...Izaak Cook NT 1210 Intro to Networking Unit 1. Lab 1.2: Binary Math and Logic Exercise 1.2.1 1 0 0 1 + 1 1 0 Binary 1111 = 15 Decimal 2. Exercise 1.2.2 1 1 0 1 0 1 Binary 1011 = 11 Decimal 3. Exercise 1.2.3 1 1 1 1 1 1 Binary 1110 = 14 Decimal 4. Exercise 1.2.4 100 2 OR 011 2 = 111 = 7 5. Exercise 1.2.5 111 2 AND 100 2 = 100 = 4 6. Exercise 1.2.6 NOT 1001 2 = 0110 2 = 6 Exercise 1.2.7 1010 2 + 10 2 = 1100 2 + 10 2 (= 2) = 1110 2 Exercise 1.2.8 If one of the values being added is 11112, then the result will be the same as the other value being added. Exercise 1.2.9: 1 | 1 | 0 | 0 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | Using the OR operator, what is the result of 11002 OR 11112? What can you conclude about using OR on any value with a string of 1s? What value can you use with an OR operator to preserve the other input number in the logical equation? When using a string of 11112 the result will be the same using 111121.2 review 1. Determine the result of 100100002 + 11011102. Show the mapping that you created to solve this addiTon problem. 100100002 11011102 111111104 = 254 decimal 2. Determine the result of 110011002 AND 111111002. Show the mapping or truth table that you created to solve this addiTon problem. 110011002 111111002 1.3 Exercise...
Words: 266 - Pages: 2
...Exploring the Motherboard and Busses Exploring the Motherboard and Busses The motherboard represents the logical foundation of the computer. Everything that makes a computer must be attached to the motherboard. Answer the following questions: 1. What are the major components of the motherboard? Provide a brief description of each component. 1. Processor (CPU): The processor is the brain of the computer and is the chip where all the computing is done. 2. Memory: This is where the computer stores information while it is working on it. 3. Chipset: The chipset is a link between the processor and the outside world, and handles things like controlling the hard drives, the USB ports, the keyboard and mouse, generates the sounds the computer makes, and sometimes even creates the pictures you see on the screen. 4. Expansion Slots: Expansion slots are connectors that allow you to attach additional cards on the computer, such as video cards, sound cards, modems, and add abilities to the computer that the motherboard doesn’t provide. 5. I/O (Inputs/ Outputs): These are a set of connectors that allows you to connect various devices to the computer, such as the keyboard, monitor, mouse, hard drives, flash drives, printers, and connect the computer to a network. 2. Upgrading only the motherboard will give some performance improvement to a computer system. Why? Upgrading the motherboard will definitely give performance improvement to any computer system...
Words: 469 - Pages: 2
...Oscar Martinez NT 1110 Lab 4 Task 1: LGA 1156, also known as Socket H[2][3] or H1, is an Intel desktop CPU socket. LGA stands for land grid array. Its incompatible successor is LGA 1155. LGA 1156, along with LGA 1366, were designed to replace LGA 775. Whereas LGA 775 processors connect to a northbridge using the Front Side Bus, LGA 1156 processors integrate the features traditionally located on a northbridge on the processor itself. The LGA 1156 socket allows the following connections to be made from the processor to the rest of the system: PCI-Express 2.0 ×16 for communication with a graphics card. Some processors allow this connection to be divided into two ×8 lanes to connect two graphics cards. Some motherboard manufacturers use Nvidia's NF200 chip to allow even more graphics cards to be used. DMI for communication with the Platform Controller Hub (PCH). This consists of a PCI-Express 2.0 ×4 connection. FDI for communication with the PCH. This consists of two DisplayPort connections. Two memory channels for communication with DDR3 SDRAM. The clock speed of the memory that is supported will depend on the processor. LGA 1156 socket and processors were discontinued sometime in 2012, along with LGA 1366.[4] Supported processors Code name | Brand name | Model (list) | Frequency | Cores/Threads | Max...
Words: 1200 - Pages: 5
...Com put er Fundam ent als: Pradeep K. Sinha & Pr it ii Sinha Com put er Fundam ent als: Pradeep K. Sinha & Pr it Sinha Ref Page Chapt er 9: I nput - Out put Dev ices Slide 1/ 58 Com put er Fundam ent als: Pradeep K. Sinha & Pr it ii Sinha Com put er Fundam ent als: Pradeep K. Sinha & Pr it Sinha Le a r n in g Obj e ct ive s I n t h is ch a pt e r you w ill le a r n a bou t : § I nput / Out put ( I / O) devices § Com m only used input devices § Com m only used out put devices § Ot her concept s relat ed t o I / O devices Ref Page 148 Chapt er 9: I nput - Out put Dev ices Slide 2/ 58 Com put er Fundam ent als: Pradeep K. Sinha & Pr it ii Sinha Com put er Fundam ent als: Pradeep K. Sinha & Pr it Sinha I / O D e vice s § Provide m eans of com m unicat ion bet ween a com put er and out er w orld § Also known as peripheral devices because t hey surround t he CPU and m em ory of a com put er syst em § I nput devices are used t o ent er dat a fr om t he out side world int o prim ary st orage § Out put devices supply r esult s of processing from prim ary st orage t o user s Ref Page 148 Chapt er 9: I nput - Out put Dev ices Slide 3/ 58 Com put er Fundam ent als: Pradeep K. Sinha & Pr it ii Sinha Com put er Fundam ent als: Pradeep K. Sinha & Pr it Sinha Role of I / O D e vice s Input data from external world Input Devices CPU and Memory Output Devices Results of processing in human acceptable form Input data coded in internal...
Words: 21581 - Pages: 87
...CHAPTER 1 INTRODUCTION TO INFORMATION TECHNOLOGY 1.1 Introduction Modern civilization has become so complicated and sophisticated that to survive one has to be competitive. This compels people to keep themselves informed of all types of happening in the society. And this in turn entails the need for an infrastructure of information. This is the point where information technology or IT becomes most important, as it is the infrastructure that allows us to get information accurately and in time. Before we define information technology, it is important to understand the notion of Data, Information, Technology, and Knowledge. In everyday conversation, people use the terms data and information interchangeably. However, some computer professional make a distinction between the two terms. Data It is the words, numbers, letters, symbol, sound, video and graphics that describe people, events, things and ideas. It is raw facts about people, objects, and events that have little or no meaning. It is the raw material used to create useful information. It becomes information when you use it as the basis for initiating some action or for making a decision. Information It is defined as the words, numbers, letters, symbol, sound, video and graphics used as the basis for human action or decisions. It is data that have been processed and presented in a form suitable for human interpretation, often with the purpose of revealing trends or patterns that can be used in decision-making. It is data...
Words: 12773 - Pages: 52
...CONTENT Page No 1 2 3 4 5 6 7 8 9 10 Academic calendar Digital Communications Microprocessors and microcontrollers Digital Signal Processing Object Oriented Programming Through Java Managerial Economics And Financial Analysis Digital Signal Processing Lab Microprocessor & Microcontroller Lab Advanced English Communication Skills Lab Object Orient Programming Through Java Lab 2 3 48 85 129 186 217 219 222 224 ACADEMIC CALENDAR VIGNAN INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING DEPARTMENT ACADEMIC CALENDAR B. Tech Academic Year 2013 - 2014 - II - Semester S.No Event Date th 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. Submission of abstracts of main project by IV years Faculty orientation program Commencement of Class work Spell for UNIT – I Instructions Fresher’s day Spell for UNIT – II Instructions Alumni meet VIGNAN TARANG Spell for Unit-III Instructions st nd Assignment -1/ Unit test-1 on I & II Units Submission of results & week students list to Dept Spell for Unit-IV Instructions University I-Mid-Exam- II & IV Year rd University I-Mid-Exam- III Year Spell for UNIT – V Instructions for II &IV years rd Spell for UNIT – V Instructions for III year LAB INTERNAL-1 Commencement of Special classes for Slow learners Spell for UNIT – VI Instructions for II &IV years rd Spell for UNIT – VI Instructions for III year Submission of Mini project title along with guide for III year Spell for Unit...
Words: 28702 - Pages: 115
...INFORMATION TECHNOLOGY FOUNDATION 1 Compiled By: RONKY F. DOH (aka: ronky biggy diggy daddy igp) FU DAME TALS OF COMPUTERS We are living in an information age dependent upon digital information. Digital information is electronic information, the result of computer processing. Every type of job relies upon getting information, using it, managing it, and relaying information to others. Computers enable the efficient processing and storage of information. Do not think of a computer merely as the machine with the keyboard and the mouse, although that might be true for some types of computers. Embedded computers may be inside your household appliances, the video cassette recorder, the automobile, planes, trains, power plants, water purification plants, calculators, and even inside a few toys. These embedded computers are very small. They affect our lives each day. Why, even modern traffic lights operate with computers. They are all around us. Think of additional ways in which computers affect our lives each day. Every organization somehow use(s) a computer to run the organization. Some of the places are hospitals, schools, fire department, banks, stores or supermarkets, stock exchange, police department, insurance companies, transport companies, and government agencies etc. What is a computer? A computer is many things to many people, depending on what it is being used for. At one time the computer can be a machine which processes the payroll, then it can be a machine which tabulates...
Words: 67033 - Pages: 269
...Composition: PreMediaGlobal Cover Credit: © Masterfile Royalty Free Manufacturing Coordinator: Julio Esperas © 2013 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means—graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act—without the prior written permission of the publisher. For product information and technology assistance, contact us at Cengage Learning Customer & Sales Support, 1-800-354-9706. For permission to use material from this text or product, submit all requests online at cengage.com/permissions. Further permissions questions can be e-mailed to permissionrequest@cengage.com. Some of the product names and company names used in this book have been used for identification purposes only and may be...
Words: 234459 - Pages: 938
...Press chapter in another scientific or research publication provided that the material has not been credited to another source and that full credit to the Academic Press chapter is given. Academic Press A division of Harcourt, Inc. 525 B Street, Suite 1900, San Diego, Cahfomia 92101-4495, USA http://www.academicpress.com Academic Press Harcourt Place, 32 Jamestown Road, London NWl 7BY, UK http ://www. academicpress .com Library of Congress Catalog Card Number: 2001092781 hitemational Standard Book Number: 0-12-500452-4 International Standard Book Number: 0-12-500453-2 (International edition) PRINTED IN THE UNITED STATES OF AMERICA 01 02 03 04 05 06 MB 9 8 7 6 5 4 3 2 1 Contents Preface vii Note to Students xi Prelude to Multimedia Sugata Mitra 1 Overview of...
Words: 60427 - Pages: 242
.............................. 3 LESSON 1 – Use Hand Tools ........................................................................ 4 – 30 LESSON 2 – Perform Mensuration and Calculation ................................ 31 – 46 LESSON 3 –Prepare and Interpret Technical Drawing ............................ 47 – 63 LESSON 4 – Practice Occupational Safety and Health............................. 64 - 103 Answer Keys .................................................................................................. 104 - 111 Acknowledgment..................................................................................................... 112 COMPUTER HARDWARE SERVICING K to 12 – Technology and Livelihood Education 1 What Is This Module About? Welcome to the world of Computer Hardware Servicing! This Module is an exploratory course which leads you to Computer Hardware Servicing National Certificate Level II ( NC II)1. It covers 4 common competencies that a Grade 7 / Grade 8 Technology and Livelihood Education (TLE) student like you ought to possess, namely: 1) Use hand tools; 2) Perform mensuration and calculation; 3) Prepare and interpret technical drawing; and 4) Practice ccupational health and safety procedures. These 4 common competencies are covered separately in 4 Lessons. As shown below, each Lesson is directed to the attainment of two or more learning outcomes: Lesson 1 – Use Hand Tools Learning Outcome (LO) 1 -...
Words: 22909 - Pages: 92
...This page was intentionally left blank This page was intentionally left blank Hands-On Ethical Hacking and Network Defense Second Edition Michael T. Simpson, Kent Backman, and James E. Corley ———————————————————————— Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. This is an electronic version of the print textbook. Due to electronic rights restrictions, some third party content may be suppressed. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. The publisher reserves the right to remove content from this title at any time if subsequent rights restrictions require it. For valuable information on pricing, previous editions, changes to current editions, and alternate formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for materials in your areas of interest. Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated...
Words: 185373 - Pages: 742
...Contents 1. Introduction 2. Assessment Test 3. Chapter 1: Getting Started with Ethical Hacking 1. Hacking: A Short History 2. What Is an Ethical Hacker? 3. Summary 4. Exam Essentials 5. Review Questions 4. Chapter 2: System Fundamentals 1. Exploring Network Topologies 2. Working with the Open Systems Interconnection Model 3. Dissecting the TCP/IP Suite 4. IP Subnetting 5. Hexadecimal vs. Binary 6. Exploring TCP/IP Ports 7. Understanding Network Devices 8. Working with MAC Addresses 9. Intrusion Prevention and Intrusion Detection Systems 10. Network Security 11. Knowing Operating Systems 12. Backups and Archiving 13. Summary 14. Exam Essentials 15. Review Questions 5. Chapter 3: Cryptography 2 1. Cryptography: Early Applications and Examples 2. Cryptography in Action 3. Understanding Hashing 4. Issues with Cryptography 5. Applications of Cryptography 6. Summary 7. Exam Essentials 8. Review Questions 6. Chapter 4: Footprinting and Reconnaissance 1. Understanding the Steps of Ethical Hacking 2. What Is Footprinting? 3. Terminology in Footprinting 4. Threats Introduced by Footprinting 5. The Footprinting Process 6. Summary 7. Exam Essentials 8. Review Questions 7. Chapter 5: Scanning Networks 1. What Is Network Scanning? 2. Checking for Live Systems 3. Checking for Open Ports 4. Types of Scans 5. OS Fingerprinting 6. Banner Grabbing 7. Countermeasures 8. Vulnerability Scanning 9. Drawing Network Diagrams 10. Using Proxies 11. Summary 12. Exam Essentials 13. Review Questions...
Words: 71242 - Pages: 285
...TTL Cookbook BY Don Lancaster A Division of M t i c e Hall ComputerPublishing 11 711 Nonh College, Cmel, Indiana 46032 USA " 1974 by SAMS A Division of Prentice Hall Computer Publishing. All rights reserved. No parts of this book shall be reproduced, stored in a retrieval system, or transmitted by any means. electronic, mechanical, photocopying, recording, or otherwise, without written permission from the publisher. No patent liability is assumed with respect to the use of the information contained herein. While every precaution has been taken in the preparation of this book, the publisher assumes no responsibility for errors or omissions. Neither is any liability assumed for damages resulting from the use of the information contained herein. International Standard Book Number: 0-672-21035-5 Library of Congress Catalog Card Number: 73-90295 Interpretation of the printing code: the rightmost double-digit number of the first column is the year of the book's printing; the rightmost double-digit number of the second column, the number of the book's printing. For example, a printing code of 92-23 shows that the twenty-third printing of the book occurred in 1992. Printed in the United States of America. Preface I don't like to revise books. Correct, yes. Revise, no. So I won't. A book becomes history the instant it appears in print. To tamper with history messes with what others and I were thinking at the time and distorts the way things...
Words: 89774 - Pages: 360
...Acknowledgments ix Acknowledgments This book owes a great deal to the mental energy of several generations of scholars. As an undergraduate at the University of Cape Town, Francis Wilson made me aware of the importance of migrant labour and Robin Hallett inspired me, and a generation of students, to study the African past. At the School of Oriental and African Studies in London I was fortunate enough to have David Birmingham as a thesis supervisor. I hope that some of his knowledge and understanding of Lusophone Africa has found its way into this book. I owe an equal debt to Shula Marks who, over the years, has provided me with criticism and inspiration. In the United States I learnt a great deal from ]eanne Penvenne, Marcia Wright and, especially, Leroy Vail. In Switzerland I benefitted from the friendship and assistance of Laurent Monier of the IUED in Geneva, Francois Iecquier of the University of Lausanne and Mariette Ouwerhand of the dépurtement évangélrlyue (the former Swiss Mission). In South Africa, Patricia Davison of the South African Museum introduced me to material culture and made me aware of the richness of difference; the late Monica Wilson taught me the fundamentals of anthropology and Andrew Spiegel and Robert Thornton struggled to keep me abreast of changes in the discipline; Sue Newton-King and Nigel Penn brought shafts of light from the eighteenthcentury to bear on early industrialism. Charles van Onselen laid a major part of the intellectual foundations on...
Words: 178350 - Pages: 714
...الفصل الأول التعريف بتقنيات التشفير وأمنية المعلومات 1-1:المقدمة ( Introduction ): إن أمنية المعلومات ناتجة من الحاجة إلى تناقل المعلومات الخاصة لكل من العبارات العسكرية والدبلوماسيـة. هذه الحاجة هي قديمة بقدم الحضارة نفسها. الأسبان القدماء مثلا, شفروا عباراتهم العسكرية. أما بالنسبة للصين, فانه يكفي فقط كتابة العبارات بلغتهم المعروفة والتي تعبر لغة خاصة, وذلك لان القليل من الناس يستطيعون قراءة الحروف الصينية. كانت قنوات الاتصال في السابق بسيطة جدا وكانت ترتب بأسلوب يعتمد في تامين السري على استخدام مراسلين موثوقين. تعتمد الأمنية لمثل هذا التنظيم على كل من موضع الثقة للمراسل وقابليته في أن يبقى محتفظا بالمواقف أو المواقع التي فيها يمكن أن تتعرض العبارات للانتهاك. بسبب اكتشاف أنظمة الحاسبات واستخدام شبكات الحاسبة الواسعة بين الدول, فان القرن العشرين قد غير بصورة ملحوظة مدى مفاهيم الحماية. في الحاسبات المبكرة ( الأولى), فان الأمنية الفيزيائية ومعها سياسة الاختيار الملائم للكادر العامل في الحاسبة كان كافيا لتامين الأمنية. لكن هذا أصبح غير كاف وغير مرن بعد اكتشاف أنظمة حاسبات المشاركة الزمنية (Time-Sharing) والتي تتألف من عدة محطات طرفية موزعة في مساحة جغرافية واسعة. من الجدير بالذكر أن امن وسلامة اتصال,ت الالكترونية في بدء ظهورها لم يكن هاما لان معظم المعلومات المخزونة فيها لم تكن ذات حساسية كبيرة, بعكس ماهي عليه اليوم, إذ كلما ازدادت وارتفعت قيمة المعلومات المخزونة في الحاسبات الالكترونية كلما ازدادت الرغبة لدى بعض الأفراد لمحاولة الوصول إليها من اجل التخريب أو من اجل الكسب غير المشروع بواسطة بيعها إلى الجهات الراغبة بذلك, لذا فقد أصبح امن هذه المعلومات على درجة...
Words: 35136 - Pages: 141