Issc340 Week 6 Assignment

In: Computers and Technology

Submitted By cunninghams04
Words 297
Pages 2
Name: Jerry Cunningham Date: 16 March 2015
ISSC340 Week 6 Assignment (3% of Grade) APUS/Sanford

Lesson 6 Review: Transmission Media
The purpose of this activity is to reinforce what you have learned so far about local area networks technologies.

1. What is the difference between standard voice-grade cabling and data-grade cabling? (Min. word count: 30)


When determining the difference between voice-grade cabling and data-grade cabling, user much keeps in mind that twisted pair cables such as voice grade can support data speed of 19Kbp up to a distance of six miles. On the other hand data grade cabling have a speed of to 100 Mbps.

2. True or false: A diameter of a 22AWG twisted-pair cable is smaller than a 26AWG twisted pair cable? Explain… (Min. word count: 10)


The answer would be false because due to being bigger in the numbers of AWG the diameter of the cable would be much smaller

3. In which frequency bands to do short-range wireless transmission operate? (Min. word count: 10)


When dealing with frequency band short-range wireless operates in both 2.4(Ghz) microwave band and 5 (Ghz) band



4. What are the two types of light source used to transmit signals over optical fiber? (Min. word count: 10)


According to textbooks, the two different types of light source use to transmit signals over optical fiber are: analog and digital data



5. True or false: Bluetooth is a good example of short-range wireless transmission. Explain. (Min. word count: 10)


The answer is : True

Short-range wireless is used both for networking PCs and for connecting PC to peripherals. The most common standard for wireless networking is 802.11 Ethernet. The most common standard for peripheral device communications is Bluetooth.…...

Similar Documents

Week 6 Assignment

...GM 592 Skill Development Assignment Week 6 Well the company that I work for is a high performance culture as for what is expected of its employees and the mission and values of the company. The slogan is the “customer is always right “. We have to bend over backwards sometime to satisfy the customer’s needs. However, if I was to look at everything internally I would say that it is a low performance culture because insular things and resistance to change. Management to me is a dictator ship when it comes down to making changes. The send out the e-mail of what is expected for us to do but they do not work in the stores or know how much extra time it will take to implement the changes. My current boss basically reads the e-mails tell us what they say and then it is just do it. He never questions the changes because for one there is nothing he can do about it but his approach is so dry to where I personally have some sort of resistance. Sometimes I feel that if those who come up with the plans for the changes were in practice they would grumble as well. Creating a strategy culture fit would be the leadership action used by my organization. Because I work in a pharmacy there is a lot of liability when we make mistakes with customer’s medication. A lot has to do with understanding the doctor’s writing and making the necessary phone calls to clear up any concern. Then the scanning of the bottles upon dispensing help with error of giving the patient the wrong medication...

Words: 702 - Pages: 3

Assignment 3 Week 6

...Week 6 Assignment 3 Research Plan HSA505 Health Services Planning and Management Dr. Point-Johnson, Instructor Strayer University Berlin Boxley May 13, 2012 Alternative health care is a growing industry in medicine. Canada has one of the highest rate of their population seeking alternative medicine in the U. S. According to the National Population Health Survey by Statistics Canada (1998-99) found that 3.8 million Canadians aged 18 and over had consulted an alternative health care provider at least once during the previous 12 months. This is just one state out of 50 for the U.S. Imagine the popularity of this type of treatment being sought as medical attention for sicknesses. A definition frequently referenced in research comes from the National Center for Complementary and Alternative Medicine (NCCAM) in the United States. They define alternative medicine as a group of diverse medical and health care systems, practices, and products that are not presently considered to be part of conventional medicine (medicine as practiced by medical doctor or doctors of osteopathy and their allied health professionals, such as physical therapists, psychologists, and registered nurses). Alternative health care is sometimes referred to as complementary and alternative health care. The terms “alternative” and ‘complementary” refer to using the same therapy in many different ways. That is, alternative refers to using a particular type of therapy instead of conventional treatment. Also...

Words: 1105 - Pages: 5

Issc340 Week 2 Assignment Lesson 2 Review: Wide Area Networks

...Name: ___ ____________ Date: __ 2013_________ ISSC340 Week 2 Assignment (3% of Grade) APUS/ Lesson 2 Review: Wide Area Networks The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. What is a T1 circuit? (Word count: 15-25) ____A T1 circuit is a DS1 WAN technology that is comprised of 24 x 64 kbps data channels and 1 x 8 kbps allotted for signal and network management for a total of 1.544 Mbps. It is versatile because data types can be divided into voice, video, and data channels from one T1. ________________________________________________________________________________________________________________________________________________________ 2. A statistical multiplexer provides each user with … (Word count: 15-25) ____bandwidth based on demand on the circuit as it is available. This is different and more efficient than TDM where each user is slotted a given bandwidth whether it is used or not. __________________________________________________________________________ ______________________________________________________________________________ 3. What does a SONET add/drop multiplexer do? (Word count: 15-25) ____It provides the capability to add or extract part of the data payload without completely demultiplexing or remultiplexing the signal.____________________________ 4. Describe an ATM cell … (Word count: 15-25) ___ATM is a connection-oriented, packet-switching technology......

Words: 299 - Pages: 2

It210 Week 6 Assignment

...Currency Conversion Test Cases Display Menu Valid Menu Selection or Errors | Inputs | Expected Output or Message | Canadian | Menu Selection = 1 | Do you want to continue with the conversion Yes or No?Currency_Type = 1 | Costa Rica | Menu Selection=1 | Do you wish to continue with this conversion yes or no?Currency Type= 1 | Australian | Menu Selection= 2 | Do you wish to continue with this conversion yes or no?Currency Type= 2 | Europe | Menu Selection= 3 | Do you wish to continue with this conversion yes or no?Currency Type= 3 | Singapore | Menu Selection= 4 | Do you wish to continue with this conversion yes or no?Currency Type= 4 | Colombian | Menu Selection= 5 | Do you wish to continue with this conversion yes or no?Currency Type= 5 | Exit | Menu Selection= 6 | Are you sure you would like to exit the program? | India | Menu Selection= 1 | The Country entered is invalid | Jupiter | Menu Selection= 2 | The Country entered is invalid | Peru | Menu Selection= 3 | The Country entered is invalid | Get International Values Valid International Values | Input | Expected Output | 100 CAD | 100.00 | International Value = 100 | 10000 CRC | 10000.00 | International Value=10000 | 25 AUD | 25.00 | International Value=25 | 2000 EUR | 2000.00 | International Value=2000 | 75 SGD | 75.00 | International Value= 75 | 6000 COP | 6000.00 | International Value=6000 | 2 CRC | 20000.00 | International Value=20000 | 60 AUD | 60.00...

Words: 704 - Pages: 3

Issc340 Week 1 Assignment

...Name: _________________ Date: ___________ ISSC340 Week 1 Assignment (3% of Grade) APUS/Sanford Lesson 1 Review: Overview of Local Area Networks The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. What are the main architectural components of a LAN? (Minimum word count: 60) The network’s physical topology – how the nodes are connected. The access method – how nodes access the transmission medium. The transmission technique – how information passes through the network. The transmission media – wired or wireless. The use of specific protocols that define how communication between computers takes place – TCP/IP is the standard communication protocol in modern networks. The LAN’s interconnectivity – how the LAN shares information with other types of networks. 2. Describe the function and characteristics of a network operating system (NOS). (Minimum word count: 100) A network operating system (NOS) manages resources on a network and enables the provision of services to one or more clients. A NOS consists of two components: a server component and a client component. The sever component is the more complex component that runs on the server. The server component can manage multiple users on a network, provide access to file and print servers, provide services such as Internet access and implement network security. The client component runs on the client machine and......

Words: 273 - Pages: 2

Issc340 Week 5 Assignment

...Name: _______________ Date: __ ISSC340 Week 5 Assignment (3% of Grade) APUS/Sanford Lesson 5 Review: Networking Models, Traffic and Devices The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. Describe the three modes of communication available on a network. (Minimum word count: 60) They are simplex, half-duplex, and full duplex. In simplex communication, data travels only in one direction, much like a PA system. While the half-duplex allows travel in two different directions, but only one direction at a time, much like a walkie talkie. The full-duplex communication allows data to travel in two directions at the same time, similar to a phone conversation. 2. List the seven layers of the OSI model, including both layer number and name for each. (Minimum word count: 20) They are 7) Application, 6) Presentation, 5) Session, 4) Transport, 3) Network, 2) Data Link, 1) Physcial. 3. Describe a protocol data unit (PDU). (Minimum word count: 30) A protocol data unit (PDU) is a unit of data passed from one open system interconnection (OSI) level to another. The PDU consists of the payload or original information along with the header that is added in Layer 7 of the OSI. 4. List three practical functions of the OSI model. (Minimum word count: 60) The OSI practical functions are it describes the process of packet creation. It also explains the framework used to connect different types of systems, meaning...

Words: 444 - Pages: 2

Nt1110 Week 6 Assignment

...1. A DHCP is Dynamic Host Configuration Protocol, it is a client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other related configuration information such as the subnet mask and default gateway. 2. The type of NIC that I have is A VIA Rhine II Fast Ethernet Adapter 3. The physical address is 00-11-2F-BF-C9-DA 4. The Subnet Mask is 255.255.255.0 1. A LAN is a Local Area Network. A local area network is a network that connects computers and other devices in a small area, usually in a single building or a group of buildings. 2. WAN is Wide Area Network A WAN is a computer network that spans a relatively large geographical area. 3. MAC ADDRESS stands for Media Access Control Address It is an ID code that's assigned to a network adapter or any device with built-in networking capability, such as a printer. 4. 802.11 G is used for transmission over short distances at up to 54-Mbps in the 2.4 GHz bands. 802.11 N The speed is 100 Mbps and so it is up to 4-5 times faster than 802.11g. 802.11n also offers a better operating distance than current networks. 5. Bluetooth is a short-range radio technology (or wireless technology) aimed at simplifying communications among Internet devices and between devices and the Internet. It also aims to simplify data synchronization between Internet devices and other computers. 6. Router is a device that forwards data packets along networks. Switch is a device that filters and...

Words: 520 - Pages: 3

Issc340 Week 1 Assignment

...Lesson 1 Review: Overview of Local Area Networks The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. What are the main architectural components of a LAN? (Minimum word count: 60) There are several main architectural components of a LAN. Included is the physical topology of the network determining how the nodes on the network are connected. Access methods are needed on the network to determine how the nodes will access the transmission mediums. The networks transmission techniques and the transmission media determine how the information will be passed throughout the network and if the network will use cables or be wireless. Protocols are a main component of a LAN because they lay out how the various machines will communicate between each other. The LAN’s interconnectivity is another main component because it determines how the information on its own network will be shared with other types of networks. 2. Describe the function and characteristics of a network operating system (NOS). (Minimum word count: 100) The network operating system (NOS) allocates resources throughout the network and allows sharing of services to its clients. There are two different parts of the NOS, the server portions and the client portions. The server portion of the NOS will be more complex than the clients because that runs the servers and consists of many more tasks. The server portion of the NOS will have many...

Words: 344 - Pages: 2

Week 6 Assignment

...Homework Assignment NETW 420 February 15, 2014 Professor Viviane Ruiz SNMP stands for Simple Network Management Protocol. SNMP is one example of a management protocol. This is an application layer protocol that helps in administrating and supervising network assets across the web. The SNMP has three key components. They are the managed devices, the agents and the network management system. Show below is the relationship between the managed devices, agents, and NMSs components (Simple Network Management Protocol, 2012). Managed devices are network nodes that contain the SNMP agent and are connected to the network that is managed. They will gather and store information then they make the information available to the Network Management System by using SNMP. These devices are routers, servers, switches, computers, printers and many other devices. The agent is a network management software module that is installed on a managed device. The agent is knowledgeable of the management information and can make it compatible to the SNMP. The Network Management System implements the applications that will conduct the monitoring and controlling of the managed devices. There is usually more than one NMS on a managed network (Simple Network Management Protocol, 2012). SNMP uses four basic commands while it monitors and controls a managed device. These four commands are read, write, trap, and the traversal operations. The Network Management System uses the read command to...

Words: 598 - Pages: 3

Issc340 Week 1 Assignment

...Name: _Aaron Hancock_ Date: _12OCT2014_ ISSC340 Week 1 Assignment (3% of Grade) APUS/Sanford Lesson 1 Review: Overview of Local Area Networks The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. What are the main architectural components of a LAN? (Minimum word count: 60) The main architectural components are 1: The network's physical topography (how the nodes are connected) 2: The access method (how the nodes access the transmission medium) 3: the transmission technique (how information passes through the network) 4: the transmission media (wired or wireless) 5: the use of specific protocols (the language used to communicate between computers) 6: the LAN's inter-connectivity (how the LAN shares with other networks) 2. Describe the function and characteristics of a network operating system (NOS). (Minimum word count: 100) A network operating system (NOS) manages the resources used within the network and enebles select services to select nodes. A NOS consists of two main components: a server component and a client component. The server component is the most complex component that runs on the server. The server component can do many things, to include; manage multiple users, provide access to files and printers, provide internet access, and enforce network security protocols. The client component runs on the client machine and enables the client to participate on the network. A NOS client......

Words: 270 - Pages: 2

Issc340 Week 4

...Name: ___________________________Date: ____________________ ISSC340 Week 4 Assignment (3% of Grade) Lesson 4 Review: LAN Topologies The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. What are the two methods that Carrier Sense Multiple Access (CSMA) employs to handle messages that are sent simultaneously? (Min. word count: 15) Carrier sense multiple access methods are detection where a transmission is cancel when collision is detected and avoidance where transmission is delayed. Which topology would you use when unable to install network cable? (Min. word count: 15) Mesh topology because is provides has separate cables for each connection, meaning a cable can break without interfering with the rest of the network. What is inherent in mesh topologies that enable them to provide high reliability? (Min. word count: 20) Mesh topology provides fault tolerance by having separate cables for each connection, allowing any one cable to break without interfering with the rest of the network. What are advantages of star topologies? (Min. word count: 10) Star topology gives great fault tolerance as any device/cable failure will not affect the rest of the network. Compare the two modes supported by wireless topologies. (Min. word count: 20) In ad-hoc mode data in the network is transferred to and from wireless network adapters connected to PCs. An infrastructure network enables you...

Words: 454 - Pages: 2

Hrm 562 Week 6 Assignment Hrm562 Week 6 Assignment

..., and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: * Examine the processes of how organizations learn and organizational barriers that impact the process. * Use technology and information resources to research issues in developing a learning organization. * Write clearly and concisely about developing a learning organization using proper writing mechanic. HRM 562 Week 4 Discussion "Contextual Factors and Behavioral Channels" * Design a table using three (3) of the six (6) contextual factors (e.g., environmental uncertainty, task uncertainty, error criticality, task structure, proximity to the organization’s core mission, and organizational structure). For each contextual factor, create one (1) brief scenario that is beyond management’s control. Then, develop one (1) corrective action to increase the management success. Note: Online students may use Microsoft Word or other equivalent software to design the table and then copy and paste it into the discussion board. * Use the Internet or the Strayer Library to research different leadership styles. Next, select the behavioral channel of influence that you believe promotes the most effective learning in your organization or an organization with which you are familiar. Then, specify the most effective leadership style to influence the workforce. Justify your response HRM......

Words: 3971 - Pages: 16

Issc340 Week 1 Assignment

...Name: Date: ISSC340 Week 1 Assignment (3% of Grade) Lesson 1 Review: Overview of Local Area Networks The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. What are the main architectural components of a LAN? (Minimum word count: 60) The main architectural components of any LAN starts with the layout for how the nodes connect, the access method (which is how the node gain access to a transmission medium), the transmission technique (which is how the information passes through the network), transmission media (which is defined by either wired or wireless connections), the use of very specific protocols (which are sets of rules that define how the computers communicate and define the LANs interconnectivity), which then determines how the LAN shares information. 2. Describe the function and characteristics of a network operating system (NOS). (Minimum word count: 100) One of the biggest differences between a Network Operating System and a regular operating system is that unlike the OS which can run a single computer, the Network Operating System can run multiple computer on a network at once and allow the network to continue running. The Network Operating System is an essential element of the LAN that can consist of server components and a client component. The server components have multiple responsibilities that can range from managing multiple users on a network, providing access to......

Words: 297 - Pages: 2

Week 6 Assignment 1

... Did Jim and Laura Buy a Car Week 6 Assignment 1 Matthew Ader Professor Lori Baggot LEG 100 Feb 14 2016 A contract is an agreement that creates an obligation that is enforceable by the law. The law has clear guidelines that before there exists a contract that will be binding, there has to be an offer, acceptance, mutual obligation and all parties should be of sound mind and by law be of legal age. A contract can either be written or spoken. Assuming that the buyers were at the required age went to the car dealership looking to purchase a new car. Stan the salesman made an offer to Jim and Laura and they both agreed to the terms. They asked that Stan the salesman hold the car for a day. He told them to put down $100 dollars to hold the car and that it would go to the final purchase of the car or that it would be refundable. Jim and Laura just wanted to hold the car so that it would still be there the next day. With mutual understanding Stan the salesman keeps the car and calls the next day to confirm when the purchase would be completed. I do believe that Jim and Laura did not enter into a legal contract that is binding. There are several factors that do not exist that would show a legally binding agreement. Like a contract that both parties would sign, agreeing to the purchase of the car. Having a contract in writing that both parties signed could show the sale of the car. Stan the salesman let Jim and Laura have a chance to test drive several cars that they...

Words: 760 - Pages: 4

Issc340

...Wireless Security T 01/15/2015 ISSC340 American Public University System Eric Yocam When it comes to dealing with wireless security, it happens to be a problem for everyone. The rise in devices being made during the last decade has put a strain on the amount of data being requested by users. The statistics show that 64 percent of Americans who have internet service providers that impose a broadband cap, have a meter for the cap that is presented. Recent studies have shown that five out of seven people’s meters don’t count your bits correctly. This allows for the chance of assuming what data is being used and being overcharged for what is not actually used. Other statistics show that the laptops that were purchased in 2005 and later were equipped with wireless connectivity. This created an issue with wireless laptops connected to the corporate network, it presents a situation where a hacker could sit in the parking lot and receive information through laptops and other devices, or break in using the wireless card-equipped with this wireless connectivity option. In order to test the strength of most wired and wireless networks the intrusion detection system was implemented. This is a software application that monitors the network activity for malicious activity or privacy violations. The way this works, is that the incidents get reported to a management station. The two different types of intrusion detection system are (NIDS) network based and (HIDS...

Words: 3051 - Pages: 13