Premium Essay

Nt1210 Unit 8

In: Computers and Technology

Submitted By yardcore
Words 473
Pages 2
NT1210 Unit 8
Assignment 1 Practice #1
Give an IP address and number of bits borrowed (from the host for the subnet mask), Find the following information.
Host Address 200.17.15.10 Network Class C
SN Mask 255255255224 Network Address 200.17.15.0
Bits Bono wed 3 SNs Created 524288 Usable SNs | 8 | | Hosts perSN | 32 | Usable Host^N 30 |

Subnet No. | Network ID | First Host IP | Last Host IP | Broadcast Address | 0 | 200.17.15.0 | 200.17.15.1 | 200.17.15.30 | 200.17.15.31 | 1 | 200.17.15.32 | 200.17.15.33 | 200.17.15.62 | 200.17.15.63 | 2 | 200.17.15.64 | 200.17.15.65 | 200.17.15.92 | 200.17.15.93 | 3 | 200.17.15.94 | 200.17.15.95 | 200.17.15.124 | 200.17.15.125 | 4 | 200.17.15.126 | 200.17.15.127 | 200.17.15.156 | 200.17.15.157 | 5 | 200.17.15.158 | 200.17.15.159 | 200.17.15.188 | 200.17.15.189 | 6 | 200.17.15.190 | 200.17.15.191 | 200.17.15.220 | 200.17.15221 | 7 | 200.17.15.222 | 200.17.15.223 | 200.17.15.252 | 200.17.15253 |

Practice #2
Given an address and subnet mask, find the Following information. Host Add ness | 152.12.14.18 | Network Class | B | SN Mask | 255.255.255.240 | Net wotk Address | 152.12.14.16 | Bits Borrowed | 4 | SNsCieated | 1048576 | UsableSNs | 16 | | | Hosts perSN | 16 | Usable HosWSN | 14 |

Subnet No. | Network ID | Rrst Host IP | Last Host IP | Broadcast Address | 0 | 152.12.14.16 | 152.12.14.17 | 152.12.14.30 | 152.12.14.31 | 1 | 152.12.14.32 | 152.12.14.33 | 152.12.14.46 | 152.12.14.47 | 2 | 152.12.14.48 | 152.12.14.49 | 152.12.14.62 | 152.12.14.63 | 3 | 152.12.14.64 | 152.12.14.65 | 152.12.14.78 | 152.12.14.79 | 4 | 152.12.14.80 | 152.12.14.81 | 152.12.14.94 | 152.12.14.95 | 5 | 152.12.14.96 | 152.12.14.97 | 152.12.14.110 | 152.12.14.111 | 6 | 152.12.14.112 | 152.12.14.113 | 152.12.14.126 | 152.12.14.127 | 7 | 152.12.14.128 | 152.12.14.129 | 152.11.14.142 |…...

Similar Documents

Free Essay

Nt1210 Unit 10 Exercise 1

...Student Name: Justin Hennings Date Due: November 24, 2013 Date Submitted: November 24, 2013 Instructor: L. Chretien Subject: NT1230 Unit 10 Exercise 1 – Backup Plan How Grade: One hundred points total. Submission Requirements * Write a response to the email below by recommending solutions and explaining the rationale for your recommendations. * This is not a group project. All rules of plagiarism apply. * Cite your sources and references. * Include introductory and concluding paragraphs. Assignment Requirements Respond to the following email: -- FROM: Rebop Pakulah, Acme Engineering Company RE: Burning Smell in the server room in the US office. Hello most esteemed US computer guru, While visiting the US Office I noticed that there was a somewhat disconcerting smell in the server room. It reminded me of my uncle's cooking – somewhat burnt. I am concerned that the employees are not being responsible and having too many of their barbecue parties since we turned off their streaming Internet music to their cubicles. They swear by the Curley's barbecue sauce but I am not a fan. We are using tape backup in the server room. Could the barbecue smoke affect the tapes? I am concerned because all of our backup tapes are kept in that room. What would you suggest to take make sure the tapes are not affected by the smoke? Thank you again for you kind attention to this matter. Yours truly, Rebop Pakulah ---- Self-Assessment......

Words: 522 - Pages: 3

Premium Essay

Nt1210 Unit 2 Assignment

...NT1210 Intro to Networking Lab 2.3 Exercise 2.3.1 LAN Local Area Network is a computer network that interconnects computers within a limited area such as a home, school, computer laboratory, or office building using network media. MAN Metropolitan Area network is a computer network in which two or more computers or communicating devices or networks which are geographically separated but in same metropolitan city and are connected to each other are said to be connected on MAN. PAN personal area network is a computer network used for data transmission among devices such as computers, telephones and personal digital assistants. WAN A wide area network (WAN) is a computer network that spans a relatively large geographical area and consists of two or more interconnected local area networks (LANs). The classification metric used here Exercise 2.3.2 Network Topology is the arrangement of the various elements (links, nodes, etc.) of a computer network. Essentially, it is the topological structure of a network, and may be depicted physically or logically. The metric used to define networks by topology is what clients they are using and how they are using them. A wide area network is larger than a metropolitan network for example. Exercise 2.3.3 It would take 1 hop to send a message from A to B. To get from B to A it would take 3 hops to send a message. It would take one link to connect E to D and C. It would add one message to the transverse of the ring. Exercise......

Words: 1007 - Pages: 5

Premium Essay

Unit 8

...Unit 8: Consultants Task: Fill in the gaps in the text with the words and word combinations from the Word Bank below. Word bank: analyzing, arm’s-length, auditing, best practice, big four accountancy firms, client relationship, completing projects, confidentiality, consultant, contractor, e-commerce sites, enhanced shareholder value, experience, fee, focus on results, formulate strategy, human dimension, implementation, independent eye, information technology (IT), input, IT consultancy, knowledge, management consultants, not-invented here syndrome, objective view, objectives, outcomes, outplacement services, ownership, profits, restructure, site design, skills, solving problems, specialized services, specific tasks, strategy, strengths and weaknesses, structure, support, technology consultants, training, transferring, usability, web consultants, websites A consultant is a contractor or outside supplier who provides skills or support to a client for a fee. Some consultants work on their own, often drawing on experience and knowledge they have gained previously as salaried employees in companies. Others work for organizations large and small: one well-known firm, for example, is McKinsey, which describes itself as ‘a management consulting firm advising leading companies on issues of strategy, organization, technology and operations’. The big four accountancy firms (Deloitte, Ernst & Young, KPMG and PwC) also offer consulting services, and an issue for them has been......

Words: 668 - Pages: 3

Premium Essay

Nt1210 Unit 2 Assignment 2

...Joseph V. Stewart NT1210 Unit 2 Assignment 2 Computer Basics Review 1. C. Datacom 2. B. Bob’s incoming email server 3. B. The call uses only digital electrical signals, D. The call represents short sounds as a unique set of bits 4. C. The call uses both analog and digital electrical signals, E. The call represents each spoken word as a unique set of bits. 5. D. A choice for the number of frames per second 6. B. Use an incoming video server 7. D. None of the answers is correct 8. B. The web browser asks for the one object identified by the web address, and the web server automatically sends the rest of the objects to the browser. 9. A. A website typically contains many web objects, C. A web page typically contains many web objects, D. A website typically contains many web pages. 10. C. The operating system on the PC, D. The PC’s NIC 11. A. 16 HTTP GET request messages with 16 matching HTTP GET reply messages 12. A. Web browsers 13. A. http 14. C. Node 15. B. Cable, D. Switch 16. D. SMB Network 17. A. Router 18. D. The Internet 19. A. Internet service provider 20. B. Any ISP’s network Key Terms Computer Networking-the stuff that works together Computer network-the process of the stuff working together Application-a function on any kind of computer or electronic device that is useful to the user, which can give the user a reason to want to own and use the device Email-electronic......

Words: 483 - Pages: 2

Premium Essay

Nt1210 Unit 2 Ip Address

...addresses above cannot be determined unless you have more information. This information is supplied in another 32-bit number called a subnet mask. In this example, the subnet mask is 255.255.255.0. It is not obvious what this number means unless you know that 255 in binary notation equals 11111111; so, the subnet mask is: 11111111.11111111.11111111.0000000 Lining up the IP address and the subnet mask together, the network and host portions of the address can be separated: 11000000.10101000.01111011.10000100 -- IP address (192.168.123.132) 11111111.11111111.11111111.00000000 -- Subnet mask (255.255.255.0) The first 24 bits (the number of ones in the subnet mask) are identified as the network address, with the last 8 bits (the number of remaining zeros in the subnet mask) identified as the host address. This gives you the following: 11000000.10101000.01111011.00000000 -- Network address (192.168.123.0) 00000000.00000000.00000000.10000100 -- Host address (000.000.000.132) So now you know, for this example using a 255.255.255.0 subnet mask, that the network ID is 192.168.123.0, and the host address is 0.0.0.132. When a packet arrives on the 192.168.123.0 subnet (from the local subnet or a remote network), and it has a destination address of 192.168.123.132, your computer will receive it from the network and process it. Almost all decimal subnet masks convert to binary numbers that are all ones on the left and all zeros on the right.......

Words: 884 - Pages: 4

Free Essay

Unit 8

...Running head: SHORT TITLE OF PAPER (<= 50 CHARACTERS) Unit 8 Analysis 1 System Performance Computer Structure and logic Mr.Zakkary 11/11/14 Brandon Walker In computing, file system fragmentation, sometimes called file system aging, is the inability of a file system to lay out related data sequentially (contiguously), an inherent phenomenon in storage-backed file systems that allow in-place modification of their contents. It is a special case of data fragmentation. File system fragmentation increases disk head movement or seeks, which are known to hinder throughput. The correction to existing fragmentation is to reorganize files and free space back into contiguous areas, a process called defragmentation. File system fragmentation is projected to become more problematic with newer hardware due to the increasing disparity between sequential access speed and rotational latency (and to a lesser extent seek time), of consumer-grade hard disks,[3] on which file systems are usually placed. Thus, fragmentation is an important problem in recent file system research and design. The containment of fragmentation not only depends on the on-disk format of the file system, but also heavily on its implementation.[4] In simple file system benchmarks, the fragmentation factor is often omitted, as realistic aging and fragmentation is difficult to model. Rather, for simplicity of comparison, file system benchmarks are often run on empty file systems, and unsurprisingly, the results......

Words: 473 - Pages: 2

Premium Essay

Nt1210 Unit 5

...LAN Standards Kevin Nguyen David Beitl Luis Benitez NT1210 1/25/2015 5.1.1 802.1 standard is basically that it handles the architecture, security, management and internetworking of LAN, MAN, WAN standardized by IEEE 802. 5.1.2 What 802.3 standard originally defined PoE functionality? The IEEE 802.3af standard When was the standard enhanced, and what was the new standard name given for the enhancement? It was changed in 2009 and it was called IEEE 802.3at 5.1.3 Ethernet Standards Standard | Speed | Segment Length | Cable | 10Base5 | 10Mbps | 500m | Rg-8 or RG-11 Coaxial | 10Base2 | 10Mbps | 185m | RG-58 A/U or RG-58 C/U Coaxial | 10Base-T | 10Mbps | 100m | Cat 3 or better UTP | 100Base-T | 100Mbps | 100m | Cat 5 UTP or STP | 100Base-TX | 100Mbps | 100m | Cat 5 UTP or STP | 100Base-FX | 100Mbps | 2km | 2-pair 850 nm Multimode optic fibers | 1000Base-T | 1Gbps | 100m | 4-pair, Cat 5 or Cat 5e | 1000Base-SX | 1Gbps | 550m (multimode) | 2-pair fiber optic | 5.1.4 What does the numeric prefix before BASE the Ethernet standards? It denotes its maximum data transmission rate What does the inclusion of the postfix of –T imply? A reference to the twisted pair cable needed for this standard. Lab 5.1 Review 1. What would the maximum speed of traffic be from a node in network A to a node in network B? 10 Mbps 2. How is it possible for a network to uphold a maximum speed when it allows different categories of UTP wire......

Words: 359 - Pages: 2

Premium Essay

Unit 8

...Lab 8 BCP 2/24/2015 Document internal key personnel and backups. These are people who fill positions without which your business absolutely cannot function make the list as large as necessary but as small as possible. Consider which job functions are critically necessary, every day. Think about who fills those positions when the primary job-holder is on vacation. Make a list of all those individuals with all contact information including business phone, home phone, cell phone, personal email, and any other possible way of contacting them in an emergency situation where normal communications might be unavailable. If you have critical vendors or contractors, build a special contact list that includes a description of the company and any other absolutely critical information about them including key personnel contact information. Personal computers often contain critical information so make sure they are all on backups. Identify critical documents. Articles of incorporation and other legal papers, utility bills, banking information, building lease papers, tax returns, you need to have everything available that would be necessary to start your business over again. A business impact analysis (BIA) predicts the consequences of disruption of a business function and process and gathers information needed to develop recovery strategies. Potential loss scenarios should be identified during a risk assessment. Identifying and evaluating the impact of disasters on business provides the...

Words: 806 - Pages: 4

Free Essay

Nt1210 Unit 4 Labs

...Unit 4 Labs SJR Exercise 4.1.1 So that each piece of equipment work together on a network work to together properly. Exercise 4.1.2 Because the voltage uses to transmit data only needs to be high enough for the receiver to detect it. Exercise 4.1.3 Shielded copper cables would be used where there is a possibility of more electric interference. To help prevent this interference with the cables. Exercise 4.1.4 Category | Maximum Speed | Application | 1 | - | Telephone cabling (POTS) | 2 | 4Mbps | Token Ring | 3 | 4Mbps | Can be used for telephones | 4 | 16Mbps | Fast Token Ring | 5 | 1Gbps | Desktop cabling | 5e | 1Gbps | Gigabit Ethernet | 6 | 10Gbps | Multi gigabit Ethernet | 6a | 10Gbps | Multi gigabit Ethernet | Exercise 4.1.5 Exercise 4.1.6 Coaxial cable has a copper core with an inner dielectric insulator, a woven copper shield, and an outer plastic sheath for protection. Exercise 4.1.7 Not to go over the length of 85-90 meters between any given connection. Exercise 4.1.8 Straight through cabling. Exercise 4.1.9 No, S1-S2 and S2-G. Fiber Optics should be used in these cases. Exercise 4.1.10 Multimeter – Measures voltage, current, and resistance. Tone Generator - A signal generator used to generate an audio-frequency signal suitable for signaling purposes or for testing audio-frequency equipment. Pair Scanner – An Ethernet cable tester Time Domain Reflectometer - An electronic instrument that uses time-domain......

Words: 636 - Pages: 3

Free Essay

Nt1210 Unit 4 Labs

...Unit 4 Labs SJR Exercise 4.1.1 So that each piece of equipment work together on a network work to together properly. Exercise 4.1.2 Because the voltage uses to transmit data only needs to be high enough for the receiver to detect it. Exercise 4.1.3 Shielded copper cables would be used where there is a possibility of more electric interference. To help prevent this interference with the cables. Exercise 4.1.4 Category | Maximum Speed | Application | 1 | - | Telephone cabling (POTS) | 2 | 4Mbps | Token Ring | 3 | 4Mbps | Can be used for telephones | 4 | 16Mbps | Fast Token Ring | 5 | 1Gbps | Desktop cabling | 5e | 1Gbps | Gigabit Ethernet | 6 | 10Gbps | Multi gigabit Ethernet | 6a | 10Gbps | Multi gigabit Ethernet | Exercise 4.1.5 Exercise 4.1.6 Coaxial cable has a copper core with an inner dielectric insulator, a woven copper shield, and an outer plastic sheath for protection. Exercise 4.1.7 Not to go over the length of 85-90 meters between any given connection. Exercise 4.1.8 Straight through cabling. Exercise 4.1.9 No, S1-S2 and S2-G. Fiber Optics should be used in these cases. Exercise 4.1.10 Multimeter – Measures voltage, current, and resistance. Tone Generator - A signal generator used to generate an audio-frequency signal suitable for signaling purposes or for testing audio-frequency equipment. Pair Scanner – An Ethernet cable tester Time Domain Reflectometer - An electronic instrument that uses time-domain......

Words: 636 - Pages: 3

Free Essay

Nt1210 Unit 7 Assignment 1

...Unit 7 Assignment 1 Multiple Choice 1.) A 11.) C 2.) A, B 12.) A 3.) B, D 13.) A, D 4.) A 14.) C 5.) A 15.) B, C 6.) B, D 16.) B, D 7.) A 17.) C 8.) C 18.) B, D 9.) C 19.) A, C 10.) D 20.) B, C Key Terms Switched circuit - A circuit established through one or more intermediate switching devices, such as circuit switches or packet switches. Dedicated circuit - it is used in reference to a phone or data line, or to an electrical circuit. Circuit switching - a methodology of implementing a telecommunications link in which two network nodes establish a dedicated communications channel (circuit) through the network before the nodes may communicate. Packet switching - a digital networking communications method that groups all transmitted data into suitably sized blocks that are transmitted through a medium that may be shared by multiple simultaneous communication sessions. Leased line - connects two locations for private voice and/or data telecommunication service. Time-division multiplexing -a method of transmitting and receiving independent signals over a common signal path by means of synchronized switches at each end of the transmission line so that each signal appears on the line only a fraction of time in an alternating pattern. T-carrier system – one of several digital transmission systems developed by Bell Labs, sometimes called T-CXR. DS0 – a standard digital transmission rate for digital telecommunications, stands for Digital Signal Zero. DS1......

Words: 336 - Pages: 2

Premium Essay

Unit 8

...The HIPAA Privacy Rule establishes national standards to protect individuals' medical records and other personal health information and applies to health plans, health care clearinghouses, and those health care providers that conduct certain health care transactions electronically. At the Akron General Medical Center employees were fired recently for violating hospital and federal privacy rules involving the fatal shooting of a patient in the intensive-care unit. John H. Wise was 66and was accused of shooting and killing his wife. Jim Gosky confirmed that a small number of hospital employees were terminated for accessing computerized patient records in the case even though they weren’t involved with the patient’s care. Gosky declined to say how many workers lost their jobs so far in the ongoing investigation. He also would not specify their positions. I think is terrible when any employee loses his or her job, patients come first. Part of that commitment is respecting and safeguarding the privacy of our patients. Privacy laws, like HIPAA, are very important to protecting our patients’ rights, and we are supportive of reasonable measures aimed at protecting our patient. I was informed during my orientation, when I first started working for my employer. Seminars and annual training that federal privacy rules prohibit them from looking at patient files unless the information is needed to do their job. All violations result in termination. I mean is part of a human nature and we...

Words: 251 - Pages: 2

Premium Essay

Unit 8

...will then establish a fear hierarchy of things she finds scary about belts, each with a fear score out of 100. She will then start to work through the fear hierarchy making sure to keep relaxed and calm using the techniques she has been taught, eventually she will reach the top of the chart and not be scared any more. Amy’s conditioned stimulus? Amy's conditioned stimulus is still belts, however she has a different response to belts now. Amy’s conditioned response? Amy's new response it to relax and breathe when she is faced with a belt using the techniques she has been taught, she will stay calm and not be scared or anxious around belts as the fear has been eradicated. Social Learning Perspective to Social Care Polly is 8 years old. She gets told off a lot as school as she has anger problems and cannot seem to control her temper. Polly was playing tag in the playground and one of the girls accidentally knocked into her. Polly swore at the girl and pushed her really hard, knocking the girl to the floor. Polly got told off and was not allowed to take part in an art lesson after break. Using the Social Learning Perspective, how could you explain Polly’s behaviour? Could Polly be modelling behaviour she has seen? Think of and explain as many different influences as you can and explain why it could be an influence? According to the Social Learning Perspective Polly has learnt these characteristics and behaviours from watching other people do these......

Words: 8290 - Pages: 34

Premium Essay

Unit 8

...Assignment Front Sheet| Learner name|Assessor name| |S. Guzman-Rodriguez| Date Issued|Completion date|Submitted on| |See deadline spreadsheet|| Qualification|Unit number and title| Btec Level 3 National Extended Diploma in IT|Unit 8: E-commerce| Assignment title|Assignment 2 Shopping and Handling Money Online| In this assignment you will have opportunities to provide evidence against the following criteria.Indicate the page numbers where the evidence can be found | Criteria reference|To achieve the criteria the evidence must show that the student is able to:||Task no.||Evidence| P5|Examine the social implications of e-commerce on society||1||Booklet| P6|Plan an e-commerce strategy||3||Magazine article or a Podcast| M3|Design an interface for an e-commerce business||5||Interface| D2|Compare different payment systems used by e-commerce systems||2||Booklet| |||||| |||||| |||||| |||||| Learner declaration| I certify that the work submitted or this assignment is my own and research sources are fully acknowledged.Learner signature: Date:| Assignment brief| Qualification |Btec Level 3 National Extended Diploma in IT| Unit number and title|Unit 8: E-commerce| Start date|| Deadline || Assessor name|SGU| | Assignment title|Shopping and Handling Money Online| Assignment BriefIn this assignment you will be looking at alternative......

Words: 685 - Pages: 3

Premium Essay

Unit 8

...they employees perform at high-standards and meet company’s objectives, the company must recognize and celebrate their achievements in order to motivate them to keep performing this way. Another important aspect is customer care and even if it has not been stated in the issue, the company must properly take care of its clients because they are the ones that generate organization wealth. If the leadership takes into consideration all the 10 truths mentioned and detailed above, and if it starts to pay more attention to the managers, employees, and also consumers, the company will be able to recover and be back in business in a timely manner. References Kouzes, J., & Posner, B. (2010). Leadership Truths. Leadership Excellence, 27(8), 15. Retrieved from EBSCOhost. Robbins, S. P., & Judge, T. A. (2011). Organizational Behavior, 14th Edition. Upper Saddle River, NJ: Pearson/ Prentice Hall....

Words: 664 - Pages: 3