....72 | 0 | 380 | 0 | 0 | Lunch | | | | | | | | | | | | | | | | Spinach salad | 3 oz | 1 | 20 | 0.1 | 0.1 | 0.1 | 0 | 0 | 0 | 80 | 2.7 | 0 | 2 | 0 | 0 | Italian Dressing (fat free) | 2 tbsp | 1 | 20 | 0.5 | 3.6 | 0.2 | 0.3 | 0.2 | 1 | 14 | 0.08 | 38 | 430 | 0 | 0.4 | Snack | | | | | | | | | | | | | | | | Blueberries | 1 C | 1 | 83 | 1.1 | 21.0 | 3.5 | 0.5 | 0 | 0 | 9 | 0.41 | 112 | 1 | 4 | 14.1 | Banana | 1 | 1 | 105 | 1.3 | 27 | 3.1 | 1 | 0.13 | 0 | 6 | 0.31 | 422 | 1 | 4 | 10 | Dinner | | | | | | | | | | | | | | | | T-Bone Steak | 4 oz | 1 | 250 | 22.0 | 0 | 0 | 17 | 7.0 | 70 | 0 | 3.6 | 0 | 60 | 0 | 0 | Oven Baked Potatoes | 1 serving (100g) | 1 | 86 | 2.2 | 16.3 | 3.0 | 1.4 | 0.7 | 0 | 0 | 0 | 0 | 70 | 0 | 0 | String Beans | 1 C | 1 | 44 | 2.4 | 9.8 | 4.0 | 0.3 | 0.1 | 0 | 55 | 0.81 | 183 | 299 | 44 | 12.1 | Arizona Sweet Tea | 8 oz | 1 | 90 | 0 | 23 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 10 | 0 | 60 | Totals |...
Words: 654 - Pages: 3
...Microsoft While Microsoft has been very successful in providing the Windows operating system to PC makers as well as the Office Suite there is growing competition from Apple in terms of both the consumer market and the corporate market. The Apple Mac OS is now becoming a viable contender in both markets. However, in terms of the quickly growing and ever expanding mobile market Microsoft has done very little to win over handset makers and create an environment in which individuals are writing apps for their platform. In this case Apple has become the predominant leader and the standard methods of competing are not producing the results needed to remain competitive in the long term market. For this reason I would recommend that Microsoft make a significant departure and start writing apps for the Apple iOS platform. While it may seem counterintuitive to develop apps that will run on other hardware Microsoft is currently faced with the issue of taking a beating in terms of the app market. Creating apps that run on iOS will allow Apple users to see the Microsoft products that are available and hopefully create additional revenue such that they can fund and create new opportunities in their own potential app store for Windows based phones. This is basically the last significant chance Microsoft has in order to salvage the potential for the mobile OS and app market. The opportunity is a single as it hopefully prevents the downfall of their mobile market altogether. There is a risk...
Words: 861 - Pages: 4
...LAN b. A network of users that share computer resources across a metropolitan area – MAN c. A network that connects local area networks across a large geographic area – WAN 3. Expand the acronym MAC – Media Access Control 5. Expand the acronym WAN – Wide Area Network 7. Define the term topology – Topology is the architecture of a network 9. A disadvantage of the token-ring system is that if an error changes the token pattern, it can cause the token to stop circulating. This can be eliminated by adding a d. token-ring hub 11. What is the difference between a hub and a switch? A hub broadcasts the data it receives to all devices connected to its ports and a switch forwards a frame it receives directly out of the port associated with its destination address. 13. What information is not included in an Ethernet frame? a. Frame size 15. What is the minimum and maximum size of an Ethernet frame? The minimum length of the Ethernet frame is 64 bytes from the destination MAC address through the frame check sequence. The maximum Ethernet frame length is 1518 bytes, 6 bytes for the destination MAC address, 6 bytes for the source MAC address, 2 bytes for length/type, and 1500 bytes for the data. 17. What does the OUI represent? The OUI represents the first 3 bytes of the MAC address that identifies the manufacturer of the network hardware. 19. INTERNET SEARCH: Find the device manufacturer for the following Ethernet devices: a. 00-C0-4F-49-68-AB – Dell Computer Corporation ...
Words: 976 - Pages: 4
...#1 a. LAN b. MAN c. WAN #3 MAC- media access control #5 WAN wide area network #7 Topology- the architecture of a network #9 D. token-ring hub #11 hub- broadcasts the data it receives t oall devices connected to its ports Switch- forwards a fram it receives directly out the port associated with its destination address #13 A. frame size #15 64 and 1518 bytes #17 organizationally unique identifier- the first 6 digits of an address which are used to indicate the vendor of the network interface. #19 a. 00-C0-4F-49-68-AB: dell computer b. 00-0A-27-B7-3E-F8: apple computer inc. c. 00-04-76-B6-9D-06: com corporation d. 00-00-36-69-42-27: ATARI corporation #21 TCP/IP transmission control protocol/ internet protocol #23 Easy to add stations as there are no cables required Signals can be sent through doors and walls so the stations can be mobile so can move around There is less need for technical support in setting up due to their simple nature There are no cables to trip over so there are less health and safety issues to consider Share resources like printers. Have shared access to a centralized storage. #25 Router is used to make the connection to the ISP. The switch is used to interconnect other working devices, the broadband modem is used to make the data connection to the ISP. #27It can tell you if the ISP is the issue, as opposed to your computer or your own network at home. #29 a limited geographic area that provides wireless access for the...
Words: 678 - Pages: 3
...administrative distance? Static route Describe the point-to-point WAN connection protocol provided by Telco? Leased Lines This cisco IOS command copies the current running configuration to a tftp server? Copy running-config tftp The concept of EIGRP Feasible distance is the computed metric of a SUCCESSOR route Is the dotted decimal equivalent to slash notation /25 255.255.255.128 The routing protocol that doesn’t support support VLSM? RIP v1 Is the broadcast address for the ip subnet 8.5.8.232 mask 255.255.0.0 8.5.255.255 Is the slash notation dotted decimal mask of 255.255.255.252 /30 The following mask could create an IP subnet from a class B that contains 500 hosts? 255.255.255.0 Port of STMP? 25 Protocol responsible for resolving mac addresses from IP addresses? ARP Two protocols commonly used in WANS at layer 2 of the OSI model? HDLC and PPP 192.168.254.0 is private up networks, classified by? RFC1918 Bits comprise the network portion of a class C address? 24 126.254.1.45 address belongs to what range? Class A 5 bits of mask for the host portion of an ip address, how may usable hosts addresses are available? 14 Usable host addresses are contained in a class c network? 254 What is the tool that can be used to determine the number of hops to a destination? Traceroute What are the possible mechanisms of...
Words: 2228 - Pages: 9
...Deciding on the right piece of equipment? By: Maurice T. Wade Student: American Intercontinental University Class: ENG106 Abstract Trying to set out and find the perfect computer for the members of my organization there are several factor that are vitally important. These are factors are but not limited to memory, anti-virus protection, and processing speed. So the best choice of all three of these in one would be a MAC from Apple. This would be the recommendation that I would give. The search has been narrowed down between three units which are Apple IMac 27inch (Late 2012), Dell XPS 27 Touch All in One (2720), last but not least Dell Optiplex 9010 AIO. Trying to set out and find the perfect computer for the members of my organization there are several factor that are vitally important. These are factors are but not limited to memory, RAM size, and processing speed. So the best choice of all three of these in one would be a MAC from Apple. This would be the recommendation that I would give. The search has been narrowed down between three units which are Apple IMac 27inch (Late 2012), Dell XPS 27 Touch All in One (2720), last but not least Dell Optiplex 9010 AIO. So for memory the Dell XPS takes this category by a land slide it comes off the shelf with 2038GB worth of memory. That is an extremely large amount of memory that could definitely come in handy depending on the reason that the organization plans on using the computers. With Apple IMac you are only getting...
Words: 493 - Pages: 2
...Universidad Interamericana, Recinto de Guayama | Diseño de una Red Mediana | | Luis Lugo 16 de enero de 2013 | Introducción En este trabajo estaré diseñando una red mediana para un colegio técnico el cual contiene pocos estudiantes. Este diseño usa conmutadores en las capas 2 y 3 proveyendo servicios a usuarios y a la misma vez seguridad para toda la red. La organización tiene alrededor de 700 usuarios y existen diferentes dominios dentro de esta red. Diseño Este diseño debe tener varios requerimientos específicos para poder completar lo que es una red mediana segura. Uno de estos requerimientos y el mayor de estos es que la red debe de proveer conectividad para tres servidores y alrededor de 700 clientes. De la misma manera, la red va a permitir que si en alguna ocasión alguno de estos equipos necesita separarse el otro, esto sea posible. En esta red otro de los requerimientos importantes es el de evitar ataques, ya que como la red va a estar comunicándose entre dos edificios, esta es más susceptible a ataques que provengan de afuera. El centro o “core” de esta red es un solo conmutador de capa 3 con interfaz de “Ethernet” este conmutador “core” le provee los servicios de índole de ambas capas (2 y 3) hacia los equipos necesarios. La red tiene 4 sub redes diferentes, una de estas es para los servidores, otra para los clientes, otra para el sistema de red inalámbrico y la última para la administración. Se diseñó un NDIS para monitorear...
Words: 1290 - Pages: 6
...Al and begin to wonder where they should eat. But the question is answered for them almost as soon as it has arisen, for at the bottom of the exit ramp is a familiar sign, a gold arch on a red background – ‘McDonald’s – Straight Ahead One Mile’. McDonald’s! Hamburgers! French fries! ‘Let’s eat at McDonald’s!’ Paul suggests. ‘We can’t see anywhere else to go, and at least we know what their food is like’. ‘Sure’ Emma agrees. ‘I could just eat a cheeseburger...or maybe even a Big Mac!’. About a mile further on is a large shopping centre, and at the far ends of its car park the golden arches of McDonald’s are plainly visible. Paul and Emma enter the restaurant, walk down the centre aisle between uniform rows of spotlessly clean tables, and examine the menu that is posted behind and above the service counter. Exactly the same menu as the one back home! They quickly decide what to have and approach the counter. ‘Can I take your order, please?’ inquires the crew member, smiling at them. ‘Two Big Mac meals with Diet Coke, to go please’. ‘Is that large?’ she replies. The order is placed using pre-programmed shortcuts on the till. ‘Is that everything, sir?’ she asks. Paul looks at his wife, who shakes her head. ‘Er, no. Thanks anyway’. The crew member totals up the sale and states the amount in a clear voice. Paul gives her a ten-pound note. ‘Ten pounds,’ she says, counting out the correct change and giving it to Paul before putting the note in her cash drawer. Change...
Words: 1354 - Pages: 6
...Ay yo im mac daddy ay yo im mac daddy ay yo im mac daddy ay yo im mac daddy yo yo yo yo yo yo yo yo yo yo big mac daddy in the house yeah buddy big mac daddy daddy boy get on my level becuz im mac daddy, this aint to real essay homie you know that. This gotta be 250 so imma copy and paste this til I get 250 Ay yo im mac daddy ay yo im mac daddy ay yo im mac daddy ay yo im mac daddy yo yo yo yo yo yo yo yo yo yo big mac daddy in the house yeah buddy big mac daddy daddy boy get on my level becuz im mac daddy, this aint to real essay homie you know that. This gotta be 250 so imma copy and paste this til I get 250 Ay yo im mac daddy ay yo im mac daddy ay yo im mac daddy ay yo im mac daddy yo yo yo yo yo yo yo yo yo yo big mac daddy in the house yeah buddy big mac daddy daddy boy get on my level becuz im mac daddy, this aint to real essay homie you know that. This gotta be 250 so imma copy and paste this til I get 250 Homey I copy pasted this twice and im only at 232, so imma do it one more time. Ay yo im mac daddy ay yo im mac daddy ay yo im mac daddy ay yo im mac daddy yo yo yo yo yo yo yo yo yo yo big mac daddy in the house yeah buddy big mac daddy daddy boy get on my level becuz im mac daddy, this aint to real essay homie you know that. This gotta be 250 so imma copy and paste this til I get 250 Yeah homey now we at 323, itz mac...
Words: 324 - Pages: 2
...Fannie Mae and Freddie Mac Fannie Mae and Freddie Mac are private corporations that were established by Congress and are referred to as government sponsored enterprises or GSEs. They are the largest “packagers” of individual mortgages into mortgage backed securities (MBS) which they guarantee against loss. We will be addressing the following threats to your financial institutions stability. Counterparty risk. Internal and external vulnerability and threats. Stemming the tide of losses from overly aggressive practices in lending continues to retard the marketplace and has yet to reach equilibrium. The use of macro measures is of critical importance in returning the company to profitability. \ The use of Macroeconomic Measures, Using Aggregate Data. These measures approach threats to financial stability from the top down: Is aggregate credit growing too fast? Are credit underwriting standards falling? Are asset prices too high relative to fundamentals? “In an internal boom-bust cycle, an initial market upswing entices new investors and rising prices until additional capital or investors’ nerves are exhausted.”(Evanoff, Kaufman, and Malliaris, 2012). “This process can be amplified by capital rules that encourage banks to increase leverage when the economy is expanding and loan losses are low.” (Hanson, Kashyap, and Stein, 2011). “In the ensuing bust, a credit crunch can occur as participants switch from lending too much to lending too little.” (Brunnermeier, 2009). A selling...
Words: 960 - Pages: 4
...the silent workhorse of a network. Other than offering an administrative interface, switches do not maintain layer three IP addresses, so hosts cannot send traffic to them directly. The primary attack against a switch is the ARP poisoning attack described earlier in the “Switches” section of this chapter. However, the possibility of an ARP attack doesn’t mean switches cannot be used as security control devices. As mentioned earlier, MAC addresses are unique for every network interface card, and switches can be configured to allow only specific MAC addresses to send traffic through a specific port on the switch. This function is known as port security, and it is useful where physical access over the network port cannot be relied upon, such as in public kiosks. With port security, a malicious individual cannot unplug the kiosk, plug in a laptop, and use the switch port, because the laptop MAC will not match the kiosk’s MAC and the switch would deny the traffic. While it is possible to spoof a MAC address, locking a port to a specific MAC creates a hurdle for a would-be intruder. Switches can also be used to create virtual local area networks (VLANs). VLANs are layer two broadcast domains, and they are used to further segment LANs. As described earlier, ARP broadcasts are sent between all hosts within the same VLAN. To communicate with a host that is not in your VLAN, a switch must pass the hosts packets through a layer three device and routed to the appropriate VLAN...
Words: 399 - Pages: 2
...IPv6 Address Type - Multicast Overview: As part of your assigned readings and material covered in class lecture, you have learned about IPv6 address types, including unicast and multicast addresses. For this assignment, you will expand your knowledge of the use of multicast addresses compared to the use of broadcast addresses in IPv4. Required Resources: Textbook and lecture notes Internet access Research Resources: • IPv6 multicast address – overview o http://www.tcpipguide.com/free/t_IPv6MulticastandAnycastAddressing.htm • IPv6 subnet scanning RFC o http://www.ietf.org/rfc/rfc5157.txt Deliverables Perform additional research to understand the use of multicast addresses in IPv6 protocol compared to IPv4 broadcast addresses with emphasis on: o Neighbor discovery o All nodes address o All routers address Describe the process of neighbor discovery including the use the all nodes address for achieving the same result as the IPv4 ARP protocol. Include the IPv6 multicast address for all routers and all hosts. Perform research to determine: o Are you able to perform subnet “scanning” by simple sending an ICMP echo packet to the “all hosts” multicast address? Similar to the concept of sending an ICMP echo packet to the broadcast address on an IPv4 subnet. o Provide an estimate of how long it would take to scan, through a tool similar to NMAP, an entire /64 IPv6 subnet to find every possible host, not using the multicast “all host” address. Use...
Words: 883 - Pages: 4
...Basic Switch Configuration Switch>enable Switch# Examine the current running configuration file. Switch#show running-config Examine the current contents of NVRAM: Switch#show startup-config Examine the characteristics of the virtual interface VLAN1: Switch#show interface vlan1 Switch#show ip interface vlan1 Examine the following version information that the switch reports. Switch#show version Examine the default properties of the FastEthernet interface used by PC1. Switch#show interface fastethernet 0/18 Switch#show vlan examine the contents of the flash directory. Switch#dir flash: or Switch#show flash Switch#dir flash:c2960-lanbase-mz.122-25.SEE3 To save the contents of the running configuration file to non-volatile RAM (NVRAM), issue the the command copy running-config startup-config. Switch#copy running-config startup-config S1#configure terminal S1(config)#hostname S1 S1(config)#exit S1#configure terminal S1(config)#line console 0 S1(config-line)#password cisco S1(config-line)#login S1(config-line)#line vty 0 15 S1(config-line)#password cisco S1(config-line)#login S1(config-line)#exit S1(config)#enable secret class First, you will create the new VLAN 99 on the switch. Then you will set the IP address of the switch to 172.17.99.11 with a subnet mask of 255.255.255.0 on the internal virtual interface VLAN 99. S1(config)#vlan 99 S1(config-vlan)#exit S1(config)#interface vlan99 %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan99...
Words: 873 - Pages: 4
...Chapter 14 Answer the following review questions. For some questions, more than one choice may be correct. 1. Which of the following routing protocols are considered to use distance vector logic? a. RIP b. IGRP c. EIGRP d. OSPF 2. Which of the following routing protocols are considered to use link-state logic? a. RIP b. RIP-2 c. IGRP d. EIGRP e. OSPF f. Integrated IS-IS 3. Which of the following routing protocols support VLSM? a. RIP b. RIP-2 c. IGRP d. EIGRP e. OSPF f. Integrated IS-IS 4. Which of the following routing protocols are considered to be capable of converging quickly? a. RIP b. RIP-2 c. IGRP d. EIGRP e. OSPF f. Integrated IS-IS 5. Router1 has interfaces with addresses 9.1.1.1 and 10.1.1.1. Router2, connected to Router1 over a serial link, has interfaces with addresses 10.1.1.2 and 11.1.1.2. Which of the following commands would be part of a complete RIP Version 2 configuration on Router2, with which Router2 advertises out all interfaces, and about all routes? a. router rip b. router rip 3 c. network 9.0.0.0 d. version 2 e. network 10.0.0.0 f. network 10.1.1.1 g. network 10.1.1.2 h. network 11.0.0.0 i. network 11.1.1.2 6. Which of the following network commands, following a router rip command, would cause RIP to send updates out two interfaces whose IP addresses are 10.1.2.1 and 10.1.1.1, mask 255.255.255.0? a. network 10.0.0.0 b. network 10.1.1.0 10.1.2.0 c. network 10.1.1.1 10.1.2.1 d. network 10.1.0.0 2550.255...
Words: 1957 - Pages: 8
...Mac vs. PC/windows The technology market has severely impacted the world in the last decade. Apple and Microsoft are two companies whose competition to dominate sales has been mostly developed with computer sales. Apple’s computer is named “Mac” and Microsoft’s product can be recognized as windows PC. Microsoft has millions of customers because of the amazing job that the company has developed on marketing. However, Apple’s computer is undoubtedly better in three aspects: Productivity, security and design. The lighter you are, the faster you can run. This is an advise usually used for athletes, but can be applied for computers too. Mac has an immediate processing, because it does not have useless applications by default, and so, the software works faster. Furthermore, the apple keyboard facilities, as the multi-touch, give to the user a higher list of options to control the computer. On the other hand, windows PC wants to provide a big amount of options to the customer, for instance, more than 40 game by default. The computer usually gets slower for having apps that never are used by customers. However, the processing speed of computers can be affected for other reasons; malwares are one of these. A malware is malicious software used to corrupt computers. Apple has many restrictions for computer developers and its programing language is much more exclusive, because the software and hardware are both created by the same company. This strategy lets Apple to be much more careful...
Words: 453 - Pages: 2