...following exercises and questions from Routers and Routing Basics: CCNA 3 Labs and Study Guide: Vocabulary Exercise: Matching on page 3 VLSM Subnetting a Subnet Exercises on pages 9-11 VLSM Addressing Design Scenarios 1-6 on pages 15-20 Summary Route Exercises on pages 21-24 Concept Questions on pages 25-27 VLSM Case Study on page 27 Internet Research on page 29 (Use the ITT Tech Virtual Library.) • Complete Chapter 9 Review Questions 2-7, 10, 14, 20-22 on pages 258-259 of Introduction to Telecommunications. Submit your written answers to your instructor at the beginning of Unit 2. . Assignment 1.2: Virtual Labs • Complete Virtual Labs 6, 7, and 8 from the CCNA 640-802 CCNA Simulator, which you can find by clicking through these paths: ICND1 Troubleshooting Scenarios Lab 6: IP Addressing and Routing. ICND1 Troubleshooting Scenarios ICND1 Part 4: Troubleshooting Labs Lab 7: IP Routing I ICND 2 Troubleshooting Scenarios Lab 13: IP Routing II Submit your written answers to your instructor at the beginning of Unit 2. ©ITT Educational Services, Inc: Date: 03/13/09 Network Technology and Service Integration Unit 2 Homework The following homework is designed to cover the course objectives for this unit. Assignment 2.1: Textbook/Workbook Assignments • Complete the following exercises and questions from Routers and Routing Basics: CCNA 3 Labs and Study Guide: Vocabulary Exercise: Matching on page 70 Vocabulary Exercise: Completion on page 71 Concept Questions on page 72 Build the SPF...
Words: 2825 - Pages: 12
...CSEC630 Week 3 **When working this and the remaining portion of the course, it is best to do everything and look again and do everything before submission.) Instructions and Grading Criteria for Lab Assignment #1 Assignment instructions for the written report appear with the grading criteria below. The questions that must be addressed in the report and instructions for the lab portion of the assignment are attached to this assignment. Note: there are two parts to this lab, each part contains 4 questions for you to answer. The CSEC630 Lab 1 PDF attached document includes an introduction section to CrypTool. Lab part 1 starts on page 11 and Lab part 2 starts on page 17. Please submit a Word document that contains your answers to all 8 questions to Lab1 Assignment for Week 3. Objective: The objective of the lab session is for the student to explore cryptography in action by using the educational CrypTool. Competencies: Technology fluency, critical thinking Instructions: For this lab assignment, each student completes the lab exercise using the CrypTool software and prepares a report addressing the questions included in the lab assignment instructions attached to this topic. Submit your answers in the Assignment folder. This assignment is due at the end of the session week 3. Note: You are not required to turn this assignment to Turnitin.com. Grading Criteria This assignment is worth 10 percent of your total grade. • Your score for this assignment...
Words: 400 - Pages: 2
...CSEC630 Week 3 Instructions and Grading Criteria for Lab Assignment #1 Assignment instructions for the written report appear with the grading criteria below. The questions that must be addressed in the report and instructions for the lab portion of the assignment are attached to this assignment. Note: there are two parts to this lab, each part contains 4 questions for you to answer. The CSEC630 Lab 1 PDF attached document includes an introduction section to CrypTool. Lab part 1 starts on page 11 and Lab part 2 starts on page 17. Please submit a Word document that contains your answers to all 8 questions to Lab1 Assignment for Week 3. Objective: The objective of the lab session is for the student to explore cryptography in action by using the educational CrypTool. Competencies: Technology fluency, critical thinking Instructions: For this lab assignment, each student completes the lab exercise using the CrypTool software and prepares a report addressing the questions included in the lab assignment instructions attached to this topic. Submit your answers in the Assignment folder. This assignment is due at the end of the session week 3. Note: You are not required to turn this assignment to Turnitin.com. Grading Criteria This assignment is worth 10 percent of your total grade. • Your score for this assignment can range from 0-100 percent. There are eight questions. • full credit- The answer is thoroughly developed and clearly stated. It represents...
Words: 376 - Pages: 2
...ITT TECHNICAL INSTITUTE NT1210 Introduction to Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes Identify the major needs and major stakeholders for computer networks and network applications. Describe how digital devices store data. Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): Respond to the multiple-choice questions. Complete the List the Words inside Acronyms table. Required Resources Odom textbook Computer with word processing software Internet access Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they are...
Words: 16182 - Pages: 65
...ITT TECHNICAL INSTITUTE NT1210 Introduction to Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Describe how digital devices store data. * Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): * Respond to the multiple-choice questions. * Complete the List the Words inside Acronyms table. Required Resources * Odom textbook * Computer with word processing software * Internet access * Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the...
Words: 16043 - Pages: 65
...ITT TECHNICAL INSTITUTE NT1210 Introduction to Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Describe how digital devices store data. * Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): * Respond to the multiple-choice questions. * Complete the List the Words inside Acronyms table. Required Resources * Odom textbook * Computer with word processing software * Internet access * Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the...
Words: 16043 - Pages: 65
...------------------------------------------------- Graded Assignment Requirements Assignment Requirements documents provided below must be printed and distributed to students as the guidance for completing the assignments and submitting them for grading. Instructors must remind students to retain all handouts and assignment documents issued in every unit, as well as student-prepared documentation and graded deliverables. Some or all these documents will be used repeatedly across different units. Unit 1. Lab 1. Preparing a Virtual Workstation Image Windows 7 Virtual Machine “Keyless” Installation and Re-arm Process Purpose: This section describes the reason for and the procedure to use the “keyless” installation for Windows 7 Professional applicable to our lab environment for IT109/NT1230, and to use the “Re-arm” procedure to extend the trial period to meet our curriculum needs. Background: In installing Windows 7 Professional into a virtual machine in the VMware Player for the labs in our lab environment, if the Product Key for Windows 7 Professional is applied and activated during or at the end of the installation, the installed virtual machine will be authorized to launch only from the physical computer from which it was installed, as Microsoft registers the product key to associate with the hardware identity of the physical computer in their antipiracy database during the activation process. Subsequently, if the virtual machine is launched from a different computer, Microsoft...
Words: 5558 - Pages: 23
...Chapter 5 Case Project Assignment for Chapter 5 In this assignment, use your problem-solving skills and information presented in this chapter to answer the following real-life scenario. Make sure to address all of the questions posed in the following Case Project. You have been asked to design the entire cabling system for a medical instrument manufacturer’s new warehouse. The company already has three buildings, each 1/2 a mile apart, and the warehouse, 2 miles away, will be its fourth building. Currently, the buildings run on separate networks, but the company wants to be able to exchange data among them. For example, the Quality Control Department in Building 1 would like to be able to access servers in the Research Department in Building 2. In addition, the Sales Department in Building 3 wants to conduct video training for its representatives in the field via the Internet. What kind of transmission media would you recommend for inside each different building and department of the medical instrument company and why? What type of media would you recommend using to connect the buildings together and why? Finally, what kind of media should the company use for connecting the corporate WAN to its ISP and ultimately, the Internet? NOTE: The above assignment needs to be turned in as a single Microsoft Word file containing only your answer to the Case Project for Chapter 5. This assignment is turned in using the Assignment Submission for this project found on the Moodle page for...
Words: 3057 - Pages: 13
...hours: 4.5 Contact /Instructional hours: 34 Theory, 22 Lab Prerequisite: NT1210 Introduction to Networking or equivalent Course Revision Table Change Date Updated Section Change Description Change Rationale Implementation Quarter 07/18/2011 All New Curriculum New Curriculum September 2011 02/19/2013 All Updated labs across the course to map the 2nd edition of lab manual Immediately 02/27/2013 Midterm and Final Examination Answer Keys Added examination keys Immediately 03/18/2013 Answer Keys for Midterm and Final Updated some answers to address the accuracy March 2013 04/19/2013 Assignment labels on Pages 43, 52, 61, 78, 87, 97, 106 and 132. Added labels to identify additional assignments in affected units Clarification of additional assignments March 2013 Table of Contents COURSE OVERVIEW 5 Catalog Description 5 Goals and Expectations 5 Learning Objectives and Outcomes 6 Career Impact 6 INSTRUCTIONAL RESOURCES 7 Required Resources 7 Additional Resources 7 COURSE MANAGEMENT 9 Technical Requirements 9 Test Administration and Processing 9 Replacement of Learning Assignments 10 Communication and Student Support 10 Academic Integrity 10 GRADING 11 COURSE DELIVERY 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 UNIT PLANS 15 Unit 1: The TCP/IP Model, LANs, WANs, and IP Networks 15 Unit 2: TCP/IP Network, Transport, and Application Layers 24 Unit 3: IP Subnetting and Basic Router Configuration 34 Unit 4: IP...
Words: 22068 - Pages: 89
...BIO 182 LAB SIGN OFF PAGE — LESSON 13 Name _______________________________ Please staple all of your lab pages for this Lesson together with this page as the top. You will use this page to get your Labs for Lesson 13 signed off by the Biology Learning Center staff. You need to have all of the following steps initialed by a staff member before you can receive your 15 labs points for Lesson 13 and be allowed to take Exam 7. After you have obtained all of your sign offs for this Lesson, be sure that a BLC staff member indicates on your Lab Card that you have completed all the Labs. Also, keep this sign off page, along with your completed lab worksheets, as proof of your lab completion If your Lab Card indicates that you have not completed the required Labs for this Lesson and you believe that you have, it is up to you to provide proof that you have indeed completed the Labs. Keep this page! __________ Lesson 13, Step 3A: Ecobeaker: Isle Royale (in BLC) Lesson 13, Step 3B: Ecobeaker: Isle Royale (in BLC) Lesson 13, Step 3C: Ecobeaker: Isle Royale (in BLC) Lesson 13, Step 3D: Ecobeaker: Isle Royale (in BLC) Lesson 13, Step 4A: Ecobeaker: Intermediate Disturbance Hypothesis (in BLC) Lesson 13, Step 4B: Ecobeaker: Intermediate Disturbance Hypothesis (in BLC) Lesson 13, Step 4C: Ecobeaker: Intermediate Disturbance Hypothesis (in BLC) __________ __________ __________ __________ __________ __________ *BLC Staff: After the student receives his/her last initial on this...
Words: 3068 - Pages: 13
...NETW320 -- Converged Networks with Lab Lab #4 Title: IPv4 TOS and Router Queuing – Cont. Procedure Start OPNET IT Guru Open the scenario 1. Select File/Open. 2. Select Computer or My Computer (depending on your O/S). You may also need to allow Citrix access to your computer. 3. On your F: drive, open the op_models and then open the NETW320 folder. 4. Open the Lab2_RouterTOS.project 5. Click on Lab2_RouterTOS.prj 6. Click Open. The project should open. 7. Choose Scenarios > Switch To Scenario > FIFO Configure the Simulation Run 1. We are now ready to configure the Simulation Run. Select the Configuration/Run Discrete Event Simulation tab (the running man) from the tool bar. The following screen will open. 2. Set the Duration to 4 (if it is not set) and change hour(s) to minute(s). 3. Click Apply and Cancel. 4. Go to File > Save, to save your configuration. 5. Before we duplicate the scenarios, now would be a good time to run the first simulation to ensure we have all the configurations made correctly. Once we copy them over to the PQ and WFQ scenarios, if something is configured incorrectly, that mistake will be transferred over. 6. Select the running man icon again to bring up the Configuration/Run Discrete Event Simulation panel again and click Run. The Simulation Execution window will open and the sim will start. 7. When the Sim completes and the Close window lights, click it to end. 8. We are now ready to look at the results. From the tool...
Words: 2594 - Pages: 11
...BellNetworking9/21/14 Category | Points | Description | Section 1 A Simple Network Using RIP Protocol - 15 Points Task 2: Step 3 Related Explanation or Response Task 2: Step 4 Related Explanation or Response Task 4: Step 1 Related Explanation or Response Task 5: Step 1 Related Explanation or Response Summary Paragraph | 1 1 1 1 1 1 1 1 7 | Paste the requested screenshot Provide the requested answer Paste the requested screenshot Provide the requested answer Paste the requested screenshot Provide the requested answer Paste the requested screenshot Provide the requested answer In your own words, summarize what you have learned about configuring RIP routing. | Section 2 Floating Static Routes for Network Redundancy - 15 Points Task 4: Step 1 Related Explanation or Response Task 4: Step 2 Related Explanation or Response Task 4: Step 3 Related Explanation or Response Task 5: Step 1 Related Explanation or Response Summary Paragraph | 1 1 1 1 1 1 1 1 7 | Paste the requested screenshot Provide the requested answer Paste the requested screenshot Provide the requested answer Paste the requested screenshot Provide the requested answer Paste the requested screenshot Provide the requested answer In your own words, summarize what you have learned about configuring floating routes. | Total | 30 | | Name: Date:Professor:...
Words: 1050 - Pages: 5
...Assignment Requirements Answer: * Short Answer 1, 2, 3, and 4 on page 71 * Algorithm Workbench Review Questions 1 and 2 on page 71 * Programming Exercises Questions 1 and 4, starting on page 72 Required Resources Textbook Submission Requirements Submit your written answers to your instructor at the beginning of Unit 3. Unit 2 Research Assignment 1: Researching Variable Naming Rules Learning Objectives and Outcomes Determine program input, processing, and output stages. Create the necessary flowcharts to describe a program’s structure. Use pseudocode to define a program’s structure. Formulate solution algorithms for calculations by properly following the order of operations. Assignment Requirements Use the Internet and the ITT Tech Virtual Library to research the following questions: What are the variable naming rules of Visual Basic, Python, and Java? List three similarities and differences in between the three programming languages. Required Resources Textbook ITT Tech Virtual Library: http://library.itt-tech.edu Submission Requirements Submit your written answers to your instructor at the beginning of Unit 3. Labs Unit 2 Lab 2.1: Pseudocode Learning Objectives and Outcomes * Use pseudocode to define a program’s structure. * Formulate solution algorithms for calculations by properly following the order of operations. Required Setup and Tools * Standard lab setup * Lab Manual * Lab Demo Media and Startup...
Words: 450 - Pages: 2
...Week 3 Laboratory Week 3 Lab Part 1: Automate Digital Evidence Discovery Using Paraben’s P2 Commander Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: * Open an existing case file using P2 Commander * Analyze the data in the image and the files saved in the case * Sort and identify evidence file types in a case using Paraben's P2 Commander forensic tool * Use P2 Commander to identify information for potential evidence contained in chat logs such as Skype chat * Analyze the contents of user profiles and data using the P2 Commander browser Week 3 Lab Part 1 - Assessment Worksheet Overview View the Demo Lab available in the Practice section of Learning Space Unit 5 and then answer the questions below. The video will demonstrate the use of Paraben's P2 Commander and outline the different forensics capabilities of the tool. Lab Assessment Questions & Answers 1. When talking about Information Security, what does the 'CIA' stands for? CIA in information security stands for confidentiality, integrity and availability. 2. When would it be a good practice to classify data? It would be a good practice to classify data when you need to extract files from a hard drive or system for investigating in order to accurately organize the findings. 3. What is Security classification? Security classification is the security level assigned to a government document, file...
Words: 635 - Pages: 3
...Tools Lab 1.1 Record Your Work and Make Deliverables Review Questions 1. What are the eight categories in the Category view in Control Panel? Answer: System and Security Network and Internet Hardware and Sound Programs User Accounts and Family Safety Appearance and Personalization Clock, Language and Region Ease of Access 2. What are the four file types that can be used to save a snip using the Windows Snipping Tool? Answer: Portable Network Graphic file (PNG) (*.PNG) GIF file (*.GIF) JPEG file (*.JPG) Single file HTML (MHT) (*.MHT) 3. The Windows Experience Index rates a computer’s performance on a scale of 1.0 to 7.9. Based on the rating of your computer, what can you conclude about its performance? Answer: The Windows Experience Index rates certain components giving them a sub score. The component with the lowest score is the Windows Score Index Score. In this case the lowest score was for the graphics components, which means that it has a basic graphics chip, instead of high end graphics chip. 4. Search the web for information about the price of Windows 7. How much would it cost to buy your current edition of the Windows 7 operating system as an upgrade from Windows Vista? Answer: About $76.00 for an upgrade Lab 1.2 Gather And Record System Information Review Questions 1. List two categories available in Control Panel that were not mentioned in the lab: Answer: Ease of...
Words: 862 - Pages: 4