Free Essay

Nt 1210

In: Other Topics

Submitted By GriffDogg404
Words 918
Pages 4
NT-1210 Unit
Name
Lab

l Labs
Date

1-l

Reading Binary

Convert the following decimal numbers to binary equivalents:
89

1011001

776

10110000

Convert the following Binary values to their decimal equivalent:

101_0100L

169

11101010

234

Lab 1-2 Binary Math and Logic

Draw the graphical symbol Explain the logical operations (give a truth table) for each:
AND

OR

NOT

Lab 1.3 Bit and Byte Structure - (see page 15 of lab manual)

How many bits are in a byte?

8

1 Kilobyte is equal to:

1024
55,296 23,552

bytes Kilobytes Megabytes Terabytes

54 Megabyte is equalto:
23 Gigabyte is equalto:
5 Terabyte is equal to

5,120

120MB =
16GB=

125,829,120
16,384

bytes MBytes

Lab 1.4 ASCII (See page 20 of Lab manual)

1.

Decode the simple numerical sentences into one English paragraph. You may use Google to find an ASCII table. Use the keywords-Binary to text conversion; Hexadecimatto text

conversion; ASGllto text conversion-to aid the decoding process:
Code"Tvoe
ASC

llcodes

Numeric Message 87 101 1 08 1 08 44 32 116 104 97 116 32 109 97 107 101 115 32 111 117 114 32 49 48 32 110 117 109 98 101 114 32 100 101 99 105 109 97'108 3247 3297 115 99 105 10532115121115116 101 '10932 106 117 11511632114105103104 11633148

Translation

Well, that makes our 10 number decimal / ASCII system just right!

Lab 1.5 Creating a File System

Follow the procedures outlined in the Lab Manual on pages 231o27 Exercise 1.5.1 (P. 24)

C:\Users\Junior\Desktop\Classes

Exercise 1.5.2 (P. 25)

The myname.txt file has been relocated to the Networking folder. The path to access the myname.txt file is C:\Users\Junior\Desktop\Classes\Networking.

Exercise 1.5.3

C:
Classes
Math Computing English Networking

Lab Unit 1 Lab Unit 2 Lab Unit 3
Exercise 1.5.4

Lab Unit 4 Lab Unit 5

Yes. When a file is created, it is stored in a location on the disk. As other files are created, they

are placed immediately behind the previously created file. However, if a file is modified, it may need more disk space than it originally got. If the system cannot find enough space to hold the modified file, it stores the excess in a noncontiguous location. This separation of a files is not a big problem because the FAT maintains a record of the location of each file's clusters. However, if a files individual clusters are spread all over the disk surface and separated by the clusters of

other files, the read/write heads have to spend extra time moving from track to track looking for all

the bits and bytes needed to load the file into memory. The result is a degradation in disk operations.
'r'r'r You may skip the Lab 1.5 review on page 26-27

***

Lab 1.5 Gathering System lnformation

Follow the procedures outlined in the Lab Manual on pages 27 Exercise 1.6.1

to32

Free Space Available: 359 GB
Exercise

Capacity: 448 GB

1.6.2 **(****

SKlp

*******

Exercise 1.6.3

4.00 GB of RAM installed

Exercise 1.5.4

Exercise 1.5.5

AMD A6 - 5200 APU @ 2.00 Ghz

Exercise 1.6.6

Exercise 1.6.7

Processses, Performance, App History, Startup, Users, Details, Services. Task Manager enables you to monitor the different services that are currently running on your PC. You can use Task Manager to start and stop programs and to stop processes. Also, Task Manager will show you informative statistics about your computer's performance and about your network.
Exercise 1.6.8

Task Manger is using the most CPU time at 1.5%.

Exercise 1.6.9

Service Host: Local System is using the most RAM at 54.9 MB.

Lab 5-1 Review (Page 32)
1.

Knowing the specs of your system is important for a lot of reasons. From upgrading by buying

new parts to add to your system to dealing with customer support in order to fix a problem.

2.

The risk is that if a process is selected and terminated, a computer might crash. Also, important

data may be lost as a result of killing a process or terminating the wrong process.

3.

If a operating system goes on without system or firmware updates, the computer becomes vulnerable to hackers as well as malware and viruses. Updating the product may enhance or fix an issue, but it can cause other issues. When you install a program, it installs numerous files on the system. Majority of the files are shared by other programs on the computer. If program A and program B both use file A and program A updates file A to a different version that program B is not aware of, program B may not know

how to interpret it. If that is the case then there will be errors.

Lab 2.4 Command Line lnterface Page5O

-

Use Windows XP (Virtual Machine) or Windows 7

1. Click the Start Menu 2. Type (or Select) Run 3. Type CMD (Win 7 and XP) 4. Type IPCONFIG
Record your results below (You

don't have to document all the adaptors)

Lab 3.5 Sharing Network Resources (You should use the Virtual Machine

for NT-1210)

Note: The password for Windows XP is PaSSwOrd -- The "0" is the numerical zero; not the letter o.
Exercise 3.5.L(P.72l,

Lab 3.5 Review (P.75)
1.

2.

Similar Documents

Premium Essay

Nt 1210

...Emmanuel Reyes NT 1210 S. 8:00-12:55 Unit 2 Lab 6.3: 1) SSID can be more diverse be unique to the users of the network 2) ASUS RT-AC68U, the LAN and Wireless 2.4 GHz MAC Addresses are the same because is the same device providing hard-line and wireless internet connection. The IP Address is 192.168.1.1. IP Range of 192.168.1.2 – 192.168.1.255. 3) Firmware updates help keep the device running with the latest software needed. Restoring to defaults/loading settings help re-acquire in case something happens to the router. 4) Reyes Home Network Guest. You can add security to sign on to the guest network. You increase the number of wireless networks found within range of the router. 2.1: 1) Media is needed for the signal to pass on, Interface is needed to connect media and access the signal, Signal is what is transported on the media, Pattern is used so signals can be recognized, Timing helps determine the patterns and thus the signal being passed. Without any one of these, the signal will not get to the destination and a link will not occur. 2) Plug and Play, Device Discovery, Driver Updates 3) I cannot add programs by searching on my laptop 4) Peer-to-peer devices allow like devices to communicate without special hardware. 5) Local Area Network, Wireless, Bluetooth 2.1 Review: 1) Network devices can operate through the network and by more than one computer, peripheral devices may be internal or external, but must be connected to a computer with the proper cables. ...

Words: 569 - Pages: 3

Free Essay

Nt 1210

...NT 1210 Lab 3.1.1, 3.2.1, 3.3.1 The Purpose of Reference Models Exercise 3.1.1 What would happen if wireless devices were not governed by the Wi-Fi Alliance and each vendor had its own standards and protocols? What impact would this have on your personal life or business communications? The process of marketing the wireless devices would be much slower than if the Wi-Fi Alliance wasn’t governing them. This would impact my personal life or business communications in a big way. The reason is Wi-Fi Alliance certifies the products through pre-standard rules thus insuring the speed of product market and quality. The OSI Reference Model Exercise 3.2.1 Define each layer of the OSI Model and state what each layer provides. Physical – transmission and reception of the unstructured raw bit stream over a physical medium. Carries signals for higher layers and describes the electrical /optical , mechanical and functional interfaces. Data link – Error free transfer of data frames from node to node over the physical layer , allowing the higher layers to assume virtually error –free transmission over the link. Network - is the third layer, which controls the subnet operation by deciding which physical path data should take based on network conditions and priority of service with other factors. Transport - is the fourth layer, which ensures the error-free delivery of messages in sequence and with no losses or duplications. Higher layer protocols are relieved from concerns with......

Words: 473 - Pages: 2

Free Essay

Nt 1210

...Objectives and Assignments Week 7 Instructor: Thomas W. Chappell, PhD. Office Hours (For appointments): Monday, Tuesday, Wednesday, Thursday 3:30 – 6:00 PM Objectives: Complete current week’s assignments submissions Important Notes: Attendance in class is critical to your accomplishments Missing class is missing valuable information that will help you succeed and accomplish your goals Please attend every class for success in your field! Grading Policy: * Please read the last page of your syllabus which will be covered in week one. * Missing labs will be made up at 80% after the first week, 70% the after the second week and 0% the third week. * Quizzes will not be made up. * Students can potentially be dropped by the Dean of Academic Affairs after missing 4 or 5 cumulative classes. * Students who miss three consecutive class will be dropped by the Dean of Academic Affairs * Assignments and Labs will be counted at 0% after three weeks. Course Objectives Covered by This Unit * CO1 Identify the major needs and stakeholders for computer networks and network applications * CO2 Identify the classifications of networks and how they are applied to various types of enterprises * CO3 Compare and contrast the OSI and TCP/IP models and their applications to actual networks * CO4 Explain the functionality and use of typical network protocols * CO5......

Words: 799 - Pages: 4

Premium Essay

Nt 1210

...ITT Technical Institute NT1210 Introduction to Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to......

Words: 4400 - Pages: 18

Premium Essay

Nt 1210

...Casey Alexander Unit 2 Assignment 2 Multiple choice 1) C 11) A 2) B 12) A, D 3) B, D 13) B 4) C, D 14) C 5) A 15) A, D 6) D 16)D 7) C 17)D 8) C 18)D 9) A, C, D 19) A 10) C, D 20) B Key terms 1) Computer networking – A combination of many components that work together so that many different devices can communicate. 2) Computer network - A combination of many components that work together so that many different devices can communicate. 3) Application – Software that performs some useful function for a user. 4) Email - Electronic mail. An application in which the user can type text and attach other files to create the electronic equivalent of a postal letter, and send the email to another person using his or her email address. 5) Voice call – A more modern term for a telephone call that emphasizes the fact that the traffic flows between the endpoints is voice. 6) Video frame – A grid of pixel locations of a chosen width by height that contains the light/colors......

Words: 402 - Pages: 2

Premium Essay

Nt 1210 Presention

...NT1210 Introduction to Networking Introduction to Computer Networking 1 Objectives  Identify the major needs and stakeholders for computer networks and network applications.  Identify the classifications of networks and how they are applied to various types of enterprises.  Explain the functionality and use of typical network protocols.  Use preferred techniques and necessary tools to troubleshoot common network problems. 2 Objectives  Define a computer network.  Identify the primary needs for computer networks and network applications.  Draw the four major physical network topologies: bus, star, ring, and mesh. 3 Computer Networking  Use large variety of components that must work together.  Move bits from one device to another.  Bit: Smallest unit of data, binary 1 or 0.  Focuses on copying bits on one device to another.  Computing devices include computers, gaming systems, televisions, phones, tablets, GPS navigation systems, watches, etc. 4 Defining a Network with User Applications  Examples: Digital advertising, online/video games, text messages, websites, social media, and email.  Network diagrams often use cloud to identify what part of network to ignore for a particular discussion.  LAN vs WAN 5 Defining a Network with User Applications Computer Networks: Cloud Representing Hidden Parts of the Network 6 Figure 2-1 An Informal General Definition of a Computer Network  Telecom: Short for telephone......

Words: 4305 - Pages: 18

Free Essay

Nt 1210 Introduction to Networking

...John Holbrook Step by Step Installation of a Secure Linux Web, DNS and Mail Server Feb 10, 2004 GIAC GSEC Practical – Version 1.4b, Option 1 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46. 1 Table of Contents Abstract................................. Introduction.........................................................................................................................4 Current Setup..................................................................................................................4 Reasons for new install ..................................................................................................4 Sudo...............................................................................................................................5 Security Comparison of Redhat 9.0 and Openna 1.0..........................................................7 Default Installed Services...............................................................................................7 Configuration Notes............................................................................................................8 The New Setup...............................................................................................................8 Layers of Protection........................................................................................................9 Verifying Integrity of Downloaded Files.................................

Words: 16169 - Pages: 65

Free Essay

Nt 1210 Unit 9 Exercise

...Unit 9. Exercise 1. Print Server Assignment Requirements Respond to the following email: -- FROM: Rebop Pakulah, Acme Engineering Company RE: Printers are multiplying like rabbits. Hello most esteemed US computer guru, Thank you for setting up our branch office in the US. However, our data center has a problem. It seems that everyone there is in love with Office Depot and has a printer on their desk. We employ 150 people. This is too many printers. The ink is so expensive. I hear many people come in of Saturdays and print baseball schedules, shopping list, and photos of their family. What can you suggest to help me? Thank you! From: AA To Rebop Pakulah Hello Rebop; glad to hear your company has increased in employees and volume. Rebop I cannot believe almost every user in cubicle has their own printer. This must stagnate your network, not to mention office expenses for toner and repair calls. Here is what I am suggesting for your 150 employees; you should have 3 multipurpose printers HP4555mfp printers. Then perhaps keep about 10 small HP printers that may belong to your admin staff, such as HR, Recievers, accounts payable team, and those employees that use a printer for 75% percent of their duties. All of these printers would be added to the network server, the subnet, gateway, and IP would be assigned to each printer. After that rules can be added to these printers, such as standard settings, if a user needed to use a portrait printer......

Words: 319 - Pages: 2

Free Essay

Nt 1210 Unit 1 Assignment

...Unit 1 assignment 1. C 2. All of them are wrong the smallest measurement in the answers is a kilobyte and that is actually 1024 bytes not 106. 3. C 4. A,E 5. A 6. C 7. D 8. A 9. A,B,D 10. A 11. A 12. B,D 13. A,C 14. A,D 15. A 16. D 17. B 18. C 19. C,D 20. A,B Lab 1.1 Exercise 1.1.1 103 > 1000 x 2 = 2000 102 > 100 x 9 = 900 101 > 10 x 3 = 30 100 > 1 x 1 = 1 2931 Exercise 1.1.2 22 > 4 x 1 = 4 21 > 2 x 1 = 2 20 > 1 x 0 = 0 4+2+0= 6 Exercise 1.1.3 21 > 2 x 1 =2 20 > 1 x 1= 1 2+1= 3 Exercise 1.1.4 24 > 16 x 1 = 16 23 > 8 x 0 = 0 22 > 4 x 0 = 0 21 > 2 x 1 = 2 20 > 1 x 0 = 0 16+0+0+2+0=18 Exercise 1.1.5 11100010 27 > 128 x 1 = 128 26 > 64 x 1 = 64 25 > 32 x 1 = 32 24 > 16 x 0 = 0 23 > 8 x 0 = 0 22 > 4 x 0 = 0 21 > 2 x 1 = 2 20 > 1 x 0 = 0 128+64+32+0+0+0+2+0=226 > Exercise 1.1.6 156 156 > 27 > 128 x 1 = 128/ 156-128= 28 28 > 26 > 64 x 0 = 0 28 > 25 > 32 x 0 =0 28 > 24 > 16 x 1 = 16/ 28-16=12 12 > 23 > 8 x 1 = 8/ 12-8=4 4 > 22 > 4 x 1 = 4/ 4-4=0 0 > 21 > 2 x 0 = 0 0 > 20 > 1 x 0 =0 100111002 = 156 Exercise 1.1.7 255 255 > 27 > 128 x 1 = 128/ 255-128=127 127 > 26 > 64 x 1 = 64/ 127-64=63 63 > 25 > 32 x 1 = 32/ 63-32=31 31 > 24 > 16 x 1 = 16/ 31-16=15 15 > 23 > 8 x 1 = 8/ 15-8=7 7 > 22 > 4 x 1 =......

Words: 2960 - Pages: 12

Premium Essay

Nt 1210 Unit 5 Assignment 2

...GS 1145 Strategies Unit 11 Assignment 1 Reflection Kelly S Draney This class has been an eye opener for me in respect that I was a real procrastinator. It has helped to open my eyes to the fact that I need to get my homework done and in on time. With the assignment on scheduling I found that I wasted a lot of time during the day, when I could be getting things done. Breaking down my schedule into blocks showed me that I had a lot of wasted time watching TV when I could be more productive. Having to juggle time for work and school was something I was not accustomed to. I have a greater respect for my students now seeing what they have to go through. The other thing this class helped me with, was learning how to use the Microsoft Office Suites programs better. I had no idea how to use Power Point before this class. Gratefully we were put into small groups to work on these projects. The good thing about these projects was it gave me a chance to learn about Power Point. I was surprised how easy it really is to use. It also helped to learn the different rules about completing a Power Point Presentation. I enjoyed being in your class. I heard a lot of good comments from students who felt you were tough, but fair. You created a fun learning environment in class. I look forward to having you again for an instructor later on in my studies....

Words: 259 - Pages: 2

Premium Essay

Nt 1210 Unit 5 Research Project 1.Docx

...Major needs and major stakeholders for computer and network applications Classification of Networks A system convention characterizes standards and contracts for correspondence between network devices. Versatile, few progressions, few elements, high data transfer capacity, CPU power, repetition, port thickness, reasonableness, security highlights The Advantages of using Layer 2 economical, adaptable and versatile, simple to introduce and keep up. Advantages of Ethernet technology Thicknet >(10BASE5)- uses a thicker coaxial link with a transport topology. Thinnet-(>10BASE2) uses a more slender coaxial link with a transport topology. >Ethernet-(10BASE-T) - star topology & UTP cabling >Quick Ethernet (100BASE-T) - convey movement at the ostensible rate of 100 Mbit/s, star topology utilizes UTP .>Gigabit Ethernet (1000BASE-T) - utilizes four sets of Category 5 unshielded contorted pair to accomplish the gigabit information rate of 1000 Mbits/s Define Ethernet concepts Classifiedness- Protection from exposure to unapproved individuals. Confirmation- User names and passwords. Trustworthiness- Maintaining information consistency. Firewalls-an instrument that controls advanced data that comes into and goes out of the system. Antivirus-infection programming intended to recognize and demolish infections. Basic security requirements LAN (Local Area Network)-WLAN (Wireless Area Network)CAN (Campus Area Network)MAN (Metropolitan Area Network)WAN (Wide......

Words: 453 - Pages: 2

Premium Essay

About

...Windows 8 is a Microsoft operating system that is designed for home users as well as for business purpose. Its development started even before its predecessor’s release Windows 7 in 2009.Windows 8 is a system that is particularly orientated to touchscreen hardware. There are some important changes and additives that make it look and differently than the users are used to. For example, the Start menu is completely substituted by a Start screen that can be taken away from the desktop easily by touch screen pen and also by just a normal mouse or keyboard key combination. It contains all the important applications also the ones that are active at the moment. All the icons in the old version of the operating system are changed into tiles that can be juggled with. It can stay constantly on the screen or can be hidden.And now the most important that users expect to hear – when will it be available for the public and for what price? The official release date is the 26th of October, 2012. It was preceded by three pre-release editions while still being developed and tested for the period of the 13th of September 2011 until 31st of May 2012. There will be four editions issued on the market – two general editions just for conventional use, one Pro release of Windows most ardent devotees and Enterprise edition which is for business purposes. ² Windows 8 is the current release of the Windows operating system, produced by Microsoft for use on personal computers, including home and business...

Words: 327 - Pages: 2

Premium Essay

Ocper

...WEEK 8, ASSIGNMENT 2Ireti Kayode Strayer University | | CIS 175 Dr. William McConnell12/03/2013 | | | | | Ocper, Inc. Server Proposal Given Ocper, Inc.’s expanding network scenario there is a clear need to maximize the available resources between employees then it is appropriate to add additional servers to facilitate the sharing of files as well as the configuration of remote access services to allow for remote and secure working. In order to complement the existing network scenario this proposal is based around the configuration and deployment of Microsoft Windows Server 2012 as the network operating system. This is a stable and secure server environment which will allow the designated services to be configured and will equally allow for scalability while at the same time decreasing the overall maintenance and administration to support the network and associated servers. Given the size of the current organization and the IT systems at present, Windows Server 2012 Standard edition would be the most appropriate version for deployment as this will also keep the up-front costs down to a minimum – there is no requirement for the Enterprise Edition whose features will not be required in this implementation. One of the critical roles for the new server implementations will be that of a File Server capability – this can be easily configured within the Ocper, Inc. network through a Static IP address being assigned to this machine and then......

Words: 630 - Pages: 3

Premium Essay

Updating from Windows Xp to Windows 7

...Updating From Microsoft Windows XP to Microsoft Windows 7 A lot of problems can arise when trying to update an older machine such as this from Microsoft Windows XP to Microsoft Windows 7. Microsoft has not made it easy for XP users to move to Win7. You won't be able to run the upgrade disk and have the newer operating system install on top of XP, leaving your data and programs in place. Instead, you have two options: 1. You can do a Clean install, in which you wipe the hard drive clean and install a virgin copy of Windows 7, then reinstall your software and copy your data back to the drive. 2. You can do a Custom install, in which your older setup is squirreled away in a folder called WINDOWS.OLD. This will include your program files, though you won't be able to run your software from there. It will also include data files, but you shouldn't rely on this as your sole backup strategy prior to upgrading. First and foremost When performing and update such as this: make sure that all hardware on the machine that is being updated is compatible and will meet Windows 7's minimum system requirements. A good way to do this is simply to go to the Microsoft website and download the windows 7 advisor at: http://windows.microsoft.com/en-us/windows/downloads/upgrade-advisor. This tool can be very helpful in determining if a system is capable of running windows 7. Some of the Windows 7 system requirements are: * 1 GHz processor (32- or 64-bit) * 1 GB of RAM (32-bit); 2 GB of...

Words: 498 - Pages: 2

Premium Essay

Riordan Manufacturing Company Inc. Wide Area Network

...The current architecture of the Riordan Manufacturing Company Inc. Wide Area Network and network security in place requires updated documentation. The purpose of this paper is to gather the existing information into a single format and evaluate the WAN and security documentation for an executive overview. Riordan Manufacturing, Inc. is an industry leader in the field of plastic injection molding. With state-of-the art design capabilities, they create innovative plastic designs that have earned international acclaim. Attention to detail, extreme precision and enthusiastic quality control are the hallmarks of Riordan Manufacturing. With facilities in San Jose, California, Albany, Georgia, Pontiac, Michigan and Hangzhou, China, the company is heavily dependent upon their communication networks. The documentation produced by this analysis will give the management at Riordan Manufacturing an understanding of their networks today, a plan for future upgrades and a baseline to evaluate security. The goal of this exercise is three fold. Our first will be to provide an inventory of the existing network components for Riordan Manufacturing designated by location, review the network security for each site, and our last goal is to document the current security plan for use in future planning. Because of the limited scope of the project, several assumptions must be made. The first assumption is that Riordan Manufacturing has accurate records of the current infrastructure and no changes......

Words: 11081 - Pages: 45