Premium Essay

Nt1310 Unit 6.1 Case Analysis

Submitted By
Words 551
Pages 3
Elizabeth Fischer
10/25/2016
HW 6

1)
Visual History of Telecommunications
1. When was the first switchboard installed and how many connections did it have?
It was installed in 1877. It served 5 subscribers.
2. In what year did communications span the United States?
1915
3. What happened as far as communications in 1935?
Talking on the phone could encircle the globe.
4. What was recorded May 16, 1986 and what was the technological improvement involved in the recording?
The sound of a pin dropping was recorded. Long distance phone calls were possible due to satellites.
5. From watching the video explain total mobility.
Total mobility is the ability to do everything from your phone or a laptop, such as accessing maps, taking photos, and uploading to the internet. …show more content…
1. What is the difference between RFID, RFID chips, and RFID tags?
RFID – radio frequency identification, it allows physical objects to be identified by digital devices. RFID describes the technology. An RFID chip refers to the RFID technology on a semiconductor chip in a device. RFID tags are a combination of an RFID chip and an antenna.
2. What are three uses of the RFID tags to cut costs and boost efficiency?
Some given examples were the tracking and recovery of lost pets, patient identification in the medical sector which could speed up treatment and diagnosis, and inventory for grocery stores to keep track of what is going to expire and what they need to order.
3. What is the “issue” that has arisen with the use of RFID tags?
Some are concerned that RFID enables a “Big Brother” type of society.
Fiber Optic
1. Explain one thing you learned in the making of a fiber optic wire
At 2000 degrees Celsius, you fuse glass tubes together by heating with a hydrogen oxygen fire. This larger glass tube gets injected with gases to inject silicon and

Similar Documents

Premium Essay

Test

...ITT Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110...

Words: 2305 - Pages: 10