...------------------------------------------------- FI – 516 – WEEK 2 - MINI CASE – ANSWER KEY Assume that you have just been hired as a business manager of PizzaPalace, a regional pizza restaurant chain. The company’s EBIT was $50 million last year and is not expected to grow. The firm is currently financed completely with equity, and it has 10 million shares outstanding. When you took your corporate finance course, your instructor stated that most firms’ owners would be financially better off if the firms used some debt. When you suggested this to your new boss, he encouraged you to pursue the idea. As a first step, assume that you obtained from the firm’s investment banker the following estimated costs of debt for the firm at different capital structures: ------------------------------------------------- ------------------------------------------------- % Financed With Debt rd ------------------------------------------------- 0% --- ------------------------------------------------- 20 8.0% ------------------------------------------------- 30 8.5 ------------------------------------------------- 40 10.0 ------------------------------------------------- 50 12.0 ------------------------------------------------- ------------------------------------------------- ...
Words: 3189 - Pages: 13
...Network technology has come forward as an important component of IT infrastructure. Within the healthcare industry, the value of an efficient and stable network is immeasurable. The challenge in most industries, especially healthcare, is address security concerns and the rights of the patience. Patton-Fuller Community Hospital, located in the City of Kelsey, is a fully function hospital servicing the local area since 1975. Recently, The Chief Executive Officer (CEO) of Patton-Fuller Community Hospital expressed the desire to design an upgrade to the current network architecture. This design will include upgrades to hardware components and software components. This proposal will discuss and summarize the current network structure, propose an upgrade design to meet future challenges while addressing network security and compliance; more specifically, the transfer and confidentiality of patient records information. Patton Fuller Community Hospital – Current Network The current networking architecture of the Patton-Fuller Community Hospital can be broken down into two major sections. Today the two major backbones of the network include a 1000 Base T using CAT6 cable which provides network access to many administrative and operational areas of the facility. Executive management, Human Resources, Operations, Facilities, Finance, as well as the IT data center are all connected directly to this side of the network backbone. The hospital side is connected via 1000 Base F which...
Words: 1760 - Pages: 8
...AT&T Headquartered in Oakton, VA, AT&T Government Solutions is a long-standing, trusted source of information technology solutions for the federal government, integrating unmatched network resources and IT managed solutions expertise with innovative technologies from AT&T Labs and a complementary team of industry-leading technology companies. Best known for network leadership in voice, data, video, and managed services, AT&T is a proven solutions integrator, with professional service expertise in enterprise architecture, business transformation, knowledge management, training, program management, systems engineering and security. More than 4,000 scientists, engineers and analysts – many with security clearances – focus exclusively on the IT requirements of government, with support from tens of thousands of professionals throughout the AT&T family of companies. Externally evaluated as a Software Engineering Institute - Capability Maturity Model Integration (SEI-CMMI) Level-3 organization and an International Organization for Standardization (ISO) 9001:2008, AT&T has the proven processes and procedures in place to deliver on time, on budget, with quality service. 1. Leadership Enterprise Management solutions from AT&T are designed to optimize the efficiency and availability of network services and mission applications. Enterprise Management process tools, implemented throughout your IT organization, can help your agency: * Increase automation...
Words: 3651 - Pages: 15
...Associate Program Material Appendix J Wireless Network Plan Use the following outline to create your wireless network plan. Fill in each section of the plan as required. Deployment Scenario Infrastructure Deployment Scenario Rationale An infrastructure wireless network provides a more reliable network connection for wireless clients. If we strategically placed the stationary base we can maximum reception. Infrastructure mode networks offer the advantage of scalability, centralized security management and improved reach. Hardware Components • Component Name: Access point o Rationale for using component: Receive and transmit signal that can be picked up by any node that has the ability to receive wireless signals through a wireless network interface card. o Rough cost estimate: $100 • Component Name: Switches o Rationale for using component: Give the ability to expansion of a WLAN o Rough cost estimate: $250 • Component Name: Cables o Rationale for using component: The access point is connect to wired network with cables to give wireless access o Rough cost estimate:$10 IEEE Wireless Network Type Apex Designs has identified that an 802.11n LAN will be implemented. Access Point Management Apex Designs has decided that thin access points will be used to simplify the management of the wireless LAN. These access points allow the wireless network to be managed from one central location rather than to...
Words: 503 - Pages: 3
...would vary. A wireless network can potentially be more expensive. The reason for this is because the security of data should be a main priority. Data that is sent through wireless transmissions by default is unsecure and anyone with a wireless device could connect and use the bandwidth of that access point. This is why securing a wireless access point is very important. Most wireless access points are ready with specific encryption methods. Wired Equivalent Privacy (WEP): This encryption allows 64 or 128 bit encryption and uses a word and converts it to hexadecimal. This encryption is possible to be hacked with the correct hacking tools. It is always best to use the highest encryption. There is also 2 versions Wi-Fi Protected Access WPA1 and WPA2. Some wireless routers do not include this protection, and this is one reason why this technology would be more expensive. WPA1 and WPA2 is very difficult to break, but it is still possible. The WPA security uses 256 bit encryption and uses a passphrase that is...
Words: 1166 - Pages: 5
...SOPA, PIPA, and Internet Freedom Chase Fnords University of Liberty SOPA and Internet Freedom I. Introduction A. The internet is a vast, ever-expanding microcosm of information. As a tool, it provides the ability to share information with anyone in the world within seconds. Because of this ability, data that may be under copyright has been shared in a manner that may be deemed illegal. B. In recent history, legislation has been brought forth in congress to try to prevent the sharing of data that has been used without the copyright owner’s consent. Most recently, the legislation known as Stop Online Piracy Act (SOPA) was introduced in the U.S. House of Representatives, and the Protect IP Act (PIPA) in the U.S. Senate. C. Because of acts such as SOPA and PIPA, there have been protests by large Internet companies, as well as individuals, that believe their passage will limit free speech and infringe on the public’s First Amendment rights. II. Legislation Defined A. The Stop Online Piracy Act (SOPA) is bill that was introduced as H.R.3261 in the U.S. House of Representatives in 2011. It will attempt to prevent the sharing of copyrighted and protected data over the internet from foreign sources. According to (Schatz, 2012) “The Justice Department could seek a court order requiring U.S. Internet providers to block access to foreign pirate websites. Access could be blocked either by making it impossible...
Words: 1079 - Pages: 5
...Section 11-2 1. List two advantages of wireless networking. 1. User mobility in the workplace. 2. A cost-effective networking media for use in areas that is difficult or too costly to wire. 2. What are the three areas defined for the IEEE 802.11 standard? 1. Physical Layer (PHY) The method of transmitting the data, which may be either RF or infrared (although infrared is rarely used.) 2. Medium Access Control (MAC) I. The reliability of the data service. II. Access control to the shared wireless medium. III. Protecting the privacy of the transmitted data. 3. MAC management protocols and services I. Authentication, association, data delivery, and privacy. 3. What is an ad hoc network? 1. In this network, the wireless clients (stations) communicate directly with each other. This means the clients have recognized the other stations in the WLAN and have established a wireless data link. 2. The fundamental topology of the WLAN is the Basic Service Set (BSS). This is also called the independent Basic Service Set, or ad hoc network. 4. What is the purpose of an Extended Service Set? 1. By adding multiple access points to the network, the range of mobility of a wireless client in the LAN is extended. 2. Definition - The use of multiple access points to extend user mobility Hand-off. 5. What are the four physical layer technologies being used...
Words: 1687 - Pages: 7
...Wireless Technologies Introduction As wireless technology has begun to mature, the demand for wireless products has increased as new applications for the technology are realized. One application for wireless technology at the U.S. Naval Academy is to use the wireless capability to enhance classroom instruction. Currently the Electrical Engineering and Physics Departments have wireless access points and wireless laptops/desktops available for classroom instruction. The purpose of this report is to provide the technical research necessary to aid decision makers in determining which wireless technologies the Naval Academy should invest. Background In a wireless network, computers communicate with the network through a radio path vice a cable. The device that contains the radio and connects to the wired network is called the “Access Point”. Each client that communicates with the access point must have a wireless PCMCIA card. Once both devices communicate via radio transmission, network access can begin. Each client is configured to communicate with a single access point. A client can move from one access point to another. Roaming from access point to access point (cell to cell), similar to cellular telephone technology, is possible. Technology Discussion There are three wireless technology standards on the market today: Bluetooth, 802.11b, and 802.11a. A new standard, 802.11g, was recently approved by IEEE and products using this technology are expected...
Words: 1089 - Pages: 5
...PROJECT SCOPE PROJECT OBJECTIVE The purpose of this contract is to provide Umbrella Auto insurance with Network Infrastructure for its new office at Stoughton- MA, within 2 months at cost not to exceed $75,000. The building consists in 3 offices, one customer service and one first floor. The building shall be fully outfitted with the latest Network infrastructure, highly available, fault tolerant, extremely secure and capable of providing the high quality technology required to run the latest generation of data, voice and video applications. DELIVERABLES • #2 2000-square-foot, 3 offices , 1 customer service, 1firstfloor • Offices will include the desktops, printers and cabling • Costumer service will include printer, desktop and 1 laptop with wifi connection • Fast-ethernet. • Switches • Equipment rack • Patch panel • Cables • Wall plates * NETWORK INFRASTRUCTURE DESCRIPTION * The new Umbrella Auto offices consists in 3 offices (A-B-C), 1 customer service and1 first floor. * Office A has a dedicated Telecomm wiring closet. The rack has 12RU of space dedicated for installation of network equipment. * Data Centre is located on the 1st floor and has its own data server runinng. * Vertical backbone cabling * Horizontal structured cabling and will be based on CAT-6 to perform a better quality * Approximately 15 different users are expected to occupy this office with different schedule * Wireless Network This network also...
Words: 482 - Pages: 2
...Topic: Write a paragraph about “Qualities of a good neighbor” There are many attributes to a good neighbor, but i will highly appreciate the one who is helpful , sympathetic and honest. First of all, a person with the quality of helpfulness will be put on top of my list of desirable neighbors. It is a fact that all of us have our own difficulties and nothing is more meaningful than a hand given to us in time of need. For instance, when you are busy organizing a get-together with all members in your family but the fact that you have forgotten to purchase one of the most important ingredients threatens to ruin your main dish. However, you can easily have the neighbors to travel to the market and buy it for you. That’s an accurate picture of a helpful neighbor who you should be grateful to. Furthermore, a kind neighbor from my point of view would have the quality of sympathy. Having someone to care about you and share their feelings with you is necessary when you are experiencing a tough time in life . For example, a nice neighbor to a widow who has just lost her husband in a terrible accident must help her to overcome with grief. There may be cases where there are children whose their parents got dirvoced. In such cases, a good neighbor is required to treat them equally to other kids instead of gossiping anything about them. In addition to helpfulness and sympathy, a neighbor who possess a sense of integrity would be perfect. I can endure the fact that there are some two-faced...
Words: 309 - Pages: 2
...to: navigation, search For the radio station, see WIFI (AM). Wi-Fi logoWi-Fi ( /ˈwaɪfaɪ/, also spelled Wifi or WiFi) is a popular technology that allows an electronic device to exchange data wirelessly (using radio waves) over a computer network, including high-speed Internet connections. The Wi-Fi Alliance defines Wi-Fi as any "wireless local area network (WLAN) products that are based on the Institute of Electrical and Electronics Engineers' (IEEE) 802.11 standards".[1] However, since most modern WLANs are based on these standards, the term "Wi-Fi" is used in general English as a synonym for "WLAN". A device that can use Wi-Fi (such as a personal computer, video game console, smartphone, tablet, or digital audio player) can connect to a network resource such as the Internet via a wireless network access point. Such an access point (or hotspot) has a range of about 20 meters (65 feet) indoors and a greater range outdoors. Hotspot coverage can comprise an area as small as a single room with walls that block radio waves or as large as many square miles — this is achieved by using multiple overlapping access points. "Wi-Fi" is a trademark of the Wi-Fi Alliance and the brand name for products using the IEEE 802.11 family of standards. Only Wi-Fi products that complete Wi-Fi Alliance interoperability certification testing successfully may use the "Wi-Fi CERTIFIED" designation and trademark. Wi-Fi has had a checkered security history. Its earliest encryption system,...
Words: 2476 - Pages: 10
...Wi-Fi ( /ˈwaɪfaɪ/, also spelled Wifi or WiFi) is a popular technology that allows an electronic device to exchange data wirelessly (using radio waves) over a computer network, including high-speed Internet connections. The Wi-Fi Alliance defines Wi-Fi as any "wireless local area network (WLAN) products that are based on the Institute of Electrical and Electronics Engineers' (IEEE) 802.11 standards".[1] However, since most modern WLANs are based on these standards, the term "Wi-Fi" is used in general English as a synonym for "WLAN". A device that can use Wi-Fi (such as a personal computer, video game console, smartphone, tablet, or digital audio player) can connect to a network resource such as the Internet via a wireless network access point. Such an access point (or hotspot) has a range of about 20 meters (65 feet) indoors and a greater range outdoors. Hotspot coverage can comprise an area as small as a single room with walls that block radio waves or as large as many square miles — this is achieved by using multiple overlapping access points. "Wi-Fi" is a trademark of the Wi-Fi Alliance and the brand name for products using the IEEE 802.11 family of standards. Only Wi-Fi products that complete Wi-Fi Alliance interoperability certification testing successfully may use the "Wi-Fi CERTIFIED" designation and trademark. Wi-Fi has had a checkered security history. Its earliest encryption system, WEP, proved easy to break. Much higher quality protocols, WPA and WPA2, were...
Words: 325 - Pages: 2
...THE LIABILITY OF INTERNET SERVICE PROVIDERS FOR UNLAWFUL CONTENT POSTED BY THIRD PARTIES N.D. O’BRIEN 2010 THE LIABILITY OF INTERNET SERVICE PROVIDERS FOR UNLAWFUL CONTENT POSTED BY THIRD PARTIES By N.D. O’BRIEN Submitted in fulfilment of the requirements for the degree of MAGISTER LEGUM in the Faculty of Law at the Nelson Mandela Metropolitan University January 2010 Supervisor: Prof F. Marx PREFACE I would like to extend my thanks to the following people: To my parents and Emma Taggart for their help, encouragement, sacrifice and support; To my supervisor, Prof Marx, for his assistance and guidance; To Dawn Prinsloo, at the NMMU Library, for providing me with her time and guidance; To Ms. Fourie, the Law Faculty Officer, for her always prompt and friendly assistance; To Mr. Ant Brooks and the Internet Service Provider Association, for providing me with a variety of interesting information and insights. Without their invaluable assistance I would not have been able to have completed this work. i SUMMARY Internet Service Providers (ISP’s) are crucial to the operation and development of the Internet. However, through the performance of their basic functions, they faced the great risk of civil and criminal liability for unlawful content posted by third parties. As this risk threatened the potential of the Internet, various jurisdictions opted to promulgate legislation that granted ISP’s safe harbours from liability. The South African (RSA)...
Words: 77880 - Pages: 312
...The World Wide Web has evolved a great deal since its induction in the late 1980’s. The World Wide Web was accessed over the phone lines through an internet service provider. Today there are several different internet service providers that offer a variety of connection speeds. The two most commonly used networks are client servers and peer to peer (P2P) networks. There are many ways that computers connect and share information with each other. Computers today connect and share information by connecting to a network. There are several types of networks that computers can connect to, but the two most popular are local area networks (LAN) and wireless local area networks (WLAN). In a computer network, anything that a computer can communicate with can be connected to the network. Such as printers, fax machines, routers, and other computers. The internet was created in the mid 1960’s by the department of defense. At first this new invention called the internet was not available to the public. Like with every other new technology, the government officials were the only ones with access to the internet. In 1974 the design of the Transmission Control Program (TCP) made data and information sharing easier and more efficient. In 1982 the internet technology protocols were developed. These protocols worked together with the TCP to regulate and monitor the information sent/received over network. The first definition of the internet is described as computers connected to a set of networks...
Words: 1649 - Pages: 7
...I. Introduction: Wireless Local Area Network (WLAN) is the linking of two or more computers without using wires. WLAN makes use of the spread spectrum technology based on radio waves to enable communication between two devices in a limited area. Wireless local area networks (WLANs) based on the Wi-Fi (wireless fidelity) standards are one of today's fastest growing technologies in businesses, schools, and homes, for good reasons. They provide mobile access to the Internet and to enterprise networks so users can remain connected away from their desks. These networks can be up and running quickly when there is no available wired Ethernet infrastructure. They are reported to reduce setting up costs by 15%. But, with these benefits come the security concerns. WLANs have very little security. An attacker can listen to you, take control of your laptops/desktops and forge him to be you. He can cancel your orders, make changes into your databases, or empty your credit cards. a. The 802.11 Wireless LAN Standard: In 1997, the IEEE ratified the 802.11 Wireless LAN standards, establishing a global standard for implementing and deploying Wireless LANS. The throughput for 802.11 is 2Mbps, which was well below the IEEE 802.3 Ethernet counterpart Late in 1999, the IEEE ratified the 802.11b standard extension, which raised the throughput to 11 Mbps, making this extension more comparable to the wired equivalent. The 802.11b also supports...
Words: 2926 - Pages: 12