Premium Essay

Cis 106 Assignment 2

In: Computers and Technology

Submitted By shyyguy
Words 1186
Pages 5
A Computer Home Network

Jerry Battle

Instructor: Dr. Phillip Duncan

CIS 106

June 12, 2015

HP
Officejet Pro 6830 Printer
IP: 192.168.1.84
HP
Officejet Pro 6830 Printer
IP: 192.168.1.84
Samsung
55’’ SmartTV

Samsung
55’’ SmartTV

Lenovo
All-In-One
PC # 1 Media
IP: 192.168.1.79
Lenovo
All-In-One
PC # 1 Media
IP: 192.168.1.79
Laptop #1
Lenovo
G50 Notebook
IP: 192.168.1.73
Laptop #1
Lenovo
G50 Notebook
IP: 192.168.1.73
Laptop # 2
Lenovo
G50 Notebook
IP: 192.168.1.75

Laptop # 2
Lenovo
G50 Notebook
IP: 192.168.1.75

Samsung
Blue-Ray
Player
Samsung
Blue-Ray
Player
Ethernet Switch
Ethernet Switch
Wireless Broadband Router
Wireless Broadband Router AT&T
Home Internet AT&T
Home Internet

Laptop # 1 Laptop # 2 Acct # 1 Mr. Battle Acct # 1 Joshua Admin Rights, Admin Rights Acct# 2 Ms. Battle Acct # 4 Jaylen Basic User Rights Basic User Rights My Home Network

My home network consists of the basic 4 computers and network devices that are need to create a small home network. The hardware that I purchase all came for the same vendor. I have purchased many computer devices from Tiger Direct Store and have always been very pleased with the quality. Below summarizes the hardware that I purchased to setup my home network. 1. Laptop: I chose to purchase the 2 Lenovo G50 Notebook. This laptop is ideal for use at home. G50 Notebook has a 15’’ display with Intel HD Graphics controller. It comes with 4GB of DDR3L 1600 PC3-12800 memory and i7 2GHz Dual Core Intel processor with Windows 7 Home O.S. I can use this laptop as anywhere and anyplace in my home and will always be attached to the network as long as a connection is available. 2. Desktop: I chose to purchase the Lenovo C365 All-In-One PC. This all-in-one desktop is a perfect

Similar Documents

Free Essay

Cis 106 Complete Class – All Quizzes and Assignments

...CIS 106 COMPLETE CLASS – ALL QUIZZES AND ASSIGNMENTS To purchase this, Click here http://www.activitymode.com/product/cis-106-complete-class-all-quizzes-and-assignments/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 106 COMPLETE CLASS - ALL QUIZZES AND ASSIGNMENTS CIS 106 WK 3 Case Study 1 - Computer Ethics, CIS 106 WK 4 Assignment 1 - Computer Architecture, CIS 106 WK 5 Quiz 1, CIS 106 WK 6 Assignment 2 - Networking, CIS 106 WK 7 Assignment 3 - Databases, CIS 106 WK 8 Quiz 2, CIS 106 WK 9 Assignment 4 - The Human-Computer Interface, CIS 106 WK 10 Case Study 2 - Software Development Models, CIS 106 WK 11 Quiz 3, CIS 106 COMPLETE CLASS – ALL QUIZZES AND ASSIGNMENTS To purchase this, Click here http://www.activitymode.com/product/cis-106-complete-class-all-quizzes-and-assignments/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 106 COMPLETE CLASS - ALL QUIZZES AND ASSIGNMENTS CIS 106 WK 3 Case Study 1 - Computer Ethics, CIS 106 WK 4 Assignment 1 - Computer Architecture, CIS 106 WK 5 Quiz 1, CIS 106 WK 6 Assignment 2 - Networking, CIS 106 WK 7 Assignment 3 - Databases, CIS 106 WK 8 Quiz 2, CIS 106 WK 9 Assignment 4 - The Human-Computer Interface, CIS 106 WK 10 Case Study 2 - Software Development Models, CIS 106 WK 11 Quiz 3, CIS 106 COMPLETE CLASS – ALL QUIZZES AND ASSIGNMENTS To purchase this, Click here http://www.activitymode.com/product/cis-106-complete-class-all-quizzes-and-assignments/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 106 COMPLETE...

Words: 437 - Pages: 2

Free Essay

Cis 106 Complete Class

...CIS 106 COMPLETE CLASS TO purchase this tutorial visit following link: http://wiseamerican.us/product/cis-106-complete-class/ Contact us at: SUPPORT@WISEAMERICAN.US CIS 106 COMPLETE CLASS ALL QUIZZES AND ASSIGNMENTS CIS 106 WEEK 3 Case Study 1 – Computer Ethics, CIS 106 WEEK 4 Assignment 1 – Computer Architecture, CIS 106 WEEK 5 Quiz 1, CIS 106 WEEK 6 Assignment 2 – Networking, CIS 106 WEEK 7 Assignment 3 – Databases, CIS 106 WEEK 8 Quiz 2, CIS 106 WEEK 9 Assignment 4 – The Human-Computer Interface, CIS 106 WEEK 10 Case Study 2 – Software Development Models, CIS 106 WEEK 11 Quiz 3, CIS 106 COMPLETE CLASS ALL QUIZZES AND ASSIGNMENTS CIS 106 WEEK 3 Case Study 1 – Computer Ethics, CIS 106 WEEK 4 Assignment 1 – Computer Architecture, CIS 106 WEEK 5 Quiz 1, CIS 106 WEEK 6 Assignment 2 – Networking, CIS 106 WEEK 7 Assignment 3 – Databases, CIS 106 WEEK 8 Quiz 2, CIS 106 WEEK 9 Assignment 4 – The Human-Computer Interface, CIS 106 WEEK 10 Case Study 2 – Software Development Models, CIS 106 WEEK 11 Quiz 3, CIS 106 COMPLETE CLASS ALL QUIZZES AND ASSIGNMENTS CIS 106 WEEK 3 Case Study 1 – Computer Ethics, CIS 106 WEEK 4 Assignment 1 – Computer Architecture, CIS 106 WEEK 5 Quiz 1, CIS 106 WEEK 6 Assignment 2 – Networking, CIS 106 WEEK 7 Assignment 3 – Databases, CIS 106 WEEK 8 Quiz 2, CIS 106 WEEK 9 Assignment 4 – The Human-Computer Interface, CIS 106 WEEK 10 Case Study 2 – Software Development Models, CIS 106 WEEK 11 Quiz 3, CIS 106 COMPLETE CLASS ALL...

Words: 334 - Pages: 2

Free Essay

Cis 106 Wk 10 Term Paper - the Future of It

...CIS 106 WK 10 Term Paper - The Future of IT To Purchase Click Link Below: http://strtutorials.com/CIS-106-WK-10-Term-Paper-The-Future-of-IT-CIS1062.htm CIS 106 WK 10 Term Paper - The Future of IT You are the new chief information officer for ACME Widgets. The president of the company recently asked you what you think the future of information technology will be. After a lengthy discussion, he further challenged you to write a position paper that will help direct the company’s allocation of resources based on your understanding of the future and potential paradigm shifts. Write a five to eight (5-8) page paper in which you: 1. Identify and describe a future information technology that you believe will create a paradigm shift. 2. Identify and describe the domain in which the shift will occur. 3. Explain the technology, how it works, and how it is different from what we have today. 4. Give at least five (5) reasons why the technology will create a shift. 5. Use at least three (3) quality resources in this assignment. Note:Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: • Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. • Include a cover page containing the...

Words: 279 - Pages: 2

Free Essay

Cis 106 Wk 10 Term Paper - the Future of It

...CIS 106 WK 10 Term Paper - The Future of IT To Purchase Click Link Below: http://strtutorials.com/CIS-106-WK-10-Term-Paper-The-Future-of-IT-CIS1062.htm CIS 106 WK 10 Term Paper - The Future of IT You are the new chief information officer for ACME Widgets. The president of the company recently asked you what you think the future of information technology will be. After a lengthy discussion, he further challenged you to write a position paper that will help direct the company’s allocation of resources based on your understanding of the future and potential paradigm shifts. Write a five to eight (5-8) page paper in which you: 1. Identify and describe a future information technology that you believe will create a paradigm shift. 2. Identify and describe the domain in which the shift will occur. 3. Explain the technology, how it works, and how it is different from what we have today. 4. Give at least five (5) reasons why the technology will create a shift. 5. Use at least three (3) quality resources in this assignment. Note:Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: • Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. • Include a cover page containing the...

Words: 279 - Pages: 2

Premium Essay

Get Online Help with Ur Assignment Ashford a+Material

...http://homeworktimes.com/downloads/acc-202-complete-course-acc-202-entire-course/ http://homeworktimes.com/downloads/acc-206-entire-course-new/ http://homeworktimes.com/downloads/acc-206-new-week-1-assignment-chapter-one-problems/ http://homeworktimes.com/downloads/acc-206-new-week-2-assignment-chapter-two-three-problems/ http://homeworktimes.com/downloads/acc-206-new-week-2-journal-institute-management-accounting/ http://homeworktimes.com/downloads/acc-206-new-week-3-assignment-chapter-four-five-problems/ http://homeworktimes.com/downloads/acc-206-new-week-3-journal-hershey-company/ http://homeworktimes.com/downloads/acc-206-new-week-4-assignment-chapter-six-seven-problems/ http://homeworktimes.com/downloads/acc-206-new-week-5-assignment-chapter-eight-problems/ http://homeworktimes.com/downloads/acc-206-new-week-5-assignment-final-paper/ http://homeworktimes.com/downloads/acc-212-financial-accounting/ http://homeworktimes.com/downloads/acc-250-complete-course-acc-205-entire-course/ http://homeworktimes.com/downloads/acc-290-complete-course-acc-290-entire-course/ http://homeworktimes.com/downloads/acc-291-complete-course-acc-290-entire-course/ http://homeworktimes.com/downloads/acc-340-entire-course-acc-340-complete-course/ http://homeworktimes.com/downloads/acc-400-complete-course-acc-400-entire-course/ http://homeworktimes.com/downloads/acc-407-entire-course/ http://homeworktimes.com/downloads/acc-455-complete-course/ http://homeworktimes.com/downl...

Words: 3197 - Pages: 13

Premium Essay

Computer Architecture

...Assignment 1: Computer Architecture Joseph Henry Strayer University CIS 106 Prof. Shaun Gray November 03, 2013 Assignment 1: Computer Architecture Von Neumann architecture is named after the late John Von Neumann, who was part of a team that created the EDVAC in 1944. This machine was the follow up to the ENIAC, simply because the ENIAC could not modify the program’s contents and could only hold 20 10-digit numbers at a time, needing to be programmed manually (Anderson, Ferro, & Hilton, 2011, p. 11) The concept of Von Neumann architecture is that of a stored program computer, where both binary instructions and data are stored on the main memory. Basically, a program is loaded into memory, and that program could modify itself and be written to perform other functions. Binary instructions are fetched at the same time that data operations occur since they share the same bus. From the computer’s memory, instructions are processed in order and executed by the central processing unit (CPU). The focal point is the CPU, which contains an arithmetic login unit (ALU), control unit (CU), and registers (small storage areas). The ALU performs mathematical functions, especially addition. The CU controls the data traffic in and out of the CPU. The registers are small high-speed units that store instructions and data for the CPU. The CPU accepts input and provides output to external devices. A crystal clock, known as the System Clock times each step in the fetch-execute cycle that...

Words: 1203 - Pages: 5

Premium Essay

Assignment 1: Computer Memory Hacking

...Assignment 1: Computer Memory Hacking Professor Carl Brown CIS 106 Technology continues to evolve exponentially. However these technological advancements continue to pose a threat to both individuals and information resources of companies and governments. There is therefore the need to protect one’s data and information due to the emerging threats and risks. Hacking is where third parties create a backdoor version of a hardware and software so as to manipulate or unlock hidden functionalities on a machine. Most of these hacks are open source and free soft wares. These hacks manipulate the firmware update option on many devices to run and install themselves. Many researchers have found out that breaking into a computer’s encrypted hard drive is very easy with the help of the right tools. A research by Princeton University revealed how low tech hackers access even the most well protected computers (Jordan Robertson 2008). This paper details how encryption was coveted for a long time as a vital shield against hackers, but can be manipulated by altering the operations of the memory chips. This paper outlines just how vulnerable the data we store on our computers and laptops is to possible hacking. Through freezing the Dynamic Random Access Memory (DRAM) chip, which is the most frequently used memory chip in personal gadgets. Freezing DRAM makes it retain data for many hours way after the machine loses its power. This data includes the keys used to unlock encryptions. If the...

Words: 901 - Pages: 4

Premium Essay

Form

...OFFICIAL CATALOG This Catalog contains information, policies, procedures, regulations and requirements that were correct at the time of publication and are subject to the terms and conditions of the Enrollment Agreement entered into between the Student and ECPI University. In keeping with the educational mission of the University, the information, policies, procedures, regulations and requirements contained herein are continually being reviewed, changed and updated. Consequently, this document cannot be considered binding. Students are responsible for keeping informed of official policies and meeting all relevant requirements. When required changes to the Catalog occur, they will be communicated through catalog inserts and other means until a revised edition of the Catalog is published. The policies in this Catalog have been approved under the authority of the ECPI University Board of Trustees and, therefore, constitute official University policy. Students should become familiar with the policies in this Catalog. These policies outline both student rights and student responsibilities. The University reserves the right and authority at any time to alter any or all of the statements contained herein, to modify the requirements for admission and graduation, to change or discontinue programs of study, to amend any regulation or policy affecting the student body, to increase tuition and fees, to deny admission, to revoke an offer of admission and to dismiss from the...

Words: 149595 - Pages: 599

Premium Essay

Just Me

...Assignment 1: Computer Architecture Mardez Terrell Davis CIS- 106 May 5, 2013 Strayer University Arnold Daus Assignment 1: Computer Architecture In the 1940’s computer architecture developed by John Von Neumann and others that allows for input, output, processing, and memory; it also includes the stored program concept. The name Von Neumann machine is named after John Von Neumann. He is also a mathematician who was critical to its success. Von Neumann machine operates on fetch-execute cycle. That means the CPU (Central Processing Unit) fetches an instruction from memory and then executes this instruction. In the process of the CPU you have your input device go to the control unit. Then once the input device is in the control unit it send codes to the Arithmetic Logic Unit known as ALU. The portion of the CPU is responsible for mathematical operations, specifically addition. The next part is when the ALU is sending zeros and ones to a small unit of very high speed of memory o the CPU, used to store data and instructions for the CPU known as the register. In the registers it send everything that is on the computer to the main memory. The two, registers and the main memory is a cycle because they send each other data back and forwards. Now the last part is the output known as the auxiliary storage device like USB, earphones, printers, monitors, mouse and HDMI cord. Von Neumann architecture is important because in the input device you have the keyboard and it sends binary...

Words: 1720 - Pages: 7

Premium Essay

Aau Catalog

...ALLIED AMERICAN UNIVERSITY Personalized. Flexible. Dedicated. Online Programs – Individual Support – Open Enrollment – Ease of Transfer Credits UNIVERSITY CATALOG 2013 Seventh Edition 22952 Alcalde Drive, Laguna Hills, CA 92653 Phone: (888) 384-0849 ∼ Fax: (949) 707-2978 7:00 A.M. – 5:00 P.M. (Monday – Friday) Email: info@allied.edu Website: www.allied.edu KEY STAFF AND FACULTY Charlotte Hislop, Ph.D. Candidate, President/CEO Bonny Nickle, Ed.D., Provost Eric Sharkey, M.Ed., Director of Education Bill Luton, Ph.D., Director of Assessment and Dean of Business Carlo Tannoury, Ph.D. Candidate, Dean of Computer Information Systems Patricia Drown, Ph.D., Dean of Criminal Justice and General Studies C.J. Bishop, M.B.A., Institutional Research Frank Vazquez, Operations Director Parrish Nicholls, J.D., Director of Compliance Lindsay Oglesby, Admissions Director Abby Dolan, B.A., Registrar Sasha Heard, M.B.A., Student Services Manager Barbara Jobin, B.S.B.A., Career Center Manager Hugo Aguilar, B.A., Chief Financial Officer Richard Madrigal, B.A., Financial Aid Officer As a prospective student at Allied American University, you are encouraged to review this catalog prior to signing an enrollment agreement. You are also encouraged to review the student performance fact sheet which must be provided to you prior to signing an enrollment agreement. This catalog is not a contract between the student, AAU, or any party or parties. Reasonable effort was made at the time this document...

Words: 52297 - Pages: 210

Premium Essay

Strategy

...Women and Men A Sex-Specific Meta-analysis of Randomized Controlled Trials Jeffrey S. Berger, MD, MS Maria C. Roncaglioni, MD Fausto Avanzini, MD Ierta Pangrazzi, MD Gianni Tognoni, MD David L. Brown, MD pirin therapy for reducing the risk of myocardial infarction (MI), stroke, and vascular death among men and women with preexisting cardiovascular disease are well established,1-3 the role of aspirin in primary prevention is less clear. An overview of 5 randomized trials investigating aspirin therapy for the primary prevention of vascular disease found a significant beneficial effect of aspirin therapy on the prevention of a first MI, but no significant effects on the risk of stroke or vascular death.4 Although women were included in only 2 of these studies and accounted for only 20% of the population studied, the US Preventive Services Task Force5 and the American Heart Association6 deemed aspirin therapy effective in decreasing the incidence of coronary heart disease in adults of both sexes who are at increased risk. Subsequently, guidelines from the American Heart Association on the primary prevention of cardiovascular disease in women recommended use of low-dose aspirin therapy in women whose 10-year risk of a first coronary event exceeds 20% and consideration 306 Context Aspirin therapy reduces the risk of cardiovascular disease in adults who are at increased risk. However, it is unclear if women derive the same benefit as men. Objective To determine if the benefits and...

Words: 7157 - Pages: 29

Premium Essay

Jessica

...实用审计英语词汇 1 ability to perform the work 能力履行工作 2 acceptance procedures 承兑程序过程 3 accountability 经管责任,问责性 4 accounting estimate 会计估计 5 accounts receivable listing 应收帐款挂牌 6 accounts receivable 应收账款 7 accruals listing 应计项目挂牌 8 accruals 应计项目 9 accuracy 准确性 10 adverse opinion 否定意见 11 aged analysis 年老的分析(法,学)研究 12 agents 代理人 13 agreed-upon procedures 约定审查业务 14 analysis of errors 错误的分析(法,学)研究 15 anomalous error 反常的错误 16 appointment ethics 任命伦理学 17 appointment 任命 18 associated firms 联合的坚挺 19 association of chartered certified accounts(ACCA) 特计的证(经执业的结社 (ACCA) 20 assurance engagement 保证债务 21 assurance 保证 22 audit 审计,审核,核数 23 audit acceptance 审计承兑 24 audit approach 审计靠近 25 audit committee 审计委员会,审计小组 26 ahudit engagement 审计业务约定书 27 audit evaluation 审计评价 28 audit evidence 审计证据 29 audit plan 审计计划 30 audit program 审计程序 31 audit report as a means of communication 审计报告如一个通讯方法 32 audit report 审计报告 33 audit risk 审计风险 34 audit sampling 审计抽样 35 audit staffing 审计工作人员 36 audit timing 审计定时 37 audit trail 审计线索 38 auditing standards 审计准则 39 auditors duty of care...

Words: 2307 - Pages: 10

Free Essay

Graduate Student

...Zhiqiang Gu CPS 230 Fall Semester of 2008 Table of Contents 1 I 2 3 4 5 Introduction D ESIGN T ECHNIQUES Divide-and-Conquer Prune-and-Search Dynamic Programming Greedy Algorithms First Homework Assignment S EARCHING 3 4 5 8 11 14 17 18 19 22 26 29 33 34 35 38 41 44 IV 13 14 15 16 G RAPH A LGORITHMS Graph Search Shortest Paths Minimum Spanning Trees Union-Find Fourth Homework Assignment T OPOLOGICAL A LGORITHMS 17 18 19 Geometric Graphs Surfaces Homology Fifth Homework Assignment G EOMETRIC A LGORITHMS 20 21 22 Plane-Sweep Delaunay Triangulations Alpha Shapes Sixth Homework Assignment NP-C OMPLETENESS 23 24 25 Easy and Hard Problems NP-Complete Problems Approximation Algorithms Seventh Homework Assignment 45 46 50 53 56 60 61 62 65 68 72 73 74 77 81 84 85 86 89 92 95 V II 6 7 8 9 Binary Search Trees Red-Black Trees Amortized Analysis Splay Trees Second Homework Assignment P RIORITIZING VI III 10 11 12 Heaps and Heapsort Fibonacci Heaps Solving Recurrence Relations Third Homework Assignment VII 2 1 Introduction Meetings. We meet twice a week, on Tuesdays and Thursdays, from 1:15 to 2:30pm, in room D106 LSRC. Communication. The course material will be delivered in the two weekly lectures. A written record of the lectures will be available on the web, usually a day after the lecture. The web also contains other information, such as homework assignments, solutions, useful links, etc. The main supporting text is TARJAN . Data Structures...

Words: 49158 - Pages: 197

Premium Essay

Dodi 8500.01

...Information Security Officer (SISO) (formerly known as the Senior Information Assurance Officer) and continues the DoD Information Security Risk Management Committee (DoD ISRMC) (formerly known as the Defense Information Systems Network (DISN)/Global Information Grid (GIG) Flag Panel). d. Adopts the term “cybersecurity” as it is defined in National Security Presidential Directive-54/Homeland Security Presidential Directive-23 (Reference (m)) to be used throughout DoD instead of the term “information assurance (IA).” 2. APPLICABILITY a. This instruction applies to: (1) OSD, the Military Departments, the Office of the Chairman of the Joint Chiefs of Staff (CJCS) and the Joint Staff, the Combatant Commands, the Office of the Inspector General of the DoD, the Defense Agencies, the DoD Field Activities, and all other organizational entities within the DoD (referred to collectively in this instruction as the “DoD Components”). DoDI 8500.01, March 14, 2014 (2) All...

Words: 19443 - Pages: 78

Premium Essay

Eps/Ebit Analysis for Mcdonalds

...relationship between strategic management and competitive advantage for firms. How can a firm achieve sustained competitive advantage? Ans: Strategic management is all about gaining and maintaining competitive advantage. Competitive advantage is anything a firm does especially well compared to rival firms. When a firm can do something that rival firms cannot do, or owns something that rival firms desire, that can represent a competitive advantage. Getting and keeping competitive advantage is essential for long-term success of an organization. A firm must strive to achieve sustained competitive advantage by (1) continually adapting to changes in external trends and events and internal capabilities, competencies and resources, and by (2) effectively formulating, implementing and evaluating strategies that capitalize upon those factors. Page:...

Words: 9747 - Pages: 39