Free Essay

Unit 1 Exercise 1

In:

Submitted By Redskins24
Words 253
Pages 2
Composition 1 Composition 1Composition 1didnt didn’t didn’t didn’t did nt didi did did did did did did did did did did did did did did did did did idid id idi did idid did did did dmdidi didid idid idid didid didid didi didididid didiid dididid iediddjiiiiiiiiiii did did didi did idid didi dd didi didii didid didid dddid didid didid diid idid idid idid ididididi did ididi idid ddi didi didi didi idid didid did dididi didid didid didi diid didid didi did idi did id id id I I did id id id id id I ii ii I I I I j j j j j j j d djdjd jdj du dudu dudu dud dud ud dudu dudud dudu dudud dud didi didi diid did idid didi didi did did idd didi diid d idid idi didi idi diid idi did did did id did did id di did did idid ddi didi didi didi did did did did did did did did didid didid didid didid didid did did did dd did id did did did di did di did did did did didi did didid did didid didi did d did did did dd didid did did did did di did did did did did did did did did did did did did did did didid did id did did did did dd did did d did did did did did did did did did did ddid did di didid id diidi di did idid dd

Similar Documents

Premium Essay

Unit 1 Exercise 1

...NT1310 Unit 1 Exercise 1 6/17/14 The world is connected more than ever through the use of the internet. From paying bills to shopping or enjoying leisure time on the web; taking advantage of the internet has become second nature to society. Focusing in on one specific type of networking entertainment, online gaming has become a major league sport in its own right. Online gaming allows people from all around the world to connect together to team up or fight against one another. Behind the scenes is where the real magic happens. Between the gamers sits countless devices and hardware not to mention miles and miles of land. Using Call of Duty as an example, each gamer has a copy of the map being played on installed onto their local computer. Every time the gamer moves the direction of their character, their data is sent from their machine to their router, and then out past the demarc point. On the other side of the demarc is where the service provider picks up the data and moves the data from local network to the central office (better known as the local exchange). The central office then sends the data over the MAN (metro area network) or WAN (wide area network) to continue the data to game server. If the data hasn’t reached the server yet (for example the gamer lives in Michigan and the server is in California) the data will be passed over the core (also known as long-haul) network which connects MANs and WANs of different geographies together. On the off chance...

Words: 398 - Pages: 2

Premium Essay

Nt1310 Unit 1 Exercise 1

...Unit 1 Exercise 1 Local Exchange When you send an email from New York to Japan, that email,is sent from your home to the local exchange point over the access network. Once it is in the local exchange it is then sent to aggregating points in different cities and counties over the regional network. Then it is aggregated and transported over the long-haul network so that it reaches the launching point at the country shoreline where it is then sent over the ocean network to Japan. Once there, the email is sent back over the long-haul or regional network to the local exchange and then on to the individual receiving the email. This occurs using mostly fiber optics so the speeds at which all this takes is at the speed of light which is approximately 127,000 miler per second. understand how to interface with the local exchange you must first understand the different networks that comprise it. The first network, being the access network. The access network is the network that connects the individual user or business with the telecommunications system. This is made up of a series of fiber-optic and copper cabling and passive and active equipment that connects you to the local exchange. The central office at the local exchange contains the switching equipment to direct your telephone, data , video, etc. to where it needs to go. The access network is very important to the local exchange since it’s the part that reaches the end user, who is you, and connects them. The metro network, sometimes...

Words: 339 - Pages: 2

Free Essay

Unit 1 Exercises

...Page 20-21 1. What is free software? List three characteristics of free software. Free software is a matter of the users’ freedom to run, copy, distribute, study, change and improve the software. Three characteristics are: Freedom to run the program for any purpose, freedom to redistribute copies, and freedom to improve the program and release your improvements to the public. 4. What is the Free Software Foundation/GNU? What is Linux? Which parts of the Linux operating system did each provide? Who else has helped build and refine this operating system? GNU is a project for creating an operating system, both kernel and system programs. Linux is a free kernel that was written in 1991. Linus Torvalds contributed the kernel while the GNU project contributed the system programs. It was built and refined by like-minded programmers all over the world. Page 50 1. Briefly, what does the process of installing an operating system such as Fedora/RHEL involve? It involves copying the operating system files from the installation media to the hard disk(s) on a system and setting up configuration files so Linux runs properly on the hardware. Page 86 1. What is a live system? What advantages does it have over an installed system? A live system is when you run Linux from a CD/DVD instead of installing it on the computer. The advantage is you can test out Linux without disturbing your current operating system. 4. Where on the disk should you put your /boot partition or the root (/)...

Words: 470 - Pages: 2

Free Essay

Nt1420 Unit 1 Exercise 1

...Unit 1 Exercise 1 An analog signal is any continuous signal which the time varying feature (variable) of the signal is a representation of some other time varying quantity, i.e., analogous to another time varying signal. A digital signal is a physical signal that is a representation of a sequence of discrete values (a quantified discrete-time signal), for example of an arbitrary bit stream, or of a digitized (sampled and analog-to-digital converted) analog signal. Half-duplex data transmission means that data can be transmitted in both directions on a signal carrier, but not at the same time. Full-duplex data transmission means that data can be transmitted in both directions on a signal carrier at the same time. A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring Long-distance telephone company, such as MCI (before its absorption by Verizon), Sprint and the former AT&T Corporation (before its merger with SBC in 2005). In the United States, it is defined as any carrier that provides inter-LATA communication, where a LATA is a local access and transport area. Long Distance central office, central office (CO) is an office in a locality to which subscriber home and business lines are connected on what is called a local loop. Tandem, telephone switch is a U.S. telephone company central office telephone exchange used to interconnect local exchange carrier...

Words: 263 - Pages: 2

Premium Essay

Nt1330 Unit 1 Exercise 1

...IP Addressing Scenario Unit 1 Exercise 1 ITT Technical Institute Floyd Washington Jr. April 4, 2015 When setting up a network that will consist of many host computers, one of the first things that an administrator must do is to determine what class of networks that they must administer to a given business. This is the point where every administrator must know how to implement classful and classless IP addressing. A classful network is a network addressing architecture used in the internet from 1981 until the introduction of Classless Inter-Domain Routing (CIDR) in 1993. Classful IP addressing divides the addtess space on the internet into five address classes. Each class is coded in the first four bits of the address. Today the classful network concepts remain in play only limited scope of the default configuration parameters. There are 32 bits contained in any IPv4 IP address. A Class A network has eight bits in the network number field and 24 bits in the rest of the field and covers a range of 0-126 in the leading field. There are 128 Class A networks with 16,777,216 hosts capability per network. The range of the Class A networks are 0.0.0.0 to 127.255.255.255. A Class B network has 16 bits in the network number field and has 16 bits in the rest of the fields and covers a range from 128.0.0.0 to 191.255.255.255. There are 16,385 Class B networks and each network has the capability of having 65,536 network hosts. A Class C network has 24bits in the network number...

Words: 756 - Pages: 4

Premium Essay

Nt1310 Unit 1 Exercise 1

...Diabetes is when a disease results in too much sugar in the blood. Also known as high blood glucose. There are two types of diabetes; diabetes 1 and 2. 8 things people with diabetes have to do is test their blood sugar and record it in a log book, take a medication prescribed by your doctor, check your feet as you may get wounds such as blisters, brush and floss your teeth; blood sugar levels can increase plaque in the mouth, be physically active; exercising improves blood flow, increase energy, helps from the impact of stress and makes sleeping better, focus on eating healthy meals and snacks, protect your skin; diabetes may cause fungal infection, Get a good night sleep; this increases metabolism. Diabetes 1 usually occurs to people who are now in their 40’s....

Words: 484 - Pages: 2

Premium Essay

Nt1310 Unit 1 Exercise 1

...Introduction: With the advances of micro electro mechanical system technology, wireless communications and digital electronics, Wireless Sensor Networks have been used in everywhere such as battlefield surveillance, environment supervision and traffic control has become a reality. Wireless Sensor Networks consist of large number of sensor nodes which collect and route data to the external sink with a certain transmission regulation. Due to the limitations of bandwidth memory and computing capability of such nodes the applied routing topology should ensure the minimization of energy consumption and hence maximization the lifetime of the network. When the energy is limited, our main aim is to find a route which can minimize the energy consumption and maximize the network lifetime. In typical WSNs applications, data about a particular event is collected by the sensor nodes and then sent to the Base Station. Since nodes are deployed densely, the high density of the network may lead to nodes generating and transmitting redundant data, which results in unnecessary energy consumption. Data aggregation can be the solution for this problem. Data aggregation basically eliminates redundant data and reduces the communication load. Clustering method has been extensively exploited for increasing the network scalability. In this paper we propose an energy efficient load balanced data gathering routing protocol to minimize energy consumption and thus enhance the network lifetime. The cluster...

Words: 924 - Pages: 4

Premium Essay

Nt1310 Unit 1 Exercise 1

...The implications of the above results are discussed next. As it can be seen in Figure 1, ESSENDON1 drug seemed to not to be effective in the Forced Swim Test experiment. The data shows that there is a higher percentage of immobility in the control group (mean = 54.3 +12.4%) compared to the ESSENDON1 test group (mean = 47.5 +7.6 %). This indicates that the test group demonstrated to have less escape - related behaviour and was found to be more anxious than the control group. Moreover, the t–test (p=0.6497) indicates there is ~65% chance that the immobility is the same and hence there is no significant differences between the two groups. The bar graph of the Elevated plus-maze test in Figure 2 demonstrates the effectiveness of ESSENDON1. Through immediate observation, the...

Words: 889 - Pages: 4

Premium Essay

Nt1330 Unit 1 Exercise 1

...Training We can provide user training for the users, by teaching them how to create strong password, which are memorable. Then after that impose strict security to ensure that whatever is taught must be carried out. Like performing night checks going around desks to look for any papers with password lying around. Can also impose military style in the office where passwords are treated the same way as the the data is. We can also teach them the possible attacks that they could face if they do not choose a strong password, where users would want their account to be compromised? Even running ecommerce, there are ways to teach the users and administrators. Asking administrators to impose password to be at least eight digits long, have at least 1 upper case character and also a symbol to increase the complexity of the password. The password must pass the necessary requirements in order to be registered into the system. While storing in the database, can hash the password, thus the password can never be reversed. We can have a phrase of Four score and seven years ago, our Father which forms 4s&7yaoF. Having a mnemonic password is also recommended when giving users training, because this password does not exist in password cracking dictionary. The phrase can also help them to use different characters such as uppercase or lowercase, punctuations in their passwords. So even when you try to social engineer a user about their password, the user can tell you that their password is “Four...

Words: 1749 - Pages: 7

Premium Essay

Nt1310 Unit 1 Exercise 1

...Watchdog detects malicious misbehavior's by promiscuously listening to its next hop’s transmission. If a Watchdog node overhears that its next node fails to forward the packet within a certain period of time, it increases its failure counter. Whenever a node’s failure counter exceeds a predefined threshold, the Watchdog node reports it as misbehaving. The watchdog is capable of detecting malicious nodes rather than links. These advantages have made the Watchdog scheme a popular choice in the field. Many MANET IDSs are either based on or developed as an improvement to the Watchdog scheme the Watchdog scheme fails to detect malicious misbehavior's with the presence of the following: 1) ambiguous collisions; 2) receiver collisions; 3) limited transmission power; 4) false misbehavior report ; 5) collusion ; and 6) partial...

Words: 581 - Pages: 3

Premium Essay

Nt1330 Unit 1 Exercise 1

...1. Exec Summary Architects, developers, and interior designers use architectural visualization to help sell their projects as images can better describe a project than verbiage. Whether a house, a high-rise office building, a bridge, or an entire development, they all share an intense design process. From initial concept, to line drawings, to high resolution conceptual art, the goal is the selling of your idea. And it is the high resolution conceptual rendering which communicates the embodiment of your project and subsequently promotes excitement and sales. The use of 2d images is commonplace. Site plans, floor plans, and elevations can convey general information and are necessary for the builder, but this information is sometimes lost on the end customer. These drawings can suggest the...

Words: 2007 - Pages: 9

Premium Essay

Nt1310 Unit 1 Exercise 1

...__________________________________ Score: _______ Section: ___________ Instructor: _______________________ Date: ________ Activity 4.1A HYPOTHESIS TESTING I. Problem Solving: A. Formulate the null and and alternative hypothesis of the following statements. 1. The Department wants to know if the average working hours in preparing full meal is 3 hours. Ho: ______; ______________________________________________________ H1: ______; ______________________________________________________ 2. A teacher wants to know if there is a significant difference in the performance task of STEM and ABM strand in Personal Development subject. Ho: ______; ______________________________________________________ H1: ______; ______________________________________________________...

Words: 895 - Pages: 4

Premium Essay

Pt1420 Unit 1 Exercise 1

...the following equation. This equation shows that the rate of change of the human population can be expressed by minus the population of zombies. Consequently, this new model predicts that the zombie population will grow exponentially. It is possible to use this equation to find out how quickly the human population is changing for any number of zombies. For example, if there are 50 zombies, the rate of change of the human population can be expressed by the following. This shows that the rate of change of the human population when there are 50 zombies is -50. This means at this time, the human population will be shrinking at a rate of 50 humans per day. Assuming the population of zombies can be expressed by the equation in kill rate 1, the following substitution can be made. Therefore, it is possible to integrate the equation to find the population of humans over time. It is possible to calculate the value of A by finding the initial conditions. When time is 0, it has already been stated that there are 9999 humans. Therefore, these values can be substituted into the equation and it rearranged for A. Therefore, the population of humans can be modelled by the following equation. Thus, the population of zombies is modelled by, . Both of these can be graphed as follows. Figure 2. Populations of both zombies and humans over time. Using figure 2, it can be seen that the time that it takes the zombies to overtake the human population has drastically decreased...

Words: 454 - Pages: 2

Premium Essay

Nt1310 Unit 1 Exercise 1

...MANET is the infrastructureless network without any access point or base station. It consists of the mobile nodes and has dynamic topology. MANET is self configured and self organizing network. In the ad hoc network nodes are free to move anywhere and any pair of nodes can communicate directly if they are in the transmission range of each other otherwise the communicating nodes depend upon the other nodes present in the network for the communication. So, MANET follows the multi-hop pattern for the communication. In the ad hoc network, the nodes can act as the router as well as host. The nodes in the network dynamically exchange the data without their dependency on any wired backbone network. The nodes in the network are differentiated by their processing, energy consumed, memory resources and most important by their high degree of mobility. Routing protocols play an important role in order to transmit the data from one node to another. The goal of the ad hoc network routing protocols is to establish the valid and efficient routes between the nodes so that the messages are delivered within time. The routing protocols must be able to deal with high degree of mobility. Depending upon their network structure the routing protocols are classified into three types: Proactive protocols, Reactive protocols and Hybrid protocols. Proactive protocols are table-driven routing protocols. Each node stores the network topology information and routing information is exchanged periodically. When...

Words: 519 - Pages: 3

Premium Essay

Nt1310 Unit 1 Exercise 1

...ADAMTS-13 is a protease and it’s role is to cleave vWF (ulvWF). ADAMTS-13 INH ELISA allows us to detect the human autoantibodies (IgG) which is found in plasma and or serum against the ADAMTS-13. These autoantibodies inhibit ADAMTS-13 activity, hence non-cleaved ULvW gather in the plasma – one of the main causes of thrombotic thrombocytopenic purpura (TTP). TECHNOZYM® ADAMTS-13 INH test allows us to differentiate between autoantibodies (acquired) and congenital (gene polymorphisms) TTP when paired to an activity assay. It is also used to control efficacy of plasma exchange therapy. Thrombotic Thrombocytopenic Purpura (TTP) is an uncommon blood disorder which is defined as clotting in the small blood vessels of the body which causes low platelet count (thromboses). The disease can also cause some of the following when TTP progresses: hemolytic anemia, thrombocytopenic purpura, neurologic abnormalities, fever, and acute renal damage/failure. Assays have been developed to measure von Willebrand factor cleaving enzyme (ADAMTS-13) activity. ADAMTS-13 activity can be low, and inhibitors to its activity can often be demonstrated in patients with TTP. These are confirmatory tests, as the results are not returned in time to make a prompt diagnosis. There is debate over whether the ADAMTS-13 activity assay can help in the management of patients with TTP. It does not appear to predict who will respond to plasma exchange. Studies have shown that the multiple domains of ADAMTS-13 are...

Words: 345 - Pages: 2