Premium Essay

Unit 1 Assignment 1 Dns

In: Computers and Technology

Submitted By BossKing124
Words 388
Pages 2
The use of DHCP is highly recommended and there are a number of obvious reasons why you should use it. As mentioned before, there are two ways you can configure client addresses on a computer network, either manually or automatically. Manual configuration requires the careful input of a unique IP address, subnet mask, default router address and a Domain Name Server address. In an ideal world, manually assigning client addresses should be relatively straight forward and error free. Unfortunately, we do not live in an ideal world; computers are frequently moved and new systems get added to a network. Also if a major network resource, such as a router (which interconnects networks) changes network addresses, this could mean changing EVERY system's configuration. For a network administrator this process can be time consuming, tedious and error prone. Problems can occur when manually setting up your client machines, so if you have the option to set-up your client machines automatically, please do, as it will save you time and a lot of headaches.
DHCP has several major advantages over manual configurations. Each computer gets its configuration from a "pool" of available numbers automatically for a specific time period (called a leasing period), meaning no wasted numbers. When a computer has finished with the address, it is released for another computer to use. Configuration information can be administered from a single point. Major network resource changes (e.g. a router changing address), requires only the DHCP server be updated with the new information, rather than every system.

Some machines on your network need to be at fixed addresses, for example servers and routers. The DHCP server you choose should be capable of assigning pre-allocated addresses to these specific machines.
You need to be able to assign a machine to run the DHCP server continually as it must be…...

Similar Documents

Premium Essay

Unit 1 Assignment 1

...Unit 1 Assignment 1 1. Describe the role of software for computers: Computer software tells the hardware what to do. Without any software, the hardware would be worthless. Think of the software as a subject in school, and the hardware as you or your brain. Without any learning, you can't do anything. One you have learned some math, and then you are able to solve math problems. This learning is usually accomplished through downloads or CD's that are loaded into the computer. At the very basic level, computer software contains specific instructions for how to accomplish a specific task. These instructions tell the hardware exactly what to do, and how to do it 2. Identify the hardware associate with a computer: the physical components that make up a computer system. There are many different kinds of hardware that can be installed inside, and connected to the outside, of a computer. Here are some common individual computer hardware components that you'll often find inside a modern computer case: Motherboard, Central Processing Unit (CPU), Random Access Memory (RAM), Power Supply Video Card, Hard Drive (HDD), Solid-State Drive (SSD), Optical Drive (e.g. BD/DVD/CD drive) Card Reader (SD/SDHC, CF), etc. Here is some common hardware that you might find connected to the outside of a computer: Monitor, Keyboard, and Mouse 3. Describe how computer store data: it converts the request into binary digits and its stores the data in a database. As a table format. The binary data can......

Words: 324 - Pages: 2

Premium Essay

Unit 1 Assignment 1

...Tina Nunez NT1330 Unit 1. Assignment 1 Windows 2008 Network Services Domain name system (DNS) is a naming service used on any device that can connect to the internet. It translates fully qualified domain names of websites into IP addresses for the device. There are DNS records such as address (A, AAAA) records, name server (NS) records and mail exchanger (MX) records stored in the DNS server. Regardless of how many hosts, the DNS is a system that is very important. Dynamic host configuration protocol (DHCP) is a networking protocol that allows the dynamic (automatic) distribution of IP addresses to hosts on a network. If DHCP is enabled, the hosts will each receive a leased IP address that is chosen by the DHCP server from a scope chosen by the network administrators. Sometimes the administrators can reserve IP addresses if needed. Depending on the amount of hosts, it could determine if the IT management wants to use DHCP. If the company is very small, it may not be worth the effort to set up a DHCP server. It can still work but static (manual) IP addresses would be simple to configure because there would be very few devices compared to a large company. Some of the vital devices will usually use static IP addresses anyway such as any servers. If there is a very large company, it would be extremely beneficial to use DHCP. All of the devices can automatically pick up an IP as soon as they connect to the network and the network administrators do not have to go to each and...

Words: 272 - Pages: 2

Free Essay

Unit 1 Assignment 1

...Unit 1 Assignment 1 Scientific inquiry is a process of developing an explanation of a question by testing, investigating and collecting data that will either support the idea of what's going on. A problem in the world can be a scientific inquiry because you might have a question about it, so you are basically digging for information about the problem going on and you try to find results by using the internet, books or any source to get your answers. There will be results maybe through testing or charts will appear from studies to support the answers. A non-scientific inquiry is one that does not use a systematic collection of evidence or one that tries to find answers to questions about things other than the natural world/universe, such as beliefs. An example of everyday assumption is gender or stereotyping of what you see that what you assume this more like expectations. If women are mowing the lawn there is going to be a man that will approach you and tell you how to do things properly or what to wear in order to for you to cut the grass right. The answers will come to you without seeking them, just because she is a women it doesn’t mean that she don’t know what’s she doing it is just an assumption because of her gender. The cutting of a lawn is supposed to be a man’s job so they feel they need to say something about it. But all of this is not right....

Words: 256 - Pages: 2

Free Essay

Unit 1 Assignment 1

...Unit 1 Assignment 1 Community Groups The definition of Community is a group of people that live in the same place or having a particular characteristic in common. It is also described as having a feeling of fellowship with others, as a result of sharing common attitudes, interests, and goals. Community groups are created for a lot of different reasons some more critical than others. Since communities are so close knit people start groups for several reasons, the most common is just to know one another and be familiar with who you live by. Some people start neighborhood watches, borrow things from one another or just simply look out for each other when the other is not at home. What Makes a Good Community? In my personal opinion a Good Community takes time to form. Just like anything school, work, etc... You’re taking different people from different places, ethnicities, and backgrounds and putting them all together in once specific place. So it takes time for everyone to gel, but in all it takes patience, understanding and just being courteous and respectful. Challenges There are a lot of challenges you face when your living somewhere whether it’s a bigger or smaller community, it may possibly be easier to get know everyone in a smaller community than a bigger one. For instance some communities or neighborhoods are outside the county that means that the city does not fund the neighborhoods street lights, therefore the community......

Words: 290 - Pages: 2

Premium Essay

Nt1330 Unit 1 Assignment 1

...Unit 1 Assignment 1 DNS servers provide domain name resolution for network resources. They associate the TCP/IP address assigned by DHCP to a client with its fully qualified domain name. The association of an IP address to a domain name requires that a change in either the address or the name requires an update of the information in DNS. The DHCP protocol does not do this automatically. To make this more seamless, servers running Windows Server® 2008 and DHCP and clients running DHCP can register with DNS, allowing the two to cooperate (TechNet) Dynamic Host Configuration Protocol (DHCP) is a protocol that assists in configuring IP addresses, subnet masks, default routers, and other IP parameters to client PCs that don't have a static IP address. These computers locate a DHCP server in their local network that gives them an IP address so they can connect to the internet or other computers within the local network. (dhcp server) There are four way to allocate dynamic IP addresses: automatic, dynamic, roaming, and manual. Three of these (dynamic, roaming, and manual) use DHCP to assign the IP addresses. (DHCP Servers) There are a number of downsides to administering IP addresses statically. Foremost is human error. If the administrator mistypes the IP address or subnet mask, the workstation may not have connectivity to the resources it requires. If the DNS or WINS server IP addresses are mistyped, the workstation will not be able to perform name resolution. If the default......

Words: 486 - Pages: 2

Free Essay

Unit 1 Assignment 1

...Unit 1 Assignment 1: Integrated Circuit Technology Year | Transistor Count | Processor Model | 1971 | 2,300 | Intel 4004 | 1972 | 3,500 | Intel 8008 | 1974 | 4,500 | Intel 8080 | 1976 | 6,500 | Intel 8085 | 1978 | 29,000 | Intel 8086 | 1979 | 29,000 | Intel 8088 | 1982 | 55,000 | Intel 80186 | 1982 | 134,000 | Intel 80286 | 1985 | 275,000 | Intel 80386 | 1989 | 1,180,235 | Intel 80486 | 1993 | 3,100,000 | Pentium | 1995 | 5,500,000 | Pentium Pro | 1997 | 7,500,000 | Pentium II | 1999 | 9,500,000 | Pentium III | 2000 | 42,000,000 | Pentium 4 | 2008 | 47,000,000 | Atom | 2002 | 220,000,000 | Itanium 2 McKinley | 2006 | 291,000,000 | Core 2 Duo | 2003 | 410,000,000 | Itanium 2 Madison 6M | 2004 | 592,000,000 | Itanium 2 with 9MB cache | 2008 | 731,000,000 | Core i7 (Quad) | 2011 | 1,160,000,000 | Quad-Core + GPU Core i7 | 2010 | 1,170,000,000 | Six-Core Core i7 (Gulftown) | 2012 | 1,400,000,000 | Quad-Core + GPU Core i7 | 2006 | 1,700,000,000 | Dual-Core Itanium 2 | 2008 | 1,900,000,000 | Six-Core Xeon 7400 | 2010 | 2,000,000,000 | Quad-Core Itanium Tukwila | 2011 | 2,270,000,000 | Six-Core Core i7/8 Core Xeon E5 | 2010 | 2,300,000,000 | 8-Core Xeon Nehalem-EX | 2011 | 2,600,000,000 | 10-Core Xeon Westmere-EX | 2012 | 3,100,000,000 | 8-Core Itanium Poulson | 2012 | 5,000,000,000 | 62-Core Xeon Phi | In 2010, the processor model that was the first to have two billion transistors on its chip was known as the......

Words: 374 - Pages: 2

Premium Essay

Unit 1 Assignment 1

...Homework Unit 1 Assignment 1 1. Why is the CPU the most important component in a computer? It’s the part of the computer that runs programs. 2. What number does a bit that is turned on represent? What number does a bit that is turned off represent? A turned on bit is 1 and a turned off bit is 0. 3. What would you call a device that works with binary data? A digital device 4. What are the words that make up a high-level programming language called? Key words or reserved words 5. What are the short words that are used in assembly language called? Mnemonics 6. What is the difference between a compiler and an interpreter? A compiler translates a high-lever program into a separate machine language program; whereas, an interpreter is a program that both translates AND executes instructions in a high-level program language program. 7. What type of software controls the internal operations of the computer’s hardware? Operating systems which is a type of system software. Unit 2 Assignment 1 Short Answer 1. What does a professional programmer usually do first to gain an understanding of a problem? Works with and interviews the customer to gain an understanding of what the customer wants the program to accomplish. 2. What is a pseudocode? A “fake” code that programmers use to test their programs before executing them. 3. Computer programs typically perform what three steps? A) Input is received B) Some process......

Words: 508 - Pages: 3

Free Essay

Unit 1 Assignment 1

...Unit 1 Assignment 1 Integrated Circuit Technology A motherboard is the backbone of the personal computer, it transfers information and power to all the other components. The motherboard is the largest board inside of the computer that contains the basic input and output system that allows every component to communicate with one another. Attached to the motherboard is a chip comprised with dozens of pins called the central processing unit. Along with the CPU attached to the motherboard is the dual-inline memory modules a part of the random access memory. RAM is the most common type of memory used another type is ROM, read only memory, which stores data onto metal disc within the device. The operating system manages the hardware resources and provides a place to run programs. The last components of the personal computer are the tower and the human interface devices. The tower holds all the components that make up the computer except for the HID which are located outside of the computers tower. The main purpose of the HID’s are to help us interact with the computer, a few examples are the keyboard, mouse, monitor, video camera and speakers. You put together the Motherboard, CPU, RAM, ROM, OS, Tower, HID’s add a power supply and you have a basic personal computer. PROCESSOR TRANSISTOR YEAR Intel 4004 | 2,300 | 1971 | Intel 8008 | 3,500 | 1972 | Intel 8080 | 4,500 | 1974 | Intel 8085 | 6,500 | 1976 | ......

Words: 427 - Pages: 2

Free Essay

Nt1330 Unit 1 Assignment 1

...EN1330 Client-Server Networking 2 Unit 1. Assignment 1 9/25/2014 A Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any resources connected to the internet or a private network. It associates various information with domain names assigned to each of the participating entitles. It translates easily memorized domain names to the numerical IP addresses needed for the purpose of locating computer services and devices worldwide. The best way that I have been able to explain it, it works like a phone book for the internet by translating hostnames into IP addresses. But unlike a phone book, the DNS can easily be updated and quickly. The internet maintains two principal namespaces, the domain name hierarchy and the Internet Protocol address spaces. A DNS name server is a server that stores the DNS records for a domain name, such as (A or AAA) records, name server records, and mail exchanger records. A DNS name server responds with answers to queries against its database. The Dynamic Host Configuration Protocol is a Standardized networking protocol used in Internet Protocol networks for dynamically distributing network configuration parameters, such as IP addresses for interface and services. With DHCP computers request IP addresses and networking parameters automatically from a DHCP server, reducing the need for a network administrator or a user to configure these settings manually. DHCP is used by computers for requesting......

Words: 323 - Pages: 2

Premium Essay

Unit 1 Assignment 1

...IT-management overhead in reference to DNS and DHCP In order to address the issue of when is it cost effective to employ the use of DHCP for a computer network we first have to get a brief understanding of the terms DNS and DHCP. Domain Name Servers (DNS) for short is like a phone directory for the internet. They translate domain names into IP (Internet Protocol) addresses. Domain names are easier for people to remember, computers access the internet based on IP addresses. Dynamic Host Configuration Protocol (DHCP) is a network protocol that allows a server to automatically assign an IP address to a computer. Now that we have defined these two terms it is possible to analyze the cost effectiveness of a DHCP server. To manually configure a computer workstation with an IP address is not difficult. On the other hand to manually configure tens, hundreds, or thousands of workstations would be too time consuming, it also increases the chance of duplicating IP addresses, misconfiguring the subnet mask or other network protocols. It is in these instances that DHCP is not only a handy tool it is a needed tool for network administrators to perform their job. There are three main instances to manually assign addresses. 1) When there are no configured DHCP servers on the network and the network has multiple network segments. 2) When you are configuring a computer as a DHCP server, you assign that computer a static IP address. 3) When you configure computers as important......

Words: 416 - Pages: 2

Free Essay

Unit 1 Assignment 1

...Miosha Vogt ET2560 Unit 1 Assignment 1 Chapter 1: Pg. 43 Quick- Check Exercise 1. Machine language 2. Operating System 3. Translation, Linking, Loading, Execution 4. Source 8. Software, Hardware 9. Variables 10. Secondary storage Pg. 44 Review Questions 3. Two secondary storage devices is a disk drive and flash drive Two input devices is the keyboard and mouse Two output devices is the monitor and printer 5. Syntax error is grammar error of a programming language. 6. The loader copies the executed file into memory and initiates execution of instructions. 7. Memory cells are a grouping of small units called bytes Bytes are the amount of storage required to store a single character, composed of even smaller unit called bits. Bits are binary digits 0-10. 8. Three high languages are Fortran, C, and Java FORTRAN used in scientific programming. C is used in system programming. Java supports web programming and programming Android applications. 9. Ram is volatile and it temporarily stores programs while their being executed, delete when computer is turned off, Rom is not volatile the data stored there will not disappear when the computer is turned off. 2. Write an algorithm in pseudo-code to solve the following problem: Input a temperature in Fahrenheit, and output the temperature in Celsius and Kelvin. Formulas needed are: C = ( 59 ) (F – 32). K= ( 59 ) (F – 32) + 273.15 Algorithm:......

Words: 458 - Pages: 2

Premium Essay

Unit 1 Assignment 1

...Unit 1 Assignment 1 Cell Phones use voice and data communications. It uses the voice at a lot less these days because people rarely call one another anymore. Data is used for the applications which people use more of these days. So they use a mixture of both but mainly data. Also some phone now use Wi-Fi calling so people can use data networks to call people. Landlines use voice communication. Unlike data voice can work during a black-out because it doesn’t get its power from the same and everything in your house. It’s also a cheaper technology which also makes it cheaper. SMS/Text Messaging uses data. It’s part of the reason I said Cell Phones use both. And it can only be sent over 2G and above because 1G is voice only. Fax Machines use voice. It uses the same jack and RJ-11 like landlines do. It can be used on data but traditional fax use the voice network. The fax is sent it immediately gets digitized the put back in analog form once its sent. Pagers use data. It’s almost like SMS in the is send data (words over the networks). It’s an older technology. VOIP phone use data. It’s similar to Wi-Fi calling. It breaks up in to packets and is sent over the air waves. If you used a VOIP phone you could probably hear it sounding choppy that’s because those packets were dropped for some reason or another. Skype and face time also use data. Without internet connection these applications can’t be used. The main reason these applications exist it to provide an......

Words: 330 - Pages: 2

Premium Essay

Unit 1 Assignment 1

...Daphne Jones AP2530 Unit 1 Assignment 1: Homeostatic Imbalances Hypertension is caused by physical inactivity, a salt-rich diet made by processed and fatty foods, and also alcohol and tobacco use. You can identify hypertension if your blood pressure is higher than 140 over 90 mmHg. While having hypertension you could also develop some other conditions such as kidney disease. Even though hypertension itself does not cause symptoms, it does lead into long-term complications caused by blood vessels becoming narrower. To be able to reduce Hypertension and get better, we would need to cut down, restrictions such as salt restriction; moderation of alcohol and other diet changes that have affect your condition you have now. There are several drugs that may be used for treatment. Hypertension will affect your heart, so your blood pressure should be normal… when you follow the restrictions. Diabetes Is also called diabetes mellitus, what it does is describes a group of metabolic diseases in where you have high blood glucose, which is high blood sugar. You will experience frequent urination called polyuria, and become more thirsty and hungry. There are two types of diabetes, Type 1 and Type 2. With type 1, your body doesn’t make enough insulin, which is a hormone. Type 2 is where your body doesn’t produce enough of the insulin to function properly. There is Gestational Diabetes, but fortunately for you… you are not a female. Most females get this type while they are pregnant....

Words: 435 - Pages: 2

Premium Essay

Unit 1 Assignment 1

...Unit 1 Assignment 1 Exploring Programming Languages PT1420 Introduction to Programming Pong Sintaisong ITT-Tech Tempe Campus Instructor: Ms. Kate Eskesen 9/23/2015 5 Programming Languages 1970s-2000 1970s Pascal: Niklaus Wirth was is the invertor and was invented in 1971 Motivation: To provide features that were lacking in other languages at the time. Forth: Forth was created in 1970 by Charles H. Moore Motivation: He wanted to create a language that would allow direct user and machine interactions. C: In 1971-73 Dennis M. Ritchie turned the B language into the C language. Motivation: Lack of features from B language so made C language. Prolog: Alain Colmerauer in 1973. Motivation: Unknown ML: In 1973 ML was invented as part of the University of Edinburgh's LCF project Motivation: Research in constructing automated theorem provers. Eventually saw that the "Meta Language" they used for proving theorems was more generally useful as a programming language. 1980s C++: Bjarne Stroustrup was the inventor. 1979 Motivation: He needed the use of a programming language that was concise and that produced compact and speedy programs. MATLAB: First Fortran MATLAB was portable and could be compiled to run on many of the computers that were available in the late 1970s and early 1980s. Cleve Moler is the inventor. Motivation: This document for engineers developing models and generating code for embedded systems using Model-Based Design with MathWorks......

Words: 715 - Pages: 3

Free Essay

Unit 8 – Assignment 1: Dns Zone File

...Unit 8 – Assignment 1: DNS Zone File Assignment Requirements The Just Legal Company in Figmont, Nebraska has acquired a new Internet address – www.justafigmont.com. They want to set up a DNS server. What would a basic DNS file look like? Describe the file. A DNS Server is a hierarchical naming system for computers and resources connected to the internet. Basically each line is a text description that defines a single resource records Domain Name Servers (DNS) are the They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses. Information from all the domain name servers across the Internet are gathered together and housed at the Central Registry. Host companies and Internet Service Providers interact with the Central Registry on a regular schedule to get updated DNS information. When you type in a web address, e.g., www.jimsbikes.com, your Internet Service Provider views the DNS associated with the domain name, translates it into a machine friendly IP address (for example 216.168.224.70 is the IP for jimsbikes.com) and directs your Internet connection to the correct website. The Domain Name System is a hierarchical naming system for computers and resources connected to the internet. Basically this is the Internet's equivalent of a phone book that lets you have name to number mappings on your computers. The name decel.ecel.uwa.edu.au is the number 130.95.4.2 and vice versa. This is achieved through the DNS. The DNS is a......

Words: 300 - Pages: 2