...15OCT14 NT1110-1 Task 1 The LGA 1156 is known as Socket H2, the LGA 1155 CPU socket is used with Intel's “2nd Generation Core* i7/i5/i3 series” of desktop microprocessors codenamed Sandy Bridge. This 1155-circuit socket is a replacement of its predecessor – the LGA 1156 Socket (or Socket H1) – which mates with the Nehalem* processor. Its purpose is to connect the motherboard to the, without this connection the computer would not work. The Intel H55 Express Chipset. The GIGABYTE H55N-USB3 motherboard was built to support Clarkdale (Core i3/i5) processors as well as Lynnfield (Core i5/i7) CPUs. New to the H55 platform is a Direct Media Interface (DMI) that connects between the processor and chipset. The purpose of the H55 is to provide the interface for the PCI Express lanes on the motherboard The Gigabyte GA-H55M-UD2H motherboards interesting information is its Unique On/Off Charge delivers the best recharging capability to iPad, iPhone and iPod Touch. It supports six devices without the need for drivers to be installed before being fully functional. The high performance DAC has 108 dB signal to noise ratio playback quality and it has an innovative Smart 6 technology for smarter PC management. Task 2- The AMD 700 chipset series (also called as AMD 7-Series Chipsets) is a set of chipsets designed by ATI for AMD Phenom processors its purpose on the motherboard is to link the computer systems hardware to the processor. The AMD SB710 Southbridge Chipset is for use with...
Words: 298 - Pages: 2
...Jon Irfan NT1210 Lab_8 8.1.1: The network ID is 110. And the network host is 10.10.1. Binary value of the network ID is 192. And the binary value of the host is 21. 8.1.3: yes it would be. The first octet is 192 which would be in Class C. 8.1.4: The network ID of the IP address is 192.8. The network ID of host address is 8.4. The Binary network ID is 10111110.1000. And the binary host ID is 1000.100. 8.1.5: 255.255.255.0 = /24 11111111.11111111.11111111.00000000. total of 24 1’s. 255.128.0.0 =/9 11111111.00000000.00000000.00000000 = /9 total of 9 1’s. Block size | Starting IP address | Ending IP Address | Subnet Mask (slash notation | 24 bit block | 10.0.0.0 | 10.255.255.255 | 255.0.0.0 = /8 | 20 bit block | 172.16.0.0 | 17.31.255.255 | 255.255.0.0 = /16 | 16 bit block | 192.168.0.0 | 192.168.255.255 | 255.255.255.0 =/24 | 8.1 Review: The IP address is; 10.91.108.165. Subnet Musk is; 255.255.255.0. And the IP address is considered class C.Yes, it is a part of the private address block. 8.2.1: yes, the IP address works. No, the Ping command don’t reach the default gatway. 8.2 Review: using a static IP you can dial into the computer that is having the issue directly. 2. in large scale networking environments. So that you would not have to worry about setting up each individual machine and their IP setting. 8.4 1- AP 2 would be the most reliable. Outside of using AP3 it is in the middle...
Words: 526 - Pages: 3
.... a) Virus – A malicious software that attaches itself to or copies itself into, another program for the purpose of causing the computer to follow instructure that were not by the original program developer. b) Worm – A malicious software programs that actively transmit themselves. Generally over networks to infect other computers. c) Spyware – A malicious software that covertly monitors and records pieces of information such as Web surfing activities and all data processed by the browser. d) Malicious code – Software that is designed to infiltrate a target computer and make it do something the attacker has instructed it to do. 2. An update should be done every day 3. Antivirus or something excepted to the program. And they assist to detecting. And by using cd the files are protected for any virus. 4. a) Internet e-mail-messages Shield - set your computer to update Viruses day or weekly and run a complete Virus Scan. b) Web Traffic Shield – Scan or update before using web browsing activities. c) P2P traffic Shield d) Network Traffic Shield 5) Yes they should be tested first before to fill out or put in public environment. 6) It depends on how often you run the scans vs your activity with the internet. Do a quick scan on a daily basis. Once a month I'll do a full scan. The quick scan should be good enough, though.... 7. 8. Yes 9. Home Page Hijacking, Pop up Advertisements, Crashes, firewall and antivirus programs are frequently turned off automatically. 10. what...
Words: 258 - Pages: 2
...Lab #4 Operating Systems: Hardening and Security March 1st, 2015 Lab Assessment Questions & Answers 1. What is the one thing that a virus, a worm, spyware, and malicious code have in common? What are the differences among these three threats: a virus, a worm, and spyware? A virus, worm and spyware all have in common that they replicate themselves into the network’s system. Some of the differences between the three are that worms can edit files, viruses need a host file to propagate itself and a spyware can steal very sensitive information within the network. 2. How often should you update your antivirus protection? You should update your antivirus protection daily to always keep your network secured. 3. Why is it a best practice to have and to carry an antivirus boot-up disk or CD? It is best practice to use an antivirus boot-up or CD because it can bypass any files that are meant to protect the malware from being detected during scans. 4. In a corporate environment, should new antivirus definitions be installed as soon as they are available? Yes, in a corporate environment antivirus programs should be installed right away to protect the company’s files. 5. Is the manual quick scan good enough protection for a system? No a manual quick scan is not good enough protection for a system the files also have to be deleted. 6. What best practices for the workstation domain that can mitigate the risks and threats caused by malicious code...
Words: 421 - Pages: 2
...Old code import java.util.Scanner; public class lab { /** Main method */ public static void main(String[] args) { // Create a Scanner Scanner input = new Scanner(System.in); // Get number of students System.out.print("Please enter number of students: "); int numberOfStudents = input.nextInt(); int[] scores = new int[numberOfStudents]; // Array scores int best = 0; // The best score char grade; // The grade // Read scores and find the best score for (int i = 0; i < scores.length; i++) { System.out.print("Please enter a score: "); scores[i] = input.nextInt(); if (scores[i] > best) best = scores[i]; } // Declare and initialize output string String output = ""; // Assign and display grades for (int i = 0; i < scores.length; i++) { if (scores[i] >= best - 10) grade = 'A'; else if (scores[i] >= best - 20) grade = 'B'; else if (scores[i] >= best - 30) grade = 'C'; else if (scores[i] >= best - 40) grade = 'D'; else grade = 'F'; output += "Student " + i + " score is " + scores[i] + " and grade is " + grade + "\n"; } // Display the result System.out.println(output); } } Corrected code import java.util.Scanner; public class Grades{ public static void main(String[] args) { // Create a Scanner Scanner input = new Scanner(System.in); // Get number of students System.out.print("Please enter number of students: "); int numberOfStudents = input.nextInt(); int[] scores = new int[numberOfStudents];...
Words: 341 - Pages: 2
...740 words. Question 3: “Describe the function of the following Docker commands and briefly explain the purpose of each of the parameters. docker run –d –p 8080:5000 –v $(pwd)/data:/data –name container1 lab4 Docker is a software containerization platform, that runs processes in isolated containers. The docker run command is used to define the containers resources at runtime. When the command is run, the container process is isolated. It is separate from the host itself. The –d command is an option run by Docker to communicate whether the container should be run in “detached” mode or in the “default mode”. The –d command signifies that the container should be run in detached mode, meaning the container will be run in the background. The next option used is –p. This is used to publish all exposed ports to the host interfaces. Docker, in turn, ‘binds’ each of the exposed ports to a host port, addresses of the published ports are 8080:5000....
Words: 741 - Pages: 3
...Unit 3 Lab4 Chris Hann Zy Powell 1. Dictionary attacks and rule-based search attacks. 2. Cross-site scripting allows for attackers to bypass client-side security mechanisms normally forced on web content by current browsers. 3. You can do this by disabling scripting when it is not necessary. Do not trust links to other sites on email or message boards, and do not follow links from sites that lead to security-sensitive information directly through its address. 4. The attacker can use redirect vulnerability, where a webpage uses a script to redirect the user somewhere other than the intended site. So then the hacker takes advantage of the script and you are sent to an external page instead of an internal one. 5. It can be denial of access, data loss or corruption, and unnecessary account privileges. 6. Blind SQL injection ask question that can only have a yes or no answer. Yet with normal SQL injection ask questions that will confuse the applications into returning answers in error message and. 7. Because XSS is a hacking technique in which a malicious user enters a short snippet of JavaScript into a textbox so that this script will be saved in the database. Therefore when a user retrieves and displays this later, the browser will execute the script. 8. When a user tries to enter their credentials, the url is explaining that the password is wrong. 9. By removing all unwanted input and accept only expected input, and...
Words: 295 - Pages: 2
...tch Lab 4.4.2 VTP Configuration Challenge Topology [pic] Addressing Table |Device |Interface |IP Address |Subnet Mask |Default Gateway | |(Hostname) | | | | | |S2 |VLAN 99 |172.17.99.12 |255.255.255.0 |N/A | |S3 |VLAN 99 |172.17.99.13 |255.255.255.0 |N/A | |PC1 |NIC |172.17.10.1 |255.255.255.0 | | |PC2 |NIC |172.17.20.1 |255.255.255.0 | | |PC3 |NIC |172.17.30.1 |255.255.255.0 | | |PC4 |NIC |172.17.10.2 |255.255.255.0 | | |PC5 |NIC |172.17.20.2 |255.255.255.0 | | |PC6 |NIC |172.17.30.2 |255.255.255.0 | | Port Assignments...
Words: 1364 - Pages: 6
...http://jozefg.ecs.fullerton.edu/public/CS906/Assignment/ |Ass # |Text Chapter |ASSIGNMENT CPSC 906 FALL 2004 |Due |Max Points | | | |Section 1 | | | | | |Note: Please provide the program assignment documentation according to | | | | | |SyllabusCS901.doc and Project Submittals.doc. | | | |1 |Ch1 |Problems: 26 p.69. Unit conversion. |09-09 |2 | | |Ch2 |Problems: 4 p.153. Stacks separated | | | |2 |Ch2 - 3 |See the exercise assignment description below |09-21 |3 | | | | |Tue | | |3 |Ch2 |Problem: 39 p.156 - provide a Gantt chart for each case and calculate AWT,| 09-30 |3 | | | |ATT and ART. Problems 44. |Thu | | | | |Provide the solution in the PowerPoint slides...
Words: 5471 - Pages: 22
...This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors in the CCNA Exploration: LAN Switching and Wireless course as part of an official Cisco Networking Academy Program. PT Activity 1.2.4: Build a Hierarchical Topology Topology Diagram Learning Objectives • • Add devices to a topology. Connect the devices. Introduction Packet Tracer is integrated throughout this course. You must know how to navigate the Packet Tracer environment to complete this course. Use the tutorials if you need a review of Packet Tracer fundamentals. The tutorials are located in the Packet Tracer Help menu. This activity focuses on building a hierarchical topology, from the core to the distribution and access layers. All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 3 CCNA Exploration LAN Switching and Wireless: LAN Design PT Activity 1.2.4: Build a Hierarchical Topology Task 1: Add Devices to the Topology Step 1. Add the missing distribution layer routers. The routers you need are located in Custom Made Devices. R1 and R3 are 1841 routers. Ctrl-click the 1841 router to add more than one. Press ESC to cancel. R2 is a 2621XM router. Step 2. Add the remaining access layer switches. Following the topology diagram, add nine 2960-24TT switches to complete the rest of the access...
Words: 48601 - Pages: 195
...3 711 Chapter Tax Accounting TRUE-FALSE QUESTIONSCHAPTER 13 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. A partnership may adopt any tax year without IRS permission. A corporation ling its rst return must annualize its income if the tax period is less than 12 months. A taxable year may be as short as one day and may exceed 366 days. Under no circumstances may a corporation change its scal year without IRS permission. A taxpayer engaged in two or more separate and distinct businesses may use different accounting methods for both businesses. A grocery store may use the cash basis of reporting sales. In general, a CPA on the cash basis method will never have a bad debt deduction. A cash basis taxpayer may deduct prepaid business expenses currently. Both cash and accrual basis taxpayers will be taxed on a dividend when it is actually received. Computing cost of goods soldand being on the accrual basis are independent of each other. If, in the IRSs opinion, the taxpayers books do not clearly reect income, the IRS may revise them so that they do. Taxpayers must generally obtain the permission of the IRS to change accounting methods. A correction of an error in a tax return is usually considered a change in accounting method. The IRS can require a change in accounting methods if the method used by a taxpayer does not clearly reect income. IRS permission is not required for a change from FIFO to LIFO. The installment method cannot be used unless the total selling price...
Words: 13382 - Pages: 54