Free Essay

It 321

In: Computers and Technology

Submitted By tysam
Words 501
Pages 3
Ty Sams
IT 321
Chapter 13 Review Questions pg. 358-359

5. False
6. True
8. F
9. False
12. H
15. B, C, D
16. A, B, D
19. D
20. B
22. True
23. F
24. A
25. H
26. A
27. A, C, D, F

Vocabulary Matching pg. 163

1. T – Collision domain 10. G – Full Duplex 19. K – Port-based buffering 2. I – Hub 11. E- NIC 20. N – Shared Memorybuffering 3. O – MAC 12. S – Latency 21. F – Frame Check sequence 4. Q – Bridge 13. H – Bit time 22. M – Cut- Through 5. V – Switch 14. B – Attenuation 23. R – Fragment -Free 6. L – Virtual Circuit 15. F – Cycle Redundancy Check 7. D – Router 16. C – Store and Forward 8. A – CSMA/CD 17. J - Flooding 9. U – Half Duplex 18. P – Filtering
Vocabulary Completionpg.164

1
Concentrator
Multiport
Shared or Broadcast
Bandwidth
Collision
Data link
MAC
Virtual
Microsegmentation
Broadcast
Network
Broadcast
Collision
Broadcast
CSMA/CD
Half-duplex
Full-duplex
100
Collision
Half-duplex
Latency
Router
64
1518
Attenuation

Building the MAC address Table pg. 167-168
Port MAC Address
E0 0260.8c01.1111
E0 0260.8c01.2222
E1 0260.8c01.4444
E1 0260.8c01.3333

1. The bridge will enter the source MAC address for Host A and the interface that Host A is attached to. Because the bridge does not know where Host B is, the bridge will forward the frame to the segment out E1. 2. The bridge will enter the source MAC address for Host B and the interface that Host B is attached to. The bridge will drop the frame because the destination host, Host A, is on the same segment as Host B. Host A has already received the frame. 3. The bridge will enter the source MAC address for Host D and the interface that Host D is attached to. Because the bridge does not know where Server C is, the bridge will forward the frame to the segment out E0. 4. The bridge will enter the source MAC address for Server C and the interface that Server C is attached to. The bridge will drop the frame because the destination host, Host D, is on the same segment as Server C. Server C has already received the frame. 5. The bridge will refresh the timestamp on the entry for Server C. The bridge will forward the frame out E0 because the destination is a broadcast. Bridges must forward broadcasts.

Vocabulary Completion pg. 170 1. Collision 2. Broadcast 3. Unicast 4. Multicast 5. Broadcast 6. FF:FF:FF:FF:FF:FF 7. collision and broadcast

Collision and Broadcast Domain pg.171-172

In Lab Book

Correct Cable Exercise pg. 172 1. S Hub to workstation or server 2. C Switch to switch 3. C Hub to hub 4. C Router to PC 5. S Switch to router 6. C Workstation to workstation 7. S Switch to workstation or server 8. C Switch to hub 9. C Router to router

Similar Documents

Premium Essay

Fin 321

...Case Project Case # 1: Valuation “ Mercury Athletic Footwear : Valuing the Opportunity” FIN 321 Dr. Ghosh Edward Pinela Adriana Nava Kristie Tillett Grace Tung Zhibin Yang Mercury Athletic Footwear 1. Is Mercury an appropriate target for AGI? Why or why not? There is sufficient evidence to suggest it will be advantageous for AGI to acquire Mercury Athletics. Factored into the decision is the lack of information on the work culture both firms currently possess. Culture is important, because if the cultures drastically differ, it could possibly inhibit efficiency and effectiveness of strategic planning. If one culture empowers employees, while the other gives very limited power to employees to make decisions, the other group will be forced to change. Change is often difficult and is viewed negatively by the employees forced to change. The team still believes there is adequate information from the financial statements and forecasting, that acquiring Mercury is appropriate. Both firms strive in opposing target markets and since the markets differ so greatly, AGI should not experience a measurable amount of cannibalism. Diagram 1 displays revenue and the market advantage of each company. The revenues are comparable, and through the acquisition, they will have more leverage with producers. 2. Review the projections formulated by Liedtke. Are they appropriate? How would you recommend modifying them? The biggest assumption in this model...

Words: 1178 - Pages: 5

Free Essay

Qnt 321

...Data Collection Veronica Rodriguez, Christopher Nieto Vanessa Monge, Rocio Valenzuela QNT/351 March 24, 2014 Victor Ornelas Data Collection Present the BIMS situation as an overview—problem, purpose, research questions, and hypotheses. Problem: Ballard Integrated Managed Services, Inc. (BIMS) has questions in the past months why the turnover over employment has increased drastically. Purpose: BIMS typically experience an annual turnover rate of 55 to 60%, this is common for the industry in general. However, the company’s’ turnover has increased in the past 4 months and it has climbed to over 64%. Managers and supervisors do not understand why the turnover rate has increased and to all management this remains a puzzle. (University of Phoenix,  2014). Research questions: BIMS Employee Survey Using the scale provided, record your answer by circling the number that is closest to your view where 5 is a very positive response and 1 is a very negative choice. Very Negative Very Positive 1. How well do you enjoy working for BIMS? 2. You enjoy your assigned shift. 3. Your request for your desired shift was fulfilled. 4. How many times have you called in sick in the last month? 5. You are well trained for your work. 6. You are paid fairly for the work you do. 7. Your supervisor treats you fairly. 8. Your supervisor’s boss treats your division fairly. 9. The company is good at communicating. 10. You do not fear...

Words: 1227 - Pages: 5

Free Essay

Business 321

...Busi 321 Things to Think About Have you ever cut in line? Are there times when you have been undeservingly favored? How do you look back on those times now? Yes I have cut in line before. The few times where I did cut in line I would look back at the people behind me and most times I would feel guilty to the point where I would just leave the line. I think the reason I felt so bad was because I could see myself in their eyes. Although no one really tried to get me to get out of line, I could see the emotion in their face and that made it personal. I felt like I had personally disrespected every person in the line individually. There has been several times in my life where I felt that I was undeservingly favored. There was a time in my life where I felt undeservingly favored. I was raised in the church most of my life, but as I grew into an adult I turned away from God. Honestly it was a very conscious decision. The basis of my decision was logically correct based on Revelation 3:5 where God says “I know your deeds, that you are neither cold nor hot; I wish that you were cold or hot. So because you are lukewarm, and neither hot nor cold, I will spit you out of My mouth.” There were things I wanted to do that was wrong in the eyes of God and because I didn’t want to be “luke warm”, I chose to leave God because I felt that I would rather be completely in the world than to halfway love God. Of course looking back on it I was very foolish. The reason I feel I was favored is...

Words: 753 - Pages: 4

Premium Essay

Eth 321

...Discrimination and Employment Laws Christine Rodriguez ETH 321 December 7, 2015 Brian La Hargoue Does spoken action have to be targeted or understood as intentional to be considered harassment? More clearly can language have a contrasting impact? While questions like this may seem trivial, everyday workers morale, mental health and feelings are being threated and or affected by harassment. A huge majority of employees both male and female at one point or another are subjected to some form of discrimination and sexual harassment in the workplace. Throughout the centuries sexual harassment and discrimination in the workplace have evolved tremendously. The workforce has shifted from what was once a male predominant workforce to a more equal balance of women and men in the work place. In the case of Reeves v. C.H. Robinson World Wide, Inc., we see a classic example of a woman being indirectly sexually harassed by male employees. Mrs. Reeves claims the men in the workplace constantly made verbal vulgar remarks and suggestions of woman that were offensive and disrespectful. In this paper we will examine the elements of this case as well as see the applicable defenses based on the 11th Circuits Courts of Appeals ruling. Over the years, women have become more career minded and oriented; therefore, a vast majority have achieved positions of authority and professionals as their male counterparts. Because of this evolution in the workforce discrimination and sexual harassment...

Words: 1266 - Pages: 6

Premium Essay

Accounting 321

...SOLUTIONS TO EXERCISES EXERCISE 15-1 (15-20 minutes) (a) Jan. 10 Cash (80,000 X $6) 480,000 Common Stock (80,000 X $5) 400,000 Paid-in Capital in Excess of Par 80,000 Mar. 1 Organization Expense 35,000 Common Stock (5,000 X $5) 25,000 Paid-in Capital in Excess of Par 10,000 (Note: In the past, these costs would have been charged to Organiza¬tion Costs) July 1 Cash (30,000 X $8) 240,000 Common Stock (30,000 X $5) 150,000 Paid-in Capital in Excess of Par 90,000 Sept. 1 Cash (60,000 X $10) 600,000 Common Stock (60,000 X $5) 300,000 Paid-in Capital in Excess of Par (60,000 X $5) 300,000 (b) Jan. 10 Cash (80,000 X $6) 480,000 Common Stock (80,000 X $3) 240,000 Paid-in Capital in Excess of Stated Value 240,000 Mar. 1 Organization Expense 35,000 Common Stock (5,000 X $3) 15,000 Paid-in Capital in Excess of Stated Value 20,000 July 1 Cash (30,000 X $8) 240,000 Common Stock (30,000 X $3) 90,000 Paid-in Capital in Excess of Stated Value 150,000 Sept. 1 Cash (60,000 X $10) 600,000 Common Stock (60,000 X $3) 180,000 Paid-in Capital in Excess of Stated Value 420,000 EXERCISE 15-2 (15-20 minutes) Jan. 10 Cash (80,000 X $5) 400,000 Common Stock (80,000 X $1) 80,000 Paid-in Capital Excess of SV – Common 320,000 Mar. 1 Cash (5,000 X $108) 540,000 Preferred Stock (5,000 X $100) 500,000 Paid-in Capital in Excess...

Words: 7034 - Pages: 29

Premium Essay

Acct-321

...Running head: IMPORTANCE OF INTERNAL CONTROL IN BUSINESS 1 Importance of Internal Control in Business IMPORTANCE OF INTERNAL CONTROL IN BUSINESS 2 Introduction Brazos Manufacturing, Inc.(BMI), a $550 million international automotive parts supply company. It had urged to cut the budgets of its all of the vice presidents. The executive vice president of BMI fraudulently used corporate funds, set up an executive’s double standard and was above the law. However, the ethics officer considered the EVP’s tenure and 30 years authority and was at the very highest levels officer in North America. He wanted to avoid personal involvement in the case he should take action. The controller of company confronted the unethical behavior. He decided to strictly enforce the standards of BMI and disclose the ugly fact. How did company deal with the issues? How did company foresee the importance of the internal control in business and improve it and achieve its budgeted objective? IMPORTANCE OF INTERNAL CONTROL IN BUSINESS 3 Discussion In this case, EVP admitted to everything quickly and had apologized sincerely, and asked to keep his job. (Source) BMI should make the decision based on EVP’s attitude for his fraudulency instead of how huge his contribution to the organization for the past 30 years. Today, the legal and moral culpability of top-level company managers and the ethical...

Words: 839 - Pages: 4

Premium Essay

Eth/321

...Week 2 Knowledge Check Study Guide Concepts Intentional business related torts Negligence torts Strict liability torts White collar crimes 100% 100% 67% 100% Mastery Questions 1 2 3 Score: 11 / 12 4 5 6 7 8 9 10 11 12 Concept: Intentional business related torts Mastery 100% Questions 1 2 3 1. Identify the true statement about a claim of defamation. A. A statement must have the ability to hurt the reputation of an individual in order to qualify as defamatory. B. A statement does not have to be heard by a third party in order to qualify as defamatory. C. An unkind statement made against a profession as a whole is also considered defamatory. D. A statement should be based on pure opinion to qualify as defamatory. Correct: The Correct Answer is: A. In a defamation case, the plaintiff must prove that the defamatory statement was heard or seen by a third party and that the statement had the ability to hurt the reputation of the plaintiff. 2. Who among the following is given absolute privilege or immunity against defamation? A. Journalists while covering the news B. Employers while recruiting new employees C. Business owners during press conferences D. Congress members during congressional debates Correct: The Correct Answer is: D. The members of Congress have absolute privilege against defamation for statements made during congressional debates. This immunity was given through the “speech and debate clause.” 3. ...

Words: 1195 - Pages: 5

Premium Essay

It-321 Lab 4

...Lab Unit 4 4-1 Task 1 CDP only shows information about directly connected Cisco devices. Task 2 Clock rate is set to 56000, interface Serial0 The no shutdown command brings up the interface. Task 3 two Serial0 and FastEthernet 0 Task 4 Switch, Fas 0/2 | Fas 0 | 148 | TS | WS-C2950-1 | BHM, Ser 0/1 | Ser 0 | 178 | R | 2621 | 4-2 Task 1 56000, Serial0 Task 2 GAD FastEthernet 0 | Administratively down | Down | Serial 0 | Administratively down | Down | Task 3 GAD(config)#interface serial 0 GAD(config-if)#no shutdown GAD(config-if)#exit GAD(config)#interface FastEthernet 0 GAD(config-if)#no shutdown GAD(config-if)#exit GAD(config)#exit Task 4 FastEthernet 0 | Up | Up | Serial 0 | Down | Down | Task 5 Sending CDP packets every 60 seconds Holdtime is 180 seconds status of the router interface Task 6 There will be no entries because the serial line is down. Task 8 Table 4-7 CDP Neighbor Detail Neighbor device ID: BHM Neighbor device capabilities: Router IP address of interface attached to your router: 192.168.15.2 Port ID of your router that the neighbor is on: Serial 0 Port ID of neighbor router that your router is on: Serial 0 IOS version of neighbor router: 12.2(12h) Task 9 00:22:50: CDP-PA: version 2 packet sent out on FastEthernet0 00:22:50: CDP-PA: version 2 packet sent out on Serial0 00:22:53: CDP-PA: Packet received from Router on interface Serial0 00:22:53: **Entry found in cache** 00:22:57: CDP-PA: Packet received...

Words: 1696 - Pages: 7

Premium Essay

It-321 Unit 1 Hw

...Unit 1 Chapter 1 Practice Exercise Questions 1-14 1. What does the command ip route 186.157.5.0 255.255.255.0 10.1.1.3 specify? D 2. When a router receives a packet with a destination address that is within an unknown sub-network of a directly attached network, what is the default behavior if the ip classless command is not enabled? A 3. By default, how often does RIP broadcast routing updates? C 4. What is the maximum allowable hop count for RIP? B 5. Which command correctly specifies RIP as the routing protocol? B 6. What is the default value of the RIP hold-down timer? D 7. In this line from the output of the debug ip rip command, what do the numbers within the parentheses signify? A 8. What could cause the message "RIP: bad version 128 from 1600.89.80.43" to be displayed in the output of the debug ip rip command? A 9. How many subnets do you gain by subnetting 172.17.32.0/20 into multiple /28 subnets? C 10. How many hosts can be addressed on a subnet that has 7 host bits? C 11. How many hosts can be addressed with a prefix of /30? B 12. Which of the following subnet masks would be appropriate for a Class C address used for nin LANs, each with 12 host? C 13. What network best represents all private Class B networks? C 14. Which network best represents all multicast IP addresses?...

Words: 256 - Pages: 2

Premium Essay

Bus 321 Test 2

...Bus 321 Test 2 Study online at quizlet.com/_wkq0a 1. The "level playing field" argument is primarily used to justify government policies that The 12 member countries became known as the European Union when the what was signed in 1993. An absolute ban on the exporting and importing of goods to a particular destination According to public choice analysis, domestic trade policies that affect international business have a tendency to develop from Any government regulation policy, or procedure other than a tariff that has the effect of impeding international trade may be labeled Are common in key industries like broadcasting, utilities, air transpiration, defense contracting, and financial services As a result of trade agreements, many countries have replaced quotas with Boeing accused Airbus of violating international trade laws because restrict foreign competition Treaty of Maastricht embargo 12. A common market 2. requires members to eliminate internal trade barriers, adopt a common external policy toward nonmembers, and eliminate barriers to the movement of the factors of production International strategic management 3. 13. 4. Political goals 5. nontariff barrier A comprehensive and ongoing management planning process aimed at formulating and implementing strategies that enable a firm to compete effectively internationally Comprehensive frameworks for achieving a firm's fundamental goals Country X wants to stimulate exports. Which of the...

Words: 2424 - Pages: 10

Free Essay

Com 321 Entire Course

...In this file of POS 371 Entire Course you will find the next docs: POS 371 Week 1 DQs and Summary.doc POS 371 Week 2 Basic Alice Programming Mad Cow Disease.zip POS 371 Week 2 Basic Alice Programming Road to Hana.zip POS 371 Week 2 DQs and Summary.doc POS 371 Week 3 Basic Alice Programming Loops and Logic Big 12 Ranking.zip POS 371 Week 3 Basic Alice Programming Loops and Logic Space Jump.zip POS 371 Week 3 DQs and Summary.doc POS 371 Week 4 Basic Alice Programming Lists and Arrays Helicopter Squadron.zip POS 371 Week 4 Basic Alice Programming Lists and Arrays Leaving on a Jet Plan.zip POS 371 Week 4 DQs and Summary.doc POS 371 Week 5 DQs and Summary.doc POS 371 Week 5 Team Assignment Old West Animation.zip Deadline: ( ), Computer Science - General CS Assignment 4: Database Modeling and Normalization Imagine that you work for a consulting firm that offers information technology and database services. Part of its core services is to optimize and offer streamline solutions for efficiency. In this scenario, your firm has been awarded a contract to implement a new personnel system for a government agency. This government agency has requested an optimized data repository for its system which will enable the management staff to perform essential human resources (HR) duties along with the capability to produce ad hoc reporting features for various departments. They look forward to holding data that will allow them to perform HR core functions such as hiring, promotions...

Words: 388 - Pages: 2

Premium Essay

Bmgt 321 Chapter 13 Homework

...BMGT 321 Chapter 13 Homework Click Link Below To Buy: http://hwaid.com/shop/bmgt-321-chapter-13-homework/ Solutions to In Class Homework Assignments 13-16 Value-added, nonvalue-added costs. The Magill Repair Shop repairs and services machine tools. A summary of its costs (by activity) for 2013 is as follows: Required: 1. Classify each cost as value-added, non-value-added, or in the gray area between. 2. For any cost classified in the gray area, assume 60% is value-added and 40% is non-value-added. How much of the total of all seven costs is value-added and how much is non-value-added? 3. Magill is considering the following changes: (a) introducing quality-improvement programs whose net effect will be to reduce rework and expediting costs by 40% and materials and labor costs for servicing machine tools by 5%; (b) working with suppliers to reduce materials-procurement and inspection costs by 20% and materials-handling costs by 30%; and (c) increasing preventive-maintenance costs by 70% to reduce breakdown-maintenance costs by 50%. Calculate the effect of programs (a), (b), and (c) on value-added costs, non-value-added costs, and total costs. Comment briefly. 3. Effect on Costs Classified as Program Value-Added Nonvalue-Added Gray Area (a) Quality improvement programs to • reduce rework costs by 40% (0.40  $90,000) • reduce expediting costs by 40% (0.40  $65,000) • reduce materials and labor costs by 5% (0.05  $1,100,000) ...

Words: 2889 - Pages: 12

Free Essay

Cmit 321 Final Exam

...CMIT 321 Final Exam Click Link Below To Buy: http://hwaid.com/shop/cmit-321-final-exam/ Written 2016 Attempt Score: 121 / 125 - 96.8 % Final Exam Question 1 1 / 1 point __________ is the exploitation of an organization's telephone, dial, and private branch exchange (PBX) system to infiltrate the internal network in order to abuse computing resources. a. War driving b. Line dialing c. PBX driving d. War dialing View Feedback Question 2 1 / 1 point __________ cryptography is the most common method on the Internet for authenticating a message sender or encrypting a message. a. Symmetric b. Hash-based c. Private-key d. Public-key View Feedback Question 3 1 / 1 point __________ is a lightweight Knoppix version cut to 50 MB for a business-card-sized CD. a. Gnoppix b. GeeXboX c. Morphix d. Damn Small Linux View Feedback Question 4 1 / 1 point The __________ utility tests the integrity of an ODBC data source. a. odbcping b. ASPRunner c. FlexTracer d. DbEncrypt View Feedback Question 5 1 / 1 point In the TCP/IP stack, the __________ layer is where applications and protocols, such as HTTP and Telnet, operate. a. Internet b. network c. transport d. application View Feedback Question 6 1 / 1 point Attackers can use a simple test to find out if an application is vulnerable to an OLE DB error. They can fill in the username and password...

Words: 4865 - Pages: 20

Premium Essay

Com 321 Week 1

...Why I’m a Communications Studies Major I’ve always had a way with my words. Whether it was writing what was on my mind, or delivering a speech, I have always been able to easily find the right words to use. My motivation to study communication lies in my desire to leave my footprint on the world. When I look around and get involved in campaigns I am interested in, I see the hurt and injustice that so many people face. I want to be a driving force in creating a world of justice and acceptance for everyone. The benefits of understanding communication in my person and professional lives are to understand how communication works between different parties, how breakdowns and miscommunications can occur and how to overcome those obstacles. Having a better understanding of communication means I can become a more effective communicator in my personal and professional lives than I what already am. I believe the definition that best fits my own definition in Table 2.1 of Thinking Through Communication, is, “Spoken symbolic interaction is the process by which people use words and other symbols to create meaning and to affect one another.” The definition best fits my own definition, because I believe all interactions between individuals are meant to affect one another. People teach each other, persuade one another, and work together in an effort to affect one another and affect the world they live in. References Trenholm, S. (2011).  Thinking Through Communication:  An Introduction...

Words: 257 - Pages: 2

Premium Essay

Ccjs 321 Project 2

...On Monday July 21, 2014 at approximately 9:15AM Mr. Iam Helpful an employee of Widget Corp. assigned to the human resources department contacted the Intellectual Property and Compliance department of Widget Corp to report a suspected violation of the company’s computer usage policy. I Bill Jones an employee of Widget Corp serving as a technical specialist in the Intellectual Property and Compliance department answered the call and in accordance with company policy begin and immediate investigation. I met with Mr. Helpful in a private office at 9:20AM to get his statement. Mr. Helpful stated that at approximately 9:00AM as part of his regular duties he was meeting with the general manager of the Marketing department. As he passed by the cubicle of Mr. Isure Didit an employee of Widget Corp assigned to the marketing department Mr. Helpful believes he saw what appeared to be a picture of a child that was pornographic in nature on the computer screen. Mr. Helpful did not confront Mr. Didit rather he cancelled his meeting returned to his office and reported the incident. I ended the interview with Mr. Helpful, contacted our physical security desk, and went to the office of the general manager of marketing. I explained that a reported violation of the company’s computer usage policy had been made against Mr. Isure Didit. As per company policy Mr. Didit’s cubical would need to be secured. Following company procedure I made Mr. Didit aware that he was the subject of a reported violation...

Words: 562 - Pages: 3