Premium Essay

Nt1330 Unit 2 Assignment

Submitted By
Words 511
Pages 3
I took notes on the reading assignments, then I worked on the programming assignment. The programming assignment was very simple, just a couple of variables, some math, and the comments. I didn’t have any trouble writing it, but I did take a little time looking for ways that I could improve the program and making sure that I met all of the criteria. I was somewhat surprised how straightforward it was because I was anticipating the course to be difficult from the beginning. The difficulty of the assignments will increase quickly, I expect. So for now I am hesitant to go too far ahead on my own since I haven’t taken a programming course before and I don’t want to get on the wrong track. I realize that there is a long way to go, but I’m still excited to start working with Python.
There was no specific feedback this week, and the feedback for from last week’s discussion board was somewhat general and not about my work itself, so I …show more content…
The timeline and major developments, and some of the background of the people and companies developing the machines. I was surprised by just how disorganized the development was, and how much small ventures contributed to large developments in technology. I was under the impression that development was being largely driven by a few large companies, such as Bell Labs and IBM. Also, I learned the differences between the various data types and how to use them, or at least the types covered, which is very useful. I did not see an explanation for why float division produces errors. It could be a problem with rounding, or maybe it is caused by changing the data into base 10. I’ll have to read into how that works. Any math errors would be a major liability, so that’s probably going to be addressed later in the course. The textbook also didn’t talk about what tuples were yet. Other than that, I didn’t find anything challenging this week, except for keeping up with dates in the

Similar Documents

Premium Essay

Unit 2 Assignment Nt1330

...NT1330 Client Server Networking II Mr. Pham Unit 2 Assignment 1 Dear Junior Admin, Regarding your task with changing out the DHCP You can start by checking the workstations and seeing if they have an static IP setup on the network adapter. There are 2 ways to check this. The first way is to click on the run command in the start menu and type cmd and hit enter. Next type in ipconfig /all, depending on how many Network Interface Card or NIC cards are installed (both logically and virtually.) you might get a long list . Look for your main NIC card that you are configuring. Once you find your NIC card that you are looking for, you should see a line that says DHCP Enabled. If there is no static IP address set up then it should say yes. The second way to check is to open the control panel. Find and open the Network and Sharing Center. On the right hand side you should see an option for change adapter settings. Select you main NIC card and right click and select properties. Select and double click on Internet Protocol Version 4 (IPv4). Once the window pops up, make sure that both the radio buttons for obtain IP Address automatically are selected. You should also check to see if each workstation has renewed its DHCP lease. To do this you can repeat the steps in the first way to change the DHCP setup. Once again you want to look for your main NIC card that you are configuring. Once you find your NIC card that you are configuring you should see 2 lines that say Lease Obtained...

Words: 357 - Pages: 2

Premium Essay

Nt1330 Unit 2 Assignment

...General Questions In-game username: TearInMyHaruhi, normally it is HaruhiFujioka and will be again in a month, but most people call me Haruhi or Em Age: I am fifteen years old and a sophomore in high school. Gender: Female Location and Timezone: Washington (State) and Pacific Time Zone How many staff applications have you made, when was your last application made? My last staff application was made on 2/1/16. If needed it was denied due to incorrect formatting. How long have you been playing Minecraft? I have been playing Minecraft for four years. How long have you been playing on The Server? I have been playing on the server for 2 years. How active are you on The Forums? I would say that I am active on the Forums, because I post a fair amount and I...

Words: 1029 - Pages: 5

Premium Essay

Nt1330 Unit 2 Assignment 1

...Unit 2 Assignment 1 DHCP troubleshooting Hello Junior Administrator, Let me clarify your parameters and intent… You have stated that you were tasked with changing the DHCP scope to match you IP addressing scheme. The IP address range you are using is 192.168.0.200 through 192.168.0.225. I have come up with a couple solutions and approaches to help you with your problem. First of all make sure you have typed all your numbers correctly. At times, a simple number incorrectly typed can throw the entire scheme off. Perform the same check for your subnet inputs as any slight number mistype will negate everything that you are trying to achieve. Make sure the scope is under the established DHCP local role IP address range on your assigned server. My next approach would be to see if there is connectivity between your user machines and the network. Make sure your network interface cards are all up to date and functioning. The other approach I will suggest can be involved if you’re not used to working with your command prompt however it’s doable with a detailed memo to your employees. I would have them release their IP addresses and renew them to through the console command input. I understand that most users may not have the required know how to do these tasks but for those I would actually go and input the commands manually and hopefully this will finally fix your problems. If you still encounter issues, please feel free to contact me and we can walk through...

Words: 265 - Pages: 2

Premium Essay

Nt1330 Unit 2 Individual Assignment

... certain qualities. this has helped me in being a better person. I have learned things which otherwise would never have been explained through classroom interactions. for instance, by being a member of an NGO , I have developed a sense of brotherhood. Also by taking part actively in various sports tournaments , i have known the true meaning of sportsmanship. I have availed of every chance alllowed to me to articulate myself publicly and this has inculcated immense confidence in me . I have encountered people of varied mindsets and approaches , giving me chance to analyse and correlate with multitude of prospective about life thereby enhancing my personality. Overall these all things have helped me develop and grow better. QUESTION 2: I will certainly use my UofT computer engineering degree to curb as many problems as I can. In this 'computer era' ,one can do miracles if he intends to do so with the help of computer. Computation has changed the way people think, work, live, and play. Our methods for communicating, collaborating, and problem-solving, and doing business have changed and are still changing due to innovations enabled by computing. Many innovations in other fields are fostered by advances in computing. health issues are one of the major concern for the world today.thus problems related to health can be overcomed by developing software that can detect diseases in a particular region and offer best solution possible. for this automatic disease diagnosis...

Words: 509 - Pages: 3

Premium Essay

Nt1330 Unit 2 Assignment 1

...Assignment 2 Ebtesam Falah Alhajri, 2120007594, G:1 Write down detailed answers to following questions. At least write 250 words for each question. All assignments will be evaluated with plagiarism software and submissions having a similarity rate of more than 35% will be awarded 0 marks. While answering the questions use the rules of scientific writing such as in-text citations, paraphrasing etc. Maximum Marks=5 Due Date: 23 November 2016 1. The web services model involves managing and performing all types of business processes and activities through accessing web-based services rather than running a traditional executable application on the processor of your local computer. Debate on this statement by discussing...

Words: 1271 - Pages: 6

Premium Essay

Nt1330 Unit 5 Assignment 2

...I have highlighted this during the last PMC meeting that SSI website didn’t get good feedback during UAT. Despite that it went for Usability test which engages internal and external users. During the meeting, I have also highlighted that NEC need to ensure that systems are tested and reviewed by project teams before requesting users to test. The system should be ready for testing by end user when project teams have 70% assurance on the quality of the product. Current Situation: I have attached links to SSI and NCSS website at UAT stage (http://ssiuat/SSIUAT and http://ncssuat/NCSSUAT). From the few clicks to these sites, you can clearly see that SSI website is not ‘product ready’ in comparison to NCSS website. Following are the broad issues with SSI website: • Missing Webpages which do not conform to agreed Information Architecture • Missing graphics and texts • Links do not work • Inconsistent font and format of text used • Previously agreed by NEC that SSI Website will be able to link TMM and update upcoming courses. There is a disconnect between TMM systems developer and website developer. SSI users have expressed their frustration as they can clearly see that the product is not ready for testing and the entire exercise of creating test report will be futile. It is clearly felt by users that UAT and Usability is done as an activity to comply to project timeline. This has severe repercussion downstream as users do not wish to submit gap documents where more than 50% of...

Words: 451 - Pages: 2

Premium Essay

Nt1330 Unit 3 Assignment 2

...chance against a true disaster. It may be impossible to ward off every threat actors attempt, so understanding what actions must be taken in the midst of a network infiltration or malicious attack is of dire importance. Lastly, risk management allows a company to understand ways to reduce risk. This may be through testing the network, applications, and systems for vulnerabilities and determining how to improve, outsourcing some of the operations to reduce risk to operations, obtaining insurance to maintain financial obligations, accepting the residual risks within the organization, and more. Each aspect of risk management can create a better understanding of the assets that require more protection, and ways to improve processes for the company. 2. What is the difference between a'smart' and a'smart'? Discuss how you would assess the risk of identity theft in a non-profit agency. Describe your agency and your needs. Give your agency a creative name. Our non-profit organization, Hero’s Helping Hero’s (HHH) develops programs based on the needs of the community. We function mainly throughout the state of Virginia but provide services to those out of state when visiting different areas. We help others in need of rental assistance, food, jobs and education, mental health counseling, substance abuse training, temporary housing, and community service opportunities. We are stationed in Petersburg, VA, Richmond, VA, and Norfolk, VA. Although we are open to providing everyone assistance, we primarily...

Words: 3281 - Pages: 14

Premium Essay

Nt1330 Unit 2 Assignment 1

...Dear Junior Admin A, Sounds like the other workstations are still trying to use their old IP addresses. Go to the workstations and perform an ipconfig /release and then ipconfig /renew in the command prompt. Default IP lease is set to renew every 8 days and if the affected workstations are not due to renew their IP address yet they’re not picking up on the new scope. I hope this works and if you have any problems or questions feel free to contact me. Thanks, IT Admin Dear Junior Admin B, For the small office, I would use a DNS server with a stub zone. This will really help conserve bandwidth. Without an onsite DNS each time a workstation attempts to find a website it will have to query Internet DNS servers taking up bandwidth. Using an onsite DNS decreases a lot of broadcast chatter. Of course a stub zone DNS will have to be directed to a primary DNS to maintain a current authoritative list of name servers. For the larger office, I would also use a DNS server but with an active directory-integrated zone. This is a primary zone configuration. Even though this location has higher bandwidth, domain members still rely heavily on DNS services to locate domain resources. This DNS should be configured as a DC (domain controller)/DNS server. This will greatly improve the overall user experience within the network. I hope this works and if you have any problems or questions feel free to contact me. Thanks, IT...

Words: 255 - Pages: 2

Premium Essay

Nt1330 Unit 2 Assignment 1

...Unit 2 Assignment 2: The Best Solution Task 1 The purpose of anti-virus protection is to detect malicious software; it does this by scanning files and software though the database, this is known as definition files. Anti-virus protection will protect the computer from malicious software and viruses. Malicious software is self-replicating so that anti-virus protection is used to stop this kind of software replicating. A virus will make the computer shut down, so anti-virus protection is put in place to prevent this from happening. There are different forms of viruses which anti-virus software prevents; these include adwok, malware and worms. Adwok are advertisements which users may see on websites they visit, for example you may visit a website like eBay, and then when you go on to...

Words: 1817 - Pages: 8

Premium Essay

Nt1330 Unit 4 Assignment 2

...Assignment # 04 Kamal Hussain 16179 QUALITY OF SERVICE Introduction: QUALITY OF SERVICE (QoS) refers towards capability of the network to provide superior help to help picked network traffic in excess of a variety of technologies, similar to frame delay, Asynchronous Transfer Mode (ATM), Ethernet and also 802.1 networks, SONET, and also IP-routed networks The item will use any kind of as well as just about all associated with most of these underlying technologies. ones primary goal involving QoS is actually to required priority similar to dedicated bandwidth, controlled jitter as well as latency The idea necessary via a series of real-time in addition to interactive traffic, and with improved loss characteristics. Additionally clicks is bringing in sure The idea providing priority regarding sole as...

Words: 591 - Pages: 3

Premium Essay

Nt1330 Unit 2 Assignment 1

...Introduction System administrators, also known as chief information officer (CIO) are people who are responsible of setting up and maintaining systems. The duties of one ranges from installing, supporting, and maintaining servers or computer systems, user accounts management, ensure the availability of peripherals and services, performance tuning and monitoring, managing file systems, software installation and updates, preparing contingency, backup and recovery plans, policy enforcements, as well as security measurements implementation. (cyberciti.biz, 2008) Problems Identification As a software house, program scripts and codes, and documentations are core business assets. Storing them in a publically assessable server jeopardizes the resources by putting them at risk of being cyber-attack victims, hence the integrity and confidentiality are questionable. The company also lacks proper management and administration of their systems and resources in place, some are underutilized, such as the disk space utilization of their services like databases, mail services, active directory, and so on, the administrative account is known by most of their employees and there is no control over employees’ usage of internet resources that are in place. The company also possesses inefficient contingency and recovery plans, when disastrous failure happens, their operations takes long period of time to recover to the original state. There is no scheduling of software/hardware upgrades that are in...

Words: 2994 - Pages: 12

Premium Essay

Fsmo Role Ayer Nate Method

...important to be aware of what servers are Global Catalog servers, especially if you have more than one domain and even if only one domain, they will be prefered by applications like Exchange server. It is recommended to place the forest roles on one Domain Controller (DC) and the domain roles on another server. If not all Domain Controllers are Global Catalog servers, it is also important to place the infrastructure master on a server that is NOT a Global Catalog server. Recommended Best Practice setup of FSMO roles. Domain Controller #1 Place the two forest roles on this server. * Schema Master * Domain Master Domain Controller #2 Place the domain roles on this server. * RID Master * Infrastructure Master * PDC Emulator If more domains exist in the forest, place the domain roles on a server in theese domains like Domain Controller #2 Global Catalog configuration. In Windows 2008 Active Directory all Domain Controllers are by default Global Catalog servers, personally...

Words: 10360 - Pages: 42

Premium Essay

Client Server 2

...ITT Technical Institute 3825 West Cheyenne Avenue, Suite 600 North Las Vegas, Nevada 89032 NT1330 Client-Server networking II Name: ____________________________________________________ Date: _______________________ NT1330 Week 1 Unit 1 Assignment 1 Instructions: 1. Complete this assignment and submit it prior to the beginning of the next class meeting. 2. Completely fill in the bubble for the correct answer(s), any other mark such as an X or just a line through it will be marked as incorrect. True/False Indicate whether the statement is true or false. 1. IPv6 uses 128 bits, or 16 bytes, for addressing, thus providing 2128 (about 340 billion) unique addresses. A True B False 2. Dynamic IP addresses can be assigned when administering TCP/IP hosts. These addresses must be configured and maintained manually. A B True False 3. Using DHCP relay agents eliminates the need to have a DHCP server on every subnet. A True B False 4. One benefit of the hierarchical structure of DNS is that it is possible to have two hosts with the same host names that are in different locations in the hierarchy. A B True False 5. ICS turns your computer into a router so that other computers on the local network can access its Internet connection. A B True False 6. If you inappropriately allowed network discovery in a public network environment (for example, an Internet café), you would allow total strangers to see and access any file shares on your system. A B True...

Words: 1872 - Pages: 8

Premium Essay

Help

...Anna Monreal NT1330 WEEK 2 ASSIGNMENTS Unit 2 Assignment 1 DHCP Trouble Shooting Dear Jr. Admin, One of the first reason that some of the computers may not have not picked up the new leases could be that those computers were not rebooted. This would be the first thing I would do. If for some reason this does not work try disabling and enabling the NIC. Once the computer comes back up it should ask for the new DHCP. One other step to try is to force the address to renew. Go to your command prompt and type in ipconfig or iprelease. Once you have tried these steps and the work station still do not pick up the new leases there obviously would be some other issues. It is possible that there are more workstations than ip addresses. You may want to take a count of how many actual computers that you have in your office. If they exceed the number of IP address that you were given you will need to contact the main office to request a larger range of addresses. One of the last reasons could be is that the DHCP does not cross the router. If those computers that did not renew their leases are separated by a router you will make sure that you have a DHCP for each network. If this is the case then once you have DHCP on each network as an extra step I would make sure that each computer on the network that did not renew is rebooted. Good Luck Anna...

Words: 262 - Pages: 2

Premium Essay

Test

...Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210 Structure and Introduction to  ComputerLogic Networking    IS3120 IS3110 NT1210 Network  Risk Management in Introduction to General Education / General Studies NT2580 NT2799 Communications Information Technology Introduction to Information Security NSANetworking Capstone Project IS4550 NT2640 Security Policies and Implementation IP NT2640 Networking IP Networking PT2520...

Words: 2305 - Pages: 10