Free Essay

Unit 10 Exercise 1

In: Computers and Technology

Submitted By clinker
Words 469
Pages 2
1. Forward biased LED-a semiconductor device that emits a narrow spectrum of light. 2. Incoherent Light- light in which the electric and magnetic fields of photons are completely random in orientation 3. Laser- acronym for light amplification by stimulated emission of radiation 4. Output pattern-the pattern of light produced in fiber optic that translate in the data 5. Output power – the amount of light produced by a fiber optic device 6. Modulation speed- the speed of which data is transferred over light 7. Core diameter mismatch- occurs when there is a difference in the core diameter of two optic fibers. 8. Current- the flow of electrons in a conductor 9. PIN photodiode- alight sensitive diode that conducts current in one direction only 10. Avalanche photodiode- is a highly sensitive semiconductor electronic device that exploits the photoelectric effect to convert light to electricity. 11. Responsivity-the ratio of a detector output to input usually measured in unit of amperes per watt 12. Optical subassembly- the portion of a fiber optic receiver that guides light from the optical fiber to the photodiode 13. Dynamic range- the difference between the maximum and minimum optical input power that an optical receiver can accept 14. Operating wavelength- the wavelength at which a fiber optic receiver is designed to operate 15. Fiber optic couple- a device that connect two piece of fiber for the purpose of extent the cable or fixing a broken cable 16. Optomechanical switch- produces different optical paths from one light source 17. Optical attenuator- reduces the intensity of light waves usually so that the power is within the capacity of the detector. 18. Optical isolator- a component used to block out reflected and other unwanted light 19. Wavelength division multiplexing- a method of carrying multiple channel through a fiber at the same time where by signals within a small spectral range are transmitted at different wavelength thought the same optical fiber 20. Passive optical network- is a telecommunications network that uses point-to-multipoint fiber to the premises in which unpowered optical splitters are used 21. FTTH- fiber to the house 22. FTTB fiber to the building 23. FTTC- fiber to the curb 24. FTTN- fiber to the node 25. Feeder cable- a voice backbone cable that runs from equipment room to the telecommunication room 26. Distribution cable- an optical fiber cable used behind the shelf of optical fiber patch panel 27. Drop point- it is the point where signal began to degrade to the of being unsalable 28. Local convergence point-serve as an interface between a telecommunication provider and an individual 29. Network access point-was a public network exchange facility where ISP was connected with one another in a peering arrangement 30. Network interface device- an component that function is a physical connection to a network…...

Similar Documents

Free Essay

Unit 1 Chapter Exercise

...Chapter 1 1. Free software is a matter of the users' freedom to run, copy, distribute, study, change and improve the software.  a. The freedom to run the program, for any purpose. b. The freedom to study how the program works, and adapt it to your needs. Access to the source code is a precondition for this. c. The freedom to redistribute copies so you can help your neighbor. 2. The Free Software Foundation (FSF) is a nonprofit with a worldwide mission to promote computer user freedom and to defend the rights of all free software users. a. Linux is an operating system. It is the software on a computer that enables applications and the computer operator to access the devices on the computer to perform desired functions. The operating system (OS) relays instructions from an application to, for instance, the computer's processor. The processor performs the instructed task, and then sends the results back to the application via the operating system. 3. The GNU Hurd is not suitable for production use. The capability-based design has problems that result directly from the flexibility of the design, and it is not clear whether solutions exist. Fortunately, another kernel was available. In 1991, Linus Torvalds developed a Unix-compatible kernel and called it Linux. In 1992, he made Linux free software; combining Linux with the not-quite-complete GNU system resulted in a complete free operating system. It is due to Linux that we can actually run a version...

Words: 879 - Pages: 4

Free Essay

Nt1210 Unit 10 Exercise 1

...Student Name: Justin Hennings Date Due: November 24, 2013 Date Submitted: November 24, 2013 Instructor: L. Chretien Subject: NT1230 Unit 10 Exercise 1 – Backup Plan How Grade: One hundred points total. Submission Requirements * Write a response to the email below by recommending solutions and explaining the rationale for your recommendations. * This is not a group project. All rules of plagiarism apply. * Cite your sources and references. * Include introductory and concluding paragraphs. Assignment Requirements Respond to the following email: -- FROM: Rebop Pakulah, Acme Engineering Company RE: Burning Smell in the server room in the US office. Hello most esteemed US computer guru, While visiting the US Office I noticed that there was a somewhat disconcerting smell in the server room. It reminded me of my uncle's cooking – somewhat burnt. I am concerned that the employees are not being responsible and having too many of their barbecue parties since we turned off their streaming Internet music to their cubicles. They swear by the Curley's barbecue sauce but I am not a fan. We are using tape backup in the server room. Could the barbecue smoke affect the tapes? I am concerned because all of our backup tapes are kept in that room. What would you suggest to take make sure the tapes are not affected by the smoke? Thank you again for you kind attention to this matter. Yours truly, Rebop Pakulah ---- Self-Assessment......

Words: 522 - Pages: 3

Premium Essay

Nt1310 Unit 1 Exercise 1

...Unit 1 Exercise 1 Local Exchange When you send an email from New York to Japan, that email,is sent from your home to the local exchange point over the access network. Once it is in the local exchange it is then sent to aggregating points in different cities and counties over the regional network. Then it is aggregated and transported over the long-haul network so that it reaches the launching point at the country shoreline where it is then sent over the ocean network to Japan. Once there, the email is sent back over the long-haul or regional network to the local exchange and then on to the individual receiving the email. This occurs using mostly fiber optics so the speeds at which all this takes is at the speed of light which is approximately 127,000 miler per second. understand how to interface with the local exchange you must first understand the different networks that comprise it. The first network, being the access network. The access network is the network that connects the individual user or business with the telecommunications system. This is made up of a series of fiber-optic and copper cabling and passive and active equipment that connects you to the local exchange. The central office at the local exchange contains the switching equipment to direct your telephone, data , video, etc. to where it needs to go. The access network is very important to the local exchange since it’s the part that reaches the end user, who is you, and connects them. The metro network,......

Words: 339 - Pages: 2

Premium Essay

Unit 1 Exercise 1

...NT1310 Unit 1 Exercise 1 6/17/14 The world is connected more than ever through the use of the internet. From paying bills to shopping or enjoying leisure time on the web; taking advantage of the internet has become second nature to society. Focusing in on one specific type of networking entertainment, online gaming has become a major league sport in its own right. Online gaming allows people from all around the world to connect together to team up or fight against one another. Behind the scenes is where the real magic happens. Between the gamers sits countless devices and hardware not to mention miles and miles of land. Using Call of Duty as an example, each gamer has a copy of the map being played on installed onto their local computer. Every time the gamer moves the direction of their character, their data is sent from their machine to their router, and then out past the demarc point. On the other side of the demarc is where the service provider picks up the data and moves the data from local network to the central office (better known as the local exchange). The central office then sends the data over the MAN (metro area network) or WAN (wide area network) to continue the data to game server. If the data hasn’t reached the server yet (for example the gamer lives in Michigan and the server is in California) the data will be passed over the core (also known as long-haul) network which connects MANs and WANs of different geographies together. On the off......

Words: 398 - Pages: 2

Premium Essay

Unit 4 Exercise 1

...1. The basic format for a proposal includes the following steps: Introduction Problem Analysis; major causes, Evidence and Effects of the probem. Plan for solving the problem: Major steps, Support and Deliverables. Benefits of the Plan: Costs-benefits analysis Conclusion 2. Proposals are used in college, in the workplace and anywhere you want to pitch a proposal or new project idea including grant writing. 3. The steps for inventing your proposal’s content are defining the problem, analyzing the problem, researching, inquiring, and finding similar projects. 4. The three primary sources of information for proposal writing are online, print, and empirical sources. 5. The steps to planning to solve the problem are map out the plan, explore each major step, figure out costs and benefits, and finding similar projects. 6. Costs and benefits should be listed to prove to the readers that the benefits of their investment are worth the risks. 7. In choosing an appropriate style, the steps are creating an Authoritative Tone, use metaphors and similes, pay attention to Sentence Length, and minimize the jargon. 8. Three tips for designing the proposal are creating a look, create white space and use meaningful headings. 9. The four steps in revising and editing a proposal are looking for inconsistencies in content, getting rid of extra stuff, tweaking the design and proof reading. 10. Five major problems listed are students are “paid to play”, have out......

Words: 302 - Pages: 2

Free Essay

Nt1420 Unit 1 Exercise 1

...Unit 1 Exercise 1 An analog signal is any continuous signal which the time varying feature (variable) of the signal is a representation of some other time varying quantity, i.e., analogous to another time varying signal. A digital signal is a physical signal that is a representation of a sequence of discrete values (a quantified discrete-time signal), for example of an arbitrary bit stream, or of a digitized (sampled and analog-to-digital converted) analog signal. Half-duplex data transmission means that data can be transmitted in both directions on a signal carrier, but not at the same time. Full-duplex data transmission means that data can be transmitted in both directions on a signal carrier at the same time. A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring Long-distance telephone company, such as MCI (before its absorption by Verizon), Sprint and the former AT&T Corporation (before its merger with SBC in 2005). In the United States, it is defined as any carrier that provides inter-LATA communication, where a LATA is a local access and transport area. Long Distance central office, central office (CO) is an office in a locality to which subscriber home and business lines are connected on what is called a local loop. Tandem, telephone switch is a U.S. telephone company central office telephone exchange used to interconnect local exchange......

Words: 263 - Pages: 2

Free Essay

Unit 4 Exercise 1

...cables Crimpers - joining two pieces of metal or other ductile material by deforming one or both of them to hold the other Fish Tape - is a tool used by electricians to route new wiring through walls and electrical conduit Cable Toner - professional telephone and network cable tracking system, consisting of receiver and emitter, enables you to find where a cable is laid and whether or not Continuity Tester - an item of electrical test equipment used to determine if an electrical path can be established between two points; that is if an electrical circuit can be made Category 5e/6 Cable - provides performance of up to 250 MHz and is suitable for 10BASE-T, 100BASE-TX (Fast Ethernet), 1000BASE-T/1000BASE-TX (Gigabit Ethernet) and 10GBASE-T (10-Gigabit Ethernet). Binder Groups - Cable pairs are typically arranged under the cable sheath in binder groups. The binder is a spirally wound colored thread or plastic ribbon used to separate and identify cable pairs by means of color coding. Hybrid/Composite Cable - are used for standard definition connections. There are three separate colored wires in a composite cable: Red and white for left audio and right audio. Yellow for video. Pulling Cable - A substance which facilitates the pulling of wires through a cable duct or conduit Wavelengths of light - One wavelength. equals the distance between two successive wave crests or troughs. Frequency (Hertz) equals the number of waves that passes a given point per second EMI - is the......

Words: 608 - Pages: 3

Free Essay

Unit 1 Exercise 1

...Composition 1 Composition 1Composition 1didnt didn’t didn’t didn’t did nt didi did did did did did did did did did did did did did did did did did idid id idi did idid did did did dmdidi didid idid idid didid didid didi didididid didiid dididid iediddjiiiiiiiiiii did did didi did idid didi dd didi didii didid didid dddid didid didid diid idid idid idid ididididi did ididi idid ddi didi didi didi idid didid did dididi didid didid didi diid didid didi did idi did id id id I I did id id id id id I ii ii I I I I j j j j j j j d djdjd jdj du dudu dudu dud dud ud dudu dudud dudu dudud dud didi didi diid did idid didi didi did did idd didi diid d idid idi didi idi diid idi did did did id did did id di did did idid ddi didi didi didi did did did did did did did did didid didid didid didid didid did did did dd did id did did did di did di did did did did didi did didid did didid didi did d did did did dd didid did did did did di did did did did did did did did did did did did did did did didid did id did did did did dd did did d did did did did did did did did did did ddid did di didid id diidi di did idid dd ...

Words: 253 - Pages: 2

Premium Essay

Unit 10 Research Exercise Nt1110

...Unit 10 Research Exercise Josue Tagle ITT Technical Institute NT-1110 1-What exactly is electrostatic discharge (ESD)? Electrostatic discharge (ESD) is the sudden flow of electricity between two electrically charged objects caused by contact, an electrical short or dielectric breakdown. A buildup of static electricity can be caused by tribocharging or by electrostatic induction. The ESD occurs when differently-charged objects are brought close together or when the dielectric between them breaks down, often creating a visible spark. 2-Perform the following research about the CompTIA’s Six Steps to troubleshooting, explain EACH step in DETAIL: Step 1: Identify the Problem In this first step you already know that there is a problem; now you have to identify exactly what it is. This means gathering information. You do this in a few ways: Step 2: Establish a Theory of Probable In step 2 you theorize as to what the most likely cause of the problem is. Start with the most probable or obvious cause. For example, if a computer won’t turn on, your theory of probable cause would be that the computer is not plugged in! This step differs from other troubleshooting processes in that you are not making a list of causes but instead are choosing one probable cause as a starting point. In this step you also need to define whether it is a hardware- or software-related issue. Step 3: Test the Theory to Determine In step 3 take your theory from step 2 and test it.......

Words: 2425 - Pages: 10

Premium Essay

Nt1330 Unit 1 Exercise 1

...IP Addressing Scenario Unit 1 Exercise 1 ITT Technical Institute Floyd Washington Jr. April 4, 2015 When setting up a network that will consist of many host computers, one of the first things that an administrator must do is to determine what class of networks that they must administer to a given business. This is the point where every administrator must know how to implement classful and classless IP addressing. A classful network is a network addressing architecture used in the internet from 1981 until the introduction of Classless Inter-Domain Routing (CIDR) in 1993. Classful IP addressing divides the addtess space on the internet into five address classes. Each class is coded in the first four bits of the address. Today the classful network concepts remain in play only limited scope of the default configuration parameters. There are 32 bits contained in any IPv4 IP address. A Class A network has eight bits in the network number field and 24 bits in the rest of the field and covers a range of 0-126 in the leading field. There are 128 Class A networks with 16,777,216 hosts capability per network. The range of the Class A networks are 0.0.0.0 to 127.255.255.255. A Class B network has 16 bits in the network number field and has 16 bits in the rest of the fields and covers a range from 128.0.0.0 to 191.255.255.255. There are 16,385 Class B networks and each network has the capability of having 65,536 network hosts. A Class C network has 24bits in the network......

Words: 756 - Pages: 4

Free Essay

Nt1330 Unit 10 Exercises

...Unit 10 In Class Assignment AD Trouble Shooting and Backup 1. What is extensible storage engine (ESE) Also known as JET Blue, is an ISAM (Indexed Sequential Access Method) data storage technology from Microsoft. How does it work? It’s purpose is to allow applications to store and retrieve data via indexed and sequential access. Numerous Windows components take advantage of ESE, such as desktop and directory. Source: http://www.google.com/#q=What+is+extensible+storage+engine+(ESE) Source: 2. Does Active directory offer any fault tolerance, if so what kind? Yes.  In any Active Directory deployment, more than one server with the Active Directory Domain Services role deployed is recommended for fault tolerance. In fact, at least two Domain Controllers are recommended as a best practice for every Domain deployed in an Active Directory forest. The reason for this is to ensure that more than one server exists at any given time with a copy of the Active Directory database. Source: http://www.techrepublic.com/blog/data-center/active-directory-virtualization- best-practices/ Yes. For fault tolerance, you should always deploy new domains with at least two domain controllers. If you only have a single domain controller for a given domain and the domain controller......

Words: 918 - Pages: 4

Free Essay

It Unit 6 Exercise 1

...1. You triangulate your research by looking for looking for information from three different and three sources are considered reliable. 2. Primary sources are actual records or artifacts while secondary sources are writings from knowledgeable people who have studied the topic. 3. Three strategies that help to narrow an internet search are using exact words, using quotations, and using plus or minus signs. 4. A few of the questions researchers should ask is if the source can be trusted, what will the author get out of this publication and do the sources clearly define fact and fiction? 5. Researchers can use documentaries, television, and radio if they are reliable sources; you use quotes and cite the sources. 6. A wiki is a more fact based source while the blog and podcast tend to be more opinion based. 7. Three of the periodical indexes available in the ITT Virtual Library are academic journals, magazines, and newspapers. 8. The information that can be found in these publications is usually more exact and current. 9. Empirical sources include observations, experiments, surveys, and interviews. Researchers use them to confirm and to challenge online and print sources. 10. One of the best benefits of conducting an interview is to gather quotes that you can use for the text of your research. 11. The strategies for conducting a follow up interview is to write down what you remember, get your quotes right, check facts, and most......

Words: 339 - Pages: 2

Premium Essay

Unit 10 Task 1

...UNIT 10 TASK 1- DEFINING MARKETING RESEARCH Market research is the process of gathering, analyzing and interpreting information about a market, about a product or service to be offered for sale in that market, and about the past, present and potential customers for the product or service; research into the characteristics, spending habits, location and needs of your business's target market, the industry as a whole, and the particular competitors you face . The three types of market research to be focused on are ; primary research, quantitative and qualitative research and secondary research. There are however reasons why these market researches are used or needed. Firstly, primary research is the process of gathering, analyzing and interpreting information about a market, about a product or service to be offered for sale in that market, and about the past, present and potential customers for the product or service; research into the characteristics, spending habits, location and needs of your business's target market, the industry as a whole, and the particular competitors you face . the three types of primary research include: observation, interview, and survey or questionnaire. Observation – observation market research involves watching your potential customers and their behaviours in action. This means without interacting watching customers buying products or services similar to yours, listening to what they say as they shop, noticing what they buy and how......

Words: 1415 - Pages: 6

Premium Essay

Unit 8 Exercise 1

...Unit 8 Exercise 1 Ja’Martay Bentley GE375 Tami Gary May 16, 2016 Freud’s psychoanalytic perspective emphasized unconscious and unresolved past conflicts (Carpenter & Huffman, 2011). Freud believed the psyche (mind) contained three levels of consciousness: conscious, preconscious, and the unconscious (Carpenter & Huffman, 2011). Conscious is the thoughts or motives that a person is currently aware of or is remembering (Carpenter & Huffman, 2011). Preconscious are thoughts or motives that are just beneath the surface of awareness and can be easily brought to the mind (Carpenter & Huffman, 2011). The unconsciousness are thoughts and motives that lie beyond a person’s normal awareness, which still exert great influence (Carpenter & Huffman, 2011). Freud believed that most psychological disorders originate from repressed memories and instincts (sexual and aggressive) that are hidden in the unconscious (Carpenter & Huffman, 2011). Freud also believed that personality was composed of three mental structures: id, ego, and superego (Carpenter & Huffman, 2011). The id is totally unconscious and serves as a reservoir of mental energy (Carpenter & Huffman, 2011). The id is made up of innate, biological instincts and urges. It is immature, impulsive, and irrational (Carpenter & Huffman, 2011). The id wants what it wants and when it wants it – pleasure principle (Carpenter & Huffman, 2011). As a child grows older, the ego develops......

Words: 901 - Pages: 4

Premium Essay

Unit 1 Chapter Exercises

...Page 20-21 1. What is free software? List three characteristics of free software. Free software is a matter of the users’ freedom to run, copy, distribute, study, change and improve the software. Three characteristics are: Freedom to run the program for any purpose, freedom to redistribute copies, and freedom to improve the program and release your improvements to the public. 4. What is the Free Software Foundation/GNU? What is Linux? Which parts of the Linux operating system did each provide? Who else has helped build and refine this operating system? GNU is a project for creating an operating system, both kernel and system programs. Linux is a free kernel that was written in 1991. Linus Torvalds contributed the kernel while the GNU project contributed the system programs. It was built and refined by like-minded programmers all over the world. Page 50 1. Briefly, what does the process of installing an operating system such as Fedora/RHEL involve? It involves copying the operating system files from the installation media to the hard disk(s) on a system and setting up configuration files so Linux runs properly on the hardware. Page 86 1. What is a live system? What advantages does it have over an installed system? A live system is when you run Linux from a CD/DVD instead of installing it on the computer. The advantage is you can test out Linux without disturbing your current operating system. 4. Where on the disk should you put your /boot partition or the root (/)......

Words: 520 - Pages: 3