthia Waddell ACC555: Fraud Examination “How to Steal a Million Dollar Without Taking the Cash” Seneca Staunton was an overwhelmed accounting clerk at Carlton Chemicals. His job was to deal with AR collection, customer service issues, process payments and keep the AR records straight. He was a quiet man who preferred to work alone than with others, and this was his down fall with Carlton Chemicals. The only time that Seneca was vocal was when his department was audited. He would get upset and complain about the added work load caused by the auditors. He would delay getting reports and other paperwork to them causing issues with completing the audit itself. When the reports finally got to the head auditor there were discrepancies in the reports. The senior auditor took her concerns to Seneca’s boss, Max Fairchild, because the reports would not reconcile and she was concerned. After being brought the discrepancies in the reports, Max spent several hours in trying to figure out what Seneca had done. He was unable to find if the money was missing by embezzlement or misapplied funds. All he knew at this point is that Seneca was the only one to apply the payments and that he was the one to answer the questions. Waiting until the next afternoon, Max spoke with Seneca who immediately admitted that he had misapplied the funds, but had not stolen any of the money. Max had decided to write a reprimand on Seneca stating...

Words: 868 - Pages: 4

Nt2580 Unit 4 Assignment 1

...Nt2580 Unit 4 Unit 4 assignment 1 1.0 Purpose The purpose of this policy is to define standards for connecting to Richman investments's network from any host. These standards are designed to minimize the potential exposure to Richman investments from damages which may result from unauthorized use of Richman investments resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical Richman investments internal systems, etc. 2.0 Scope This policy applies to all Richman investments employees, contractors, vendors and agents with a Richman investments-owned or personally-owned computer or workstation used to connect to the Richman investments network. This policy applies to remote access connections used to do work on behalf of Richman investments, including reading or sending email and viewing intranet web resources. Remote access implementations that are covered by this policy include, but are not limited to, dial-in modems, frame relay, ISDN, DSL, VPN, SSH, and cable modems, etc. 3.0 Policy 3.1 General 1. It is the responsibility of Richman investments employees, contractors, vendors and agents with remote access privileges to Richman investments's corporate network to ensure that their remote access connection is given the same consideration as the user's on-site connection to Richman investments. 2. General access to the Internet for recreational use by immediate household......

Words: 300 - Pages: 2

It is Well (Live) | 预告片 | ELEKTRYK WYSOKICH NAPIĘĆ