Free Essay

Unit 3 Exersise 1 Specifications -Definitions

In: Computers and Technology

Submitted By ayanna331
Words 252
Pages 2
Vocabulary 1. Application: Cabling can be applied to support TVs or phones. 2. Unshielded Twisted-Pair: two wires twisted around each other without extra protection. 3. Shielded Twisted-Pair: two wires twisted together with a shield made of metal around it. 4. Fiber-Optic Cable: a cable with optical fibers coated with plastic. 5. Dark Fiber: an unused optic fiber coated with plastic layers. 6. Coaxial Cable: a transmission line for high-frequency signals. 7. Plenum: a type of electric wire cable laid in plenum spaces for building codes. 8. Riser: Cable that is run at non plenum spaces that is fire retardant. 9. Rip Cord: A parallel cord under the jackets of the cable to remove the jackets. 10. Core: The actual cable which conducts electricity. 11. Attenuation: The loss of signal from getting farther away. 12. Noise: Interference in the signal of the cable. 13. Headroom: Signal exceeds the permitted maximum level. 14. ANSI: American national standards institute oversees standards. 15. NFPA: National fire protection association provides and advocates standards/codes to reduce fire hazards. 16. FCC: Federal Communications Commission regulates interstate and international communications by radio, television, wire, satellite, and cable. 17. NIST: National institute of standards and technology increases innovation and industrial competiveness. 18. OSHA: Occupational safety and health administration sets and enforces standards for workers safe and healthful conditions. 19. Equipment Room: Room where all the equipment is like servers. 20. Topology: is the arrangement of the various elements (links, nodes, etc.) of a computer network.…...

Similar Documents

Free Essay

Unit 3 Assigment 1

...Define the following terms: 1. Horizontal Cable : A type of inside cable designed for horizontal use in non-plenum areas. While horizontal cable must be fire retardant, the National Electrical Code (NEC) specifications are not as demanding as those governing the use of plenum cable or riser cable. See also NEC, plenum, plenum cable, and riser cable. 2. Backbone Cable : Backbone cabling is the inter-building and intra-building cable connections in structured cabling between entrance facilities, equipment rooms and telecommunications closets. Backbone cabling consists of the transmission media, main and intermediate cross-connects and terminations at these locations. This system is mostly used in data centers. 3. Patch Cords: a short cord with a plug at each end, or a plug at one end and a pair of clips at the other, used for temporarily connecting two pieces of equipment or signal paths. 4. Connectors: A device for holding two parts of an electrical conductor in contact. 5. Conduit: A tube or duct for enclosing electric wires or cable. 6. Racks: A computer rack (commonly called a rack) is a metal frame used to hold various hardware devices such as servers, hard disk drives, modems and other electronic equipment. Some may refer to a rack as "LAN or network furniture" as resembles a shelving structure where components can be attached vertically, stacked on top of one another. A computer rack can also be called a relay rack or open rack. ......

Words: 932 - Pages: 4

Premium Essay

Unit 3 Activity 1: Specifications - Definitions

...risk of fire through codes, safety requirements, research, and fire-related education. The NFPA is not directly related to data cabling, but it is responsible for the development and publication of the National Electrical Code (NEC). The NEC is published every three years and covers issues related to electrical safety requirements; it is not used as a design specification or an instruction manual. FCC – Stands for Federal Communications Commission. The FCC was founded in 1934 as part of the U.S. government. The FCC consists of sever commissioners appointed by the President; this board has the power to regulate electrical-communications systems originating in the US. These include the television, phones, and radio to name a few. NIST – Stands for National Institute of Standards and Technology. NIST was established by congress with many major goals in mind, including assisting in the improvement and development of manufacturing technology, improving product quality and reliability, and encouraging scientific discovery. Though not directly related to most cabling and data specs, NIST’s efforts contribute to the specifications and the development of the technology based on them. OSHA – Stands for Occupational Safety and Health Administration. OSHA was formed in 1970 with the goal of making workplaces in the US the safest in the world. OSHA passes laws designed to protect employees from many types of job hazards. Equipment Room – A centralized space for telecommunications......

Words: 1094 - Pages: 5

Free Essay

Unit 3 Exercise 1 – Specifications and Definitions

...Unit 3 Exercise 1 – Specifications and Definitions Application - The act of putting to a special use or purpose. Implementing the configuration of equipment. Unshielded Twisted Pair - A popular type of cable that consists of two unshielded wires twisted around each other. Fiber-Optic Cable - A fiber optic cable consists of a bundle of glass threads, each of which is capable of transmitting messages modulated onto light waves. Dark Fiber - Dark fiber refers to unused fiber-optic cable. Coaxial Cable - A type of wire that consists of a center wire surrounded by insulation and then a grounded shield of braided wire. Plenum - Cable that is run in the plenum spaces of buildings. Riser - a vertical duct through a multi-story building. Used to run cables between the floors of a building. Rip Cord – The name given to the fabric string inside of a cable. Used to “Rip” the jacket of the cable. Core – The center of a cable. Consists of the copper wires or fiber-glass. Attenuation - Reduction of signal strength during transmission. Noise - Interference (static) that destroys the integrity of signals on a line. Headroom - Also known as Attenuation Crosstalk Ratio, is the difference between attenuation and crosstalk at a given frequency along a cable. ANSI - Acronym for the American National Standards Institute. ANSI is a voluntary organization that creates standards for the computer industry. NFPA – National Fire Protection Association. Rates cables and equipment based on......

Words: 377 - Pages: 2

Premium Essay

Unit 3 Exercise 1. Specifications – Definitions

...Unit 3 Exercise 1. Specifications – Definitions Application – a system, the transmission method of which is supported by telecommunications cabling, such as 100base-TX Ethernet, or digital voice. Unshielded Twisted Pair – a pair of copper wires twisted together with no electromagnetic shielded around them. Shielded Twisted Pair – a type of twisted-pair cable in which the pairs are enclosed in an outer braided shield, the individual pairs may be shielded as well. Fiber Optic Cable – a cable containing one or more optical fibers Dark Fiber – an unused fiber; a fiber carrying no light, Common when extra fiber capacity is installed Coaxial Cable – a cable that has a single conductor surrounded by insulation and then a layer of shielding that is also a conductor, the two conductor shares one axis. Plenum – the air handling space between the walls, under structural floors, and above drop ceilings when used to circulate and otherwise handle air in the building. Plenum grade cable can be run through these spaces if building codes permit it Riser – a designation for a type of cable run between floors Fire-code rating for indoor cable that is certified to pass through the vertical shaft from floor to floor. Rip Cord – a length of string built into optical fiber cables that is pulled to split the outer jacket of the cable without using a blade Core – the central part of a single optical fiber in which that light signal is transmitted (common sizes are 8.3......

Words: 504 - Pages: 3

Premium Essay

Unit 3 Assignment 1

...Jennifer Schneider – NT 1230 – Client-Server Networking – Unit 3; Assignment 1 IPv6 Addressing 1.) Research the following organizations and explain their involvement with the Internet Public IP Addresses a. American Registry for Internet Numbers: Allocates, transfers and records maintenance of IP addresses as well as reverse DSN. b. Internet Assigned Numbers Authority: Allocates IP addresses from the pools of unallocated addresses to the RIRs according to their needs as described by global policy and to document protocol c. Asia-Pacific Network Information Center: Distributes and maintains IPv6 addresses 2.) Approximately how many IPv4 addresses are possible? There are approximately 4.3 billion IPv4 addresses available. 3.) Approximately how many IPv6 addresses are possible? There are 340,282,366,920,938,463,463,374,607,431,768,211,456 Ipv6 addresses available 4.) Why do you think the world is running out of IPv4 addresses? The internet really started in the 70s as a DARPA research project. At the time, there were 60 or so institutions expected to connect. As the interested research community grew, the addressing scheme was expanded from 8 bits (256 addresses in the predecessor to Internet Protocol (IP) known as Network Control Protocol (NCP)) to 32 bits (the IPv4 addresses we have today). At the time, it was still expected that the internet would serve largely defense, research, and educational institutions. It was essentially a laboratory experiment on a really......

Words: 411 - Pages: 2

Premium Essay

Unit 3 Exercise 1 Nt1310

...| Unit 3. Exercise 1. | | Specifications - Definitions | | Unit 3. Exercise 1. | | Specifications - Definitions | NT1310: physical networking April 15, 2014 Authored by: Nicholas Rapisardi NT1310: physical networking April 15, 2014 Authored by: Nicholas Rapisardi 1. Application (in terms of cabling infrastructure): The application layer is the OSI layer closest to the end user, which means both the OSI application layer and the user interact directly with the software application. When determining resource availability, the application layer must decide whether sufficient network or the requested communication exists.. (OSI_model#Layer_7:_application_layer) 2. Unshielded twisted-pair: UTP cable is a popular cable used in computer networking that consists of two shielded wires twisted around each other. In the image to the right, is an example of the different network cables you're likely to encounter. (/jargon/u/utpcable.htm) 3. Shielded Twisted-pair: Twisted Pair (STP) has a fine wire mesh surrounding the wires to protect the transmission; Unshielded Twisted Pair (UTP) does not. Shielded cable is used in older telephone networks, network, and data communications to reduce outside interference. In the picture to the right, is an example of what these cables look like inside. (jargon/t/twispair.htm) 4. Fiber-Optic cable: A fiber optic cable is a network cable that contains strands of glass fibers inside an insulated casing.......

Words: 1317 - Pages: 6

Free Essay

Unit 3 Assignment 1

...IS3340-WINDOWS SECURITY | Encryption and BitLocker Activity | Unit 3 Assignment 1 | | | 5/1/2014 | | 1. One of the shop floor computers that is connected to your network is commonly used by the floor manager. You want the floor manager’s files to be encrypted on that computer. Although the floor manager’s documents folder is on a central server, there are some local temporary files that could contain sensitive information and should be encrypted at all times. Which Windows encryption feature would best provide encryption for all of the floor manager’s local files while leaving other users’ files unencrypted? Folder Encryption: EFS 2. The human resource (HR) manager stores a spreadsheet with sensitive personal information on her local workstation. The spreadsheet is the only file with sensitive data and the name of the spreadsheet does not change. Which Windows encryption feature would ensure this one file is always stored on the disk in encrypted format? File Encryption: EFS 3. The chief executive officer (CEO) wants to copy confidential sales projection information from her workstation to her laptop via a universal serial bus (USB) device. What is the best option to ensure the confidential information is secure during the copying process? BitLocker To Go 4. You want to encrypt your main file server’s disk that stores confidential information for several users. Which Windows encryption feature encrypts an entire disk and is not......

Words: 294 - Pages: 2

Premium Essay

Unit 3 Assignment 1

...Unit 3 Assignment 1: Compare Windows 8 and Windows RT Course Objectives and Learning Outcomes Identify the characteristics of popular mobile operating systems. Compare mobile operating systems to their related desktop operating systems. Identify the characteristics of Windows Phone. Identify differences and similarities between Windows 8 and Windows Phone 8. Assignment Requirements Research Windows 8 and Windows RT on the Microsoft website and write a paper that discusses the implications of an integrated platform. Required Resources Web browser Windows RT website http://windows.microsoft.com/en-us/windows/rt Submission Requirements Submit a one-page paper that compares Windows 8 and Windows RT. The paper should identify five similarities and five differences between the platforms. You should also discuss how an integrated platform affects users and developers. Which operating system is required for mobile application development? Why? Evaluation Criteria Category | # | Criteria | CONTENT, 90% | 1.1 | The paper should identify 5 similarities between Windows 8 and Windows RT. Up to 20 points for this element | | 1.2 | The paper should identify 5 differences between Windows 8 and Windows RT. Up to 20 points for this element | | 1.3 | The paper should discuss how an integrated platform impacts users. Up to 20 points for this element | | 1.4 | The paper should discuss how an integrated platform impacts developers. Up to 20 points for this......

Words: 283 - Pages: 2

Premium Essay

Unit 3 Assignment 1

...Remote Access Control Policy 1. It is the responsibility of Richman Investments employees, third party contractors, vendors and agents with remote access privileges to Richman Investments networks to ensure that their remote access connection is given the same consideration as the user's on-site connection to Richman Investments. 2. General access to the Internet for recreational use by immediate household members is discouraged through the Investment Dial-In Network. The Richman Investments employee is responsible to ensure the family member does not violate any Richman Investment policies, does not perform illegal activities, and does not use the access for outside business interests. The Richman Investments employee bears responsibility for the consequences should the access be misused. 3. Access to the Richman Investments Trusted Network will only be allowed from Trusted Users and other special ITS administered subnets. 4. Remote or outside Trusted Users (defined below) may gain access to Trusted hosts in one of two ways: a. The outside Trusted user will initiate a connection and authenticate to the Richman Investments VPN endpoint (see VPN_Policy). Username and password pairs will be distributed to Third Parties upon receipt of a valid Third Party Connection Agreement. Currently supporting Windows 8 with Microsoft SQL Server 2014. Network Infrastructure and Control Systems will make client software available upon request. b. The Richman......

Words: 362 - Pages: 2

Free Essay

Unit 1 Task 3

...'doing' for example 'being' drunk in charge of a vehicle (Duck v Peacock 1949) or 'being' an illegal alien (R v Larsonneur 1933). Occasionally an omission can amount to the actus reus of a crime. The general rule regarding omissions is that there is no liability for a failure to act for example if you see a child drowning in shallow water and you don't do anything to save that child you will not incur criminal liability for your inaction no matter how easy it may have been for you to save the child's life. This general rule however, is subject to exceptions like these: 1. Statutory duty: In some situations there is a statutory duty to act for example to provide details of insurance after a traffic accident or to notify DVLA when you sell a vehicle. 2. Contractual duty: If a person owes a contractual duty to act, then a failure to meet this contractual duty may result in criminal liability: R v Pittwood (1902) 3. Duty imposed by law: The actus reus can be committed by an omission where there exists a duty imposed by law. There are three situations in which a duty may be imposed by law. These are where the defendant creates a dangerous situation, where there has been a voluntary assumption of responsibility and misconduct in a public office. Additionally an omission may be classified as part of a continuing act. Creating a dangerous situation and failing to put it right: R v Miller (1983) Second element is the Mens rea which translates as 'to have in mind’ from Latin. It......

Words: 2256 - Pages: 10

Premium Essay

Unit 3 Assignment 1

...October 1, 2014 NT2580 Unit 3 Assignment 1 There are three key parts I will have to take into account while designing a Remote Access Control Policy for Richman Investments. These three parts (Identification, Authentication and Authorization) will not be all for the Remote Access Control Policy, I will need to include the appropriate access controls for systems, applications and data access. I will also need to include my justification for using the selected access controls for systems, applications and data access. The first part I need to implement for this Remote Access Control Policy is Identification, which is defined in this sense as: physical keys or cards, smart cards, and other physical devices that might be used to gain access to something. What needs to be done for the Remote Access Control Policy is a group member policy needs to be setup which uniquely identifies each user. Users should be identified by rank with higher ranking users requiring more authentications. Each individual user should be assigned to a group based on rank with special permissions. Using this system for Identification will make our company more secure in day to day operations. The second part I need to implement for this remote access control policy is Authentication, which is defined as: what you know or passwords, numeric keys, PIN numbers, secret questions and answers. For remote access, there must be proof that the person is who they say they are every time they attempt to......

Words: 364 - Pages: 2

Premium Essay

Unit 3 Assignment 1

...October 1, 2014 NT2580 Unit 3 Assignment 1 There are three key parts I will have to take into account while designing a Remote Access Control Policy for Richman Investments. These three parts (Identification, Authentication and Authorization) will not be all for the Remote Access Control Policy, I will need to include the appropriate access controls for systems, applications and data access. I will also need to include my justification for using the selected access controls for systems, applications and data access. The first part I need to implement for this Remote Access Control Policy is Identification, which is defined in this sense as: physical keys or cards, smart cards, and other physical devices that might be used to gain access to something. What needs to be done for the Remote Access Control Policy is a group member policy needs to be setup which uniquely identifies each user. Users should be identified by rank with higher ranking users requiring more authentications. Each individual user should be assigned to a group based on rank with special permissions. Using this system for Identification will make our company more secure in day to day operations. The second part I need to implement for this remote access control policy is Authentication, which is defined as: what you know or passwords, numeric keys, PIN numbers, secret questions and answers. For remote access, there must be proof that the person is who they say they are every time they attempt to......

Words: 364 - Pages: 2

Free Essay

Unit 3 Assignment 1

...Craig Roxbury Unit 3 Assignment 1 Erica Lanier Video Summary 1 In video 1.07 the lesson is on ports and connectors. There are three different types of ports, those are serial port, parallel port and game port. The serial port is usually male and have 9 or 25 pins. The parallel port is usually female and has 25 pins. The game ports are female and have 15 pins. All of those ports have been replaced by USB ports. The video also discusses how the modem connects to a phone line and converts digital to analog. It explains there are two types of SCSI narrow and wide SCSI, the narrow SCSI has 50 pins and the wide has 68 pins. Video 1.09 teaches that there are two types of monitors, you have CRT and LCD. CRT stands for cathode ray tube and LCD stands for liquid crystal display. The CRT is similar to an old television and the LCD uses thin film transistors and the back lighting is through polarized panels. Your specifications of a monitor include screen size, contrast ratio, refresh rate, response time, interfacing, dot pitchand pixel pitch. Video 1.11 focuses on types of printers and the types of problems that come with each. There is the Dot Matrix, Ink Jet and the laser printers. Overall the videos covered your computer basics and the parts that make it productive. I could comprehend the objective of the videos but they all covered a plethora of information in a matter of minutes, so I feel there was a lot that I missed. Fortunately what I did not catch in the video......

Words: 322 - Pages: 2

Premium Essay

Unit 3. Assignment 1

...Unit 3. Assignment 1. IPv6 Addressing 1. Research the following organizations and explain their involvement with the Internet public IP addresses a. American Registry for Internet Numbers (ARIN) ARIN, a nonprofit member-based organization, supports the operation of the Internet through the management of Internet number resources throughout its service region; coordinates the development of policies by the community for the management of Internet Protocol number resources; and advances the Internet through informational outreach. IP address space allocation, transfer, and record maintenance http://www.arin.net/about_us/overview.html b. Internet Assigned Numbers Authority (IANA) IANA is responsible for global coordination of the Internet Protocol addressing systems, as well as the Autonomous System Numbers used for routing Internet traffic. http://www.iana.org/numbers c. Asia-Pacific Network Information Center (APNIC) The Asia Pacific Network Information Centre (APNIC) is an organization that manages the assignment of Internet number recourses within the Asian continent. APNIC sets the rules, regulations and standards that all designated organizations must abide by and implement. End-user organizations and Internet service providers take direction from Regional Internet Registries (RIRs) like APNIC to provide Internet resources within certain regions. The Internet number resources include antonymous system numbers as well as IP addresses that assist in clearly......

Words: 577 - Pages: 3

Free Essay

Unit 3 Exercise 1. Specifications – Definitions

...NT 1310 Mr. Davis January 6, 2016 Unit 3 Exercise 1. Specifications – Definitions Application (in terms of cabling infrastructure) – A system the transmission method of which is supported by telecommunications cabling, such as a 100base-TX Ethernet, or digital voice. Unshielded Twisted-Pair – (UTP) a pair of copper wires twisted together with no electromagnetic shielding around them. Each wire pair is twisted many times per foot to cancel out electrical signal. Shielded Twisted-Pair – A type of twisted pair cable in which the pairs are enclosed in an outer braided shield, although individual pairs may also be shielded. Fiber-Optic Cable - An optical fiber cable is a cable containing one or more optical fibers. The optical fiber elements are typically individually coated with plastic layers and contained in a protective tube suitable for the environment where the cable will be deployed. Optical fiber consists of a core and a cladding layer, selected for total internal reflection due to the difference in the refractive index between the two Dark Fiber – Dark fiber refers to unused fiber-optic cable. Often times’ companies lay more lines than what’s needed in order to curb costs of having to do it again and again. The dark strands can be leased to individuals or other companies who want to establish optical connections among their own locations. Coaxial Cable - is a type of cable for high bandwidth data transmission use that typically consists of a single copper......

Words: 927 - Pages: 4