Premium Essay

Nt1310 Unit 3

Submitted By
Words 2165
Pages 9
Question 2
1) What is a computing cluster?
Clustering is when two or more computers are connected to behave like a single computer. This alters the overall power, increasing processing speed and storage capacity. All the computers perform the same tasks and are normally connected by LAN.

2) Describe how the SETI@home project uses distributed computing to achieve its objectives.
SETI@home operates by using computers across the globe to analyse radio telescope signals. SETI@home uses a large and sensitive telescope located in Arecibo, Puerto Rico. It uses this telescope to listen for radio signals in space. As a large amount of computing power is required to cover the appropriate frequencies the telescope detects, SETI@home uses a significant numbers …show more content…
It is important that you buy a laptop with the right peripherals required. E.g. For a physics student, sufficient USB ports are vital for backing up/transferring money through memory sticks etc. Other peripherals include DVD/Blu-Ray drives.
• Operating system. Includes Windows, Mac and Linux. The student must consider which operating system is best for his/her needs; Windows is familiar and easy to use, while the Mac OS is more secure. Linux is free to install. Firstly, the physics student should determine what applications he/she wishes to run (e.g. Linux would be appropriate for scientific programs). Also, he/she must decide whether they can adapt to whichever operating system they choose (it is quite simple to manage Windows, while it gets harder to manage Mac and Linux respectively).
• Warranty. The physics student must consider what sort of warranty he/she requires. The more secure the warranty, the higher the price. It is important to consider how long the laptop will be needed for before selecting what warranty you want (e.g. physics students will most likely wish for their laptop to last 4 year- the duration of a normal degree).

2) Why is the concept of ‘trade-offs’ so relevant in buying a

Similar Documents

Premium Essay

Nt1310 Unit 3

...Complete Name: Unit 3 Student Name: Emerson, D'Shelia J ********************************************************************************************************** 1. Recruitment, Examination, and Selection ********************************************************************************************************** 2. What are the various forms of examinations used in screening employees for public employment? Student Answer: Before one is adequately considered qualified for a job in public service the following examinations are carried out as assessments of minimum qualifications requirements;Evaluations of training aspects, education, qualifications, and experience. This is a test of how learned one is, where they have worked before...

Words: 1465 - Pages: 6

Premium Essay

Nt1310 Unit 3

...record for audit provides complete information about the transactions and items of data that shows who has access to the network and what they are doing at a given time, where it may be used for security to recover lost data. We have audit trail software that helps track the source Manager (Beal, n.d.) . 2. Explain local area computer network performance issues. Currently, the vast majority of the population have access to the systems in homes and at their workplaces. Due to the increase in use, this is the reason why the network speed is slow also raising questions of hackers. 2.1 Describe how response times are affected for the following a) Speed of devices: The speed of the computer network depends on the number of devices connected to the network and their download and upload speed will be also very depending on how close you access point. It might also depend on the production on what components were used to build the hardware. And use and works faster than others and some slow. If the device is a high speed, then the response time will be high, and vice versa (Mitchell, n.d.). b) Bandwidth of transmission line: The response time depends on the distance between the client and the server, so the further away from each other, the longer it will take for the data transfer. ISPS can also be the difference if we add any meetings between ISP devices reduces the response time (Aidan Finn, n.d.). c) Queuing at nodes: the queuing process represent the term first come...

Words: 517 - Pages: 3

Premium Essay

Nt1310 Unit 3

...to not show up, in which case you can change the default ordering to allow alert rules to be applied before Pass rules. 2. If we only went to a few web sites, why are there so many alerts? Intrusion Detection Systems (IDS) monitors and gathers information through log files by sniffing packets. This information is analyzed for possible intrusion attempts. NIDS uses NIC’s running in promiscuous mode to capture and analyzed raw packet in real time (Pollock, 2014). Snort is a rule base system design to monitor different traffic patterns with a sophisticated detection engine that can analyzed and pinpoint attacks at real-time. Depending on the type of site, a security specialist analyzes can present a lot of traffic or very little traffic. 3. What are the advantages of logging more information to the alerts file? The advantage of logging more information from alert files gives security and network admin more information about possible attacks and weak points on a network. Snort can use third party Log Parser to manage Intrusion detection logs. Two convert snort log files into a text format. Admin can use the following command: output alert csv: alert.csv default (Managing Snort Alerts,). The logs can be customized by the admin. 4. What are the disadvantages of logging more information to the alerts file? More information is great but, if that information is compromised this would leave a network vulnerable to any insider or hacker to sell or used this information for their...

Words: 1545 - Pages: 7

Premium Essay

Nt1310 Unit 3

...A&P Regrades 4. a)This is correct because the basement membrane is where a cell attaches to a “lining”, so the basement membrane will always be outside the normal cell membrane as it is not a part of the actual enterocyte or keratinocyte cell. 7. b)This is correct because the working muscle gets hot and the blood that is being pumped into the muscles are cooler than the muscles themselves, so blood flow into the working skeletal muscle will cool the muscle back down. 8. b)This is incorrect because the rate of transport will only increase if there is a concentration gradient. If there is not gradient, there will not be an increase of transport, so more Glut-4 doesn’t always increase uptake. 11. a) This is incorrect because if there is more glucose ingested, the Glut-2 would allow glucose to be absorbed into the bloodstream, signalling insulin to be secreted. b)This is correct because the concentrated glucose can be taken in by Glut-2, causing a rise in blood glucose. Although, there would be more glucose uptake if there was dietary sodium because more sodium would mean more activity with SGLT-1, causing more glucose to be absorbed into the blood than just GLUT-2 uptake. d)This is incorrect because more glucose ingested would mean more glucose can be absorbed and moved into the bloodstream, causing more glucose to be in the blood rather than less. 12. c)This is correct because insulin resistant cows will have more blood glucose because the glucose will not uptake. If there...

Words: 1295 - Pages: 6

Premium Essay

Nt1310 Unit 3

...collection? 1. CPU 2. Optical storage 3. Optical scanner 4. Light pen 5. None Ans: 3 2. Which among the following is an electro mechanical handheld device? 1. Mouse 2. Monitor 3. ALU 4. CPU 5. None Ans: 1 3. Which among the following utilizes light sensitive detector to select objects on display screen? 1. Mouse 2. Barcode reader 3. Monitor 4. Light pen 5. None Ans: 4 4. Which among the following devices takes voice as input? 1. Speakers 2. Microphone 3. Light pen 4. Control unit 5. None Ans: 2 5. Which among the following is the most important output device as people interact with it directly? 1. Monitor 2. Mouse 3. Keyboard 4. Track ball 5. None Ans: 1 6. Which among the...

Words: 1015 - Pages: 5

Premium Essay

Nt1310 Unit 3

...1 UNIT III. SUPPORT, LOCOMOTION, DIGESTION AND EXCRETION Part 1. Biochemistry of the Bone Chemical and Cellular Composition of the Bone 1. Bone is a mineralized connective tissue, consisting of the following components: Organic (______________) Inorganic (________________) • Mostly Type I _____________ • Its noncollagen components are: o _____________________ o _____________________ o Bone _____________ o _____________________ • _____________________ [Ca10(PO4)6(OH)2] • • _____________ and _____________ 2. Osteoclasts are responsible for __________________ bone. a. They _______________ the matrix to release _____________ (_____________,_____________) into the blood. b. Its apical ruffled membrane border contains: H+-translocating ATPase • Expels...

Words: 675 - Pages: 3

Premium Essay

Nt1310 Unit 3

...Analyze three (3) specific potential malicious attacks and / or threats that could be carried out against the network and organization. Browser attacks Browser based attacks are the most common network attack. They try to trick internet surfers into downloading malware that is disguised as a software application or an update. Cyber criminals also target popular operating systems and applications by employing an exploit. This can be a piece of data or a series of commands that takes advantage of vulnerability in the system. An attack as such can put the network at risk. Browser attacks can download many different types of viruses which can cause system crashes and data loss. This can be avoided by regular updates to both the browser and related...

Words: 759 - Pages: 4

Premium Essay

Nt1310 Unit 3

...plane handles the packets transiting the router among the networks it serves. • The data plane handles the actual network traffic. 3. List two ways you can provide physical security for a router. Answer: There are different ways to provide physical security for a router are shown below.  The room that contains the router should be free of electrostatic or magnetic interference.  It should have controls for temperature and humidity.  If continuous operation of the router is critical, an uninterruptible power supply (UPS) should be installed and spare components kept on hand. 4. List three services you should block at a border router. Answer: The below table shows the services that should be completely blocked by a typical border router. Services to Block Completely at a Border Router Port (Transport) Servie 1 (TCP & UDP) tcpmux 7 (TCP & UDP) echo 9 (TCP & UDP) discard 11 (TCP) systat 13 (TCP & UDP) daytime 5. List two strategies that could be applied to mitigate Denial of Service (DoS) attacks on a router? Answer: There are three primary strategies for combatting DoS attacks, Mention below. 1. Prevent malicious traffic from entering the common network from the enterprise network. 2. Configure and deploy local protective measures, at both border and interior routers. 3. Coordinate protective measures against distributed DoS attacks with network access providers and/or backbone administrators. 6....

Words: 783 - Pages: 4

Premium Essay

Nt1310 Unit 3

...The simulation was performed to study the performance of both IPTV and VOIP over the LTE networks. We used the OPNET simulator 17.5 Modeler to examine the behavior of IPTV and VOIP over LTE networks in the real time domain with reasonably accurate emulation of multiple network topologies. Different thirty of scenarios have been designed in our simulation as shown in Tables 1 up to 4 and their simulated results were accumulated to analyze the effect on overall performance and all of results are monotonically and stable without any resonance. 7.2 Network Topology The network topology consists of application configuration that we accessed our application of video and voice transmission through it, profile configuration that we defined our simulated application to each LTE mobile node, LTE configuration that we accessed all required network parameters through it (i.e. In our simulation it will use physical layer mode as an efficiency mode) and seven cells in each cell LTE mobile SS nodes are located at a certain distance from LTE BS as shown in Fig.6. This network will receive a video and voice streaming signal over IP networks such that LTE BS can access it at a certain transmission power and distance between it and the other base stations and SS in the network in the same coverage area through the accessed network. 7.3 Different schemes Based on LTE Networks 7.2.1 Distance Variation The strength of the transmission signals is a critical issue that affects directly on the quality...

Words: 460 - Pages: 2

Premium Essay

Nt1310 Unit 3

...CORNERSTONE OVERVIEW PRIOR KNOWLEDGE (Before the Unit) Students will need content knowledge about how to classify and describe rocks, how rocks are used by people, and the rock cycle and how rocks are formed. They will need to research this information for their chosen rock of study and apply it to their short poem and timeline included in their pamphlet. If students are choosing to create a pamphlet about marble, for instance, they will need to understand that this rock is classified as a metamorphic rock and is often used for sculptures and countertops. Students will also need to describe the rock cycle in order to successfully create a timeline that demonstrates how marble is formed. Students will also need to practice fluency and creative expression skills. Specifically, students need to be able to read accurately, at an appropriate pace, and with meaningful expression. Teachers will want to use the exemplars provided in this cornerstone to support students in applying previous knowledge and skills to this project. PLACEMENT WITHIN THE UNIT Before:...

Words: 834 - Pages: 4

Premium Essay

Nt1310 Unit 3

...The gown should not be worn more than once and once the gown is removed, perform hand hygiene before leaving the environment. iii. Facemask – if there is a possibility of contact with respiratory secretions, sprays of blood or body fluids, a facemask should be worn. Goggles, shoe covers, and barrier gowns may be worn when wearing a facemask if there is a potential for a spray of blood, respiratory secretions or other body fluids. 3. III.C.7. Identify Center for Disease Control (CDC) regulations that impact healthcare practices. a. The CDC has created a checklist that will assess an employee’s commitment to infection prevention and to make sure that the facility has policies and procedures in place. This checklist also checks to make sure that there are adequate supplies available to prevent infections at the site. There are also specific hand hygiene guidelines and guidelines for disinfection of endoscopes (Kinn’s p 394, 401). i. This checklist includes: 1. Administrative Policies and Facility Practices 2. Surveillance and Disease Reporting 3. Hand Hygiene 4. Personal Protective Equipment (PPE) 5. Environmental Cleaning b. In order for Rosa to prevent cross contamination of infectious materials among patients, herself and staff members, she must follow what the CDC recommends regarding adequate hand hygiene. Rosa should wash her hands with antimicrobial soap and warm running water for a minimum of 15 seconds before donning her gloves. Alcohol hand rubs must be used before...

Words: 610 - Pages: 3

Premium Essay

Nt1310 Unit 3

...system database. On the other hand, if we decrease security level, this will cause that there will be false acceptance in some verification processes and at the same time there will be no matching between user data and any data stored in database and not belong to him/ her. Also there will be privacy problem because of the development of technologies, people can't trust that there biological identities is secured all the time. Biological identities can be used in police crime unit to identify criminals and threats by verifying the attributes. (Robert Gellman, 2013), (L. JEAN CAMP, 2004) Digital identity of a person is all the digital data which belong to that person. Digital identity can be used to identify any individual by creating it on any system. Digital identity is processing faster than biological identity. Digital identity can be created not only for humans but also for business, organizations, devices, software and any object. Digital identity can be traced among some techniques. In police crime unit they trace digital identities of cybercrimes and also they use it to ensure the accessibility to their systems only for the authorized users. (OECD, 2011) ...

Words: 1278 - Pages: 6

Premium Essay

Nt1310 Unit 3

...guidance, and documenting of processes and procedures, and assist in training for system users, for example I held a workshop for team member after I attended an ISA Firewall course. I am also a member of the exchange group, our task is to configure MS exchange server for the student network which is on MS Exchange server. Divided the task between two of us, I was dealing with installing MS exchange and assigning server certificates. First of all, find information, source and plan. We all have to meet and discuss how the project will move forward to the next task which was the installation & decide the appropriate steps for the project to move forward as follows; 1. Install exchange server 2. I choose Custom Exchange Server Installation 3. Choose the installation of Exchange Mailbox, Client Access and Hub Transport server roles 4. Reboot the server and exchange management console will load from start program MS exchange After the installation is over, requested, imported and assigned the certificate for exchange server The next section we will be working on is to publish the rules in ISA server on the student network. Created web server publishing rule for Exchange and OCS and CWA on ISA server. I am in a group called Network group which handles the network infrastructure and the telephony system. The network group which I am apart of maintain the telephony system of CNWL. I am in charge of the telephony system which is configured on this web base configuration interface...

Words: 664 - Pages: 3

Premium Essay

Nt1310 Unit 3 Assignment 3

...Question 1 1.1) The organization was built on bus topology which works best with only a limited number of devices connected. The reason users are experiencing slow speeds to additional users were added. The bus network topology at optimal speeds when there are less than 12 device on the network. 1.2) They could create a new network with the same design for the new users thus decreasing the pressure on the current network. Another option would be to create a new network with topological plan which would be able to accommodate the 20 new users as well as the existing users. 1.3) A single cable, the backbone functions as a shared communication medium that devices attach or tap into with an interface connector. A device wanting to communicate with another device on the network sends a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts and processes the message 1.4) 2.) 3.1) 3.2) 1 minute =60 seconds Therefore 10 × 60 = 600 seconds 1Gb = 1024 Mb 1024 ÷ 600 = 1.7066666667 8bits = 1 Byte 8 ×1.7066666667=13.6533333333 Therefore the throughput on the network is 13.65Mbps 3.3) Accessibility –The server can be remotely accessed from various platforms on the network. Proper Management - Management of files is easy as all files are stored at the same place. This also means finding files is simple. Security – The rules which define...

Words: 903 - Pages: 4

Premium Essay

Nt1310 Unit 3 Assignment 3

...Tucson 2011 has been ranked No. 5. What does this subcompact crossover have to offer? The Hyundai Tucson arrived in the United States in 2005 and its style was similar to the Santa Fe but with more fluid lines. The latest Tucson is one of the first Hyundai to use the design philosophy of the vehicle manufacturer's Fluidic Sculptured. Two four-cylinder engines are available and include a 2.0-liter bed with 164 horsepower and 146 feet of torque and a torque of 2.4 liters at 176 horsepower and 168 feet of torque. Transmission choices include a five-speed manual or a six-speed automatic. The controller moves very slowly and facilitates the motor in its powerband. The 2.0-liter engine moves the Tucson from 0 to 60 in 9.5 seconds and the 2.4-liter unit makes 0 to 60 seconds in 8.8 seconds. The four-wheel disc brakes stop the Tucson from 60 mph in 120 feet. Outside, Tucson has curved body lines combined with a bold front-end. Overall, it is described as a young and sophisticated vehicle that is eye-catching. The interior is well finished and aesthetically pleasing considering the price of this passage. Buttons and buttons for air conditioning and stereo are simple and simple. Standard features include a stereo system with six 160-watt speakers, XM satellite radio, navigation, iPod integration and leatherette partitions. The Tucson will occupy four feet six feet and offers a good back room for the legs. The cargo capacity is 55.8 cubic feet, the rear seats are folded, nearly 25 cubic feet...

Words: 505 - Pages: 3