Free Essay

# Nt1210

Submitted By Marcth
Words 255
Pages 2
Exploring Why and When to Use Shell Scripts

Lab 4.4

Lab 5.1

The condition | True or False | attAverage >= verizonAverage | True | tmobileAverage == 868 | True | verizonAverage < sprintAverage | False | sprintAverage != attAverage | True |

attAverage = 1410

sprintAverage = 795

tmobileAverage = 868

verizonAverage = 877

Lab 5.2 The condition | Expected Output | If tmobileAverage > 800 AND verizonAverage > 800 Then Display “Both have average download rates over 800” Else Display “One or both of the averages are less” End If | Both have average downloads rates over 800 | If sprintAverage == 800 Then Display “Sprints download rate is 800” End If | No Output | If attAverage >= 1300 OR tmobileAverage >=900 Display “Select either carrier” End If | Select either carrier |

Lab 5.3
Main Module( ) Declare Integer testScore = 0 Declare String category = “ “ Declare String interview = “ “

getScore(testScore) employCat(testScore, category) interviewPoss(testScore, interview) displayInfo(testScore, category, interview)

End Main Module getScore(Integer Ref testScore) Display “Enter the test score: ” Input testScore End Module Module employCat(Integer testScore, String Ref category) If testScore >= 85 then category = “Definite” Else if testScore >= 70 and testScore < 85 then category = “Likely” Else if testScore >=60 and testScore < 70 then category = “Maybe” Else category = “No” End if
End Module Module interviewPoss(Integer testScore, String Ref interview) if testScore >=60 then interview = “Yes” Else interview = “No” End if

End Module Module displayInfo(Integer testScore, String category, String interview) Display “The test score is: “ , testScore Display “The employment category is: “ , category Display “The interview possibility is: “ , interview
End Module

Lab 5.5

### Similar Documents

#### Nt1210

...NT1210 LAB 1.1 1.1.1 2931 103 102 101 100 1000 100 10 1 2 9 3 1 ___________________ 2000 + 900 + 30 + 1 = 2931 1.1.2 1102 22 21 20 4 2 1 1 1 0 ________________ 4 + 2 + 0 = 6 1.1.3 112 21 20 2 1 1 1 __________ 2 + 1 = 3 1.1.4 Exercise 1.1.4: Create an expanded mapping for binary number 10010 subscript 2. 2^7 | 2^6 | 2^5 | 2^4 | 2^3 | 2^2 | 2^1 | 2^0 | 128 | 64 | 32 | 16 | 8 | 4 | 2 | 1 | x | x | x | x | x | x | x | x | 0 | 0 | 0 | 1 | 0 | 0 | 1 | = 18 = 18 0 | 0 | 0 | 0 | 16 + | 0 + | 0 + | 2 + | 0 | Exercise 1.1.5: Create an expanded mapping for the......

Words: 252 - Pages: 2

Free Essay

#### Nt1210

...NT1210 Unit 4 Labs Unit 4 Labs NT1210 8/4/14 Unit 4 Labs Lab Review: 4.1 – Page: 82 and 83 1. To eliminate the crossover issue, lower the amount of equipment and cost. Simplify a network. 2. To increase the maximum distance for a signal. If put after the maximum distance the signal may degrade. 3. The connection and processing speed. It also depends on the number of connections the computer or laptop will allow. Lab Review: 4.2 – Page: 85 1. A. Bend Radius: The minimum radius that a fiber optic cable can be bent without loss of light or impairment. A general rule that it be no less than 15 times the cable diameter B. To not affect a signal sent down the line. 2. The core/Glass Filament, Cladding, Buffer, Strengthener and Outer Jacket. Lab Review: 4.3 – Page: 90 1. Ease of installation, lack of certified fiber optic specialists and changes to the physical design of the network later on. 2. By limiting the devices needed depending on the distance and need of each network. Verify the number of access points needed before the start. Lab Review: 4.4 – Page: 95 1. By selecting a specific layer and testing the health you can definitively say the problem lies either below or above that layer. Example: test the Transport layers health if it is ok you know the problem is in the Application layer. 2 A. B. If the cable is damaged in any way it should be checked. -----------------------...

Words: 255 - Pages: 2

Free Essay

#### Nt1210

...NT1210 INTRO TO NETWORKING UNIT3 LAB3.3 The TCP/IP Model Mr. Randy Vogl Gus Perez 19593003 The TCP/IP network model Exercise 3.3.1 What are the distinct differences between OSI and TCP/IP models? TCP refers to Transmission Control Protocol. OSI refers to Open Systems Interconnection. Model TCP/IP is developed on points toward a model the internet. TCP/IP has 4 layers. OSI has 7 layers. TCP/IP more reliable than OSI OSI has strict boundaries; TCP/IP does not have very strict boundaries. TCP/IP follow a horizontal approach. OSI follows a vertical approach. In the application layer, TCP/IP uses both session and presentation layer. OSI uses different session and presentation layers. TCP/IP developed protocols then model. OSI developed model then protocol. TCP/IP offers support for connectionless communication within the network layer. In the network layer, OSI supports both connectionless and connection-oriented communication. TCP/IP is protocol dependent. OSI is protocol independent. http://www.differencebetween.net/technology/internet/difference-between-osi-and-tcp-ip-model/ Read more: Difference between OSI and TCP IP Model | Difference Between | Difference between OSI vs TCP IP Model http://www.differencebetween.net/technology/internet/difference-between-osi-and-tcp-ip-model/#ixzz3f4nyPzTU TCP/IP model protocols and functions. Exercise 3.3.2 Identify the layer in which each protocol resides according to the TCP/IP model. Using figure 3.4 from the......

Words: 1306 - Pages: 6

Free Essay

#### Nt1210

...NT1210 Lab 3 3.1.1 If wireless devices where not governed by the Wi-Fi alliance it would make it hard to communicate hardware and software between different machines. That would mean cable providers, cellphone providers, and internet providers would all have to use their own Wi-Fi frequencies. Without the WI-FI alliance it would be to hard to manage day to day life with all devices not being able to share hardware and software. Also there would be no real security so it would be easy for someone to hack all of your information. 3.1.2 A model that is used to visualize something that I would use is power points. It is easier to explain something to someone when you break down the information into slides and show key points. Power points make information easier to understand. 3.1.3 Data Link Physical Application Network Transport 3.1.4 If the model is to general then you wouldn’t understand it. If the model is to granular then the data would begin to overlap itself. Review.3.1 1. The data wouldn’t be filtered correctly so there would be connection errors. 2. (OSI) started in the 1970s, with a lot of progress on individual standards in the 1980s, and with vendor products appearing by the early 1990s. It was created to compete with TCP/IP. It broke everything into layers and each layer provided facilities to the layer above it and below it. 3. (TCP)/IP resulted from research and......

Words: 334 - Pages: 2

#### Nt1210

Words: 704 - Pages: 3

Free Essay

#### Nt1210

...1. B. 2. C, D. 3. A, C 4. B, D 5. B, C. 6. A, B. 7. D. 8. B. 9. C. 10. B. 11. C. 12. A. 13. C. 14. B, D. 15. A. 16. A, D. 17. B, C. 18. B, C. 19. B. 20. A, B and C. Key Terms for Chapter 3 TCP/IP network: NetWare operating system software that includes a set of drivers having an interface with MLID/ODI drivers at the bottom layer, and an interface with the Berkeley-socket application program interface at the top layer. Networking standard: Network Standards refer to a series of definitions for data & voice networks and are published by IEEE and ISO. Network standards define how networks are supposed to run in relations to architecture, electrical, interface and overall process standards. TCP/IP Model: Is maintained by the Internet Engineering Task Force (IETF).  Provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination.  Development of the networking model was funded by DARPA, an agency of the United States Department of Defense. Open networking model: Like TCP/IP purposefully shares the details that any vendor can make products using those standards. Open Systems Interconnection (OSI) model: Uses 7 layers, with layers 1 through 4 matching layers 1 through 4 on TCP/IP’s model. Encoding: A set of rules used to represent characters or values in an alternative format. Header: Information at the beginning of a data packet. Header typically includes......

Words: 579 - Pages: 3

#### Nt1210

Words: 257 - Pages: 2

#### Nt1210

...Unit 10 Multiple choice 1. C 2. A, B, E 3. A 4. D 5. B, C 6. A, B, C 7. C, D 8. A, C 9. D 10. A 11. A 12. B 13. D 14. B 15. A 16. B, C 17. C, D 18. A .19. C 20.B, D Define key terms Transmission control protocol- a set of rules (protocol) used along with the Internet Protocol to send data in the form of message units between computers over the Internet. User datagram protocol- a communications protocol that offers a limited amount of service when messages are exchanged between computers in a network that uses the Internet Protocol. Flow- a directed graph where each edge has a capacity and each edge receives a flow. TCP segment- The unit of transfer between the TCP software on to machines UDP datagram- part of the Internet Protocol suite used by programs running on different computers on a network. Source port- the port from which a packet is sent. Destination port- Identifies the port number of a destination application program. Well-known port number- the port numbers that are reserved for assignment by the Internet Corporation for assigned names and numbers for use by the application end points that communicate using the Internet's transmission control protocol or the user datagram protocol. Dynamic port- is a private port. TCP segmentation- TCP receives data from an application and segments the data into pieces. This segmentation is necessary so that the information can be placed inside the TCP data......

Words: 282 - Pages: 2

#### Nt1210

...Lab 1.1 Analyze OSI & TCP/IP Networking Models | OSI Layer | Layer Name | Layer Functions | Fill in two or three protocols per layer | Matches with TCP/IP Layers | 7 | Application | How the user or user application gain network access | | Application | 6 | Presentation | Responsible for interoperability between sender and receiver who might using different encoding schemes | | Application | 5 | Session | Establishing, maintaining, and terminating communications between processes or applications across the network | | Application | 4 | Transport | Ensures that the entire message sent from a sender to a receiver has been delivered | | | 3 | Network | Ensures the delivery of individual packets across network links | | | 2 | Data Link | Takes unpackaged bit stream data and packages into units called frames and attaches physical address to each frame | | Network Access | 1 | Physical | Transmit an unpackaged bit stream over some type of physical medium | | Network Access | Analyze TCP/IP networking Model | TCP/IP Layer | Layer Name | Layer Functions | Fill in two or three protocols per layer | 4 | Application | Equivalent to the application, presentation and session layer of the OSI model | DNS, HTTP, SMTP | 3 | Transport | Establishing and maintaining end-to-end communication between the sender and receiver | TCP, UDP | 2 | Internet | pack data into data packets known as IP datagrams, which contain source and destination address......

Words: 550 - Pages: 3

Free Essay

#### Nt1210

...An operating system is the framework that allows you to communicate with computer hardware in an interactive way (Answers Corporation, 2013). Without this, you would not be able to tell the computer to do anything and it would not have any instructions to follow (Answers Corporation, 2013). This is why it is important for a computer to have an operating system (Answers Corporation, 2013). There are three main operating systems Windows, Mac, and Linux. When it comes to popularity and market share the most popular operating systems are Windows and Mac. Linux is an operating system that is popular with desktop users (HubPages, 2013), According to HubPages, “Windows is the Operating System with the largest market share. However, this doesn’t make it the best when it comes to quality and consistency as it is constantly marred with problems of viruses and malware (HubPages, 2013).” It usually had an affordable price tag at first, but the consumer is charges extra items like soft wear and anti-virus expenses that add up (HubPages, 2013). Linux is usually thought as a less effective than Mac and Windows, however it does offer many software programs that are similar to the Windows and Mac programs for free (HubPages, 2013). All three computer operating systems have Intel processors that make them unique. According to Pearson Certification Team, “Macintosh computers have Intel processors, they are not PCs. Likewise, the Mac OS is not compatible with PC hardware, and PC- based......

Words: 399 - Pages: 2

#### Nt1210

Words: 1059 - Pages: 5

#### Nt1210

...Standard Wiring Pinouts From: http://www.alatec.com/info/other.html | Standard wiring for an RJ11 or RJ12 connector, pairs are made from inside out. Pair 1 is the Blue pair, Pair 2 is the Orange pair, Pair 3 is the Green pair. | | 568A is used for a lot of Ethernet cables. It is one of the two most widely used standards. If you wire both ends of your cable using 568A, you’ll have a straight-through cable usable for most Ethernet applications. Wiring a cable with 568A on one end and 568B on the other will result in a crossover cable for connecting two hubs together, or two computers together. | | 568B is the most widely used standard for Ethernet cables. If you wire both ends of your cable using 568B, you’ll have a straight-through cable usable for most Ethernet applications. Wiring a cable with 568A on one end and 568B on the other will result in a crossover cable for connecting two hubs together, or two computers together. | | USOC RJ45 standard is not as widely used but is an acceptable standard for wiring Ethernet. It uses the two center pins for pair one, with subsequent pairs placed to the outside of each previous pair. Usually used for straight-through cables. | | Copyright © 2008 CP3, Inc. | CAT5e Straight-Through Cable Creation Guide Before you begin creating your CAT 5e straight-through (patch) cable, it’s important to point out that the method outlined here is only one method. It is by no means the only or best method. Also, make sure you have all the......

Words: 912 - Pages: 4

Free Essay

#### Nt1210

Words: 538 - Pages: 3

Free Essay

#### Nt1210

...Topology Worksheet DIRECTIONS: Complete the following worksheet. Identify each topology diagram by name, and add the typical logical and/or physical characteristics associated with each topology. Topology Diagram Topology Name Logical Characteristics Physical Characteristics Star Network Topology Easy to install and wire. No disruptions to the network when connecting or removing devices. Easy to detect faults and to remove parts. A star topology is designed with each node (file server, workstations, and peripherals) connected directly to a central network hub, switch, or concentrator Data on a star network passes through the hub, switch, or concentrator before continuing to its destination. The hub, switch, or concentrator manages and controls all functions of the network. It also acts as a repeater for the data flow. This configuration is common with twisted pair cable; however, it can also be used with coaxial cable or fiber optic cable. Ring Topology in which the signal path is a ring but the external physical appearance is that of a star, as in Token Ring networks. This is sometimes called a star-wired ring. can be a true physical ring or a logical ring. A true ring network is similar to a linear bus, in that each computer is connected to the next in a line--but with one important difference. In this case, the last computer is connected back to the first, eliminating the "beginning" and "end" of the network and forming a complete circle around......

Words: 646 - Pages: 3