Free Essay

Unit 6 Assignment 1

In: Computers and Technology

Submitted By pmmurphy123
Words 437
Pages 2
Unit 6 Assignment 1: Cable Testers In almost every application in dealing with cable installations, cable testing is a must. Some methods of testing cables include testing for attenuation, continuity testers, DC Resistance, a wire mapper and cable length. In all cable types- copper or fiber, 10BASE-T or 100BASEFX, the standards are constantly being changed and developed into a new standard for all future technologies. When testing cable, you can guarantee that the users will be satisfied when all connections prove effective for not just uninterrupted transmission but correct bandwidths to support. A wire mapper is the most common tool. It simply provides a test of a standard Cat5 cable to ensure each individual wire not only carries a strong signal through the entire length of the route, but it proves if each wire ends up in the correct pin number on the opposite end to receive the transmission. It will give the technician an idea if a cable has a short, or if it is a crossover cable. It is also very useful with telephone connections. It should be a part of each cable installation kit. Another common tool is a continuity tester. It shows if there is a direct connection between two points. If there is a closed electrical pathway for the tester to detect, then the device will make a sound. This is useful not only to test for a short, but also to determine and identify which cable is which in a closet full of many cables. This is also a very important tool in any application and should be included. Lastly another crucial tool to be included in any tool kit would be a Visual Fault Locator. It not only will aid in locating where in a cable’s length exists a fault or break, but it could also identify where a tight bend might be located in a fiber optic cable. The tool is designed to save time by narrowing down the location of a break in an otherwise closed circuit. When a connection goes down, a visual fault locator can give the approximate location of where the connection was interrupted so that a technician can quickly report to the area to fix the problem and get the connection back up and running in as little time as possible. This may not be a required tool for any job, but without it, a fault in a connection would take much longer. This is a pricey tool, but the investment may be worth it.
Works Cited
Murphy, P. (2015, January 26). Self-knowledge and original concepts. West Palm Beach, FL, USA.

Similar Documents

Premium Essay

Unit 6 Assignment 1

...IS3340-WINDOWS SECURITY | Minimizing Recovery Time Strategies | Unit 6 Assignment 1 | | | 5/5/2014 | | This document outlines the required steps to follow, in-order to properly scan the necessary servers and workstations in the Ken 7 Windows Limited Domain for security vulnerabilities. 1) Acquire and install MBSA(Microsoft Baseline Security Anaylizer) •Download MBSA. Download MBSA from the MBSA home page, and then install it to the default directory. •Updates for MBSA. If both the computer you will be scanning and the computer with MBSA installed have Internet access, the latest security catalog (.cab file), authentication files, and WUA installer files will be automatically downloaded, if needed. If either the target computer or the computer with MBSA installed does not have Internet access, download the following files and place them in the C:\Documents and Settings\<username>\Local Settings\Application Data\Microsoft\MBSA\2.0\Cache\ directory on the computer that is performing the scan. 2) Scan computers Run MBSA and clear the Check for security updates check box when performing the scan. Using the Graphical Interface Tool The following procedure describes how to use the MBSA GUI tool. To use the MBSA GUI tool to scan for updates and patches 1. On the Programs menu, click Microsoft Baseline Security Analyzer. 2. Click Scan a computer. 3. Make sure that the following options are not selected, and then click Start scan. *......

Words: 487 - Pages: 2

Premium Essay

Unit 6 Assignment 1

...Chapter 6: Conceptual Review Questions (All Questions worth 5 points each) Match the information below with Questions 1 through 14. |A. Compound Interest |E. IRR |I. PMT |M. ROI | |B. CUMPRINC |F. NPER |J. PPMT |N. Simple Interest | |C. FV |G. NPV |K. PV |O. SLN | |D. IPMT |H. Payback Period |L. RATE |P. Type | 1. Function to calculate the interest percentage per period of a financial transaction 2. Function to calculate the value at the beginning of a financial transaction 3. Function to calculate value of the end of a financial transaction 4. Function to calculate periodic payments in or out of a financial transaction 5. Function to calculate the number of compounding periods in a financial transaction 6. Use a “1” for this argument to indicate that interest will be paid at the beginning of each compounding period 7. This type of interest is calculated based on original principal regardless of the previous interest earned 8. This type of interest is calculated based on principal and previous interest earned 9. Function to calculate straight line depreciation based on the initial capital investment, number...

Words: 622 - Pages: 3

Premium Essay

Unit 6 Assignment 1

...Used to connect devices that contained DB9 pin connections usually mouse’s and keyboards. In todays computers Serial Ports have all been upgraded to USB ports. • Parallel Port- Used to connect printers or external devices such as hard disk drives. Parallel Parts are unique with a DB25 pin connection. They call it DSUB or DB25 cause the connection looks like a D • SRAM- also known as (Static random access memory) is a type of semiconductor memory where the word static indicates that, unlike dynamic ram or DRAM, it doesn’t need to be periodically refreshed. • DRAM- also known as (Dynamic Random Access Memory), DRAM is one of the most commonly found memory modules in PC compatible personal computers and workstations. Though out the assignment I have learned and gave my self a clear understanding on what certain terms and well older technology that has paved the way for our new technology to exist. The...

Words: 340 - Pages: 2

Free Essay

Unit 6 Assignment 1

...interference and degrade network performance. The following paragraphs describe three (3) cable testers and how they work and which cable system(s) they are most suitable for. The first tester is the wire-mapper. Wire-mappers are used primarily with copper twisted-pair cable installations. These devices, according to Oliviero and Woodward (2011, p.422, 441) “Transmit signals through each pair in a twisted-pair cable to determine if it is connected correctly to the correct pin at each end.” The second tool is the tone generator. A tone generator is a two-piece unit that consists of a tone generator and a probe. This type of tester's primary function, amongst installers, is to identify specific locations in a punch-down block then label accordingly. According to Oliviero and Woodward (2011, p.442-443), these testers “Transmit[s] a signal, or, with an alligator clip, you connect the unit to an individual wire. The other unit is an inductive amplifier, which is a pen-like probe that emits an audible tone when touched to the other end of the conductor.” Primary functions are identify a particular cable within a bundle and to test for opens, shorts, and miswires of individual wires. Unfortunately, there is a disadvantage to using this device; time consuming. The third and final tester to be discussed are Multifunction Cable Scanners (commonly referred to as a certification tool). Alarmingly, these devices are highly expensive but are available for both copper and......

Words: 399 - Pages: 2

Premium Essay

Unit 6 Assignment 1 Questions

...Unit 6 Assignment 1: Homework Learning Objectives and Outcomes Name the main events in the development of SQL statements. Run SELECT queries with wild cards, DISTINCT key word, calculations, sorting and aliasing. Run queries with the WHERE clause to filter the result sets. Use the Aggregate functions COUNT, AVG, SUM, MIN, and MAX. Assignment Requirements Answer the true-or-false questions on the next page by filling out the answer sheet. Required Resources Textbook Submission Requirements Submit your completed answer sheet to your instructor at the beginning of Unit 7. Unit 6 True/False Questions Indicate whether the following statements are true or false on the student answer sheet. 1) SQL is the programming language used to manipulate data and data objects in a relational database management system. 2) SQL is a procedural language. 3) A declarative language is a language in which you tell the computer what to do not how. 4) DML, or Data Manipulation Language, contains all the commands for selecting and modifying data. 5) DDL, or Data Definition Language, contains all the commands for selecting and modifying data. 6) The * in SELECT * clause of an SQL statement is a wildcard for returning all columns in a table. 7) The DISTINCT keyword in a SELECT statement returns only unique rows. 8) The FROM keyword is used in a SELECT clause to determine which columns are included in the query. 9) An alias in SQL is a......

Words: 363 - Pages: 2

Premium Essay

Nt Unit 6 Assignment 1

...Unit 6. Assignment 1. AD User/Group Design Scenario Dear Junior Admin, I received your E-mail and in response I recommend that you do the following. Since there is a domain for each department, such as Marketing, accessing one printer is rather easy. To start off you will need to create a group that allows access to the one printer within each department in your company. After creating each group you must then assign it to a domain local group, global group and then to a universal group. Then you will need to add it to the marketing domain local group. For HR, you will need to take all of the users within the forest and add them to a global then universal group. Proceed to take the universal group and add it to the domain local group within their domain. These users will then have access to whatever is in that universal group, therefore you must make sure that you assign the printer for them to print vacation requests to the HR department. You must take a slightly different approach for R&D. To allow access to only the server, you must first create a domain local group that has some administrative rights. Add them to a customized admins group that you have control of. You can assign these rights and permissions as you create and assign them. Remember to limit their access to their local machines only. You can do all of this through the desktop local user account settings. You may also take a different route if you choose to. This is one of the approaches you may......

Words: 288 - Pages: 2

Premium Essay

Unit 6 Research Assignment 1

...PT2520 Database Concepts Unit 6 Research Assignment 1: Explore the latest ANSI and ISO Standard True/False 23-Jul-2016 Tim Church Daigre ANSI- The American National Standards Institute (ANSI) oversees the creation, promulgation and use of thousands of norms and guidelines that directly impact businesses in nearly every sector: from acoustical devices to construction equipment, from dairy and livestock production to energy distribution, and many more. ANSI is also actively engaged in accreditation - assessing the competence of organizations determining conformance to standards. To enhance both the global competitiveness of U.S. business and the U.S. quality of life by promoting and facilitating voluntary consensus standards and conformity assessment systems, and safeguarding their integrity. ISO- International Organization for Standardization (ISO) is an independent, non-governmental international organization with a membership of 163 national standards bodies. Through its members, it brings together experts to share knowledge and develop voluntary, consensus-based, market relevant International Standards that support innovation and provide solutions to global challenges. Part II- The latest SQL standard was adopted in July 2003 and is often called SQL:2003. One part of the SQL standard, Part 14, SQL/XML (ISO/IEC 9075-14) was revised in 2006 and is often referenced as "SQL/XML:2006". ANSI/ISO/IEC 9075:2003, "Database Language SQL", Parts 1......

Words: 278 - Pages: 2

Free Essay

Is3340 Unit 6 Assignment 1

...IS3340 Unit 6 Assignment 1 1. How much data has been modified between the last backup and the time of failure? No data should have been lost since nothing was change since the last backup and the backup would have been completed before the error occurred. 2. What images are necessary to recover the workstation? The images that are necessary would be the reimaging image along with the latest back up image available. 3. What are the steps necessary to fix the problem that cause the data loss? Verify what caused the loss by reading the logs. Determine the fix for the issue. Reimage the computer. Restore the computer to last backup state and disable the issue that caused the data loss. 4. What steps should Ken 7 take to avoid a reoccurrence of this issue in the future? Read the logs to find out what caused the issue that caused the data lose.   Right a procedure guide to prevent the issue from occurring. Alert users of the occurrence of the issue and the way to prevent the issue. (Soloman, 2001) Procedure Guide: 1. Read logs to decide what cause the issue to occur. 2. Re-Image the computer to default configuration. 3. Restore to first available backup of the system. Restore Process: 1. Right-click on your Computer desktop icon (or click Start and right-click on the Computer tab on the right pane of the menu). 2. Click on Properties. 3. Locate the System protection tab in the System Properties menu. 4. Select the hard disk that you...

Words: 393 - Pages: 2

Free Essay

Is3230 Unit 6 Assignment 1

...You are provided with the following list of privileges, roles, rights, and actions: 1. Must authenticate when accessing network resources 2. Is allowed remote access 3. Periodically reviews all user accounts 4. Authorizes risk assessments 5. Performs security assessments 6. Creates group policy objects 7. May send inbound e-mail 8. Is allowed to install software in a secured network 9. Performs daily log reviews 10. Is allowed to change the firewall rules 11. Manages incident response 12. Provides user awareness training 13. Access the file system within authorized system and groups 14. Develop infrastructure architecture plan 15. Manages Internet service provider (ISP) and Internet connectivity 16. Install patches on production system 17. May delete files from group folder 18. Installs security software 19. Create system users 20. Monitors systems for dormant accounts 21. May request file system changes 22. Develops and implements configuration standards 23. Grants access to resources 24. Create user accounts 25. May make file system changes 26. Run a backup program to capture changes to data and systems 27. May appoint a data/application custodian 28. May disable/delete unused accounts 29. May bypass authentication 30. Approves access to resources In the table given below, you need to relate the matching privileges, roles, rights, and actions to the account type on the left...

Words: 269 - Pages: 2

Free Essay

Pt1420 Unit 6 Assignment 1

...Week 06 Assignments Textbook Reading * Chapter 4 * Chapter 5 sections 5.1, 5.2, and 5.3 (pages 196-201) Week 06 Homework From the Gaddis textbook: * Programming Exercises 2, 6 and 9, on pages 160-161 For the Programming Exercises, design a program means write the pseudocode for the program. Except for Programming Exercise 2, your design should include multiple modules, not just main(). Upload a Microsoft Word document with the pseudocode to your shared PT1420 community website or submit a paper copy to your instructor by the beginning of the Week 7 class. Programing Exercises pg. 160-161 2. Areas of rectangles Module Main() Declare width1 integer = 0 Declare length1 integer = 0 Declare width2 integer = 0 Declare length2 integer = 0 Declare area1 integer = 0 Declare area2 integer = 0 Call rectangle1 (width1, length1, area1) Call rectangle2 (width2, length2, area2) Call comparison (rectangle1, rectangle2) Display “press enter to continue” End module Module rectangle1 (value width1 as integer, value length1 as integer, value area1 as integer) Display "Enter the width of rectangle 1” Input width1 Display "Enter the length of rectangle 1" Input length1 area1 = width1 * length1 End module Module rectangle2 (value width2 as integer, value length2 as integer, value area2 as integer) Display "Enter the width of rectangle 2” Input width2 Display "Enter the length of rectangle 2" Input length2 area2 = width2 * length2 End......

Words: 764 - Pages: 4

Premium Essay

Mba 6024 Unit 6 Assignment 1

...Comprehensive Strategy Assessment April 2nd, 2016 MBA 6024 Organizational Strategy Date: 04/03/2016 To: Terri Bell, Vice President of Strategy From: CC: Vincent DeFazio, DM Subject: Comprehensive Strategy for Procter & Gamble Executive Summary Procter and Gamble (P&G) which began as a soap and candle company, has now become one of leaders in the Global Household and Personal Industry products. P&G has now grown to a company with ten core categories: Baby Care, Feminine Care, Family Care, Grooming, Oral Care, Personal Health Care, Hair Care, Skin and Personal Care, Fabric Care and Home Care (www.us.pg.com). Their products reach consumers in over 180 countries. This paper will look into the company’s main strategies and some of the struggles they are encountering. Also included in this paper are the company’s internal strengths and weaknesses, external opportunities and possible outside treats. Furthermore, it will recommend some strategies that will help continue to grow the company. Strategy Assessment Procter and Gambles emphasizes five core strategies that set them apart from their competitors: products, operations, social responsibilities, employees, and stakeholders. They strive to manufacture products that not only satisfy the consumer but are also helpful in improving the environment. In 2015, seven of their ten core categories were leaders in the industry and the other three were number 2. Operations strategy is classified into three......

Words: 1374 - Pages: 6

Free Essay

Unit 8 Assignment 1 Video Summary 6

...Unit 8 Assignment 1 Video Summary 6 VIDEO #3.01 Topics: * Microsoft Operating Systems * Other Operating Systems Terms: * DOS – Disk Operating System is an acronym for several closely related operating systems that dominated the IBM PC compatible market between 1981 and 1995 * UNIX - is a family of multitasking, multiuser computer operating systems that derive from the original AT&T UNIX. * Command Line Interface - also known as command-line user interface, console user interface, and character user interface (CUI), is a means of interacting with a computer program where the user issues commands to the program in the form of successive lines of text (command lines). Summary: The video taught me that everything that was developed after series 9x of operating systems is built on the NT platform. Also the NT did not have a device manager or a hardware wizard as well as not supporting plug and play. I also learned that Linux was developed by a Finnish student named Linus Torvalds. This information is not really useful for me its old information that for me has no value unless I want to be a technology historian. Unit 8 Assignment 1 Video Summary 6 VIDEO #3.02 Topics: * Partitioning * Creating Partitions * Create/Delete Partitions Terms: * Partition - In personal computers, a partition is a logical division of a hard disk created so that you can have different operating systems on the same hard disk or to create the......

Words: 819 - Pages: 4

Premium Essay

Unit 6 Assignment 1 Cable Testers

...Wire-Map Testers A wire-map tester transmits signals through each wire in a copper twisted-pair cable to determine if it is connected to the correct pin at each end. Wire-map testers detect transposed wires, opens, and shorts which are all problems that can render a cable useless. A wire-map tester consists of a remote unit that you attach to the far end of a connection and the battery-operated, handheld main unit that displays the results. Typically, the tester displays various codes to describe the type of faults it finds, so you know which part of the cable you messed up on or what else may be wrong with it. Tone Generators Tone generators are the simplest type of copper cable tester. A tone generator is made up of two parts, a tone generator and a probe. These are sometimes referred to as a fox and hound wire tracer. With a standard jack, you connect to the cable the unit that transmits a signal, or, with an alligator clip, you connect the unit to an individual wire. The other unit is an inductive amplifier, which is a pen like probe that emits an audible tone when touched to the other end of the conductor. Tone generators are most often used to locate a specific connection in a punch-down block. Using a tone generator is extremely time-consuming and it is nearly as prone to errors as the cable installation. Time-Domain Reflectometers A TDR is the primary tool used to determine the length of a copper cable and to locate the impedance variations that are caused by......

Words: 482 - Pages: 2

Premium Essay

Pt 2520 Unit 6 Assignment 1

...1. What is data manipulation language (with regard to SQL)? Data manipulation language is used to retrieve and change data in a database, specifically relational. 2. What is data definition language (with regard to SQL)? The data definition language is in syntax similar to computer programming language and it defines data structures. 3. Describe the wild card characters that you may use in an SQL query. Wildcards can be used in expressions. The underscore “_” can select a single character. The percent “%” can select a series of characters. The brackets “[ ]” can be used to select a range. 4. How do you alias a column in SQL? Explain and provide an example. You can do this by using the AS keyword. 5. How would you write the WHERE clause to return all employee last names beginning with D? - SELECT * FROM EmployeeAddressTable WHERE LastName LIKE d%’ 6. How would you write the WHERE clause to return all employees living in Tucson, whose names begin with an S? -SELECT * FROM EmployeeTableTucson Where City = Tucson And LastName LIKE s%’ 7. What is an aggregate function? An aggregate function is an operation on several rows at a time. 8. What is the function of the term DISTINCT in a SELECT clause? It can be used to return unique values within a monotonous table. 9. How does the ORDER BY clause work, when no other keywords related to it are specified? What about “ORDER BY EmployeeLastName DESC”? The ORDERBY clause needs to be specified. ...

Words: 319 - Pages: 2

Premium Essay

Unit 6 Assignment 1: Video Summary 4

...Unit 6 Assignment 1: Video Summary 4 1. Video 1.06 Storage Devices 2. Information Summary The clip tells about how a magnetic, optical, and solid state storage devices work, about the various interfaces such PATA/IDE, SATA, SCSI, USB, and FireWire. The clip also discussed about recognizing and identifying cables and connectors, pin configurations, and speeds associated with each technology. 3. Topics presented: * * New Hard drive Installation * Hard Drives * 137 GB Limit * 300 GB Hard Drive Scenario * Hard Drive Interfaces * PATA * SATA * SCSI * USB * FireWire * PATA or Parallel ATA * ATA 100 * ATA 133 * SATA or Serial ATA * Floppy Drives * 3 ½”Disk * 5 ¼”Disk * Floppy Drives Formatting * Power Supply Connections * Connection Types * Molex * Berg * Floppy Drive Cables/Connectors * CDs * Pits and lands * Laser Reading * Types of CDs * CD-ROM * CD-R * CD-RW * DVDs * Multiple layers increase capacity * HD-DVD * Blu-Ray * CDs and DVDs * Power Supply * Motherboard * Best Arrangement * Care & Handling * SCSI Devices * Three SCSI Standards * SCSI-1 * SCSI-2 * SCSI-3 * SCSI Connector * Narrow SCSI * Wide SCSI * Internal or External SCSI ......

Words: 1118 - Pages: 5