Computer Networking Assignment 1

In: Computers and Technology

Submitted By Skipknot
Words 307
Pages 2
Unit 1 Assignment
Dan SItkowski 1. Cell phones uses both voice and data networks. It uses data to get information and to also be allowed to access the internet. It also uses voice when you make a call. 2. Land phones use both networks. It uses data for caller ID and to send the information to find out where the call will be going. It also uses voice to transmit back and forth so that you can have a convocation. 3. SMS/Text messaging uses data networks. It only uses data networks because you are sending a message to another person. And in that message you can have files attached to the message as well. 4. Fax machines uses a data network. It uses this network because you put a document or photo threw the machine and it takes the image of that and creates a file. It then takes that file and sends it to another location. Then that location opens and prints or views the file. 5. Pagers use only data networks. It only uses data networks because when you send a file containing only text and then send it to a pager. The pager then takes that file and opens it showing the text for that person to read. 6. VOIP (voice over IP) uses data networks. VOIP uses data networks only because It uses the internet to talk to people instead of the traditional voice network. This allows someone to bypass the phone company. It works by taking the conversation and converts it to a file that is sent to the other location where it is opened. The problem with this is that if the internet goes down then you cannot call. 7. Skype/Facetime uses data networks. This works very similar to VOIP but also has the option to show…...

Similar Documents

Unit 1. Assignment 1. Home Computer Analysis

...Fortunately my home computer is already running Windows 7 ultimate x64 edition so there isn’t anything for me to upgrade to yet, unless windows 8 gets released soon but even then I won’t probably upgrade. My computer is home built and has an Intel E8400 3.0 Gig Dual Core processor with 4 gigs of DDR3 and 2 Terabytes of hard drive space. I’m also running an NVidia GTX 560 TI overclocked video card and hooked up to a 50 Mbps cable modem. I built this computer a few years ago and I built it for gaming so it’s not top of the line anymore but more than supports any operating system you can throw at it. Let’s suppose I had windows 7 Home Premium and wished to upgrade. Luckily my computer can easily support any version of windows 7 so all I would have to do is run the Windows Anytime Upgrade and upgrade to which version I wished. Since each version is a superset of the higher version you can easily upgrade to higher versions. Also since windows 7 places the entire OS on the hard disk it isn’t an upgrade in the traditional since, it’s just a matter of activating features that are already there. If I had a 32 bit version and wished to go to a 64 bit version I wouldn’t however be able to do an anytime upgrade. When your going from different bit versions you need to do a clean install to install the whole 32 or 64 bit version. This is the only time I would need to do a clean install, if I wanted to go back to x32 for some strange reason. Doing this of course would limit the amount of......

Words: 316 - Pages: 2

Assignment 1: Computer Architecture

...Assignment 1: Computer Architecture Noel E Baez Professor Ali Abedin Introduction to Information Technology July 25, 2013 Abstract This paper will describe the Von Neumann Architecture and explain why it is important. It will describe and explain what a system bus is, and why it is needed in the computer system. A summary of the Boolean operators and the use in computers calculations will be included as well. Finally, a short list of various types of computer storage and memory will be included, and a definition of computer storage. Keywords: Neumann, Boolean, Memory, Storage, System, Bus John Von Neumann was born in 1903 in Budapest. He studied mathematics and graduated from the Pázmány Péter University in Budapest with a Ph.D. In 1930 he was invited to the University of Princeton to teach mathematics in the Institute for Advance Study of Princeton. Von Neumann possessed an extraordinary memory, he was a gifted man that made multiple contributions to the math world, and the computer world, but perhaps his biggest contribution is the creation of the Von Neumann Architecture. The Von Neumann architecture stated that a computer was able to have an uncomplicated, established structure, able to execute any calculation when given the proper command. The Model of this architecture is comprised of the following components, the memory, the control unit, the arithmetic logic unit (ALU). The memory was used to store the information from the ALU or processing unit. ......

Words: 1474 - Pages: 6

Computer Networking

...Term paper of computer networking (Design wireless network) x.y.z. Abstract: this document tells us about wireless network and various techniques to design a computer wireless network Keywords—wireless networks, connecting devices, switches, hubs. [pic] Campus network A campus network is a computer network made up of an interconnection of local area networks (LANs) within a limited geographical area. The networking equipments (switches, routers) and transmission media (optical fiber, copper plant, Cat5 cabling etc) are almost entirely owned (by the campus tenant / owner: an enterprise, university, government etc). In the case of a university campus-based campus network, the network is likely to link a variety of campus buildings including; academic departments, the university library and student residence halls. [pic] | | | | Introduction A computer network allows sharing of resources and information among devices connected to the network. The Advanced Research Projects Agency (ARPA) funded the design of the Advanced Research Projects Agency Network (ARPANET) for the United States Department of Defence. It was the first operational computer network in the world. Development of the network began in 1969, based on designs developed during the 1960s. For a history see ARPANET, the first network . Purpose • Facilitating communications. Using a network, people can communicate efficiently and......

Words: 1521 - Pages: 7

Unit 1 Assignment 1-Computer Basic Review

...1. Which of the following is true about 1 bit? c. Represents one binary digit. 2. Which of the following terms means approximately 106 bytes? d. Kilobyte 3. Which answer lists the correct number of bits associated with each term? c. 64 bits per quadruple word 4. Which of the following answers are true about random-access memory (RAM) as it is normally used inside a personal computer? a. Used for short-term memory e. Is installed onto the motherboard 5. This chapter describes the concepts behind how a CPU reads the contents from RAM. Which of the following is true about the process of read data, as described in the chapter? a. The CPU tells the RAM which address holds the data that the CPU wants to read. 6. A user has opened a word processor, types the numbers 123456789, and stored the document as a file called report1. Which of the following determines, in part, what bits the computer stores in the file to represent the text typed into the report? c. Character set 7. A user has opened a calculator application, typed 123456789, and then done some math problem using this number. Which of the following determines, in part, what bits the computer stored in RAM to represent the number 123456789? d. The binary equivalent of decimal 123456789 8. Which of the following is not a feature of a file system that might be used with a hard disk drive? a. An actuator arm 9. A student writes a report using a word processor, saving the report...

Words: 904 - Pages: 4

Networking 204 Assignment 1

...NETW204: Assignment 1 (50 points) Each answer is worth 1 point each, 50 questions = 50 total points. Type answers in the appropriate cell; text will automatically wrap. Post your completed assignment to the dropbox. NAME | Diana Carter | Router Configuration Exercise (5 points) When configuring a router, there are certain basic tasks performed, * Naming the router * Setting passwords * Configuring interfaces * Configuring a banner * Saving changes on a router * Verifying basic configuration and router operations | Question | Answer | 1 | The first prompt is _______ mode and will allow you to view the state of the router. | user | 2 | What major limitation does this mode have? | Does not allow you to view Global Configuration | 3 | What does the router prompt look like for this mode? | Router> | 4 | The enable command is used to enter the privileged mode. What is the major difference between this mode and user mode? | The enable command allows you to make changes, while user mode allows you only to view statistics. | 5 | What does the router prompt look like for this mode? | Router# | Basic Configuration Tasks (18 points) The table below lists the basic router configuration tasks in the left column. Fill in the blanks in the right column with the correct command syntax for each of the tasks. | Configuration Task | Command Syntax | Answer | 6 | Naming the router | Router(config)# | hostname name | 7 |......

Words: 1085 - Pages: 5

Unit 1 Assignment 1 Home Computer Analysis

...Unit 1 - Assignment 1 - Home Computer Analysis Fortunately my home computer is already running Windows 7 ultimate x64 edition so there isn’t anything for me to upgrade to yet, unless windows 8 gets released soon but even then I won’t probably upgrade. My computer is home built and has an Intel E8400 3.0 Gig Dual Core processor with 4 gigs of DDR3 and 2 Terabytes of hard drive space. I’m also running an NVidia GTX 560 TI overclocked video card and hooked up to a 50 Mbps cable modem. I built this computer a few years ago and I built it for gaming so it’s not top of the line anymore but more than supports any operating system you can throw at it. Let’s suppose I had windows 7 Home Premium and wished to upgrade. Luckily my computer can easily support any version of windows 7 so all I would have to do is run the Windows Anytime Upgrade and upgrade to which version I wished. Since each version is a superset of the higher version you can easily upgrade to higher versions. Also since windows 7 places the entire OS on the hard disk it isn’t an upgrade in the traditional since, it’s just a matter of activating features that are already there. If I had a 32 bit version and wished to go to a 64 bit version I wouldn’t however be able to do an anytime upgrade. When your going from different bit versions you need to do a clean install to install the whole 32 or 64 bit version. This is the only time I would need to do a clean install, if I wanted to go back to x32 for some strange......

Words: 323 - Pages: 2

Unit 3 Assignment 1 Networking Models Review

...Networking Models Review (Unit 3) 1. Which of the following is true about a TCP/IP network? B 2. Which of the following terms is not a common synonym for TCP/IP model? (Choose two answers.) C & D 3. Think generically about the idea of a networking standard, ignoring any particular standard or standards group. Which of the following is typically true of a standard? (Choose two answers.) A & C 4. Contrast an international standard as compared to a de facto standard. (Choose two answers.) B & D 5. Which of the following are true about the commonly used version of the TCP/IP model as shown in this chapter? (Choose two answers.) C & D 6. The TCP/IP model refers to standards other than those the IETF defines in RFCs. Which of these standards groups is typically the source of external LAN standards? (Choose two answers.) B & C 7. Which of the following is not a typical reason for a group of ten companies to start a vendor group, for the purpose of pushing a new networking technology? D 8. The TCP/IP and OSI models have some obvious differences, like the number of layers. Think about the more commonly used version of the TCP/IP model discussed in this chapter, and then think about how to talk about TCP/IP using OSI terms. Which of the following is a correctly phrased statement for how to use OSI terminology? B 9. Historically, which of the following models were the earliest models used in corporate networks? A 10. Which of......

Words: 599 - Pages: 3

Computer Networking

... COMPUTER NETWORKING SIXTH EDITION A Top-Down Approach James F. Kurose University of Massachusetts, Amherst Keith W. Ross Polytechnic Institute of NYU Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montréal Toronto Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo Vice President and Editorial Director, ECS: Marcia Horton Editor in Chief: Michael Hirsch Editorial Assistant: Emma Snider Vice President Marketing: Patrice Jones Marketing Manager: Yez Alayan Marketing Coordinator: Kathryn Ferranti Vice President and Director of Production: Vince O’Brien Managing Editor: Jeff Holcomb Senior Production Project Manager: Marilyn Lloyd Manufacturing Manager: Nick Sklitsis Operations Specialist: Lisa McDowell Art Director, Cover: Anthony Gemmellaro Art Coordinator: Janet Theurer/ Theurer Briggs Design Art Studio: Patrice Rossi Calkin/ Rossi Illustration and Design Cover Designer: Liz Harasymcuk Text Designer: Joyce Cosentino Wells Cover Image: ©Fancy/Alamy Media Editor: Dan Sandin Full-Service Vendor: PreMediaGlobal Senior Project Manager: Andrea Stefanowicz Printer/Binder: Edwards Brothers Cover Printer: Lehigh-Phoenix Color This book was composed in Quark. Basal font is Times. Display font is Berkeley. Copyright © 2013, 2010, 2008, 2005, 2003 by Pearson Education, Inc., publishing as Addison-Wesley. All rights reserved. Manufactured in the United States......

Words: 69922 - Pages: 280

Assignment 1: Digital Computer Crimes

...Assignment 1: Digital Computer Crimes Brandy N Bledsoe Mark Stone CIS170 July 14, 2013 The computer is a doorway to a world of opportunity on the Internet that is not policed by any single law enforcement agency. The potential for financial gain along with the ease of commission has resulted in many crimes via the Internet that previously occurred via mail or over the telephone. These are the type of crimes that you do not expect as a normal everyday citizen; so many of these crimes are committed right underneath your nose. It is a wide variety of crimes that are classified under digital computer crimes. The following paragraphs will explain the four major categories of computer crimes, the most common forms of digital crime, how the computer as an instrument of a crime presents the biggest threat to the world and the roles and responses of the U.S. government. The first category of computer crimes is the computer as a target, this means that the criminal targets the network and or the device. These criminals possess the skill, technique and knowledge of computers; crimes found under this category are data alteration, network intruders, and denial-of-service as well as computer vandalism. In April of 2007, Russia launched cyber-attacks on Estonian parliament, banks, ministries and newspapers; these countries were in a disagreement over the placement of a bronze soldier statue. As a result of these attacks, the country was disabled and became crippled. The second......

Words: 1501 - Pages: 7

Linux Networking Unit 1 Assignment

...Unit 1 Assignment Chapter 1 ex 1. What is free software? List three characteristics of free software. Free software is software that is available for anyone to use and modify however they like. 3 characteristics of free software are that, you are free to study, redistribute, and modify it free of cost. Chapter 2 ex 1. Briefly, what does the process of installing an operating system such as Fedora/RHEL involve? Installing the Fedora/RHEL OS is copying the OS files from a CD, DVD, or Flash drive on to the hard drives of the system then setting up the config files so the Linux runs properly on the hardware. Chapter 3 ex 1. What is a live system? What advantages does it have over an installed system? A live session is a Linux session that is running on your computer without you actually installing Linux on your computer. The advantages you have by running a live session is you can preview the system without installing it and your computer will not be changed. 4. Where on the disk should you put your /boot partition or the root (/) partition if you do not use a /boot partition? Default layout 8. When does a Fedora/RHEL system start X by default? To start X by default you need to set run level 5 to be the default and it will start when the system boots. Chapter 11 ex 1. How does single-user mode differ from multiuser mode In single user mode, only the console user may be logged in, though the user can edit files and execute multiple programs simultaneousl 3. What......

Words: 426 - Pages: 2

Computer Networking

...Technology Introduction to Computer Networking Prof. Teodora Bakardjieva 1 1.0 Introduction The purpose of the networking guidelines are as follows:  to assist students in understanding the benefits of networking  to help students place in context their current stage of networking development in their school.  to assist students in planning the next stage of network development in their school.  to provide standard networking ‘models’ and best practice to students that will assist students in their network planning. This document includes information under the following main headings:  Introduction to Networking  Advantages of Networking  Types of Networks  Models of networking appropriate to students  NCTE recommendation to students  Some relevant terms. 1.1. Basic of Networking A computer network consists of a collection of computers, printers and other equipment that is connected together so that they can communicate with each other. Fig 1 gives an example of a network in a school comprising of a local area network or LAN connecting computers with each other, the internet, and various servers. 2 File and Print Server CD or Multimedia Servers Access to: Internet content & learning resources, Scoilnet etc Email communication Users computers Cache, Proxy, Filtering, Firewall Server Modem or Router School ‘Local Area Network’ (LAN) Other users, computers Fig 1: Representation of Network in a......

Words: 4611 - Pages: 19

Assignment 1: Computer Forensics Overview

...Assignment 1: Computer Forensics Overview CIS 417 Computer Forensics Computer forensics is the process of investigating and analyzing techniques to gather and preserve information and evidence from a particular computing device in a way it can be presented in a court of law. The main role of computer analyst is to recover data including photos, files/documents, and e-mails from computer storage devices that were deleted, damaged and otherwise manipulated. The forensics expert’s work on cases involving crimes associated with internet based concerns and the investigations of other potential possibilities on other computer systems that may have been related or involved in the crime to find enough evidence of illegal activities. Computer experts can also use their professional knowledge to protect corporate computers/servers from infiltration, determine how the computer was broken into, and recover lost files in the company. Processes are used to obtain this information and some of the processes are as follows; * Investigation process: Computer forensics investigations will typically be done as part of a crime that allegedly occurred. The first step of the investigation should be to verify that a crime took place. Understand what occurred of the incident, assess the case, and see if the crime leads back to the individual. * System Description: Next step, once you verified the crime did occur, you then begin gathering as much information and data about the specific...

Words: 1397 - Pages: 6

Physical Networking Assignment 1

...may drop these, leading to issues with call quality. Texting and SMS are both forms of data transfer, not using voice at all. They operate by sending small packets of data usually restricted to a certain number of characters to other devices. Fax machines use data transfer, not using voice. Using an analogue signal they digitize work as soon as they receive it. Pagers utilize data to receive messages or notices. They respond by usually giving off a tone or vibrating to get the user’s attention, and then displaying a message. VOIP phones use both voice and data to operate. The voice is turned into a data packet and sent down the line through the network or internet. This allows it to call normal phones, as well as other computers. Skype and Facetime use both voice and data in much the same way as a VOIP phone, except they also pack up video footage and send it alongside the audio. These can contact other devices capable of running the program, and must have internet connection to do so. http://www.cisco.com/cisco/web/solutions/small_business/resource_center/articles/serve_customers_better/how_voip_works/index.html...

Words: 258 - Pages: 2

Computer Networking

...management of computing technologies within an organization Course Title: Free Elective II (Information Assurance and Security) Course Description: This course provides a broad view of information assurance and security and its major subjects: protection of information assets; access to information system; hacking legislation and industrial standards. In addition this course will serve as a guideline for students to make their course selections. Course/Year and Section: BSIT 4A-4D Duration/Term: 2ndSemester, AY 2015-2016 Course Meeting: No. of Units: 3 units lecture No. of Hours: 3 hours Pre-requisite/s: none Student Learning Outcome (CMO No. 25 Series of 2015): The graduates must have the ability to: 1. Articulate and discuss the latest developments in the specific field of practice. 2. Effectively communicate orally and in writing using both English and Filipino 3. Work effectively and independently in multi-disciplinary and multi-cultural teams. 4. Act in recognition of professional, social, and ethical responsibility 5. Preserve and promote “Filipino historical and cultural heritage” 6. Analyze complex problems, and identify and define the computing requirements needed to design an appropriate solution 7. Apply computing and other knowledge domains to address real-world problems 8. Design and develop computing solutions using a system-level perspective 9. Utilize modern computing tools. Student......

Words: 1777 - Pages: 8

Assignment 1: Computer Memory Hacking

...Assignment 1: Computer Memory Hacking Professor Carl Brown CIS 106 Technology continues to evolve exponentially. However these technological advancements continue to pose a threat to both individuals and information resources of companies and governments. There is therefore the need to protect one’s data and information due to the emerging threats and risks. Hacking is where third parties create a backdoor version of a hardware and software so as to manipulate or unlock hidden functionalities on a machine. Most of these hacks are open source and free soft wares. These hacks manipulate the firmware update option on many devices to run and install themselves. Many researchers have found out that breaking into a computer’s encrypted hard drive is very easy with the help of the right tools. A research by Princeton University revealed how low tech hackers access even the most well protected computers (Jordan Robertson 2008). This paper details how encryption was coveted for a long time as a vital shield against hackers, but can be manipulated by altering the operations of the memory chips. This paper outlines just how vulnerable the data we store on our computers and laptops is to possible hacking. Through freezing the Dynamic Random Access Memory (DRAM) chip, which is the most frequently used memory chip in personal gadgets. Freezing DRAM makes it retain data for many hours way after the machine loses its power. This data includes the keys used to unlock encryptions. If......

Words: 901 - Pages: 4