Free Essay

Mac 1140

In:

Submitted By virtuouswoman
Words 1926
Pages 8
[pic]

Syllabus

PreCalculus Algebra

1151-MAC1140VC1151-16321

General Information | Important Information | Course Detail

General Information

Professor Information

[pic] Instructor: Dr. Ciprian Gal Phone: (305) 348-1216 Office: DM 435B (MMC) Office Hours: By Appointment E-mail: cgal@fiu.edu

Course Description And Purpose

A one semester introduction to the basic notions of calculus. Specific topics include: differential calculus using polynomial, exponential and logarithmic functions, and their application to optimization; integral calculus with area and probability applications. Please enter the course description and purpose.

Course Objectives

Students will develop an understanding of advanced algebraic techniques and procedures and enhance their logical reasoning skills including both inductive and deductive logic. They will gain a better understanding of the techniques of problem solving including clearly defining the problem, using a systematic approach and using symbolic representation to solve practical, real world problems. After finishing the course: o The student should have a good understanding of the concept of a function and its graph, in particular a polynomial, rational, exponential and logarithmic functions will be emphasized. o The student should be able to solve a system of linear and nonlinear equations by substitution and using Cramer’s Rule, if applicable. o The student should be able to recognize and graph a conic, recognize arithmetic and geometric sequences and compute the sum of the first n-terms of such sequences, use proficiently mathematical induction to prove mathematical statements and use the Binomial Theorem to expand a power of a binomial.

Learning Outcomes

Students will study algebraic topics in preparation for the study of Calculus. The skills developed in this course will prepare the students for the study of calculus and other mathematical courses requiring algebraic procedures.

Material To Be Covered

o Chapter 3 - Review only o Chapter 5 – sections 1-5 o Chapter 6 - Review only o Chapter 11: sec 1- 4 o Chapter 12: sec 1,3, 6 o Chapter 13

Important Information

Policies

Please review the FIU policies page as it contains essential information regarding guidelines relevant to all courses at FIU and additional information on the standards for acceptable netiquette important for online courses.

Technical Requirements & Skills

One of the greatest barriers to taking an online course is a lack of basic computer literacy. By computer literacy we mean being able to manage and organize computer files efficiently, and learning to use your computer's operating system and software quickly and easily. Keep in mind that this is not a computer literacy course; but students enrolled in online courses are expected to have moderate proficiency using a computer. Please go to the "What's Required" page to find out more information on this subject. Please visit our technical requirements page for additional information.

Accessibility And Accommodation

Obtain more detailed information about the specific limitations with the technologies used in this course.

Review Blackboard's Accessibility Commitment for more information.

For additional assistance please contact our Disability Resource Center.

Course Prerequisites

MAC 1105 with a “C” or better or appropriate score in the ALEKS placement test for students without prior college-level coursework in mathematics. Review the course catalog page for prerequisites information.

Proctored Exam Policy

Please note this course requires 3 proctored exams. All tests are offline! See the syllabus for dates and times, so as not to schedule any other classes in this timeblock. Students in South Florida will take these tests on FIU's University Park campus. Students outside South Florida must find a school, community college, or university in their locale where a proctor can administer the test on the same day (not necessarily at the same time) and fax the completed test to me. The National College Testing Association Site may help you find a testing center outside South Florida.

Textbook

o Option 1: Algebra & Trigonometry by M. Sullivan 9th edition packaged with MyLabsPlus access code. o Option 2: MyLabsPlus Access Code alone (MyLabsPlus program contains an electronic version of the textbook).

Course Detail

Course Communication

Communication in this course will take place via messages. Messages are a private and secure text-based communication that occurs within a Course and among Course members. Users must log on to Blackboard to send/receive/read messages. The Messages tool is located on the left side Course Menu (Blackboard user interface). It is recommended that students check their messages routinely to ensure up-to-date communication. Visit our writing resources page for more information on professional writing and technical communication skills.

Discussion Forums

Keep in mind that forum discussions are public, and care should be taken when determining what to post.

Grading

To get a full credit for a problem on a test you must show your work. An answer alone, even correct, will get no credit. Your grade will depend on your performance on tests and online assignments. Course grades will be awarded using the plus-minus grading system. As a rough guide, my grading policy is approximated below.
|Course Requirements |Points |
|Midterm Exams (3 at 100 points each) |300 pts (48%) |
|Final Exam (Comprehensive) |150 pts (24%) |
|Homework posted every week |75 pts (12%) |
|Quizzes posted every week |100 pts (16) |
|Total |625 pts (100%) |

|Letter |Range |Letter |Range |Letter |Range |
|A |93 - 100 |B- |79 - 82 |D+ |60 - 64 |
|A- |89 - 92 |C+ |75-78 |D |55 - 59 |
|B+ |86 - 88 |C |70-74 |F |0 - 54 |
|B |83 - 85 |C- |65 - 69 | | |

Calculator Policy

Use of graphing calculators is prohibited in this course. The scientific calculator, TI- 30XA will be used occasionally but not on tests.

Incomplete Grade Policy

The incomplete grade is given to a student who has substantially completed most of the course work but is unable to finish an exam or other work because of circumstances beyond the student's control. An incomplete grade cannot be given if it is necessary for the student to repeat the course. An incomplete grade must be made up within two semesters. There is no extension of the two semester deadline. The student must not register again for the course to make up the incomplete. Every incomplete grade must be approved by the Mathematics Department.

Drops/withdrawals

: Last Day to Register, Add, or Change Sections (Can be done via MyFIU) If you drop a course prior to this deadline, there will be no record on your transcript. March 23: Last Day to Withdraw from a Course with a “DR” grade After this date, you will need the signature of your instructor in order to withdraw from the course.

Academic Integrity

Academic integrity is fundamental to the activities and principles of a university. All members of the academic community must be confident that each person's work has been responsibly and honorably acquired, developed, and presented. Any effort to gain an advantage not given to all students is dishonest whether or not the effort is successful. The academic community regards breaches of the academic integrity rules as extremely serious matters. Sanctions for such a breach may include academic sanctions from the instructor, including failing the course for any violation, to disciplinary sanctions ranging from probation to expulsion. When in doubt about plagiarism, paraphrasing, quoting, collaboration, or any other form of cheating, consult the course instructor. A more complete definition of Academic Misconduct is given on pp. 120-121 of the Student Handbook. See also http://www2.fiu.edu/~oabp/misconductweb/1acmisconductproc.htm Intellectual Pluralism: The University community welcomes intellectual diversity and respects student rights. Students who have questions concerning the quality of instruction in this class may address concerns to either the Departmental Chair, Divisional leader, or Office of Student Access and Success (http://www.osas.fiu.edu/). All students will have the opportunity to submit an anonymous evaluation of the instructor at the end of the course.

Exams

THE USE OF COMPUTERS, GRAPHING CALCULATORS AND CELL PHONES DURING EXAMS IS STRICTLY PROHIBITED! This course will have two midterm exams and one comprehensive final. All midterm exams will be either proctored on campus or by using a pre-approved local/national testing center. Please refer to Blackboard for more details. Make-up Policy: There will be no make-up tests. The final will NOT replace a 0 that you get for missing a test. If you miss a test due to illness or other emergency and provide supporting documentation, your final exam will count in place of the missed test. In this case, the option of replacing the lowest test score will not be applied (see also below). There are no make-ups for online assignments. Final Grade: You will be allowed to drop the lowest score of the two midterms (ME1, ME2, ME3) and replace it with 0.7 of the score received on the final exam (FE). Note that the final exam weighs 1.5 more times than a regular midterm and this can effectively improve your final grade by a substantial margin. If you miss a test on the scheduled day when a midterm is given, your final will count as one of your dropped scores provided that you provide a legitimate verifiable reason (sickness, etc). Otherwise, you will receive a zero on that midterm and this curve will NOT be applied to you (If this is the case, your final grade will be computed by simply adding all midterms, homework (H), quizzes (Q) and final exam together and the percentage rate is calculated by taking the total score divided by 6.25). In other words, you must take all midterms for this curve to apply to you with the exception noted above. In the case that the curve applies to you, your final percentage (FP) and hence, the final grade calculated according to the grading policy introduced earlier will be computed with the following formula: FP = [(ME1 + ME2 + ME3) + (H) + (Q) + (FE) - MINIMUM (ME1, ME2, ME3) + 0.7 * (FE)] / (6.25).

Online Homework And Quizzes

o Online problems are algorithmic iterations of the textbook exercises. o All online assignments have a due date. Late submissions will not be accepted under any circumstances, so please plan accordingly. o Homework assignments can be attempted an infinite number of times but must be completed by 11:59pm on the assigned due date. It is your responsibility to track the due dates. o Some homework assignments are extensive. Make sure to allocate enough time to complete them. You should always start working on a weekly assignment every Monday. o To take a quiz you have to complete associated homework assignment with a score of 80% or more. If you do not score at least 80% on the homework, you will not be able to take the associated quiz and therefore you will receive a 0% on that quiz. o You can take each quiz up to 3 times and only the highest score will be recorded. o At the end of the semester the homework with the lowest grade and the quiz with the lowest grade will be dropped. o A grade of 0 on a homework/quiz will be assigned whenever a student did not attempt that assignment before the deadline. o Quizzes will generally be due the next day after a homework assignment is due. Please be advised that merely completing online assignments is not a guarantee of success in the class. You need to understand what you do. A test question will not come with the “help me solve it” button. So, if you can’t correctly do a homework problem without any help, you will not be able to do a similar problem on a test.
Florida International University Online
Copyright © 1998 - 2014. All rights reserved worldwide.

Similar Documents

Free Essay

Project Identification

...Microsoft While Microsoft has been very successful in providing the Windows operating system to PC makers as well as the Office Suite there is growing competition from Apple in terms of both the consumer market and the corporate market. The Apple Mac OS is now becoming a viable contender in both markets. However, in terms of the quickly growing and ever expanding mobile market Microsoft has done very little to win over handset makers and create an environment in which individuals are writing apps for their platform. In this case Apple has become the predominant leader and the standard methods of competing are not producing the results needed to remain competitive in the long term market. For this reason I would recommend that Microsoft make a significant departure and start writing apps for the Apple iOS platform. While it may seem counterintuitive to develop apps that will run on other hardware Microsoft is currently faced with the issue of taking a beating in terms of the app market. Creating apps that run on iOS will allow Apple users to see the Microsoft products that are available and hopefully create additional revenue such that they can fund and create new opportunities in their own potential app store for Windows based phones. This is basically the last significant chance Microsoft has in order to salvage the potential for the mobile OS and app market. The opportunity is a single as it hopefully prevents the downfall of their mobile market altogether. There is a risk...

Words: 861 - Pages: 4

Premium Essay

Itt It 220chapter 1 Odd 1 Thru 50

...LAN b. A network of users that share computer resources across a metropolitan area – MAN c. A network that connects local area networks across a large geographic area – WAN 3. Expand the acronym MAC – Media Access Control 5. Expand the acronym WAN – Wide Area Network 7. Define the term topology – Topology is the architecture of a network 9. A disadvantage of the token-ring system is that if an error changes the token pattern, it can cause the token to stop circulating. This can be eliminated by adding a d. token-ring hub 11. What is the difference between a hub and a switch? A hub broadcasts the data it receives to all devices connected to its ports and a switch forwards a frame it receives directly out of the port associated with its destination address. 13. What information is not included in an Ethernet frame? a. Frame size 15. What is the minimum and maximum size of an Ethernet frame? The minimum length of the Ethernet frame is 64 bytes from the destination MAC address through the frame check sequence. The maximum Ethernet frame length is 1518 bytes, 6 bytes for the destination MAC address, 6 bytes for the source MAC address, 2 bytes for length/type, and 1500 bytes for the data. 17. What does the OUI represent? The OUI represents the first 3 bytes of the MAC address that identifies the manufacturer of the network hardware. 19. INTERNET SEARCH: Find the device manufacturer for the following Ethernet devices: a. 00-C0-4F-49-68-AB – Dell Computer Corporation ...

Words: 976 - Pages: 4

Premium Essay

Networking

...#1 a. LAN b. MAN c. WAN #3 MAC- media access control #5 WAN wide area network #7 Topology- the architecture of a network #9 D. token-ring hub #11 hub- broadcasts the data it receives t oall devices connected to its ports Switch- forwards a fram it receives directly out the port associated with its destination address #13 A. frame size #15 64 and 1518 bytes #17 organizationally unique identifier- the first 6 digits of an address which are used to indicate the vendor of the network interface. #19 a. 00-C0-4F-49-68-AB: dell computer b. 00-0A-27-B7-3E-F8: apple computer inc. c. 00-04-76-B6-9D-06: com corporation d. 00-00-36-69-42-27: ATARI corporation #21 TCP/IP transmission control protocol/ internet protocol #23 Easy to add stations as there are no cables required Signals can be sent through doors and walls so the stations can be mobile so can move around There is less need for technical support in setting up due to their simple nature There are no cables to trip over so there are less health and safety issues to consider Share resources like printers. Have shared access to a centralized storage. #25 Router is used to make the connection to the ISP. The switch is used to interconnect other working devices, the broadband modem is used to make the data connection to the ISP. #27It can tell you if the ISP is the issue, as opposed to your computer or your own network at home. #29 a limited geographic area that provides wireless access for the...

Words: 678 - Pages: 3

Premium Essay

Computernt Plus

...administrative distance? Static route Describe the point-to-point WAN connection protocol provided by Telco? Leased Lines This cisco IOS command copies the current running configuration to a tftp server? Copy running-config tftp The concept of EIGRP Feasible distance is the computed metric of a SUCCESSOR route Is the dotted decimal equivalent to slash notation /25 255.255.255.128 The routing protocol that doesn’t support support VLSM? RIP v1 Is the broadcast address for the ip subnet 8.5.8.232 mask 255.255.0.0 8.5.255.255 Is the slash notation dotted decimal mask of 255.255.255.252 /30 The following mask could create an IP subnet from a class B that contains 500 hosts? 255.255.255.0 Port of STMP? 25 Protocol responsible for resolving mac addresses from IP addresses? ARP Two protocols commonly used in WANS at layer 2 of the OSI model? HDLC and PPP 192.168.254.0 is private up networks, classified by? RFC1918 Bits comprise the network portion of a class C address? 24 126.254.1.45 address belongs to what range? Class A 5 bits of mask for the host portion of an ip address, how may usable hosts addresses are available? 14 Usable host addresses are contained in a class c network? 254 What is the tool that can be used to determine the number of hops to a destination? Traceroute What are the possible mechanisms of...

Words: 2228 - Pages: 9

Premium Essay

Choosing the Right Equiptment

...Deciding on the right piece of equipment? By: Maurice T. Wade Student: American Intercontinental University Class: ENG106 Abstract Trying to set out and find the perfect computer for the members of my organization there are several factor that are vitally important. These are factors are but not limited to memory, anti-virus protection, and processing speed. So the best choice of all three of these in one would be a MAC from Apple. This would be the recommendation that I would give. The search has been narrowed down between three units which are Apple IMac 27inch (Late 2012), Dell XPS 27 Touch All in One (2720), last but not least Dell Optiplex 9010 AIO. Trying to set out and find the perfect computer for the members of my organization there are several factor that are vitally important. These are factors are but not limited to memory, RAM size, and processing speed. So the best choice of all three of these in one would be a MAC from Apple. This would be the recommendation that I would give. The search has been narrowed down between three units which are Apple IMac 27inch (Late 2012), Dell XPS 27 Touch All in One (2720), last but not least Dell Optiplex 9010 AIO. So for memory the Dell XPS takes this category by a land slide it comes off the shelf with 2038GB worth of memory. That is an extremely large amount of memory that could definitely come in handy depending on the reason that the organization plans on using the computers. With Apple IMac you are only getting...

Words: 493 - Pages: 2

Free Essay

Medium Network Design

...Universidad Interamericana, Recinto de Guayama | Diseño de una Red Mediana | | Luis Lugo 16 de enero de 2013 | Introducción En este trabajo estaré diseñando una red mediana para un colegio técnico el cual contiene pocos estudiantes. Este diseño usa conmutadores en las capas 2 y 3 proveyendo servicios a usuarios y a la misma vez seguridad para toda la red. La organización tiene alrededor de 700 usuarios y existen diferentes dominios dentro de esta red. Diseño Este diseño debe tener varios requerimientos específicos para poder completar lo que es una red mediana segura. Uno de estos requerimientos y el mayor de estos es que la red debe de proveer conectividad para tres servidores y alrededor de 700 clientes. De la misma manera, la red va a permitir que si en alguna ocasión alguno de estos equipos necesita separarse el otro, esto sea posible. En esta red otro de los requerimientos importantes es el de evitar ataques, ya que como la red va a estar comunicándose entre dos edificios, esta es más susceptible a ataques que provengan de afuera. El centro o “core” de esta red es un solo conmutador de capa 3 con interfaz de “Ethernet” este conmutador “core” le provee los servicios de índole de ambas capas (2 y 3) hacia los equipos necesarios. La red tiene 4 sub redes diferentes, una de estas es para los servidores, otra para los clientes, otra para el sistema de red inalámbrico y la última para la administración. Se diseñó un NDIS para monitorear...

Words: 1290 - Pages: 6

Premium Essay

International Business

...Al and begin to wonder where they should eat. But the question is answered for them almost as soon as it has arisen, for at the bottom of the exit ramp is a familiar sign, a gold arch on a red background – ‘McDonald’s – Straight Ahead One Mile’. McDonald’s! Hamburgers! French fries! ‘Let’s eat at McDonald’s!’ Paul suggests. ‘We can’t see anywhere else to go, and at least we know what their food is like’. ‘Sure’ Emma agrees. ‘I could just eat a cheeseburger...or maybe even a Big Mac!’. About a mile further on is a large shopping centre, and at the far ends of its car park the golden arches of McDonald’s are plainly visible. Paul and Emma enter the restaurant, walk down the centre aisle between uniform rows of spotlessly clean tables, and examine the menu that is posted behind and above the service counter. Exactly the same menu as the one back home! They quickly decide what to have and approach the counter. ‘Can I take your order, please?’ inquires the crew member, smiling at them. ‘Two Big Mac meals with Diet Coke, to go please’. ‘Is that large?’ she replies. The order is placed using pre-programmed shortcuts on the till. ‘Is that everything, sir?’ she asks. Paul looks at his wife, who shakes her head. ‘Er, no. Thanks anyway’. The crew member totals up the sale and states the amount in a clear voice. Paul gives her a ten-pound note. ‘Ten pounds,’ she says, counting out the correct change and giving it to Paul before putting the note in her cash drawer. Change...

Words: 1354 - Pages: 6

Premium Essay

Mac Daddy

...Ay yo im mac daddy ay yo im mac daddy ay yo im mac daddy ay yo im mac daddy yo yo yo yo yo yo yo yo yo yo big mac daddy in the house yeah buddy big mac daddy daddy boy get on my level becuz im mac daddy, this aint to real essay homie you know that. This gotta be 250 so imma copy and paste this til I get 250 Ay yo im mac daddy ay yo im mac daddy ay yo im mac daddy ay yo im mac daddy yo yo yo yo yo yo yo yo yo yo big mac daddy in the house yeah buddy big mac daddy daddy boy get on my level becuz im mac daddy, this aint to real essay homie you know that. This gotta be 250 so imma copy and paste this til I get 250 Ay yo im mac daddy ay yo im mac daddy ay yo im mac daddy ay yo im mac daddy yo yo yo yo yo yo yo yo yo yo big mac daddy in the house yeah buddy big mac daddy daddy boy get on my level becuz im mac daddy, this aint to real essay homie you know that. This gotta be 250 so imma copy and paste this til I get 250 Homey I copy pasted this twice and im only at 232, so imma do it one more time. Ay yo im mac daddy ay yo im mac daddy ay yo im mac daddy ay yo im mac daddy yo yo yo yo yo yo yo yo yo yo big mac daddy in the house yeah buddy big mac daddy daddy boy get on my level becuz im mac daddy, this aint to real essay homie you know that. This gotta be 250 so imma copy and paste this til I get 250 Yeah homey now we at 323, itz mac...

Words: 324 - Pages: 2

Free Essay

Freddy Mac and Fannie Mae

...Fannie Mae and Freddie Mac Fannie Mae and Freddie Mac are private corporations that were established by Congress and are referred to as government sponsored enterprises or GSEs. They are the largest “packagers” of individual mortgages into mortgage backed securities (MBS) which they guarantee against loss. We will be addressing the following threats to your financial institutions stability. Counterparty risk. Internal and external vulnerability and threats. Stemming the tide of losses from overly aggressive practices in lending continues to retard the marketplace and has yet to reach equilibrium. The use of macro measures is of critical importance in returning the company to profitability. \ The use of Macroeconomic Measures, Using Aggregate Data. These measures approach threats to financial stability from the top down: Is aggregate credit growing too fast? Are credit underwriting standards falling? Are asset prices too high relative to fundamentals? “In an internal boom-bust cycle, an initial market upswing entices new investors and rising prices until additional capital or investors’ nerves are exhausted.”(Evanoff, Kaufman, and Malliaris, 2012). “This process can be amplified by capital rules that encourage banks to increase leverage when the economy is expanding and loan losses are low.” (Hanson, Kashyap, and Stein, 2011). “In the ensuing bust, a credit crunch can occur as participants switch from lending too much to lending too little.” (Brunnermeier, 2009). A selling...

Words: 960 - Pages: 4

Free Essay

9.2 It-255

...the silent workhorse of a network. Other than offering an administrative interface, switches do not maintain layer three IP addresses, so hosts cannot send traffic to them directly. The primary attack against a switch is the ARP poisoning attack described earlier in the “Switches” section of this chapter. However, the possibility of an ARP attack doesn’t mean switches cannot be used as security control devices. As mentioned earlier, MAC addresses are unique for every network interface card, and switches can be configured to allow only specific MAC addresses to send traffic through a specific port on the switch. This function is known as port security, and it is useful where physical access over the network port cannot be relied upon, such as in public kiosks. With port security, a malicious individual cannot unplug the kiosk, plug in a laptop, and use the switch port, because the laptop MAC will not match the kiosk’s MAC and the switch would deny the traffic. While it is possible to spoof a MAC address, locking a port to a specific MAC creates a hurdle for a would-be intruder. Switches can also be used to create virtual local area networks (VLANs). VLANs are layer two broadcast domains, and they are used to further segment LANs. As described earlier, ARP broadcasts are sent between all hosts within the same VLAN. To communicate with a host that is not in your VLAN, a switch must pass the hosts packets through a layer three device and routed to the appropriate VLAN...

Words: 399 - Pages: 2

Free Essay

Ipv6 Address Type

...IPv6 Address Type - Multicast Overview: As part of your assigned readings and material covered in class lecture, you have learned about IPv6 address types, including unicast and multicast addresses. For this assignment, you will expand your knowledge of the use of multicast addresses compared to the use of broadcast addresses in IPv4. Required Resources:  Textbook and lecture notes  Internet access Research Resources: • IPv6 multicast address – overview o http://www.tcpipguide.com/free/t_IPv6MulticastandAnycastAddressing.htm • IPv6 subnet scanning RFC o http://www.ietf.org/rfc/rfc5157.txt Deliverables  Perform additional research to understand the use of multicast addresses in IPv6 protocol compared to IPv4 broadcast addresses with emphasis on: o Neighbor discovery o All nodes address o All routers address  Describe the process of neighbor discovery including the use the all nodes address for achieving the same result as the IPv4 ARP protocol.  Include the IPv6 multicast address for all routers and all hosts.  Perform research to determine: o Are you able to perform subnet “scanning” by simple sending an ICMP echo packet to the “all hosts” multicast address? Similar to the concept of sending an ICMP echo packet to the broadcast address on an IPv4 subnet. o Provide an estimate of how long it would take to scan, through a tool similar to NMAP, an entire /64 IPv6 subnet to find every possible host, not using the multicast “all host” address. Use...

Words: 883 - Pages: 4

Premium Essay

Basic Switch Configuration

...Basic Switch Configuration Switch>enable Switch# Examine the current running configuration file. Switch#show running-config Examine the current contents of NVRAM: Switch#show startup-config Examine the characteristics of the virtual interface VLAN1: Switch#show interface vlan1 Switch#show ip interface vlan1 Examine the following version information that the switch reports. Switch#show version Examine the default properties of the FastEthernet interface used by PC1. Switch#show interface fastethernet 0/18 Switch#show vlan examine the contents of the flash directory. Switch#dir flash: or Switch#show flash Switch#dir flash:c2960-lanbase-mz.122-25.SEE3 To save the contents of the running configuration file to non-volatile RAM (NVRAM), issue the the command copy running-config startup-config. Switch#copy running-config startup-config S1#configure terminal S1(config)#hostname S1 S1(config)#exit S1#configure terminal S1(config)#line console 0 S1(config-line)#password cisco S1(config-line)#login S1(config-line)#line vty 0 15 S1(config-line)#password cisco S1(config-line)#login S1(config-line)#exit S1(config)#enable secret class First, you will create the new VLAN 99 on the switch. Then you will set the IP address of the switch to 172.17.99.11 with a subnet mask of 255.255.255.0 on the internal virtual interface VLAN 99. S1(config)#vlan 99 S1(config-vlan)#exit S1(config)#interface vlan99 %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan99...

Words: 873 - Pages: 4

Premium Essay

Ip Networking

...Chapter 14 Answer the following review questions. For some questions, more than one choice may be correct. 1. Which of the following routing protocols are considered to use distance vector logic? a. RIP b. IGRP c. EIGRP d. OSPF 2. Which of the following routing protocols are considered to use link-state logic? a. RIP b. RIP-2 c. IGRP d. EIGRP e. OSPF f. Integrated IS-IS 3. Which of the following routing protocols support VLSM? a. RIP b. RIP-2 c. IGRP d. EIGRP e. OSPF f. Integrated IS-IS 4. Which of the following routing protocols are considered to be capable of converging quickly? a. RIP b. RIP-2 c. IGRP d. EIGRP e. OSPF f. Integrated IS-IS 5. Router1 has interfaces with addresses 9.1.1.1 and 10.1.1.1. Router2, connected to Router1 over a serial link, has interfaces with addresses 10.1.1.2 and 11.1.1.2. Which of the following commands would be part of a complete RIP Version 2 configuration on Router2, with which Router2 advertises out all interfaces, and about all routes? a. router rip b. router rip 3 c. network 9.0.0.0 d. version 2 e. network 10.0.0.0 f. network 10.1.1.1 g. network 10.1.1.2 h. network 11.0.0.0 i. network 11.1.1.2 6. Which of the following network commands, following a router rip command, would cause RIP to send updates out two interfaces whose IP addresses are 10.1.2.1 and 10.1.1.1, mask 255.255.255.0? a. network 10.0.0.0 b. network 10.1.1.0 10.1.2.0 c. network 10.1.1.1 10.1.2.1 d. network 10.1.0.0 2550.255...

Words: 1957 - Pages: 8

Free Essay

Mac vs Pc

...Mac vs. PC/windows The technology market has severely impacted the world in the last decade. Apple and Microsoft are two companies whose competition to dominate sales has been mostly developed with computer sales. Apple’s computer is named “Mac” and Microsoft’s product can be recognized as windows PC. Microsoft has millions of customers because of the amazing job that the company has developed on marketing. However, Apple’s computer is undoubtedly better in three aspects: Productivity, security and design. The lighter you are, the faster you can run. This is an advise usually used for athletes, but can be applied for computers too. Mac has an immediate processing, because it does not have useless applications by default, and so, the software works faster. Furthermore, the apple keyboard facilities, as the multi-touch, give to the user a higher list of options to control the computer. On the other hand, windows PC wants to provide a big amount of options to the customer, for instance, more than 40 game by default. The computer usually gets slower for having apps that never are used by customers. However, the processing speed of computers can be affected for other reasons; malwares are one of these. A malware is malicious software used to corrupt computers. Apple has many restrictions for computer developers and its programing language is much more exclusive, because the software and hardware are both created by the same company. This strategy lets Apple to be much more careful...

Words: 453 - Pages: 2

Free Essay

Ipv6 Address Type Multicast

...Matthew Reece 8/22/2015 IPv6 address type- multicast There is are several differences between ipv4 and ipv6 below I will break them down a bit IPV4 is 32 bit over 4 octets doesn’t have built in security uses broadcast and bits extend from 2^32 power IPv6 is 128 bits over 8 quadrats has built in security doesn’t use broadcast and bits extend from 2^128 power Those are the major differences between IPv4 and IPv6 next we get into a function of IPv6 which is unique it’s called multicast Neighbor Discovery Neighbor Discovery uses ICMPv6 messages to manage neighboring node interaction. Neighbor Discovery replaces ARP, ICMP Router Discovery, and ICMP Redirect and provides additional functionality. Neighbor Discovery Messages All functions of Neighbor Discovery are performed with the following messages: * Router Solicitation  IPv6 hosts send Router Solicitation messages to discover IPv6 routers present on the link. To prompt IPv6 routers to respond immediately, hosts send multicast Router Solicitation messages rather than waiting for a periodic Router Advertisement message. * Router Advertisement  IPv6 routers send Router Advertisement messages either periodically or in response to the receipt of Router Solicitation messages. Router Advertisement messages contain the information required by hosts to determine what the link prefixes are, what the link MTU is, whether or not to use address autoconfiguration, and the duration for which addresses created through address...

Words: 1401 - Pages: 6