...Common Lab Tasks In each lab, you will follow a series of step-by-step instructions designed to help you explore the environment and gather the information you need to successfully complete the deliverables. In each lab, you will perform identical steps, such as opening the virtual lab, logging in to another server, taking screen captures, and transferring files to your local computer. To avoid repeating steps in the lab itself, those common steps have been collected in this file. You may refer to this document at any time during your lab session. Though you may not be required to perform each of these steps in every lab, the Common Lab Steps are listed in the order that you are most likely to encounter them. As you review this list, you should pay attention to the logic and flow of the lab. This will help you to perform the lab procedures more quickly and more accurately. Note: The other virtual machines used in this environment may require as long as 10 minutes to complete their initialization processes (wake-up sequences) and load all required software. If you receive a connection error message, wait at least one minute before clicking on the Remote Desktop Connection icon to retry the connection. Virtual Lab Environment You will use the virtual lab environment to complete the learning activities in this lab manual. Note: The virtual lab environment, also called the Virtual Security Cloud Lab (VSCL) requires Java, Adobe Flash, and a compatible Web browser. The list...
Words: 2387 - Pages: 10
...Common Lab Tasks In each lab, you will follow a series of step-by-step instructions designed to help you explore the environment and gather the information you need to successfully complete the deliverables. In each lab, you will perform identical steps, such as opening the virtual lab, logging in to another server, taking screen captures, and transferring files to your local computer. To avoid repeating steps in the lab itself, those common steps have been collected in this file. You may refer to this document at any time during your lab session. Though you may not be required to perform each of these steps in every lab, the Common Lab Steps are listed in the order that you are most likely to encounter them. As you review this list, you should pay attention to the logic and flow of the lab. This will help you to perform the lab procedures more quickly and more accurately. Note: The other virtual machines used in this environment may require as long as 10 minutes to complete their initialization processes (wake-up sequences) and load all required software. If you receive a connection error message, wait at least one minute before clicking on the Remote Desktop Connection icon to retry the connection. Virtual Lab Environment You will use the virtual lab environment to complete the learning activities in this lab manual. Note: The virtual lab environment, also called the Virtual Security Cloud Lab (VSCL) requires Java, Adobe Flash, and a compatible Web browser. The list...
Words: 2388 - Pages: 10
...PROJECT INTRO TO NETWORKING Computer lab design Item | Qty | Description | Price | Item code | Total | HP All-in-One PC | 32 | 18-5110 (G4B05AA#ABA) AMD Dual-Core Processor E1-2500 (1.40GHz) 4GB DDR3 500GB HDD 18.5" Windows 8.1 | $309.99 | Item#: N82E16883280514 | $9,919.68 | Tri-Band Gigabit Wireless Router | 1 | NETGEAR R8000-100NAS Nighthawk X6 AC3200 | $299.99 | Item#: N82E16833122611 | $299.99 | Laser Printer | 2 | Samsung SL-C1860FW/XAA Up to 19 ppm Color Wireless 802.11b/g/n | $224.99 | Item#: N82E16828112551 | $250.00 | 48-Port Fast Ethernet Smart Switch | 1 | NETGEAR ProSAFE FS750T2NA w/ 2 Gigabit Ports 10/100 Mbps | $214.50 | Item#: N82E16833122082 | $214.50 | Pivot-Plug Surge Protector | 3 | BELKIN BP112230-08 8 Feet 12 Outlets 4320 Joules | $33.99 | Item#: N82E16812107131 | $101.97 | Printer/Fax Stand | 1 | Safco 5206BL Under desk, 1-Shelf, 19w x 16d x 13-1/2h, Black | $56.99 | Item#: N82E16848045141 | $56.99 | Wireless Keyboard and Mouse Combo - Black | 32 | Logitech MK520 2.4GHz | $39.95 | Item #: N82E16823126192 | $1278.40 | Black Cat 6 Network Cable | 8 | Link Depot C6M-25-BKB 25 FT | $7.99 | Item #: N82E16812189032 | $63.92 | | | | | Total | 12,185.45 | Labor charge | $22.00 | 5 Technical assemblers | 20 hrs. | | $2,200 | | | | | Total | 14,385.45 | taxes | $.07 | | | | $.07 | | | | | Total | 15,392.432 | Justification for product necessity. In order to turn this classroom into a computer lab we will need: ...
Words: 538 - Pages: 3
...Intro to PC TB143 Lab 2 Assignment Task 1: Procedure 1. Convert the decimal number 125 into binary. Use the division by two method. 2. Convert your binary result back into decimal to prove your answer is correct. #1. 125 / 2 = 62 R 1 = 1 62 / 2 = 31 = 0 31 / 2 = 15 R 1 = 1 15 / 2 = 7 R 1 = 1 7 / 2 = 3 R 1 = 1 3 / 2 = 1 R 1 =1 1 / 2 = .5 = 1 #2. 64/1 32/1 16/1 8/1 4/1 2/0 1/1 64+32+16+8+4+1=125 Task 2: Procedure 1. Convert the binary 10101101 into decimal. Use the method of adding weights. 128/1 64/0 32/1 16/0 8/1 4/1 2/0 1/1 128+32+8+4+1=173 Task 3: Procedure 1. Convert the decimal number 210 into hexadecimal. Use the division by 16 method. 2. Convert your hexadecimal result back into decimal to prove your answer is correct. #1. 210 / 16 = 13 R 2 = 2 13 / 16 = 13 = D 210 = D2 #2. 13 x 16 + 2 = 210 Task 4: Procedure 1. Convert the hexidecimal E7 into decimal. 2. Convert the hexidecimal E7 into binary, and then convert the binary result into decimal to prove your answer is correct. #1. 14 x 16 + 7 = 231 #2. 231 / 2 = 115 R 1 = 1 115 / 2 = 57 R 1 = 1 57 / 2 = 28 R 1 = 1 28 / 2 = 14 = 0 14 / 2 = 7 = 0 7 / 2 = 3 R 1 3 / 2 = 1 R 1 1 / 2 = .5 = 1 11100111 128/1 64/1 32/1 16/0 8/0 4/1 2/1 1/1...
Words: 289 - Pages: 2
...Hands-On Steps Note: This lab contains detailed lab procedures which you should follow as written. Frequently performed tasks are explained in the Common Lab Tasks document on the vWorkstation desktop. You should review these tasks before starting the lab. 1. From the vWorkstation desktop, open the Common Lab Tasks file. If desired, use the File Transfer button to transfer the file to your local computer and print a copy for your reference. Figure 1 "Student Landing" workstation 2. On your local computer, create the lab deliverable files. 3. Review the Lab Assessment Worksheet at the end of this lab. You will find answers to these questions as you proceed through the lab steps. Part 1: Capture Network Traffic using TCPdump utility Note: In the next steps, you will use TCPdump, a command line utility, to capture network traffic on the TargetLinux01 virtual server. You will generate that traffic by exploiting a cross-site scripting (XSS) vulnerability in the Damn Vulnerable Web Application (DVWA) tool. In the lab environment, you will be capturing traffic on one interface. In a real-world situation, it is likely the machine would be straddling both an internal network and an external network. In that case, you would want to want to monitor both sides of the interface. Monitoring outside network traffic allows information systems security practitioners to see who and what is attempting to infiltrate your IP network. Monitoring internal traffic allows network analysts to see exactly...
Words: 3168 - Pages: 13
...TROY UNIVERSITY eTROY IS2241 Section XTIC Computer Concepts and Applications COURSE SYLLABUS Term 1, 2014 August 11 – October 12 INSTRUCTOR INFORMATION: onn Dr. Joe Teng Troy University Chair, Information Systems and Quantitative Methods Office Location/Hours: Mailing Address: via email; within 24 238B Bibb Graves Hall Troy University Troy, Alabama 36082 Office: 334-670-3195 office jteng@troy.edu Dr. Joe Teng Troy University Chair, Information Systems and Quantitative Methods 334-670-3195 jteng@troy.edu Telephone: E-Mail: Troy Department Chair: The syllabus for this class includes the TROY Department Chair contact information for Dr. Teng. This is provided in the event you cannot resolve a situation with me, your instructor. PLEASE do not contact (e-mail or phone) Dr. Teng with a question, problem, or concern unless you have first contacted me and you have not received a response from me within 24-48 hours, or if you do not agree with my response. Thank you for your help in this matter. Students: Please place IS 2241 XTIC in the subject line of any emails sent to me. NOTE: For a course syllabus posted prior to the beginning of the term, the instructor reserves the right to make minor changes prior to or during the term. The instructor will notify students, via email or Blackboard announcement, when changes are made in the requirements and/or grading of the course. INSTRUCTOR EDUCATION: Ph.D., Management Information Systems. The University of Memphis, Memphis, Tennessee...
Words: 5096 - Pages: 21
...Android is an operating system for mobile devices. It is mostly used for cell phones, like Google's own Galaxy Nexus, as well as by other phone manufacturers like HTC and Samsung. It has also been used for tablets such as the Motorola Xoom and Amazon Kindle Fire. Android's kernel is based on Linux.[7] Google says that over 1.3 million Android cell phones are sold every day,[8] making Android the most popular mobile operating system, and also the most popular operating system in general. Contents 1 Android programs 2 Android version numbers and names Android programs Programs for Android, also called "apps", come from the Google Play store. The android programs have an extention of .apk. Android programs are built in Python, C, C++, or Java programming languages but the UI is always made using Java and XML. There are over 1,600,000 apps available for Android.[9]Android version numbers and names[change | change source] Each version of Android has both a number and a name based on a dessert. The version numbers and names are: Beta versions: Astro and Bender 1.5: Cupcake 1.6: Donut 2.0 and 2.1: Eclair 2.2: Froyo (FROzen YOgurt) 2.3: Gingerbread 3.x: Honeycomb (a tablet-only version) 4.0: Ice Cream Sandwich 4.1, 4.2 and 4.3: Jelly Bean 4.4: KitKat 5.0 and 5.1: Lollipop 6.0 and 6.0.1: Marshmallow Android is a name that was introduced by Google Inc. It is a very popular technology in mobile phones these days, as it is an operating system which is capable of running...
Words: 1129 - Pages: 5
...ITT Technical Institute NT1210 Introduction to Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110...
Words: 4400 - Pages: 18
...ITT Technical Institute NT1210 Introduction to Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110...
Words: 4400 - Pages: 18
...| Carmelia Bell | Portfolio | | Bachelors of Science in AccountingDeVry UniversityJune 2013 | | | | | Table of Contents * Personal Mission Statement * Elevator Speech * Education * DeVry Plan of Study * DeVry Course Description and Academic History * Resume * Reference List * Career Path Section Mission Statement My mission is to continue to drive for excellence throughout my life. I will ensure that I graduate from school with my Bachelors of Science in Accounting degree from DeVry University. My mission is to also enroll in Keller’s Graduate school to get my master in Business and Management. My goal is to work for a successful company in a management position to demonstrate my skills and help the company to drive for outstanding results. I am committed to becoming a successful manager in a retail store or corporate level. I am willing to go above and beyond to reach that goal. I am a driven, compassionate, and hardworking individual. My goal is to one day get marry and have a family. I will be loving and proactive in building and maintaining my relationships with my employees, family and friends, so that I may be considered a successful wife, mother, daughter, sister, aunt, friend, co-worker, and manager. Elevated Speech Hi my name is Carmelia Bell. I am a senior at DeVry. I’m graduating June 30 of this year. I have 4 years of an assistant manager experience. I’m currently working as a team lead at...
Words: 3474 - Pages: 14
...1 Table of Contents Executive Summary ............................................................................................... 3 Intro ...................................................................................................................... 4 Issues & Outlook Profile ......................................................................................... 6 Mission and Strategy ........................................................................................................................................ 6 Key Issues .............................................................................................................. 8 Slow to Innovate ................................................................................................................................................. 8 PC Market in Decline ........................................................................................................................................ 8 Mobile Device’s Poor Performance ............................................................................................................ 9 The External Environment .................................................................................... 10 PESTEL Analysis ............................................................................
Words: 8505 - Pages: 35
...Lab 1: Introduction to MATLAB Warm-up MATLAB is a high-level programming language that has been used extensively to solve complex engineering problems. The language itself bears some similarities with ANSI C and FORTRAN. MATLAB works with three types of windows on your computer screen. These are the Command window, the Figure window and the Editor window. The Figure window only pops up whenever you plot something. The Editor window is used for writing and editing MATLAB programs (called M-files) and can be invoked in Windows from the pull-down menu after selecting File | New | M-file. In UNIX, the Editor window pops up when you type in the command window: edit filename (‘filename’ is the name of the file you want to create). The command window is the main window in which you communicate with the MATLAB interpreter. The MATLAB interpreter displays a command >> indicating that it is ready to accept commands from you. • View the MATLAB introduction by typing >> intro at the MATLAB prompt. This short introduction will demonstrate some basic MATLAB commands. • Explore MATLAB’s help capability by trying the following: >> help >> help plot >> help ops >> help arith • Type demo and explore some of the demos of MATLAB commands. • You can use the command window as a calculator, or you can use it to call other MATLAB programs (M-files). Say you want to evaluate the expression [pic], where a=1.2, b=2.3, c=4.5 and d=4....
Words: 2151 - Pages: 9
...Student Particulars |Name | |Mavitrani a/p Madana Sriramulu | |IC Number | |920304085392 | |Student Number | |SCSJ-0008579 | |Course | |Diploma In Accountancy | |Subject Title | |Information Technology | |Subject Code | |3IS0212N | |Mode of Study | |Full-Time ( Part-Time ( Independent Learning ( E-Learning | |Name of Lecturer | |Mrs.Renne | |Due Date | |4th November 2011 | |College | |SEGI College Subang Jaya | |Declaration by student: | |I, Mavitrani, hereby declare that the attached assignment is my own work and understand that if I am suspected of plagiarism or ...
Words: 2344 - Pages: 10
... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Intro: LED Cube 8x8x8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 1: Skills required . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 2: Component list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . File Downloads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 3: Ordering components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 4: What is a LED cube . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 5: How does a LED cube work . . . . . . . . . . . . . . . . . . . . ....
Words: 21520 - Pages: 87
...UNIT 1 A Introduction to computers Unit 1 WUC 117/03 Introduction to Computing and Internet Introduction to Computers B WAWASAN OPEN UNIVERSITY WUC 117/03 Introduction to Computing and Internet COURSE TEAM Course Team Coordinator: Mr. Kevin Tan Pooi Soo Content Writer: Ms. Parasathy Daivasigamani Instructional Designer: Ms. Jeanne Chow Academic Members: Mr. Chandarasageran a/l Natarajan and Mr. Ishan Sudeera Abeywardena COURSE COORDINATOR Mr. Kevin Tan Pooi Soo EXTERNAL COURSE ASSESSOR Associate Professor Norhaziah Md Salleh PRODUCTION Editor: Mr. Terence Too Yang-Yau In-house Editor: Ms. Jeanne Chow Graphic Designers: Ms. Patsy Yap and Ms. Leong Yin Ling Wawasan Open University is Malaysia’s first private not-for-profit tertiary institution dedicated to adult learners. It is funded by the Wawasan Education Foundation, a tax-exempt entity established by the Malaysian People’s Movement Party (Gerakan) and supported by the Yeap Chor Ee Charitable and Endowment Trusts, other charities, corporations and members of the public. The course material development of the university is funded by Yeap Chor Ee Charitable and Endowment Trusts. © 2008 Wawasan Open University First revision S1 2011 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior written permission from WOU. Wawasan Open...
Words: 26839 - Pages: 108