Nt1430 Unit 2 Assignment 1 Service

Similar Documents

Intro to Linux Networking Unit 2 Hw

...b. correspond/business/milk_co- relative pathname c. /home/max- absolute pathname d. /home/max/literature/promo- absolute pathname e. .. – simple file name f. Letter.0210- simple file name 2. List the commands you can use to perform these operations: g. Make your home directory your working directory. – cd alone will make your home directory your working directory by default. h. Identify the working directory. – pwd 3. If the working directory is /home/max with subdirectory named literature, give three sets of commands you can use to create a subdirectory named classics under literature. Also give several sets of commands you can use to remove the classics directory and its contents. Creating a Subdirectoy : cd /home/max/literature : mkdir classics : ls /home/max.literature (to show directory has been created) Removing a Subdirectory :pwd (to see what directory you are in) : ls (to list your directories) : rmdir /home/max/literature/classics (removes classics directory) 4. The df utility displays all mounted filessystems along with information about each. Use the df utility with the –h(human-readable) option to answer the following questions. i. How many filesystems are mounted on your Linux system? j. Which filesystem stores your home directory? k. Assuming you answer to exercise 4a is two or more, attempt to create a hard link to a file on another filesystem. What error message do you get?......

Words: 578 - Pages: 3

Physical Networking Unit 2 Assignment

...Physical Networking Unit 2 Assignment 1. The American National Standards Institute is a private non-profit organization that oversees the development of voluntary consensus standards for products, services, processes, systems, and personnel in the United States. The organization also coordinates U.S. standards with international standards so that American products can be used worldwide. For example, standards ensure that people who own cameras can find the film they need for that camera anywhere around the globe. ANSI accredits standards that are developed by representatives of standards developing organizations, government agencies, consumer groups, companies, and others. These standards ensure that the characteristics and performance of products are consistent, that people use the same definitions and terms, and that products are tested the same way. ANSI also accredits organizations that carry out product or personnel certification in accordance with requirements defined in international standards. 2. The Institute of Electrical and Electronics Engineers (IEEE, read I-Triple-E) is a non-profit professional association headquartered in New York City that is dedicated to advancing technological innovation and excellence. It has more than 400,000 members in more than 160 countries, about 51.4% of whom reside in the United States. IEEE is one of the leading standards-making organizations in the world. IEEE performs its standards making and maintaining functions through the...

Words: 1205 - Pages: 5

Intro to Networking

...NT-1210 Intro to Networking 05/30/2012 CH 10-11 Research Paper Essay In the evolution of smart phones the first use of text messaging did not take place until 1992 in England, and this was from a computer to a cell phone. The first cell phone to cell phone text happened in 1993 in Finland, which during this period was leading the cell phone technology race, and in 2000 was the first to offer mobile news services. In this time period of the early 2g (second generation) and 2.5g networks mobile providers started to pop up everywhere making communications more reliable. In 2001 the 3g network was introduced and with this technology came the ability to send pictures and stream video. Mobile providers started to offer media content such as ringtones, news, weather, jokes, music and videos, which in 2007 reached 31 billion in sales and outpaced computer internet sales. In the business aspect of this technology, all of this is the icing on the cake. The ability to keep in touch with your employees at any time or location is priceless. Gone are the days of the travelling salesperson with only the information that was current when they began their journey. Changes to information or current events can be sent immediately, lost files can be sent, up to date sales figures can be accessed and video conferencing is possible. A new application being researched for business use is Unified Messaging, a system that offers access to E-mail, voice and fax messages though a unified......

Words: 430 - Pages: 2

Nt1310 Physical Networking Unit 2

...NT1310 Physical Networking Unit 2: Assignments and Homework Lab 1: Cloud Computing Research Amazon: Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides resizable compute capacity in the cloud. It is designed to make web-scale computing easier for developers. Amazon EC2’s simple web service interface allows you to obtain and configure capacity with minimal friction. It provides you with complete control of your computing resources and lets you run on Amazon’s proven computing environment. Amazon EC2 reduces the time required to obtain and boot new server instances to minutes, allowing you to quickly scale capacity, both up and down, as your computing requirements change. Amazon EC2 changes the economics of computing by allowing you to pay only for capacity that you actually use. Amazon EC2 provides developers the tools to build failure resilient applications and isolate themselves from common failure scenarios. Cost - Inexpensive – Amazon EC2 passes on to you the financial benefits of Amazon’s scale. You pay a very low rate for the compute capacity you actually consume. See Amazon EC2 Instance Purchasing Options for a more detailed description. Amazon EC2 Instance Purchasing Options In addition to providing the flexibility to easily choose the number, the size and the configuration of the compute instances you need for your application, Amazon EC2 provides customers three different purchasing models that give you the flexibility to......

Words: 575 - Pages: 3

Nt1430 Linux Networking (Unit 1 Linux Server Installation and Configuration)

...time or at different time. It allows many users to take advantage of the computer's resources simultaneously. Some permit 100's to 1000 users to take advantage of the computer's resources simultaneously. They are successful because of the powerful, efficient, stable and secure operating systems like LINUX. It has a capability of providing each user the same data ensuring total privacy from each user even while accessed by 100's of users simultaneously. 2. What is the Free Software Foundation/GNU? Linux? Which parts of the GNU/Linux operating system did each provide? Who else has helped build and refine this operating system? The Free Software Foundation (www.fsf.org) is the principal organizational sponsor of the GNU Project. GNU developed many of the tools, including the C compilers that are part of the GNU/Linux Operating Systems. Linux is the name of an operating system kernel developed by Linus Torvalds and expanded and improved What are multiuser by thousands of people on the Internet. Torvalds’s kernel and GNU’s tools work together as the GNU/Linux Operating System. 3. In what language is Linux written? What does the language have to do with the success of Linux? Linux is written in the C programming language and because it is written in the C language the language can be imbedded in all type of devices from TV’s, to PDA’s, cell phones, cable boxes for the reason of this language being so portable. 4. What is a shell? How does it work with the kernel? With......

Words: 1467 - Pages: 6

Linux Networking

...Linux Networking Homework ------------------------------------------------- Chapter 5 1. Which commands can you use to determine who is logged in on a specific Terminal? Who, w, hostname, finger 3. What happens when you give the following commands if the file name done already exists? $ cp to_do done $ mv to_do done Answer: Either command overwrites Done with contents of To_do. $ cp - copy files and directories,$ mv - move (rename) files 4. How can you find out which utilities are available on your system for editing files? Which utilities are available for editing on your system? Give the command apropos editor. Typical editors are vim, ex, ed, and gedit. 8. What is the result of giving the utility the name of a command that resides in a directory that is not in your search path? $ which me 10. Experiment by calling the file utility with the names of files in /usr/bin. How many different types of files are there? Approximately 20 ------------------------------------------------- Chapter 6 1. Is each of the following an absolute pathname, a relative pathname, or a simple filename? a. milk_co b. correspond/business/milk_co c. /home/max d. /home/max/literature/promo e. .. f. letter.0210 Answer: a= Directory File, b= relative c= absolute d= absolute e= relative f= Simple 2. List the commands you can use to perform these operations: a. Make your home directory the working directory b. Identify the working......

Words: 534 - Pages: 3

Intro to Linux

...A Practical Guide to Linux Commands, Editors, and Shell Programming SECOND EDITION ® Mark G. Sobell Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Capetown • Sydney • Tokyo • Singapore • Mexico City Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals. The author and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein. The publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales, which may include electronic versions and/or custom covers and content particular to your business, training goals, marketing focus, and branding interests. For more information, please contact: U.S. Corporate and Government Sales (800) 382-3419 corpsales@pearsontechgroup.com For sales outside the United States, please contact: International Sales international@pearson.com Visit us on the Web: informit.com/ph Library of Congress......

Words: 228961 - Pages: 916

Intro to Networking

...0001 2) 0010 3) 0011 4) 0100 5) 0101 6) 0110 7) 0111 8) 1000 9) 1001 Exercise1.4.3 What are the binary and decimal values of the ASCII letter K? Show the steps of the conversion. decimal | binary | 75 | 01001011 | Exercise1.4.4 Use the web to explore the origin of the Universal Character Set (UCS)—ISO/IEC 10646—and explain why it was developed. And contrast this system with ASCII. What is the relationship of ASCII to the UCS encoding? A) For communication and exchange of electronic information B) The way they encode each character and the number of bits used Exercise1.4.5 Use the web to explore the application of UTF-8 text encoding. What features are provided by UTF-8 that is not provided by ASCII? Why was it chosen to replace ASCII as the standard for the web? A) A variable with encoding that can represent every character in the Unicode character set B) Utf-8 functions better on the web C) It can translate foreign languages Lab Review 1.4 1. Using the ASCII encoding scheme, write your name (including the space between your first and last name) in hexadecimal. How much memory would it take to store your name if each ASCII character occupied a byte? = 14 J | a | v | o | n | | C | h | e | s | t | n | u | t | 4a | 61 | 76 | 6f | 6e | 20 | 43 | 68 | 65 | 73 | 74 | 6e | 75 | 74 | 2.......

Words: 1580 - Pages: 7

Intro to Networking Unit 4 Homework

...Multiple Choice 1. B & C 11. C 2. A&C 12. D 3. C&D 13. A&C 4. A&D 14. B 5. B 15.B 6. B 16. A 7. A&B 17. D 8. A 18. A&D 9. A 19.C 10. C 20. B,C&D Define key terms Electrical Circuit- A complete loop of material that conducts electricity. Frequency- When describing energy that acts like waves, the number of times that the entire waveform repeats per second. Amplitude Phase- When describing energy that acts like waves, when graphing the waveform centered on the X axis, and graphing some kind of power Bit Time- In an encoding scheme, the time period during which the encoding scheme sends an energy signal to represent 1 bit. Radio waves- Electromagnetic energy in a particular range of frequencies Wireless LAN- A group of wireless clients, plus one or more wireless access points, with the access points all using a common SSID Ecoding Scheme-A set of rules that define how to change the pattern of the waveforms of energy to represent binary 0s and 1s. Unsheilded twisted pair (UTP)- A type of cabling that uses pairs of copper wires, twisted together, with no additional shielding from the effects of EMI. Core- In a fiber-optic cable, the glass fiber in the center of the cable over which light can pass. Cladding- In a fiber-optic cable, the material around the core that helps direct light back into the core. Wireless WAN- A type of network that uses no wires (cables), instead using radio waves, with a wide-area network (WAN) business model of......

Words: 341 - Pages: 2

Nt1430 Linux Networking

...NT1430: Linux Networking Unit 4 Homework Assignment Chapter 14: 1. Which commands can you use from the command line to send a file to the default printer? a. lpoptions –d printer 2. Which command would you give to cancel all print jobs on the system? a. cancel job-id 3. Which commands list your outstanding print jobs? a. lpc status 4. What is the purpose of sharing a Linux printer using Samba? a. Sharing a Linux printer using Samba allows Windows and OS/2 clients to send print jobs to the printer. 5. Name three printing protocols that CUPS supports. Which is the CUPS native protocol? a. 1.) System-config-printer 2.) lpinfo Displays available drivers 3.) lpadmin configures printers b. IPP is the native protocol Chapter 10: 1. Describe the similarities and differences between these utilities: a. Scp and ftp i. SCP stands for Secure Copy Protocol, and FTP is an acronym for the File Transfer Protocol, which was the original file transfer protocol. SCP and FTP are two applications for copying files from one computer to another. Both were based on their own protocols, but both now use different prtocols. b. Ssh and telnet i. Both are text-based protocols: mouse movements cannot be transferred only keystrokes. Both are connection-oriented and are client-server protocols. The main difference is in security. SSH offers security mechanisms that protect the user against anyone with malicious intent while Telnet has no security measures whatsoever. c. Rsh......

Words: 284 - Pages: 2

Intro to Networking

...Intro to Networking Lab 3 Jeff Garwood EX. 3.1 Review 1. The MAC Address is sufficient to route traffic locally because it provides the needed information with regards to the equipment location. This is mostly true on level 2 networks. 2. The Open Systems Interconnection was started in two documents in 1978. The International Organization for Standardization (ISO) and the International Telegraph and Telephone Consultative Committee, or CCITT. In 1983 these two documents were combined as the basic reference model for the OSI. It was created so Protocols could allow the entity in one host to interact with a corresponding entity at the same layer in another host. 3. The TCP dates back into the 1960s on the DOD sponsored ARPANET. In 1973 the TCP/IP came to be and consisted of dozens of different protocols. Of these key protocols, two are usually considered the most important. The Internet Protocol (IP) is the primary OSI network layer (layer three) protocol that provides addressing, datagram routing and other functions in an internetwork. EX. 3.2 Review 1. The composition of the physical wiring, and connectors no matter the type are strictly regulated to ensure the electrons within the communications signal can move fast enough to maintain a connection. The addition of network devices such as switches and routers complete the campus style network. 2. The OSI model is not implemented in a network but is used as a model to guide troubleshooting a local network in......

Words: 719 - Pages: 3

Linux Networking

...NT-1430 Unit 2 Lab Lab Objectives * Perform basic system administration tasks * Creating users * Setting user passwords * Group membership and management * Working with the Linux filesystem structure * Creating files, directories * Commands, options, arguments * Copying files, moving/renaming files, deleting files * File and directory permissions Lab 1 Record your answers in the spaces provided. 1. Start your virtual machine 2. Log into the system as root with the password you specified last week 3. Create a user account for yourself with the following convention: [First Initial][Last Name] Example: John Doe would be jdoe a. Be careful, as Linux is a case-sensitive OS. Jdoe != jdoe b. Record the command used: __________________________________________________ 4. Set a password for your newly created account. Record the command used. ____________________________________________ 5. Create and set passwords for the following users: c. mark d. max 6. Log out of root and log back in as your newly created account 7. Run the following commands in sequence, and then report your findings: e. ls f. ls –a g. ls –l h. ls –al 8. Run the following commands and report your results. What is different about step 6? i. ls /tmp j. ls –a /tmp k. ls –l /tmp l. ls –al /tmp 9. Which command will display your......

Words: 1169 - Pages: 5

Linux Administration Unit 2 Homework

...without having to assign them to each user. 2. Create a group with something along the lines of Database admin, and give them the permissions needed to do their jobs. 3. Would use the command: su –c ‘chage –d 0 “admins account name”’ 4. su command is used for root access, this allows the user to run a process that needs admin rights. 5. pam.d to enforce authentication 6. This is where you setup your password policies. It contains things such as password min and max length and age limits. 7. Pass_min_day is the length of time that password can exist before it has to be changed. This is important to set to prevent a user from keeping the same password and protecting their user information. 8. The max day setting is used for the max amount of day you can have that password before it has to be changed. This setting is good for allowing the user to think of a new strong password or if they are lazy the last time they can wait to change this password. 9. This will apply to all accounts on this machine, or that use this machine to access the network/server. The next time you change the password on a existing account you will receive these warnings 10. First you would create the accounts for each users, and add each to a group they need to be in to get their jobs done. After this is complete, you would issue the command su –c ‘chage –E (YYYY-MM-DD) “username” this being for the 14days they will need access to the linux machine. ...

Words: 294 - Pages: 2

Linux Networking Unit 1 Assignment

...Unit 1 Assignment Chapter 1 ex 1. What is free software? List three characteristics of free software. Free software is software that is available for anyone to use and modify however they like. 3 characteristics of free software are that, you are free to study, redistribute, and modify it free of cost. Chapter 2 ex 1. Briefly, what does the process of installing an operating system such as Fedora/RHEL involve? Installing the Fedora/RHEL OS is copying the OS files from a CD, DVD, or Flash drive on to the hard drives of the system then setting up the config files so the Linux runs properly on the hardware. Chapter 3 ex 1. What is a live system? What advantages does it have over an installed system? A live session is a Linux session that is running on your computer without you actually installing Linux on your computer. The advantages you have by running a live session is you can preview the system without installing it and your computer will not be changed. 4. Where on the disk should you put your /boot partition or the root (/) partition if you do not use a /boot partition? Default layout 8. When does a Fedora/RHEL system start X by default? To start X by default you need to set run level 5 to be the default and it will start when the system boots. Chapter 11 ex 1. How does single-user mode differ from multiuser mode In single user mode, only the console user may be logged in, though the user can edit files and execute multiple programs simultaneousl 3. What......

Words: 426 - Pages: 2

Ged 216 Intro to Sociology Unit 2 Exam

...GED 216 Intro to Sociology Unit 2 Exam Click Link Below To Buy: http://hwcampus.com/shop/ged-216-intro-sociology-unit-2-exam/ Multiple Choice Questions (Enter your answers on the enclosed answer sheet) 1. Carol Gilligan’s work on the issue of self-esteem in girls showed that a. girls begin with low self-esteem, but it gradually increases as they progress through adolescence. b. at all ages, girls have higher self-esteem than boys. c. at all ages, boys have higher self-esteem than girls. d. girls begin with high levels of self-esteem, which gradually decrease as they go through adolescence. 2. George Herbert Mead considered the self to be a. the part of an individual’s personality that is composed of self-awareness and self-image. b. the presence of culture within the individual. c. basic drives that are self-centered. d. present in infants at the time of their birth. 3. Mead placed the origin of the self on a. biological drives. b. genetics. c. social experience. d. the functioning of the brain. 4. According to Mead, social experience involves a. understanding the world in terms of our senses. b. the exchange of symbols. c. a mix of biological instinct and learning. d. acting but not thinking. 5. By “taking the role of the other,” Mead had in mind a. imagining a situation in terms of past experience. b. recognizing that people have different views of most situations. c. imagining a situation from another person’s point of view. d.......

Words: 1085 - Pages: 5

Similar Documents

Unit 1 Assignment 2

...Unit 1 Assignment 2 The Internal Use Only data classification standard of Richman Investments has many different infrastructures domains that are affected via internal use only data classification. More than all others, the three infrastructures that are affected the most are the User Domain, Workstation Domain and the LAN Domain. The reason why the User Domain infrastructure is one of the most affected infrastructures is because the User Domain infrastructure is the infrastructure that allows users to access the network. This is a problem because many users do not fully understand everything, all the time and thus is bound to make a mistake sooner or later. With so many users on our network, this is probably the most vulnerable domain infrastructures in our network. The Workstation Domain is also another domain infrastructure that has great reason to be affect by internal use only data because this is where the user connects to the our network. The reason that this can cause security threats and other problems is because this domain can be connected via a personal laptop or even a cell phone or other mobile device. The final infrastructure domain that is greatly affected is the LAN domain. The reason that this domain infrastructure is affected by internal use only data is because this domain is the open domain available companywide, to anybody in the building or even near the building via a wireless device. If we watch these specific areas closer and implement some......

Words: 275 - Pages: 2

Unit 2 Assignment 2: Computer Basics Review

...Tiffany Ostarly NT1210 Introduction to Networking Unit 2 Assignment 2: Computer Basics Review Chapter Review 1. A,C | 2. B | 3. C,D | 4. C,D | 5. D | 6. D | 7. B | 8. B | 9. A,C,D | 10. B,D | 11. D | 12. A,C | 13. C | 14. A | 15. A,D | 16. C,D | 17. D | 18. C | 19. A | 20. D | Key Terms Computer networking – the gerund form of the term computer network. Computer network – a combination of many components that work together so that many different devices can communicate. Application – a function on any kind of computer or electronic device that is useful to the user, which can give the user a reason to want to own and use the device. More specifically, software that performs some useful function for the user. Email – electronic mail. An application in which the user can type text and attach other files to create an electronic equivalent of a postal letter, and send the email to another person using his email address. Voice call – a more modern term for a telephone call that does not use the word telephone, instead emphasizing the fact that the traffic that flows between the end points is voice. Video frame – a grid of pixel locations of a chosen width by height that contains the lights/colors to be shown in a video at a single point in time. Web server – software that stores web pages and web objects, listens for requests for those pages, and sends the contents of those pages/objects to clients...

Words: 598 - Pages: 3

Unit 2 Assignment 1

...IS3340-WINDOWS SECURITY | Recommendations for Access Controls | Unit 2 Assignment 1 | | [Type the author name] | 4/3/2014 | | Access Control is the defined as “the selective restriction of access to a place or other resource”, in the RFC 4949. “The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.” Simply put the ability to read, write, modify, or deleting information or files is what Access Control is. It is more than this, in the permissions (authorization) granted to each Security Group or Individual User. The permissions mentioned in the previous paragraph are rights that a user is allowed to access, create, modify, or delete the file(s) inside a file folder, or objects. These are all permissions (authorizations) controlled by the Authorized Windows Security Personnel of the file structure. We will list some examples of how this outlined and what the impact would be, but first understand that requirements for the permissions is controlled from the Group Level, other than by Individual User, because it is easier to control from a security standpoint when you want to modify these abilities. There are four folders created (D:\ERPdocuments, D:\ERPdocuments\HRfiles, D:\ERPdocuments\SFfiles, D:\ERPdocuments\MGRfiles) which we want to allow specific permissions for certain functions (tasks). For example; by modifying the permissions under the specific user account for HRmanager to include...

Words: 436 - Pages: 2

Unit 2 Assignment 1

...Unit 2 Assignment 1: Strengths and Challenges Reflection Letter Course Objectives and Learning Outcomes Define terms and concepts related to strategies for technical professionals. Communicate information using Microsoft Office productivity tools and email. Assignment Requirements This assignment coordinates with Unit 2 Lab 1: Introductory Word Lab. Create and send a letter to your instructor executed in MS Word that discusses your questions, concerns, and what you look forward to in Strategies for the Technical Professional. As a part of your letter, make an assessment of your strengths, such as the skills and experience you bring to the class. Also discuss your challenges, perhaps your circumstances, habits, or past academic history, as well as the parts of the curriculum that may be new to you, may not appear as relevant to your goals and objectives, or may be difficult for you to learn and apply. Required Resources Computer with Internet access and MS Word installed. Submission Requirements Your letter should meet the following specifications: Orientation: Portrait Font: 12-point Times New Roman or 10-point Arial Spacing: Double spaced Margins: Normal, Narrow, or Moderate Length: Two to five paragraphs Header: Right justified, including your name, the course number, day, and time Text format: Body of letter left justified Salutation: Appropriate greeting to open letter Closing: Appropriate sign-off and full name as......

Words: 1181 - Pages: 5

Unit 2 Assignment 1

...Eric Satchell NT1330 Service Provider Types Unit 2 Assignment 1 July 3, 2014 Comparing Service Providers There are a lot of companies providing services, but AT&T provided telephone communication to the public. AT&T monopolized the telecommunication industry until the United States took them to court for antitrust and won. AT&T was broken up into eleven smaller companies, call Baby Bells. One of the companies that derived from this law suit was the Regional Bell Operating Company or RBOC. RBOC was a term that described one of the US telephone companies that provided telephone, telegraph, and long distance to the consumers. RBOC is part of a local exchange carrier allowed to compete for business. RBOC services internet service which in turn dealt with digital data. The merging companies provided different types of service based on the Telecommunication Act of 1996. ILEC or incumbent local exchange carrier is a telephone company that provided local telephone communications before the ruling to break up the Ma Bell Company. The FCC ruled that the ILECs must provide other telecommunications service providers access to their equipment to be able to provide a better rate to the consumer. This......

Words: 480 - Pages: 2

Composition 2 Unit 2 Assignment 1: Chapter Review and Trace

...Unit 2 Assignment 1: Chapter Review and TRACE 1. The five elements in the rhetorical situation are text, reader, author, constraints, and exigence. 2. A reader can use the rhetorical situation to analyze an argument essay by analyzing what the author is arguing about and who his target readers are. A viewer can use the rhetorical situation to analyze an image by first analyzing what the image’s meaning is, and who the targeted viewer is. A writer can use the rhetorical situation during the planning phase of writing a paper by deciding who is target readers will be and the position it may take on the topic. 3. The audience is important in argument because without the audience you have no argument. The different positions that the audience might initially hold are a friendly, an undecided, a neutral, a resistant, an unfamiliar, or a linked audience. There are multiple outcomes that are associated with arguments directed to each of these audiences, these outcomes include, a bias, they may oppose your argument, or they may agree with your argument. 4. Discourse communities are defined as groups that are involved in and communicating about a particular topic, or issue. The reason a discourse community is helpful to establish common ground for its members is because they share a set of basic values and assumptions. 5. A universal audience is an imagined audience that serves as an ethical and argumentative test for the rhetor. A universal audience is a useful......

Words: 254 - Pages: 2

Unit 2 Assignment 1 Trace

...Review Questions 1. The five elements in the rhetorical situation are text, reader, author, constraints and exigence. 2. TRACE Chart a) A reader can use rhetorical situation to analyze an argument essay by knowing what kind of text it is, what the special qualities and features are and what the text is about. A reader can also use rhetorical situation to figure out if the writer anticipated a specific type of reader. It also can be used to know who the author is as well as finding out what the beliefs, attitudes, habits, affiliations or traditions will influence the way the reader and the author view an argument. The reader can also use this method to find out the cause of the argument b) A viewer can use rhetorical situation to analyze an image in order to figure out what kind of message is being portrayed in the image. The viewer can find out who the targeted audience is. The viewer should also look at what is exactly is going on in the picture in order to figure out who caused the argument or where the illustrator’s stance is. c) A writer can use the rhetorical situation in the planning phase of writing a paper by knowing what the assignment is. The reader must know who the audience is going to be and what side have they taken or what side are they going to take after reading the paper. It is also good to consider if there can be any common ground between the opposing forces. A reader needs to know why they are presenting their......

Words: 751 - Pages: 4

Unit 1 Assignment 2

...September 25, 2014 NT 2580 Unit 1 assignment 2 A Data Classification Standard is information or data shared internally by an organization. The private information or data may not be included; core communications are not planned to leave the organization. The report is designed to describe and explain the standards for the “Internal use only” data classification at the Richman Investments location, this report will address which IT set-up domains are affected by the standard and how. The first IT set-up affected by core use is the User Domain. The User Domain describes the people who access an organization’s information system. The user domain will enforce an Acceptable Use Policy (AUP) that defines what each user can and cannot do with the company’s data. With company users, any outsiders, contractor’s or third party agents will also need to agree and comply with the Acceptable Use Policy. Any violation will be taken up with management or the proper establishments to access further corrective action. Work Station Domain: This is where most of the company’s users connect to get to the IT set-up. No personal devices or removable media may be allowed on this network ever. All devices and removable media will be issued by the company for official work use. Access Control Lists (ACLs): ACLs will be tired up to appropriately define which access the users are allowed to use. Any violation causes an immediate suspension of rights and the person(s) in violation will be subject to......

Words: 414 - Pages: 2

Unit 2 Assignment 1

...Introduction to Networking Unit 2: Assignment 1 Indentifying Network Topologies Identify the major needs and major stakeholders for computer networks and network applications. The major stakeholders for computer networks and network applications are the ones who use it or relay on it to do business. The main stakeholders are the ones who uses the network or applications to get their work done for their company. The next stakeholder is the company or people who rely on the first company to get what they need. The ones who design the applications or the network are stakeholders in the fact they need to make sure their work is done properly so others can do their job. The owners are also stakeholders in the fact that others rely on their people and software to get their work done. Then there is the end-users who are also stakeholders because we need the network and applications to do our daily job. Identify the classifications of networks and how they are applied to various types of enterprises. PAN (Personal Area Network)—personal. You as an individual and the range is around that person LAN (Local Area Network)—network of interconnected computers within a small geographic area. Area of LAN’s are a room, building or group of buildings, offices, schools. The range is 10m – 1km MAN (Metropolitan Area Network)—a network design for a town or a city. The range is about 10km.Examples would be London, England or Geneva, Switzerland, WAN (Wide Area Network—a network that......

Words: 289 - Pages: 2

Unit 2 Assignment 1

...January 6, 2015 January 6, 2015 Todd Eppes NT1310 Todd Eppes NT1310 Service Provider types Unit 2 Assignment 1 Service Provider types Unit 2 Assignment 1 Todd Eppes January 1, 2015 NT1310 Unit 2 Assignment 1 Service Provider Types RBOCS stands for Regional Bell operating company. It was one of the United States regional telephone companies that were created as a result of the breakup of AT&T. They are allowed to compete for long distance telephone traffic under certain circumstances. RBOCs are generally in competition for digital data and internet traffic with wireless service providers and cable TV companies. ILEC is short for incumbent local exchange carrier. IT is a telephone company that was providing local service when the Telecommunications Act of 1996 was enacted. They are in contradistinction to CLEC. GTE was the second largest ILEC after “The Baby Bells” but has since been absorbed into Verizon. CLEC stands for competitive local exchange carrier. IT is a telecommunications provider company competing with other, already established carriers. CLECs have evolved from the competitive access providers that began to offer private line and special access services in competition with the ILECs beginning in 1985. MSO is short for multiple-system operator. This is an operator of multiple cable or direct-broadcast satellite television systems. Though in the strictest sense any cable company that serves multiple communities is......

Words: 274 - Pages: 2

Unit 1 Assignment 2

...September 25, 2014 NT 2580 Unit 1 assignment 2 A Data Classification Standard is information or data shared internally by an organization. The private information or data may not be included; core communications are not planned to leave the organization. The report is designed to describe and explain the standards for the “Internal use only” data classification at the Richman Investments location, this report will address which IT set-up domains are affected by the standard and how. The first IT set-up affected by core use is the User Domain. The User Domain describes the people who access an organization’s information system. The user domain will enforce an Acceptable Use Policy (AUP) that defines what each user can and cannot do with the company’s data. With company users, any outsiders, contractor’s or third party agents will also need to agree and comply with the Acceptable Use Policy. Any violation will be taken up with management or the proper establishments to access further corrective action. Work Station Domain: This is where most of the company’s users connect to get to the IT set-up. No personal devices or removable media may be allowed on this network ever. All devices and removable media will be issued by the company for official work use. Access Control Lists (ACLs): ACLs will be tired up to appropriately define which access the users are allowed to use. Any violation causes an immediate suspension of rights and the person(s) in violation will be subject to......

Words: 413 - Pages: 2

Unit 2 Assignment 1

...10/ 1/ 2014 NT2580 Unit 2 assignment 1 The workgroup consists of three primary workgroups, which contain group membership lists of users within the Active Directory infrastructure that currently exists on the SMB Server that is located within the confines of the LAN structure. The security breach, which is defined as any event that results in a violation of any of the CIA (confidentiality, integrity, availability) security principles, was caused by the SMB server being accessed by an unauthorized user due to a security hole that was detected by the server software manufacturer the previous day. The security patch will not be available until possible as long as three days, but hopefully within that timeframe. In addition, the LAN administrator needs at least one week (minimum) to download, test, and install the patch. To calculate the Window of Vulnerability (WoV) for this security breach, the following timeline will be used as a guideline to determine the basis for calculation: First it is important to understand the variables considered in this timeline formula. The WoV is the period within which defensive measures are reduced, compromised, or lacking. The WoV covers a timeline from the moment vulnerability is discovered and identified by the vendor. It also includes the time taken to create, publish, and finally apply a fix to the vulnerability. It is also important to explore the device(s) that were targeted by the attack. In this instance, being the SMB server within...

Words: 286 - Pages: 2

Nt1210 Chapter Review Unit 2

...Chapter review unit 2 – Nate Bell 1. Which of the following terms is the closest synonym to the term computer networking? c. Datacom 2. Ann uses her email address, me@here.com, to send an email to Bob, whose email address is you@there.com. The message contains a few paragraphs of text. Which of the following will be important to the process of making sure that Bob receives this email? b. Bob’s incoming email server 3. According to this chapter, which of the following concepts happens in a modern-day, end-to- end voice call between two business telephones sitting in the same office building in the United States? (Choose two answers.) b. The call uses only digital electrical signals. d.The call represents short sounds as a unique set of bits. 4. According to this chapter, which of the following concepts happens in a modern-day, end-to-end voice call between two home telephones in the United States? (Choose two answers.) c. The call uses both analog and digital electrical signals. d. The call represents short sounds as a unique set of bits. 5. A student makes a video recording of a professor teaching a class. The student posts the video to a website. The answers list information that the student used or chose on the computer on which he was processing the video. Which of the following answers is the least likely to impact the size of the video file? a. A character set 6....

Words: 1002 - Pages: 5

Unit 2 Assignment 1

...Course GS1145 06/28/2015 6:00PM Dear Mrs. Phifer, As a returning student to college I have very few if any questions. I know you are thinking if that is the case then why you haven’t graduated from a college or university. But the reason for so little questions and concerns is because I’ve realized my mistakes and I’ve come to terms with those mistakes and I’m currently in the process of making corrections to those mistakes. Anyways some of the few questions that I do have are as follows: 1. What if I want to go ahead on assignments am I allowed to? 2. How will this course assist me with my goals of obtaining an associate’s degree? 3. How will this course benefit me? Along with these questions and concerns I also have a few challenges that I need to overcome, one of those being time management with having to work all day attend school after gives me a very limited amount of time to finish and complete assignments. That’s one thing that be fixing this semester because procrastination has been my friend for far too long. Another challenge I would say is a big factor would be as previously mentioned procrastination I put tasks off for long periods of time, school being one of those tasks and it has caused some pretty good opportunities to slip away from me. Even though I have some challenges I still possess some good strengths a couple of them being persistence and motivation, both of them are essential qualities that are needed to finish and complete school......

Words: 464 - Pages: 2

Unit 2 Assignment 1

...NT1310 Week 2 – Unit 2 Assignment 1 Service Provider Types There are five different types of telecommunication types to date. First of which is RBOC – (regional bell operating company) which was a telephone company created as a result of the breakup of AT&T. The seven original regional Bell companies were Ameritech, Bell Atlantic, BellSouth, NYNEX, Pacific Bell, Southwestern Bell, and US WEST. The reason why this was so important was because these companies are what provided local telephone service while AT&T provided the long distance phone service. These are what made up the Local Exchanges or the LEC’s. ILEC or incumbent local exchange carrier was a telephone provider that provided local service prior to the telecommunications act of 1996. These play a major role because these carriers are what own the local loops/exchange and facilities in that area. CLEC’s are the exact same thing except they are the competitor to the ILEC’s but provided their own networking and switches for local service. MSO or Multi system Operator – is owner of multiple cable and satellite television systems. This ties into what an ISP is. An ISP is simply and Internet service provider that provides a mean for accessing the internet. MSO is majorly known for being cable companies, because of this cable companies are providing internet to cable customers (usually as bundles with their plan). They work within each other because......

Words: 314 - Pages: 2

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *