Free Essay

Unit 1 Exercise 1

In: Business and Management

Submitted By Redskins24
Words 253
Pages 2
Composition 1 Composition 1Composition 1didnt didn’t didn’t didn’t did nt didi did did did did did did did did did did did did did did did did did idid id idi did idid did did did dmdidi didid idid idid didid didid didi didididid didiid dididid iediddjiiiiiiiiiii did did didi did idid didi dd didi didii didid didid dddid didid didid diid idid idid idid ididididi did ididi idid ddi didi didi didi idid didid did dididi didid didid didi diid didid didi did idi did id id id I I did id id id id id I ii ii I I I I j j j j j j j d djdjd jdj du dudu dudu dud dud ud dudu dudud dudu dudud dud didi didi diid did idid didi didi did did idd didi diid d idid idi didi idi diid idi did did did id did did id di did did idid ddi didi didi didi did did did did did did did did didid didid didid didid didid did did did dd did id did did did di did di did did did did didi did didid did didid didi did d did did did dd didid did did did did di did did did did did did did did did did did did did did did didid did id did did did did dd did did d did did did did did did did did did did ddid did di didid id diidi di did idid dd

Similar Documents

Free Essay

Unit 1 Chapter Exercise

...Chapter 1 1. Free software is a matter of the users' freedom to run, copy, distribute, study, change and improve the software.  a. The freedom to run the program, for any purpose. b. The freedom to study how the program works, and adapt it to your needs. Access to the source code is a precondition for this. c. The freedom to redistribute copies so you can help your neighbor. 2. The Free Software Foundation (FSF) is a nonprofit with a worldwide mission to promote computer user freedom and to defend the rights of all free software users. a. Linux is an operating system. It is the software on a computer that enables applications and the computer operator to access the devices on the computer to perform desired functions. The operating system (OS) relays instructions from an application to, for instance, the computer's processor. The processor performs the instructed task, and then sends the results back to the application via the operating system. 3. The GNU Hurd is not suitable for production use. The capability-based design has problems that result directly from the flexibility of the design, and it is not clear whether solutions exist. Fortunately, another kernel was available. In 1991, Linus Torvalds developed a Unix-compatible kernel and called it Linux. In 1992, he made Linux free software; combining Linux with the not-quite-complete GNU system resulted in a complete free operating system. It is due to Linux that we can actually run a version...

Words: 879 - Pages: 4

Free Essay

Unit 10 Exercise 1

...1. Forward biased LED-a semiconductor device that emits a narrow spectrum of light. 2. Incoherent Light- light in which the electric and magnetic fields of photons are completely random in orientation 3. Laser- acronym for light amplification by stimulated emission of radiation 4. Output pattern-the pattern of light produced in fiber optic that translate in the data 5. Output power – the amount of light produced by a fiber optic device 6. Modulation speed- the speed of which data is transferred over light 7. Core diameter mismatch- occurs when there is a difference in the core diameter of two optic fibers. 8. Current- the flow of electrons in a conductor 9. PIN photodiode- alight sensitive diode that conducts current in one direction only   10. Avalanche photodiode-  is a highly sensitive semiconductor electronic device that exploits the photoelectric effect to convert light to electricity. 11. Responsivity-the ratio of a detector output to input usually measured in unit of amperes per watt 12. Optical subassembly- the portion of a fiber optic receiver that guides light from the optical fiber to the photodiode 13. Dynamic range- the difference between the maximum and minimum optical input power that an optical receiver can accept 14. Operating wavelength- the wavelength at which a fiber optic receiver is designed to operate 15. Fiber optic couple- a device that connect two piece of fiber for the purpose of......

Words: 469 - Pages: 2

Free Essay

Unit 1 Exercises

...Page 20-21 1. What is free software? List three characteristics of free software. Free software is a matter of the users’ freedom to run, copy, distribute, study, change and improve the software. Three characteristics are: Freedom to run the program for any purpose, freedom to redistribute copies, and freedom to improve the program and release your improvements to the public. 4. What is the Free Software Foundation/GNU? What is Linux? Which parts of the Linux operating system did each provide? Who else has helped build and refine this operating system? GNU is a project for creating an operating system, both kernel and system programs. Linux is a free kernel that was written in 1991. Linus Torvalds contributed the kernel while the GNU project contributed the system programs. It was built and refined by like-minded programmers all over the world. Page 50 1. Briefly, what does the process of installing an operating system such as Fedora/RHEL involve? It involves copying the operating system files from the installation media to the hard disk(s) on a system and setting up configuration files so Linux runs properly on the hardware. Page 86 1. What is a live system? What advantages does it have over an installed system? A live system is when you run Linux from a CD/DVD instead of installing it on the computer. The advantage is you can test out Linux without disturbing your current operating system. 4. Where on the disk should you put your /boot partition or the root......

Words: 470 - Pages: 2

Free Essay

Unit 1 Exercise 1. Local Exchange

...Unit 1 Exercise 1. Local Exchange NT1310 The purpose of a Network is to share data. To make this possible, you have to be able to connect to other computers. To make this enticing to people to want to take advantage of this technology, it has to be simple not so complex. This sounds a little difficult to understand as far as a qualified answer, but to sum things up that is it. The question to ask and that many people don’t consider is how data is transferred from one computer to another computer? Transferring data that is being sent by the user who has created and initialized the transfer of information using a source such as an email service for example. How do you get information from one computer to another, and how do you make it simple and easy to do this? Companies that succeeded at doing this have a great profit with exponential growth possibilities and revenue. For example Cisco company who has made billions by allowing different groups of networks to share data across what we call the internet. Games take advantage of this technology to connect to other computers. Networking companies have succeeded so well in allowing people to connect across their internal networks and the internet that pretty much any app. is able to send data to another computer. There is a physical connection running between two computers that want to connect. This is made possible because phone lines that run from houses to switches to other houses that the phone......

Words: 612 - Pages: 3

Premium Essay

Nt1310 Unit 1 Exercise 1

...Unit 1 Exercise 1 Local Exchange When you send an email from New York to Japan, that email,is sent from your home to the local exchange point over the access network. Once it is in the local exchange it is then sent to aggregating points in different cities and counties over the regional network. Then it is aggregated and transported over the long-haul network so that it reaches the launching point at the country shoreline where it is then sent over the ocean network to Japan. Once there, the email is sent back over the long-haul or regional network to the local exchange and then on to the individual receiving the email. This occurs using mostly fiber optics so the speeds at which all this takes is at the speed of light which is approximately 127,000 miler per second. understand how to interface with the local exchange you must first understand the different networks that comprise it. The first network, being the access network. The access network is the network that connects the individual user or business with the telecommunications system. This is made up of a series of fiber-optic and copper cabling and passive and active equipment that connects you to the local exchange. The central office at the local exchange contains the switching equipment to direct your telephone, data , video, etc. to where it needs to go. The access network is very important to the local exchange since it’s the part that reaches the end user, who is you, and connects them. The metro network,......

Words: 339 - Pages: 2

Premium Essay

Unit 1 Exercise 1

...NT1310 Unit 1 Exercise 1 6/17/14 The world is connected more than ever through the use of the internet. From paying bills to shopping or enjoying leisure time on the web; taking advantage of the internet has become second nature to society. Focusing in on one specific type of networking entertainment, online gaming has become a major league sport in its own right. Online gaming allows people from all around the world to connect together to team up or fight against one another. Behind the scenes is where the real magic happens. Between the gamers sits countless devices and hardware not to mention miles and miles of land. Using Call of Duty as an example, each gamer has a copy of the map being played on installed onto their local computer. Every time the gamer moves the direction of their character, their data is sent from their machine to their router, and then out past the demarc point. On the other side of the demarc is where the service provider picks up the data and moves the data from local network to the central office (better known as the local exchange). The central office then sends the data over the MAN (metro area network) or WAN (wide area network) to continue the data to game server. If the data hasn’t reached the server yet (for example the gamer lives in Michigan and the server is in California) the data will be passed over the core (also known as long-haul) network which connects MANs and WANs of different geographies together. On the off......

Words: 398 - Pages: 2

Premium Essay

Unit 4 Exercise 1

...1. The basic format for a proposal includes the following steps: Introduction Problem Analysis; major causes, Evidence and Effects of the probem. Plan for solving the problem: Major steps, Support and Deliverables. Benefits of the Plan: Costs-benefits analysis Conclusion 2. Proposals are used in college, in the workplace and anywhere you want to pitch a proposal or new project idea including grant writing. 3. The steps for inventing your proposal’s content are defining the problem, analyzing the problem, researching, inquiring, and finding similar projects. 4. The three primary sources of information for proposal writing are online, print, and empirical sources. 5. The steps to planning to solve the problem are map out the plan, explore each major step, figure out costs and benefits, and finding similar projects. 6. Costs and benefits should be listed to prove to the readers that the benefits of their investment are worth the risks. 7. In choosing an appropriate style, the steps are creating an Authoritative Tone, use metaphors and similes, pay attention to Sentence Length, and minimize the jargon. 8. Three tips for designing the proposal are creating a look, create white space and use meaningful headings. 9. The four steps in revising and editing a proposal are looking for inconsistencies in content, getting rid of extra stuff, tweaking the design and proof reading. 10. Five major problems listed are students are “paid to play”, have out......

Words: 302 - Pages: 2

Free Essay

Nt1420 Unit 1 Exercise 1

...Unit 1 Exercise 1 An analog signal is any continuous signal which the time varying feature (variable) of the signal is a representation of some other time varying quantity, i.e., analogous to another time varying signal. A digital signal is a physical signal that is a representation of a sequence of discrete values (a quantified discrete-time signal), for example of an arbitrary bit stream, or of a digitized (sampled and analog-to-digital converted) analog signal. Half-duplex data transmission means that data can be transmitted in both directions on a signal carrier, but not at the same time. Full-duplex data transmission means that data can be transmitted in both directions on a signal carrier at the same time. A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring Long-distance telephone company, such as MCI (before its absorption by Verizon), Sprint and the former AT&T Corporation (before its merger with SBC in 2005). In the United States, it is defined as any carrier that provides inter-LATA communication, where a LATA is a local access and transport area. Long Distance central office, central office (CO) is an office in a locality to which subscriber home and business lines are connected on what is called a local loop. Tandem, telephone switch is a U.S. telephone company central office telephone exchange used to interconnect local exchange......

Words: 263 - Pages: 2

Free Essay

Unit 1. Exercise 1. Local Exchange

...Unit 1 Exercise 1. Local Exchange The access network is the part of the network that connects the individual consumer or business to the telecommunication system by which the access network have’s to be one of the most important networks since data is being sent through the physical cabling link from the consumer to the local exchange but order for services to meet the requirement of data transferable satisfaction between the individual consumer and local exchange first all informative information from the local exchange will hold data information that will convert through the cabling network but there must be connectivity to the interconnection point of the telecommunication service order for this to process correctly as needed. A metro network also referred to as a MAN (metro area network) is responsible for aggregation information from the local exchanges of a specific service provider metro Ethernet can connect to a variety of data information within the local area networks (LANs) and individual end users to a wide area network (WANs) what distinguish a borderline of telecommunication structure throughout the internet connectivity service metro networking can distribute over a large climate of businesses when data is traveling through the metro network such as gaming development companies, high in corporations, academic institutions, and government agencies in large cities that can use metro Ethernet interconnection data package standard cabling or fiber optic......

Words: 452 - Pages: 2

Premium Essay

Nt 1330 Unit 1 Exercise 1

...Unit 1. Exercise 1. IP Addressing Scenario Course Objectives and Learning Outcomes In this Exercise, you will explain IP address components, contrast classful and classless IP addressing, and explain the function of DNS and DHCP. Assignment Requirements Respond to the following scenario with design considerations and recommendations: You are an IT Administrator for a newly founded company and have been tasked with designing an IP addressing scheme and a plan for allocation and management of IP addresses. The company will currently have a single, physical location with approximately 145 hosts (computers, printers, etc.). IT plans should accommodate 50% growth within the next two years. At a minimum, address these specific questions, in addition to any other concerns/considerations: 1. What subnet range/s should be used? 2. Should IP addresses be dynamically or statically assigned? 3. Should one or more network/subnets be used? 4. If DHCP is used, should a router, firewall or Windows Server be utilized and why? Respond in detail, justifying your recommendations. In your response, consider future growth and design considerations. Submission Requirements 1-2 pages, Microsoft Word, double-spaced, 12 pt. font In response to your question I would use a classless addressing and start at 172.16.0.0 for your network address with a subnet mask of 255.255.255.0. This gives you 254 hosts per subnet which will easily cover your 50% growth over the......

Words: 384 - Pages: 2

Premium Essay

Nt1330 Unit 1 Exercise 1

...IP Addressing Scenario Unit 1 Exercise 1 ITT Technical Institute Floyd Washington Jr. April 4, 2015 When setting up a network that will consist of many host computers, one of the first things that an administrator must do is to determine what class of networks that they must administer to a given business. This is the point where every administrator must know how to implement classful and classless IP addressing. A classful network is a network addressing architecture used in the internet from 1981 until the introduction of Classless Inter-Domain Routing (CIDR) in 1993. Classful IP addressing divides the addtess space on the internet into five address classes. Each class is coded in the first four bits of the address. Today the classful network concepts remain in play only limited scope of the default configuration parameters. There are 32 bits contained in any IPv4 IP address. A Class A network has eight bits in the network number field and 24 bits in the rest of the field and covers a range of 0-126 in the leading field. There are 128 Class A networks with 16,777,216 hosts capability per network. The range of the Class A networks are 0.0.0.0 to 127.255.255.255. A Class B network has 16 bits in the network number field and has 16 bits in the rest of the fields and covers a range from 128.0.0.0 to 191.255.255.255. There are 16,385 Class B networks and each network has the capability of having 65,536 network hosts. A Class C network has 24bits in the network......

Words: 756 - Pages: 4

Free Essay

It Unit 6 Exercise 1

...1. You triangulate your research by looking for looking for information from three different and three sources are considered reliable. 2. Primary sources are actual records or artifacts while secondary sources are writings from knowledgeable people who have studied the topic. 3. Three strategies that help to narrow an internet search are using exact words, using quotations, and using plus or minus signs. 4. A few of the questions researchers should ask is if the source can be trusted, what will the author get out of this publication and do the sources clearly define fact and fiction? 5. Researchers can use documentaries, television, and radio if they are reliable sources; you use quotes and cite the sources. 6. A wiki is a more fact based source while the blog and podcast tend to be more opinion based. 7. Three of the periodical indexes available in the ITT Virtual Library are academic journals, magazines, and newspapers. 8. The information that can be found in these publications is usually more exact and current. 9. Empirical sources include observations, experiments, surveys, and interviews. Researchers use them to confirm and to challenge online and print sources. 10. One of the best benefits of conducting an interview is to gather quotes that you can use for the text of your research. 11. The strategies for conducting a follow up interview is to write down what you remember, get your quotes right, check facts, and most......

Words: 339 - Pages: 2

Premium Essay

Unit 8 Exercise 1

...Unit 8 Exercise 1 Ja’Martay Bentley GE375 Tami Gary May 16, 2016 Freud’s psychoanalytic perspective emphasized unconscious and unresolved past conflicts (Carpenter & Huffman, 2011). Freud believed the psyche (mind) contained three levels of consciousness: conscious, preconscious, and the unconscious (Carpenter & Huffman, 2011). Conscious is the thoughts or motives that a person is currently aware of or is remembering (Carpenter & Huffman, 2011). Preconscious are thoughts or motives that are just beneath the surface of awareness and can be easily brought to the mind (Carpenter & Huffman, 2011). The unconsciousness are thoughts and motives that lie beyond a person’s normal awareness, which still exert great influence (Carpenter & Huffman, 2011). Freud believed that most psychological disorders originate from repressed memories and instincts (sexual and aggressive) that are hidden in the unconscious (Carpenter & Huffman, 2011). Freud also believed that personality was composed of three mental structures: id, ego, and superego (Carpenter & Huffman, 2011). The id is totally unconscious and serves as a reservoir of mental energy (Carpenter & Huffman, 2011). The id is made up of innate, biological instincts and urges. It is immature, impulsive, and irrational (Carpenter & Huffman, 2011). The id wants what it wants and when it wants it – pleasure principle (Carpenter & Huffman, 2011). As a child grows older, the ego develops......

Words: 901 - Pages: 4

Premium Essay

Unit 1 Chapter Exercises

...Page 20-21 1. What is free software? List three characteristics of free software. Free software is a matter of the users’ freedom to run, copy, distribute, study, change and improve the software. Three characteristics are: Freedom to run the program for any purpose, freedom to redistribute copies, and freedom to improve the program and release your improvements to the public. 4. What is the Free Software Foundation/GNU? What is Linux? Which parts of the Linux operating system did each provide? Who else has helped build and refine this operating system? GNU is a project for creating an operating system, both kernel and system programs. Linux is a free kernel that was written in 1991. Linus Torvalds contributed the kernel while the GNU project contributed the system programs. It was built and refined by like-minded programmers all over the world. Page 50 1. Briefly, what does the process of installing an operating system such as Fedora/RHEL involve? It involves copying the operating system files from the installation media to the hard disk(s) on a system and setting up configuration files so Linux runs properly on the hardware. Page 86 1. What is a live system? What advantages does it have over an installed system? A live system is when you run Linux from a CD/DVD instead of installing it on the computer. The advantage is you can test out Linux without disturbing your current operating system. 4. Where on the disk should you put your /boot partition or the root (/)......

Words: 520 - Pages: 3

Premium Essay

Unit 1 Exercise 1 Ip Addressing Scenario

...ITT TECH INSTITUTE OF TECHNOLOGY, LATHROP | NT1330 Client Server Networking II | Unit 1 Exercise 1 IP Addressing Scenario | | Joel Vargas, Julia Duque, Jonathan Beckman, Marwan Sayyah | Due Date 06/25/2016 | | Exercise 1. IP Addressing Scenario When designing I would use one floor with a single server rack, IDF box, or some type of data closet. I would start by creating a list of equipment and software that’s needed. A core network, networks for your firewall, server network, voice network, wireless network. Also networks for other services you have not yet identified, like security, cameras, fire, door and video.  In the case of the how the IP addressed would be assigned I would consider choosing statically. Why because a static IP address is a number that is assigned to a computer by an internet service provider to be its permanent address on the internet. Also an advantage of having statically IP addresses is that there easy to use and less expensive. I use them for my job working at Save Mart Corporations as a Bench Technician to tests our lane equipment and NIC’s on our network systems. When it comes to maintaining and obtaining static IP addresses they are easier to use as well. I would think that you should use multiple network or subnets just in case you want to expand the size of your IP addresses. Also you should take this into consideration. If you keep everything at its minimum size or space then that’s all you have to work with. If you...

Words: 541 - Pages: 3