Nt1210 User-Profile

In: Computers and Technology

Submitted By reaver28
Words 326
Pages 2
Ellery Corley
NT 1230
Unit 4. Exercise 1
User-Profile Scenario

From: Systems Administrator
To: Manager

I have reviewed your email inquiry and have the following recommendations.

1. Interns should not have the level of access that allows the changing of their workstations. Thus all interns will be combined into a group for restricted access. This group will be given standard access, not allowing for any changes to workstation unless authorized by System Administrator. This includes the changing of their password every 60 days. 2. Team leads need to have access to their files from any workstation. Thusly, all team leads will be assigned roaming user profiles. This will allow any team lead to access any work station at their convenience as long as the computer is on the network. This will also require team leads to lock or sign out of a work station when they are not using it. Due to the level of access and availability of said access, Team Lead passwords will be set to be changed every 30 days. 3. Since to Marketing Staff have dedicated work stations, they will be added to an ACL, and be designated user rights applicable to their needs. As System Admin, I do understand the need for access to applications, storage, the network, and the ability to change and customize as needed. Due to the level of access that the Marketing Staff will be assigned, they will be required to change their passwords every 30 days. They will be given a list of password protocols to follow when assigning their passwords. They will also be required to lock their work stations when not at their desks.
These system changes will take place by end of business today. Emails will be sent to all users affected by the changes outlining changes, protocols and requirements. Please direct any further questions or concerns directly to the System…...

Similar Documents


...Jasmine Perez NT1210 Chapter 2 Review Questions 1. Which of the following terms is the closest synonym to the term "computer networking"? c. Datacom 2. Ann uses her email address, me@here.com , to send an email to Bob, whose email address is you@there.com The message contains a few paragraphs of text. Which of the following will be important to the process of making sure that Bob receives this email? b. Bob’s incoming email server. 3. According to this chapter, which of the following concepts happens happens in a modern-day, end-to-end voice call between two business telephones sitting in the same office building in the United States. c. The call uses both analog and digital electrical signals. e. The call represents each spoken word as a unique set of bits. 4. According to this chapter, which of the following concepts happens in a modern-day, end to end voice call between two home telephones in the United States? a. The call uses only analog electrical signals. d. The call represents short sounds as a unique set of bits. 5. A student makes a video recording of a professor teaching a class. The student posts the video to a website. The answers list information that the student used or chose on the computer on which he was processing the video which of the following answers is the least likely to impact the size of the video file? a. A character set 6. A student records a video of a professor teaching a class. The student plans to later post the video online on......

Words: 992 - Pages: 4


...An operating system is the framework that allows you to communicate with computer hardware in an interactive way (Answers Corporation, 2013). Without this, you would not be able to tell the computer to do anything and it would not have any instructions to follow (Answers Corporation, 2013). This is why it is important for a computer to have an operating system (Answers Corporation, 2013). There are three main operating systems Windows, Mac, and Linux. When it comes to popularity and market share the most popular operating systems are Windows and Mac. Linux is an operating system that is popular with desktop users (HubPages, 2013), According to HubPages, “Windows is the Operating System with the largest market share. However, this doesn’t make it the best when it comes to quality and consistency as it is constantly marred with problems of viruses and malware (HubPages, 2013).” It usually had an affordable price tag at first, but the consumer is charges extra items like soft wear and anti-virus expenses that add up (HubPages, 2013). Linux is usually thought as a less effective than Mac and Windows, however it does offer many software programs that are similar to the Windows and Mac programs for free (HubPages, 2013). All three computer operating systems have Intel processors that make them unique. According to Pearson Certification Team, “Macintosh computers have Intel processors, they are not PCs. Likewise, the Mac OS is not compatible with PC hardware, and PC- based......

Words: 399 - Pages: 2


...Kannard Johnson Mr. Baker NT1210 April 2 2013 Unit 1 Assignment Review Questions 1) Which of the following is true about 1 bit? a. C- Represents one binary digit. 2) Which of the following terms means approximately 106 bytes? b. D- Kilobyte 3) Which answer lists the correct number of bits associated with each term? c. C- 64 bits per quadruple word 4) Which of the following answers are true about random-access memory as it is normally used inside a personal computer? d. A- Used for short-term storage e. E- Is installed on the motherboard 5) This chapter describes the concepts behind how a CPU reads the contents from RAM. Which of the following is true about the process of read data, as described in the chapter? f. A- The CPU tells the RAM which address holds the data that the CPU wants to read. 6) Which of the following determines, in part, what bits the computer stores in the file to represent the text typed into the report? g. C- Character set. 7) Which of the following determines, in part, what bits the computer stores in RAM to represent the number 123456789? h. D- The binary equivalent of decimal 132456789. 8) Which of the following is not a feature of a file system that might be used with a hard drive? i. A- An actuator arm 9) Which of the following are some of the important features supplied by files as defined by a computer OS? j. A- Keeps data in order ...

Words: 680 - Pages: 3

Profile of Social Media Users and Implication for Improving Teaching-Learning Process

...PROFILE OF SOCIAL MEDIA USERS AND IMPLICATION FOR IMPROVING TEACHING-LEARNING PROCESS AMONG 2nd YEAR BUSINESS ADMINISTRATION STUDENTS OF THE UNIVERSITY OF THE EAST-CALOOCAN ON THEIR 1ST SEMESTER ACADEMIC YEAR 2014-2015 In partial fulfillment Of the requirements for Technical Research and Report Writing By Evangelista, Paulene P. Fajardo, Lyra F. Munoz, Elizabeth P. Paguirigan, Jann-Erika A. Reyes, Jaien Denise CHAPTER 1 Profile of Social Media Users I. Introduction Social media is a popular trend today, especially among college students. Businesses are always looking for new ways to reach customers, especially ones readying to enter the work force. It helps us to interact to the other people around the world.As what Daniel Goleman said (Daniel Goleman, 2013) “Smart phones and social media expand our universe”. We can connect with others or collect information easier and faster than ever. In today’s world where Internet has experienced tremendous growth, social networking sites have become highly significant in peoples’ lives. Social networks are most commonly seen as a technology used only for entertainment purposes. However, they can also be used for serious purposes in business and education environments because they are powerful tools that can accomplish various roles and purposes. It is important to do research on them from an information system and information science point of view by analyzing user information behavior so we can see trends and......

Words: 2306 - Pages: 10


...Host 2, whose IP address is Which of the following answers is true about the IP address information in the IP header of the packet? C 5. A user at PC1 opens a web browser and types in a URL that lists the name of a server (Server1). PC1 has never tried to send an IP packet to Server1. Which of the following protocols will PC1 need to use before PC1’s browser can successfully see the web page from the server? B 6. A user at PC1 opens a web browser and types in a URL that lists the IP address of a server to which PC1 wants to connect (address The TCP/IP network has many IP routers, with many different physical paths. PC1 sits several routers away from the server with IP address Which of the following protocols could impact which path the packets from PC1 to the server take? B, D 7. Which of the following answers are true about an IPv4 address class and the type of IPv4 addresses in that class? B, D 8. Which of the following answers lists a number that, based on the value in the first octet, fits into the address class listed in that same answer? A 9. The size of a classful IP network can be defined as the number of IP addresses in the IP network. Which of the following answers lists a true statement about the sizes of class A, B, and C networks? B 10. A user has configured the IP settings on his PC using static configuration. Which of the follow- ing answers lists something not typically set as part of the......

Words: 896 - Pages: 4


...NT1210 Unit 4 Labs Unit 4 Labs NT1210 8/4/14 Unit 4 Labs Lab Review: 4.1 – Page: 82 and 83 1. To eliminate the crossover issue, lower the amount of equipment and cost. Simplify a network. 2. To increase the maximum distance for a signal. If put after the maximum distance the signal may degrade. 3. The connection and processing speed. It also depends on the number of connections the computer or laptop will allow. Lab Review: 4.2 – Page: 85 1. A. Bend Radius: The minimum radius that a fiber optic cable can be bent without loss of light or impairment. A general rule that it be no less than 15 times the cable diameter B. To not affect a signal sent down the line. 2. The core/Glass Filament, Cladding, Buffer, Strengthener and Outer Jacket. Lab Review: 4.3 – Page: 90 1. Ease of installation, lack of certified fiber optic specialists and changes to the physical design of the network later on. 2. By limiting the devices needed depending on the distance and need of each network. Verify the number of access points needed before the start. Lab Review: 4.4 – Page: 95 1. By selecting a specific layer and testing the health you can definitively say the problem lies either below or above that layer. Example: test the Transport layers health if it is ok you know the problem is in the Application layer. 2 A. B. If the cable is damaged in any way it should be checked. ----------------------- 3...

Words: 255 - Pages: 2


...NT1210 E1 Chapter 2 Review 1. Which of the following terms is the closest synonym to the term computer networking? a. Telecom b. Protocol c. Datacom< d. Stuff 2. Ann uses her email address, me@here.com, to send an email to Bob, whose email address is you@there.com. The message contains a few paragraphs of text. Which of the following will be important to the process of making sure that Bob receives this email? a. Ann’s incoming email server b. Bob’s incoming email server< c. Bob’s outgoing email server d. Ann’s compression algorithm e. The A/D converter near Ann 3. According to this chapter, which of the following concepts happens in a modern-day, end-to-end voice call between two business telephones sitting in the same office building in the United States? (Choose two answers.) a. The call uses only analog electrical signals. b. The call uses only digital electrical signals.< c. The call uses both analog and digital electrical signals. d. The call represents short sounds as a unique set of bits.< e. The call represents each spoken word as a unique set of bits. 4. According to this chapter, which of the following concepts happens in a modern-day, end-to-end voice call between two home telephones in the United States? (Choose two answers.) a. The call uses only analog electrical signals. b. The call uses only digital electrical signals. c. The call uses both analog and digital electrical......

Words: 1381 - Pages: 6


...satisfaction, and corporate profits. Finally, it enables them into summary information to view detail transactional data. Generally, data mining is the process of analyzing data from different perspectives and summarizing it into useful information - information that can be used to increase revenue, cuts costs, or both. Data mining software is one of a number of analytical tools for analyzing data. It allows users to analyze data from many different dimensions or angles, categorize it, and summarize the relationships identified. Technically, data mining is the process of finding correlations or patterns among dozens of fields in large relational databases. Data Mining Report 1 ` MicroStrategy Inc., McLean, VA founded in 1989, MicroStrategy is a global leader in business intelligence (BI) technology. MicroStrategy provides integrated reporting, analysis, and monitoring software that helps leading organizations worldwide make better business decisions every day. Companies choose MicroStrategy for its advanced technical capabilities, sophisticated analytics, and superior data and user scalability. MicroStrategy’s Perennial Education Pass (PEP) Program ensures technical proficiency through an ‘all-you-can-attend’ training approach, leveraging blended learning methods to deliver focused, role-based training and certifications for your project team. With more than 3,000 active members worldwide, the PEP Program has proven to be the most flexible and low-cost training......

Words: 324 - Pages: 2

Nt1210 U1A1

...nt1210 Unit 1 assignment 1 1. c. Represents one binary digit 2. b. megabyte 3. d. 4 bits per byte 4. c. used to process data & e. is installed on the motherboard 5. a. the cpu tells teh ram which addresses holds the data that the CPU wants to read 6. c. character set 7. d. the binary equivalent of decimal 123456789 8. a. an actuator arm 9. a. keeps data in order, b. Provides a convenient way to name a set of data for easier operations like copying and moving & c. Names give users an easy way to reference the data 10. c. By reading the files and autogenerating a directory structure for the files, for use on your classmate’s local computer 11. b. using a magnetic charge 12. a. used for short-term memory & b. used for long-term memory 13. a. actuator arm & c. platters 14. a. ram & d. USB flash drive 15. b. pixel grid 16. d. by closing an electrical circuit conneted to the key when the key is pressed 17. b. two dimensions: movement as 2 numbers: one in the direction of the x axis of an x, y graph and the other on the y axis. 18. c. input of commands that control the computer 19. c. the screen is using more than 1 million pixels & d.1024 is the number of 'items' top to bottom in a grid on the screen 20. a.information that identifies each individual pixel on the computer display & b. a binary code for each pixel, defining its color List the words inside the acronyms RAM - Ram Access Memory OS - operating system CPU - central processing unit KB -......

Words: 307 - Pages: 2


...C 6. A, B, C 7. C, D 8. A, C 9. D 10. A 11. A 12. B 13. D 14. B 15. A 16. B, C 17. C, D 18. A .19. C 20.B, D Define key terms Transmission control protocol- a set of rules (protocol) used along with the Internet Protocol to send data in the form of message units between computers over the Internet. User datagram protocol- a communications protocol that offers a limited amount of service when messages are exchanged between computers in a network that uses the Internet Protocol. Flow- a directed graph where each edge has a capacity and each edge receives a flow. TCP segment- The unit of transfer between the TCP software on to machines UDP datagram- part of the Internet Protocol suite used by programs running on different computers on a network. Source port- the port from which a packet is sent. Destination port- Identifies the port number of a destination application program. Well-known port number- the port numbers that are reserved for assignment by the Internet Corporation for assigned names and numbers for use by the application end points that communicate using the Internet's transmission control protocol or the user datagram protocol. Dynamic port- is a private port. TCP segmentation- TCP receives data from an application and segments the data into pieces. This segmentation is necessary so that the information can be placed inside the TCP data field. Guaranteed delivery- is the guarantee the delivery of an octet. Error......

Words: 282 - Pages: 2


...NT1210 INTRO TO NETWORKING UNIT3 LAB3.3 The TCP/IP Model Mr. Randy Vogl Gus Perez 19593003 The TCP/IP network model Exercise 3.3.1 What are the distinct differences between OSI and TCP/IP models? TCP refers to Transmission Control Protocol. OSI refers to Open Systems Interconnection. Model TCP/IP is developed on points toward a model the internet. TCP/IP has 4 layers. OSI has 7 layers. TCP/IP more reliable than OSI OSI has strict boundaries; TCP/IP does not have very strict boundaries. TCP/IP follow a horizontal approach. OSI follows a vertical approach. In the application layer, TCP/IP uses both session and presentation layer. OSI uses different session and presentation layers. TCP/IP developed protocols then model. OSI developed model then protocol. TCP/IP offers support for connectionless communication within the network layer. In the network layer, OSI supports both connectionless and connection-oriented communication. TCP/IP is protocol dependent. OSI is protocol independent. http://www.differencebetween.net/technology/internet/difference-between-osi-and-tcp-ip-model/ Read more: Difference between OSI and TCP IP Model | Difference Between | Difference between OSI vs TCP IP Model http://www.differencebetween.net/technology/internet/difference-between-osi-and-tcp-ip-model/#ixzz3f4nyPzTU TCP/IP model protocols and functions. Exercise 3.3.2 Identify the layer in which each protocol resides according to the TCP/IP model. Using figure 3.4 from the......

Words: 1306 - Pages: 6


...NT1210 LAB 1.1 1.1.1 2931 103 102 101 100 1000 100 10 1 2 9 3 1 ___________________ 2000 + 900 + 30 + 1 = 2931 1.1.2 1102 22 21 20 4 2 1 1 1 0 ________________ 4 + 2 + 0 = 6 1.1.3 112 21 20 2 1 1 1 __________ 2 + 1 = 3 1.1.4 Exercise 1.1.4: Create an expanded mapping for binary number 10010 subscript 2. 2^7 | 2^6 | 2^5 | 2^4 | 2^3 | 2^2 | 2^1 | 2^0 | 128 | 64 | 32 | 16 | 8 | 4 | 2 | 1 | x | x | x | x | x | x | x | x | 0 | 0 | 0 | 1 | 0 | 0 | 1 | = 18 = 18 0 | 0 | 0 | 0 | 16 + | 0 + | 0 + | 2 + | 0 | Exercise 1.1.5: Create an expanded mapping for the......

Words: 252 - Pages: 2

Nt1210 U6

...NT1210 Unit 6 Assignment 1 1. C 2. C 3. B, D 4. B,D 5. A 6. C 7. A, B 8. B 9. A, B 10. C 11. C 12. A 13. C 14. A, D 15. B, D 16. A, B, D 17. B 18. B 19. C, D 20. B, C Key Terms Coverage area – the space in which the wireless radio signals in one wireless LAN can effectively reach and be used to send and receive data between the WLAN’s AP’s and its clients. Shared bandwith – a term referring to how some networks must share the right to send data by taking turns, which limits the total number of bits sent by all devices (the networks total capacity). Wi-Fi – a term created by the Wi-FiAlliance as part of its overall wireless LAN branding and marketing strategy; this term has become somewhat synonymous with wireless LAN over time. LAN edge – a reference to the part of the campus LAN with the end-user devices and the switches to which they connect, through an Ethernet switch or a wireless LAN access point, that contains the largest number of physical links. WLAN hotspot – a location, typically in a business like a retailer or restaurant, where customers can come and go and where the company offers a wireless LAN plus internet access to its customers, often for free. Basic Service Set – (BSS) in wireless LANs, a single wireless access point (AP) and the client devices that send data to/from that AP. Extended Service Set – (ESS) a wireless LAN in which all devices......

Words: 470 - Pages: 2


...1.Which of the following types of LANs was a competitor of Ethernet LANs from the earliest days of wired LANs in the 1980s and into the 1990s? C 2. Which of the following types of LANs is the strongest competitive option to be used instead of Ethernet LANs today? D 3. Which of the following speeds are not defined as a speed by some Ethernet LAN standard? B 4. Think back to the information listed for Gigabit Ethernet for maximum cabling distances. Which of the answers matches the correct standard with the cabling type and maximum cable length? A 5. A campus LAN drawing shows hundreds of user devices cabled to LAN switches on various floors of a building. The per-floor edge switches have a cable connected to other switches that sit on the first floor of the building. All the links from the edge switches to the end-user devices use 100BASE-T. A PC on floor 2 sends an Ethernet frame to a PC on floor 3, with the frame passing through the switches on the first floor as part of the journey. Which of the following statements is true about the links between the switches in this Ethernet LAN? B 6. Which of the following shortcut names defines an IEEE standard that runs at 10,000,000,000 bits per second, and includes some fiber cabling options? E 7. Which of the following is the formal IEEE standard for 1-Gbps Ethernet using UTP cabling? D 8. Imagine that you looked back at the history of prices for Ethernet NICs. You looked at typical prices for 100BASE-T NICs over time...

Words: 1006 - Pages: 5


...NT1210 Lab 3 3.1.1 If wireless devices where not governed by the Wi-Fi alliance it would make it hard to communicate hardware and software between different machines. That would mean cable providers, cellphone providers, and internet providers would all have to use their own Wi-Fi frequencies. Without the WI-FI alliance it would be to hard to manage day to day life with all devices not being able to share hardware and software. Also there would be no real security so it would be easy for someone to hack all of your information. 3.1.2 A model that is used to visualize something that I would use is power points. It is easier to explain something to someone when you break down the information into slides and show key points. Power points make information easier to understand. 3.1.3 Data Link Physical Application Network Transport 3.1.4 If the model is to general then you wouldn’t understand it. If the model is to granular then the data would begin to overlap itself. Review.3.1 1. The data wouldn’t be filtered correctly so there would be connection errors. 2. (OSI) started in the 1970s, with a lot of progress on individual standards in the 1980s, and with vendor products appearing by the early 1990s. It was created to compete with TCP/IP. It broke everything into layers and each layer provided facilities to the layer above it and below it. 3. (TCP)/IP resulted from research and......

Words: 334 - Pages: 2