...Evaluate your personal computer configurations and determine whether it is a candidate for a clean install, migration, or if it’s unable to utilize the operating system. My home computer is already running Windows 7 home premium with Intel ® Core ™ 2 DUO T6600 @ 2.20 GHz 2.20 GHz, 4.00 Gigabyte memory with 2.84 Gigabyte usable with 32 bit version Operating System. I determined that my computer is able to support Windows 7 Operating System. I will be able to upgrade my computer from Windows 7 Home Premium to Windows 7 Ultimate however I will not be able to upgrade from 32 bit version to 64 bit version because Windows will only allow upgrades from a 32-bit version to a 32-bit version or from a 64-bit version to a 64-bit version. You can't upgrade from a 32-bit version to a 64-bit version. 32 bit and 64 bit are different architectures and you cannot upgrade from one to the other and they are too different under the hood. I will have to do a clean install when moving between 32 bit to 64 bit. 64 bit machines need 64 bit drivers, so I will have to check to make sure your machine can handle it and that peripherals have 64 bit drivers as well. After the clean install, the upgrade disk will detect previously installed Windows and allow the upgrade when it sees it on the hard drive. All the data will be erased and there will be nothing will left on hard drive after doing this upgrade. I need to copy all my stuff to an external hard drive, or buy a fresh hard drive to install the 64-bit...
Words: 295 - Pages: 2
...1. B. The network uses standards defined in TCP/IP RFCs, plus other standards. 2. C. Ethernet D. TCP/IP mapping 3. A. It exists as a written document. C. It has been passed through some form of review and approval or certification process. 4. A. De facto standard documents have been reviewed more thoroughly. C. De facto standards typically mean that the standards group has been authorized by many countries to create standards that apply to multiple countries. 5. B. The data link layer sits lower in the model than the transport layer. C. The physical layer sits just below the data link layer. 6. B. IEEE D. ANSI 7. D. To keep intellectual property rights to the technology inside the company 8. B. IP is a network layer protocol. 9. B. TCP/IP 10. B. The lower four layers of TCP/IP define the same kinds of functions as the matching layer numbers from OSI. 11. C. The PCs use two wires to create a circuit to send data from PC1 to PC2. 12. B. Ethernet defines MAC addresses, but when used in a TCP/IP network, it does not use the addresses, instead relying on IP addresses. 13. D. Datagram 14. B. Can be written in DDN format D. Used by routers to make a forwarding decision 15. A. 48 bits in length 16. A. LANs generally connect devices that are nearer to each other, compared to WANs. D. LANs are purchased, and WANs are leased. 17. B. Two TCP/IP data-link protocols are Ethernet...
Words: 699 - Pages: 3
...Student Name: Justin Hennings Date Due: November 24, 2013 Date Submitted: November 24, 2013 Instructor: L. Chretien Subject: NT1230 Unit 10 Exercise 1 – Backup Plan How Grade: One hundred points total. Submission Requirements * Write a response to the email below by recommending solutions and explaining the rationale for your recommendations. * This is not a group project. All rules of plagiarism apply. * Cite your sources and references. * Include introductory and concluding paragraphs. Assignment Requirements Respond to the following email: -- FROM: Rebop Pakulah, Acme Engineering Company RE: Burning Smell in the server room in the US office. Hello most esteemed US computer guru, While visiting the US Office I noticed that there was a somewhat disconcerting smell in the server room. It reminded me of my uncle's cooking – somewhat burnt. I am concerned that the employees are not being responsible and having too many of their barbecue parties since we turned off their streaming Internet music to their cubicles. They swear by the Curley's barbecue sauce but I am not a fan. We are using tape backup in the server room. Could the barbecue smoke affect the tapes? I am concerned because all of our backup tapes are kept in that room. What would you suggest to take make sure the tapes are not affected by the smoke? Thank you again for you kind attention to this matter. Yours truly, Rebop Pakulah ---- Self-Assessment Checklist ...
Words: 522 - Pages: 3
...2000+ | 900 + | 30 + | 1 = | 2931 | 1.1.2 22↓ | 21↓ | 20↓ | | 4X | 2X | 1X | | 1____ | 1____ | 0____ | | 4+ | 2 + | 0 = | 6 | 1.1.3 21↓ | 20↓ | | 2X | 1X | | 1____ | 1____ | | 2 + | 1 = | 3 | 1.1.4 24↓ | 23↓ | 22↓ | 21↓ | 20↓ | | 16X | 8X | 4X | 2X | 1X | | 1____ | 0____ | 0____ | 1____ | 0____ | | 16 + | 0 + | 0 + | 2 + | 0 = | 18 | 1.1.5 27↓ | 26↓ | 25↓ | 24↓ | 23↓ | 22↓ | 21↓ | 20↓ | | 128X | 64X | 32X | 16X | 8X | 4X | 2X | 1X | | 1____ | 1____ | 1____ | 0____ | 0____ | 0____ | 1____ | 0____ | | 128 + | 64 + | 32 + | 0 + | 0 + | 0 + | 2 + | 0 = | 226 | 1.1.6 156 | 28 | 28 | 28 | 12 | 4 | 0 | 0 | | 27↓ | 26↓ | 25↓ | 24↓ | 23↓ | 22↓ | 21↓ | 20↓ | | v | v | v | v | v | v | v | v | | 128x | 64x | 32x | 16x | 8x | 4x | 2x | 1x | | 1 | 0 | 0 | 1 | 1 | 1 | 0 | 0 = | 10011100 | 128 + | 0 + | 0 + | 16 + | 8 + | 4 + | 0 + | 0 = | 156 | 1.1.7 255 | 127 | 63 | 31 | 15 | 7 | 3 | 1 | | 27↓ | 26↓ | 25↓ | 24↓ | 23↓ | 22↓ | 21↓ | 20↓ | | v | v | v | v | v | v | v | v | | 128x | 64x | 32x | 16x | 8x | 4x | 2x | 1x | | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 11111111 | 128 + | 64 + | 21 + | 16 + | 8 + | 4 + | 2 + | 1 = | 255 | 1.1.8 200 | 72 | 8 | 8 | 8 | 0 | 0 | 0 | | 27↓ | 26↓ | 25↓ | 24↓ | 23↓ | 22↓ | 21↓ | 20↓ | | v | v | v | v | v | v | v | v | | 128x | 64x | 32x | 16x | 8x | 4x | 2x | 1x | | 1 | 1 | 0 | 0 | 1 | 0 | 0 | 1 | 11001001 | 128 + | 64 ...
Words: 552 - Pages: 3
...Unit 7 Assignment 1 Multiple Choice 1.) A 11.) C 2.) A, B 12.) A 3.) B, D 13.) A, D 4.) A 14.) C 5.) A 15.) B, C 6.) B, D 16.) B, D 7.) A 17.) C 8.) C 18.) B, D 9.) C 19.) A, C 10.) D 20.) B, C Key Terms Switched circuit - A circuit established through one or more intermediate switching devices, such as circuit switches or packet switches. Dedicated circuit - it is used in reference to a phone or data line, or to an electrical circuit. Circuit switching - a methodology of implementing a telecommunications link in which two network nodes establish a dedicated communications channel (circuit) through the network before the nodes may communicate. Packet switching - a digital networking communications method that groups all transmitted data into suitably sized blocks that are transmitted through a medium that may be shared by multiple simultaneous communication sessions. Leased line - connects two locations for private voice and/or data telecommunication service. Time-division multiplexing -a method of transmitting and receiving independent signals over a common signal path by means of synchronized switches at each end of the transmission line so that each signal appears on the line only a fraction of time in an alternating pattern. T-carrier system – one of several digital transmission systems developed by Bell Labs, sometimes called T-CXR. DS0 – a standard digital transmission rate for digital telecommunications, stands for Digital Signal Zero. DS1 –...
Words: 336 - Pages: 2
...CTI BEDFORDVIEW ITNT121 Assignment Networking Bradley Barker RJMMLYX21 9/12/2017 Networking Assignment Contents Question 1 1 Question 2 5 Question 3 42 marks 8 Bibliography 11 Question 1 Scenario Read the scenario below and answer the questions that follow: 1.1 You have been hired as a network expert to design and configure this network. Design an appropriate IP addressing scheme for Big Data College. For each subnet provide the following: (8 marks) a. Subnet address b. First IP address c. Last IP address d. Broadcast address Subnet Address First host Last Host Broadcast Lab 1 218.35.50.0 218.35.50.1 218.35.50.62 218.35.50.63 Lab 2 218.35.50.64 218.35.50.65 218.35.50.126 218.35.50.127 Lab 3 218.35.50.128 218.35.50.129 218.35.50.190 218.35.50.191...
Words: 824 - Pages: 4
...___________ Question 1 (25 marks) (a) A processor uses 8-bit 2’s complement signed integer representation. Given A = 8610 and B = 3110. (i) Express A and B in 8-bit sign-magnitude representation. (2 marks) A = 0101 0110 B = 0001 1111 (ii) Show how the processor computes the arithmetic operation B - A. Convert the result to decimal and show it is equal to -55. (6 marks) B – A = 0001 1111 – 0101 0110 = 1100 1001 = -55 0001 1111 - 0101 0110 Converted to 2’s complement __________ 0101 0110 0s will be converted to 1; vice versa. ‘1’ will be added thereafter. 1010 1001 + 1 1100 1001 Therefore, B – A = 0001 1111 + 0101 0110 1100 1001 Conversion of 1100 1001 to decimal: 0011 0110 0s will be converted to 1; vice versa 0011 0110 + 1 0011 0111 0011 0111 represents 55 in decimal. Therefore, 1100 1001 is -55 in decimal. (iii) Show how the processor computes the logic operation A AND B. (2 marks) 0101 0110 AND 0001 1111 0001 0110 (iv) Show how the processor computes the logic operation (NOT(A) AND B) OR (NOT(B) AND A). Express the result in hexadecimal. (6 marks) NOT(A) value: 1010 1001 NOT(A) AND B: 1010 1001 AND 0001 1111 0000 1001 NOT(B) value: 1110 0000 NOT(B) AND A: 1110 0000 AND 0101 0110 0100 0000 0000 1001 OR 0100 0000 0100 1001 0100 1001 to hexadecimal: 0100 4 1001 8+1 =9 0100 1001 in hexadecimal...
Words: 1908 - Pages: 8
...ITT TECHNICAL INSTITUTE NT1210 Introduction to Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes Identify the major needs and major stakeholders for computer networks and network applications. Describe how digital devices store data. Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): Respond to the multiple-choice questions. Complete the List the Words inside Acronyms table. Required Resources Odom textbook Computer with word processing software Internet access Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they are...
Words: 16182 - Pages: 65
...NT1210 Unit 4 Labs Unit 4 Labs NT1210 8/4/14 Unit 4 Labs Lab Review: 4.1 – Page: 82 and 83 1. To eliminate the crossover issue, lower the amount of equipment and cost. Simplify a network. 2. To increase the maximum distance for a signal. If put after the maximum distance the signal may degrade. 3. The connection and processing speed. It also depends on the number of connections the computer or laptop will allow. Lab Review: 4.2 – Page: 85 1. A. Bend Radius: The minimum radius that a fiber optic cable can be bent without loss of light or impairment. A general rule that it be no less than 15 times the cable diameter B. To not affect a signal sent down the line. 2. The core/Glass Filament, Cladding, Buffer, Strengthener and Outer Jacket. Lab Review: 4.3 – Page: 90 1. Ease of installation, lack of certified fiber optic specialists and changes to the physical design of the network later on. 2. By limiting the devices needed depending on the distance and need of each network. Verify the number of access points needed before the start. Lab Review: 4.4 – Page: 95 1. By selecting a specific layer and testing the health you can definitively say the problem lies either below or above that layer. Example: test the Transport layers health if it is ok you know the problem is in the Application layer. 2 A. B. If the cable is damaged in any way it should be checked. -----------------------...
Words: 255 - Pages: 2
...ITT TECHNICAL INSTITUTE NT1210 Introduction to Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Describe how digital devices store data. * Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): * Respond to the multiple-choice questions. * Complete the List the Words inside Acronyms table. Required Resources * Odom textbook * Computer with word processing software * Internet access * Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the...
Words: 16043 - Pages: 65
...ITT TECHNICAL INSTITUTE NT1210 Introduction to Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Describe how digital devices store data. * Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): * Respond to the multiple-choice questions. * Complete the List the Words inside Acronyms table. Required Resources * Odom textbook * Computer with word processing software * Internet access * Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the...
Words: 16043 - Pages: 65
...valuable information that will help you succeed and accomplish your goals Please attend every class for success in your field! Grading Policy: * Please read the last page of your syllabus which will be covered in week one. * Missing labs will be made up at 80% after the first week, 70% the after the second week and 0% the third week. * Quizzes will not be made up. * Students can potentially be dropped by the Dean of Academic Affairs after missing 4 or 5 cumulative classes. * Students who miss three consecutive class will be dropped by the Dean of Academic Affairs * Assignments and Labs will be counted at 0% after three weeks. Course Objectives Covered by This Unit * CO1 Identify the major needs and stakeholders for computer networks and network applications * CO2 Identify the classifications of networks and how they are applied to various types of enterprises * CO3 Compare and contrast the OSI and TCP/IP models and their applications to actual networks * CO4 Explain the functionality and use of typical network protocols * CO5 Analyze network components and their primary functions in a typical data network from both logical and physical perspectives * CO6 Differentiate among major types of LAN and WAN technologies and specifications and determine how each is used in a data network * CO7 Explain basic security requirements for networks * CO9 Use network...
Words: 799 - Pages: 4
...Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite or Corerequisite: NT1210 Introduction to Networking or equivalent Course Description: This course introduces operating principles for the client-server based networking systems. Students will examine processes and procedures involving the installation, configuration, maintanence, troublshooting and routine adminstrative tasks of popular desktop operating system(s) for standalone and network client computers, and related aspects of typical network server functions. Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course relates to other courses in the NSA program: 1 Date: 8/31/2012 Client-Server Networking I Syllabus NT2799 NSA Capstone Project ...
Words: 1834 - Pages: 8
...NT1210 Unit 8 Assignment 1 Practice #1 Give an IP address and number of bits borrowed (from the host for the subnet mask), Find the following information. Host Address 200.17.15.10 Network Class C SN Mask 255255255224 Network Address 200.17.15.0 Bits Bono wed 3 SNs Created 524288 Usable SNs | 8 | | Hosts perSN | 32 | Usable Host^N 30 | Subnet No. | Network ID | First Host IP | Last Host IP | Broadcast Address | 0 | 200.17.15.0 | 200.17.15.1 | 200.17.15.30 | 200.17.15.31 | 1 | 200.17.15.32 | 200.17.15.33 | 200.17.15.62 | 200.17.15.63 | 2 | 200.17.15.64 | 200.17.15.65 | 200.17.15.92 | 200.17.15.93 | 3 | 200.17.15.94 | 200.17.15.95 | 200.17.15.124 | 200.17.15.125 | 4 | 200.17.15.126 | 200.17.15.127 | 200.17.15.156 | 200.17.15.157 | 5 | 200.17.15.158 | 200.17.15.159 | 200.17.15.188 | 200.17.15.189 | 6 | 200.17.15.190 | 200.17.15.191 | 200.17.15.220 | 200.17.15221 | 7 | 200.17.15.222 | 200.17.15.223 | 200.17.15.252 | 200.17.15253 | Practice #2 Given an address and subnet mask, find the Following information. Host Add ness | 152.12.14.18 | Network Class | B | SN Mask | 255.255.255.240 | Net wotk Address | 152.12.14.16 | Bits Borrowed | 4 | SNsCieated | 1048576 | UsableSNs | 16 | | | Hosts perSN | 16 | Usable HosWSN | 14 | Subnet No. | Network ID | Rrst Host IP | Last Host IP | Broadcast Address | 0 | 152.12.14.16 | 152.12.14.17 | 152.12.14.30 | 152.12.14.31 | 1 | 152.12.14.32 | 152.12.14.33 | 152.12.14.46 | 152.12.14.47 | 2...
Words: 473 - Pages: 2
...Eddie Bond nt1210 Lab Review 1.1 1. 127 in binary is 01111111. I came up with tis answer by dividing by two till i couldnt anymore. 2.Both numbers represent the powers of 10. 3.16,32,64,128 4.It would be difficult becuase you would have to put multiple equations to find te rigt answer. Lab Review 1.3 1. It is important to know how many system words will fit in a primary device so you will know how big your storage device is. 2.Multiple bytes has more ones and zero as bytes with holds more information a single byte only has a series of 8 bit which has less data then a series of multiple sets of 8bit. 3. When converting a big number you cant just line up the digits, you need to make the number into bytes so that each one can easily convert into a unit of dex. Lab Review 1.4 1. My name in hexadecimal is 069 100 100 105 101 032 066 111 110 100. I would need 32bytes of storage. Lab Review 1.5 1. It is necessary to plan a file structure carefully because you want to have organization on the operating system . If it is too loosely organized or too detailed then it will be a chaotic environment and will be difficult to find anything. A nice organized file hierarchy would be easy to find things. Lab Review 1.6 1. To know what the system can handle and to know which operating system to use. 2. You must use the task manager, killing a program that is running your machine will cause your computer's operating sytem to stop working until the computer...
Words: 323 - Pages: 2