Premium Essay

Unit 1 Labs

In: Computers and Technology

Submitted By tdw01
Words 16182
Pages 65
Introduction to Networking
Onsite Course


Graded Assignment Requirements

Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units.

NOTE: Always check with your instructor for specific due dates of assignments.

Graded Assignments

Unit 1 Assignment 1: Computer Basics Review

Course Objectives and Learning Outcomes
Identify the major needs and major stakeholders for computer networks and network applications.
Describe how digital devices store data.
Describe the differences between input and output devices.

Assignment Requirements
In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook):
Respond to the multiple-choice questions.
Complete the List the Words inside Acronyms table.

Required Resources
Odom textbook
Computer with word processing software
Internet access

Submission Requirements:
Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1.

Unit 2 Assignment 1: Identifying Network Topologies

Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they are applied to various types of enterprises. * Draw the four major physical network topologies: bus, star, ring, and mesh.

Assignment Requirements
Using the Topology Worksheet provided by the instructor, complete the topology name, logical characteristics, and physical characteristics for each topology diagram on the worksheet. Be sure to include the following information: * Name each…...

Similar Documents

Premium Essay

Unit 2. Lab 1 - Cloud Computing Research

...Unit 2. Lab 1: Cloud Computing Research With Amazon, you get anywhere between 5GB and 1TB depending upon how much you’d like to pay for the privilege. Amazon passes on to you the financial benefits of Amazon’s scale. You pay a very low rate for the compute capacity you actually consume. To use Amazon EC2, you simply: * Select a pre-configured, templated Amazon Machine Image (AMI) to get up and running immediately. Or create an AMI containing your applications, libraries, data, and associated configuration settings. * Configure security and network access on your Amazon EC2 instance. * Choose which instance type(s) you want, then start, terminate, and monitor as many instances of your AMI as needed, using the web service APIs or the variety of management tools provided. * Determine whether you want to run in multiple locations, utilize static IP endpoints, or attach persistent block storage to your instances. * Pay only for the resources that you actually consume, like instance-hours or data transfer. With Google, it’s a little more complicated. There didn't used to be a single locker but now the Big G has taken care of that one with the launch of the Google Drive. You get 5GB of space plus 1GB of Picasa storage for free along with any space in your Docs and Gmail section. There's an apparent maximum storage space on the Google Drive itself up to 100GB but you can rent more space from Google if you have a Google Apps account up to a total of 16TB. On...

Words: 469 - Pages: 2

Premium Essay

Is-3440 Unit 1 Lab Answers

...file, or a combination of swap partitions and swap files. I wouldn’t recommend one over the other I believe that a balanced use of both is a good idea. 7. File system size, Extents, Delayed and Multi block allocation, Online defragmentation and fsck speed, Backward compatibility, Inodes / Timestamps and Persistent preallocation. 8. /etc/passwd file stores essential information, which is required during login i.e. user account information. /etc/passwd is a text file that contains a list of the system's accounts, giving for each account like user ID, group ID, home directory, shell, etc. 1. Username: It is used when user logs in. It should be between 1 and 32 characters in length. 2. Password: An x character indicates that encrypted password is stored in /etc/shadow file. 3. User ID (UID): Each user must be assigned a user ID (UID). UID 0 (zero) is reserved for root and UIDs 1-99 are reserved for other predefined accounts. Further UID 100-999 are reserved by system for administrative and system accounts/groups. 4. Group ID (GID): The primary group ID (stored in /etc/group file) 5. User ID Info: The comment field. It allow you to add extra information about the users such as user's full name, phone number etc. This field use by finger command. 6. Home directory: The absolute path to the directory the user will be in when they log in. If this directory does not exists then users directory becomes / 7. Command/shell: The absolute path of a command......

Words: 497 - Pages: 2

Premium Essay

Database Unit 1 Lab 1

...Lab 1 1. A collection of information accessible from a computer or server 2. DBMS is a Database Management System that organizes information internally. 3. Dbms stores information, spreadsheet runs formulas 4. Product | Use | Where it was used | Cost | DB2 | Open database environment | A small single-user application to a large multi-user system. | $598 + $99 additional user | Microsoft Access | Relational databases that have tables of data. | Software developers and data architects | $199 (Amazon) | Microsoft SQL Server | primary function is to store and retrieve data as requested by other software applications | workloads ranging from small single-machine applications to large Internet-facing applications with many concurrent users | Vary (Different Prices for different purposes) | Filemaker Pro | database engine with a GUI-based interface | ??? | $329.00 | Oracle | transfer any customer info from one location to any other in the world | larger organizations and small chain stores | ??? (Couldn’t find anything) | Mysql | database for use in web applications | Personal and commercial use | $2k-$10k/year | 5. “DBMS stands for database management system whereas RDBMS stands for relational database management system; these softwares are created to maintain and utilize large scale collection of data in an efficient manner.” 6. 290 7. Peng J Wu 8. Footlocker:......

Words: 447 - Pages: 2

Premium Essay

Is 3120 Unit 1 Lab 1

...Use the internet to help you answer the following questions: 1. What is the current state of IPv6? Estimate what percentage of the network infrastructure is running IPv6 traffic. What percentage of the network is running IPv4 traffic? IPv6 - Reports in November 2008, indicated that penetration was still less than one percent of Internet traffic in any country. The leaders were Russia (0.76%), France (0.65%), Ukraine (0.64%), Norway (0.49%), the United States (0.45%), and China: 0.24%). IPv4 - Of the 4.3 billion Internet addresses possible with today's Net mainstream technology, 95 percent are gone. That is a 90% use across the worlds internet use IPv4 2. Find a company that offers unified communications. a. What technologies are being used? i. Microsoft • Audio, video, and Web conferencing • Instant messaging • Unified messaging • Voice-over Internet Protocol (VoIP) • Secure communication • Mobility • Provide IT control with failover, redundancy, and scalability • Manage compliance, and archiving policies for messaging and telephony systems b. What type of network infrastructure is being used? IPTV – Internet Protocol Television 3. Find the following models on the internet: a. B2C – Groupon, Livingsocial, Amazon Local. b. B2B – Adobe, Cisco, American Express (Other CC companies) c. B2G – Construction and Infrastructure, Information Technology 4. Look up the general definitions of the following acronyms that relate to unified......

Words: 324 - Pages: 2

Free Essay

Nt1210 Unit 1 Lab 1.1

...2000+ | 900 + | 30 + | 1 = | 2931 | 1.1.2 22↓ | 21↓ | 20↓ | | 4X | 2X | 1X | | 1____ | 1____ | 0____ | | 4+ | 2 + | 0 = | 6 | 1.1.3 21↓ | 20↓ | | 2X | 1X | | 1____ | 1____ | | 2 + | 1 = | 3 | 1.1.4 24↓ | 23↓ | 22↓ | 21↓ | 20↓ | | 16X | 8X | 4X | 2X | 1X | | 1____ | 0____ | 0____ | 1____ | 0____ | | 16 + | 0 + | 0 + | 2 + | 0 = | 18 | 1.1.5 27↓ | 26↓ | 25↓ | 24↓ | 23↓ | 22↓ | 21↓ | 20↓ | | 128X | 64X | 32X | 16X | 8X | 4X | 2X | 1X | | 1____ | 1____ | 1____ | 0____ | 0____ | 0____ | 1____ | 0____ | | 128 + | 64 + | 32 + | 0 + | 0 + | 0 + | 2 + | 0 = | 226 | 1.1.6 156 | 28 | 28 | 28 | 12 | 4 | 0 | 0 | | 27↓ | 26↓ | 25↓ | 24↓ | 23↓ | 22↓ | 21↓ | 20↓ | | v | v | v | v | v | v | v | v | | 128x | 64x | 32x | 16x | 8x | 4x | 2x | 1x | | 1 | 0 | 0 | 1 | 1 | 1 | 0 | 0 = | 10011100 | 128 + | 0 + | 0 + | 16 + | 8 + | 4 + | 0 + | 0 = | 156 | 1.1.7 255 | 127 | 63 | 31 | 15 | 7 | 3 | 1 | | 27↓ | 26↓ | 25↓ | 24↓ | 23↓ | 22↓ | 21↓ | 20↓ | | v | v | v | v | v | v | v | v | | 128x | 64x | 32x | 16x | 8x | 4x | 2x | 1x | | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 11111111 | 128 + | 64 + | 21 + | 16 + | 8 + | 4 + | 2 + | 1 = | 255 | 1.1.8 200 | 72 | 8 | 8 | 8 | 0 | 0 | 0 | | 27↓ | 26↓ | 25↓ | 24↓ | 23↓ | 22↓ | 21↓ | 20↓ | | v | v | v | v | v | v | v | v | | 128x | 64x | 32x | 16x | 8x | 4x | 2x | 1x | | 1 | 1 | 0 | 0 | 1 | 0 | 0 | 1 | 11001001 | 128 + | 64 ...

Words: 552 - Pages: 3

Premium Essay

Unit 1 Lab

...Students will be provided with a copy of the VMware image of the Linux distribution and tools that will be used through out this course when I return to class on September 25, 2012. Accompanying this lab students will need to answer the questions from the Security Strategies in Linux Platforms and Applications lab book. To accomplish the lab assignment below, students will need to obtain a copy of the Fedora Image provided to you by the Substitute Instructor and complete a basic VMware installation of Fedora. The questions in the lab book will be based on the installation experience. Assigned Pages: 6-10 Questions: 1 through 15. This assignment is due by the end of class for Unit 1. 1. During the install, the option to sync with a NTP (Network Time Protocol) server was checked. From a security perspective, why is it important for a system to keep accurate time? Accurate time is important because of the date/time stamps (records) that occur on both log-in's and any changes that were made. This allows the logs to be checked to see what individual made the changes, or was logged-in at the time the changes were implemented. 2. During the install, a password has been set for the "root" user. What is the "root" user, and when is it appropriate to use this account? The "root" user is name or account that by default has access to all commands and files. It is also referred to as the root account, root user and the superuser. It would be appropriate to use this......

Words: 1655 - Pages: 7

Premium Essay

Unit 1 Lab 1.1 - 1.4 Pt2520

...Mark Henry Salvador PT2520 Nyguen Unit 1 Lab 1.2 Nouns | Major Topics | Doctors | Each doctor must have their own database for their own patients. | Patients | Each patient will require a database of information (depression state, eating, sleeping, physical and internal problems) for each time they visit twice a month for 18 months. | Drugs | Will need a way to see which patients will receive the drug and the traditional drug. | Supervisor/Researchers | Keep track of every drug that is being hand out. Researchers will need a way to keep data into a neat database so that they can see every bit of information that is required including doctor notes and which drug is being given to each patient. | Mark Henry Salvador PT2520 Nyguen Unit 1 Lab 1.3 Major Topics Requirement to track its software Licensing scheme Installation and uninstallation of software Must have a copy of software available If it must be purchased, it has to be bought History: Law requires that any business, including a school, track its software. It is important to know what software the school owns, in what versions, and what the license agreement for that software is. Scope: A database will insure that you have information on important legal and personal documentation of accounts. Objective: Create a way to track the software that is currently being installed, uninstalled and bought for faculty, staff computers, and software. Preliminary Timeline: 1st week: Figure out......

Words: 339 - Pages: 2

Free Essay

Unit 1 Lab

...1. The CPU is what actually runs the programs. 2. 1, 0 3. Digital data, and/or digital device 4. Key words, or reserved words 5. Nmeumonics 6. A compiler translates a high-level language program into a separate machine language program. An interpreter both translates and executes the instructions of a high-level program. 7. Operating system Popular Programming languages 1970s: Pascal: Niklaus Wirth. 1970, and was developed for use in education to teach programming. C: Dennis Ritchie. Developed between 69 and 73. It was designed to encourage cross-platform programming, and to be used by straight forward compliers. Smalltalk: Alan Kay, Dan Ingalls, Adele Goldberg. Developed between 69 and 72. It was designed primarily for educational use. Scheme: Guy L. Steele and Gerald Jay Sussman. Developed in 1975 for educational uses. SQL: Donald D. Chamberlin and Raymond F. Boyce. Appeared in 1974. Designed to manipulate and retrieve data. 1980s: C++: Bjarne Stroustrup. Appeared in 1983. Developed for systems programming. Ada: Jean Ichbiah. Developed in 1980 for the Department of Defense as a unified language for embedded and real-time systems. Eiffel: Bertrand Meyer. Appeared in 1986. Developed to eliminate bookkeeping instructions to make code more readable and easier to program. Objective-C: Brad Cox and Tom Love in1983. Perl: Larry Wall. Appeared in 1987. Developed as a general purpose Unix coding mechanism. 1990s: Python: Guido van Rossum,......

Words: 457 - Pages: 2

Premium Essay

Unit 1 Lab 1 Nt1230

...Name Student # Date Assignment Requirements Follow the directions in the Lab Manual for Lab 1, and complete all Exercises. Answer all the questions. Submission Requirements Microsoft Word. 1-2 pages. Self-Assessment Checklist I followed the directions in the lab manual for all exercises. | * | I submitted answers to all of the questions for this lab. | * | I used critical thinking. | * | I have followed the submission requirements:File Format: Microsoft Word (.doc /.docx)Length: 1-2 pagesFont: Times New Roman 12 point sizeLine Spacing: Double | * | Lab 1 worksheet Preparing a Virtual Workstation Image Exercise 1.3 | Exploring Windows 7 | Overview | In order to familiarize yourself with the new Operating System being rolled out in your organization, you decide to manipulate some common features to see how they differ from previous Windows versions. In this exercise you will work with screen saver and other display properties. | Completion time | 30 minutes | Question 1 | What is the current screen resolution? 800x600 | Question 2 | What security advantages does displaying the login screen on resume offer? Offers security from anyone coming along and taking a look at what your doing | Question 3 | How did changing the theme affect your display? It gave a different background | Exercise 1.4 | Creating an .iso Image From Windows 7 Installation Media (Optional) | Overview | Carrying around......

Words: 275 - Pages: 2

Free Essay

Nt1310 Unit 7 Lab 1

...Unit 7 Lab 1 New Building Safety Plan In my safety plan the first things that I’m going to cover are the PPE for working on a construction site where a new building is being placed. First you’re going to need a hard hat so that when anything falls from above, it keeps your brains where they belong like in your head. Second steel toed shoes or boots, preferably boot for a little extra ankle support. But the steel toes to protect your feet from anything being dropped or lowered in case your foot gets in the way. Safety goggles, pretty self-explanatory on this one, just need to keep things out of your eyes! Long pants (blue jeans) protect your legs from different object that could hurt your skin but with pants on you might just get a bruise. Next on the list gloves are always a good idea to wear so that you don’t rip your hands up while you’re working! A water cooler is a must in this situation because it’s going to be hot out and hydration is key to survival! There will also be no running on the job site. Hurry to quickly can cause more accidents than any amount of production you’re getting for running that thirty foot. Only work on the parts of the job that you know, if someone ask for help go ahead and give them a hand but if you’re a plumber then just let the electrician handle his own job. Back to PPE for a sec a back brace would be a good idea to wear also. Once you have a back injury it will be a problem for the rest of your life in most cases. In case of an......

Words: 392 - Pages: 2

Premium Essay

Nt1310 Unit 9 Lab 1

...the attached cable through an inaccessible space. This allows you to pull the cable and protect the fiber ends from damage. PULL BOX – A pull box is usually installed after a long straight run or every time the set of turns totals 180 degrees or more. The pull box is used to create a intermediate opening for the pulling cable to reduce the length of cable being pulled through the conduit or to reduce the number of turns the cable is being pulled through at a given time. It is important to keep in mind the bend radius of the cable when using a pull box. SPLICE ENCLOSURES – Splice enclosures can take many forms depending on their location and application. Splice enclosures can be typically place in one of the two following categories. 1. Radial Splice Enclosures – radial splice enclosures have cables enter and exit the enclosure on the same side. 2. Axial Splice Enclosures – Axial splice enclosures have cables enter and exit on opposite ends of the enclosure. Enclosures designed for outdoor use are environmentally sealed. Typically all enclosures will include: * A strain relief system that ensures the strength member of the cable will carry the tensile load. * Clips that hold the splices in an orderly fashion. * Space for looping the extra optical fiber that is needed to perform the splice outside the enclosure PATCH PANELS – Patch panels are an interconnected point for fiber cables that allow signals to be routed from one cable to another with a patch......

Words: 1252 - Pages: 6

Free Essay

Unit 9 Lab 1

...Task 1 1. The Cisco RV220W Firewall is a hardware firewall that doubles as a router. It has VPN security to allow safe access from remote computers and offices. It also protects against cloud based threats. ZoneAlarm is a software two-way firewall and also comes with backup software. It monitors your programs constantly and should a virus or malicious program make it through it catches it immediately. Task 2 1. Panda, Norton, and Kapersky all offer free trial versions of their products. AVG is the only full-fledged free anti-virus software in the group. McAfee does not offer trial versions or a free version, only purchasable options. 2. A Trojan horse is an application that appears benign but is really a destructive program. A user will think they are downloading something beneficial to their computer and when they do the Trojan horse begins to corrupt their system. Phishing is when a person receives an email that directs them to a false website that appears to be legit and then has the user enter sensitive personal information such as credit card numbers, social security number, etc. A drive-by download occurs when a user visits a website, doesn’t have to click any links or anything, and malicious software automatically begins to download in the background without the users knowledge. Task 3 1. A full backup backs up all the files and folders on a specific drive every time you use that file set. It takes longer and uses up more file space. An incremental......

Words: 586 - Pages: 3

Premium Essay

Nt1130 Unit 1 Lab

...Unit 1 Assignment 1: Windows 2008 Network Services Most networks out there will take advantage of DNS and DHCP services. These services make managing a network an easier task for the administrator. While they are not always required for a network to function, most cases they will be used. Knowing what these services do will help the administrator determine if they are required for the network. DNS stands for Domain Name System. What this service does is help convert IP addresses into names easily remembered by the user. Instead of having to remember an IP address for every device on the network an administrator could set up DNS so names can be assigned to all the devices. Most users will find remembering a name easier than trying to recall a string for 12 numbers. DHCP stands for Dynamic Host Configuration Protocol. What DHCP does is assign IP addresses to devices. Without DHCP an administrator would have to assign IP addresses to each device on the network. Maybe in a small network this wouldn’t be a problem, but a network with more than 10 devices this may become a large task for one person. DHCP can be configured with a range of IP addresses for a network and it will assign each device an address that is not being used. It keeps track of what devices are using IP addresses and which ones are not. Knowing how each of these services work will help an administrator decide if they want to use them. In a network with say 5 devices the administrator may want to manually assign...

Words: 357 - Pages: 2

Premium Essay

Unit 5 Lab 1

...Physical Networking Unit 5 Lab 1 Wired and Wireless Networks The biggest difference between these two types of networks is one uses network cables and one uses radio frequencies. A wired network allows for a faster and more secure connection and can only be used for distances shorter than 2,000 feet. Several other disadvantage of a wired network such as the “need to run cables in difficult environments through walls, floors and ceilings. Cables need to be run from computer to computer and switch to switch. Process can be time consuming. Loose cables likely remain the single most common and annoying source of failure in a wired network.” (PACE University, n.d.) While a wireless network is a very useful and convenient networking device, however these types of networks a lot less secure and transmission speeds can suffer from outside interference. Although wireless networking is a lot more mobile than wired networking the range of the network is usually 150- 300 indoors and up to 1000 feet outdoors depending on the terrain. The cost for wired networking has become rather inexpensive. Ethernet cables, hubs and switches are very inexpensive. Broadband routers cost more, but these are optional components of a wired network, and their higher cost is offset by the benefit of easier installation and built-in security features. The primary parts of a wired network are the cables, network adapters, and routers.......

Words: 315 - Pages: 2

Premium Essay

Unit 7 Lab 1

...Gerald Johnson NT1310T Unit 1 Exercise Local Exchange 3/13/2016 The purpose of a Network is to share data. To make this possible, you have to be able to connect to other computers. To make this enticing to people to want to take advantage of this technology, it has to be simple not so complex. This sounds a little difficult to understand as far as a qualified answer, but to sum things up that is it. The question to ask and that many people don’t consider is how data is transferred from one computer to another computer? Transferring data that is being sent by the user who has created and initialized the transfer of information using a source such as an email service for example. How do you get information from one computer to another, and how do you make it simple and easy to do this? Companies that succeeded at doing this have a great profit with exponential growth possibilities and revenue. For example Cisco company who has made billions by allowing different groups of networks to share data across what we call the internet. Games take advantage of this technology to connect to other computers. Networking companies have succeeded so well in allowing people to connect across their internal networks and the internet that pretty much any app. is able to send data to another computer. There is a physical connection running between two computers that want to connect. This is made possible because phone lines that run from houses to switches to other houses......

Words: 472 - Pages: 2