...NAME : CHOW MENG HONG STUDENT ID : GEC 0000 OD1 UNIT CODE : VU21323 TASK 1 1. I’LL COMPLETE THE EAL CERTIFICATE III AND IV HERE IN MELBOURNE AND AFTER THAT I’LL GO BACK TO MALAYSIA TO WORK AT A HIGHER POSITION IN MY WORK. 2. I WANT TO IMPROVE MY SPEAKING AND LISTENING SKILLS IN THIS CAREER 3. I CAN MOSTLY COMPLETE READING AND WRITING, BUT MY SPEAKING AND LISTENING SKILLS STILL NEED TO BE IMPROVED. 4. I HAVE COMPLETED A SECONDARY SCHOOL LEVEL AND LCCI LEVEL IN MY COUNTRY, MALAYSIA. 5. I NEED TO TAKE CERTIFICATE III AND IV IN EAL COURSE FOR MY CAREER. 6. GOOGLE.COM 7. TWO YEARS. 8. MELBOURNE 9. - IMPROVE MY LISTENING SKILL - IMPORVE MY SPEAKING SKILL - COMPLETE CERTIFICATE III IN EAL - COMPLETE CERTIFICATE IV IN EAL - BACK TO MALAYSIA - WORK...
Words: 1034 - Pages: 5
...Q1. (i) I have depicted the 3 naturally accruing isotopes of hydrogen. Hydrogen-1, sometimes known as Protium or just hydrogen, hydrogen-2, also known as Deuterium and finally Hydrogen-3, which is also known as Tritium. Although each isotope has a different number of neutrons; 0, 1 and 2, respectively. This has no impact on their chemical properties. But, it does however affect the physical properties. Namely their mass. Whereas Hydrogen-1 has an atomic mass of 1amu, Hydrogen-2 has an atomic mass of 2, due to the presence of a neutron in addition to the proton within the nucleus. And Hydrogen-3 has an atomic mass of 3amu as a result of another additional neutron. Each isotope also differs in its’ nuclear binding energy, this is a result...
Words: 1878 - Pages: 8
...MWR ASSIGNMENT 1 1. List the important microwave connectors Microwave connectors is a huge industry and there are many new types of being designed each year. Each connectors have their own frequency limit. Here are some of the connectors [1] • BNC Connector- It is used to quickly connect and disconnect the ends of a coaxial cable to any port, these are mostly found on the ends of the probes of an oscilloscope. They support up to a maximum of 4 GHz. • OSMT Connector- This is a surface mounted connector and is generally used on a PCB as they consume lesser space as compared against the usual Coaxial cable connectors. They support up to a maximum of 6 GHz. • N Connector- One of the first connectors capable of handling microwave waves invented by Neill, this was initially designed to carry...
Words: 656 - Pages: 3
... SUBJECT: OPERATING SYSTEMS ASSIGNMENT: HOME WORK ASSIGNMENT-2 Submitted by: MOHAN KUMAR RAJU BORUKATI mborukati@rivier.edu Q(1): Let S and Q be two semaphores initialized to 1. Can the code for processes P0 and P1 shown below cause a deadlock? Explain your answer. (Compare the code below to the example on page 217 of the textbook.) P0 P1...
Words: 1060 - Pages: 5
...__________________________________ is the chance or likelihood of some event occurring. The _________________________ of rolling 1 on a 12 sided dice is 1/12. __________________________ is the result of a trial of a probability experiment. I pulled a red marble out of a bag that had 5 red marbles and 5 blue marbles the _____________________ is that I pulled a red marble out. Find the probability of selecting a letter at random from the word MISSISSIPPI. Write the probability as a fraction. P(M) P(I)...
Words: 1694 - Pages: 7
... The project is the basis of the following theory: VLAN is a logical network, provides logical segmentation of network. Virtual LANs separate layer2 switch into multiple-broadcast domains. Each VLAN is its own individual broadcast domain, i.e. IP subnet. Here groups of ports or individual ports can be assigned to a specific VLAN and Only the ports which are belonging to the same VLAN can freely communicate; ports assigned to separate VLANs require a router to communicate, Broadcasts from one VLAN will never be sent ports belonging to another VLAN. A layer two switch that supports VLAN is not always necessarily a layer three switch, in addition to supporting VLANs, must also be capable of routing, and caching IP traffic flows. Layer 3 switches allows IP packets to be switched as opposed to routed, which reduces latency. VLANS work by handling tags to the network packets creating the functionality and aspect of network traffic, which is physically on one and only one network but acts as if it divided between two separate networks. Thus, VLAN can have network applications separate despite being connected to the same physical network and without requiring multiple sets of cabling all and networking devices. Otherwise, an external router is required for inter-vlan communication. In the LAN environment broadcast domains are divided by the VLANs. When a host in one VLAN have to communicate with a host in another VLAN the traffic has to route between them, this kind of routing is called...
Words: 783 - Pages: 4
...receive signal. Transport layer 4, which is the segment . Protocol working from this layer are TCP and UDP, TCP is for reliable connection, to make sure the datagrams arrives at the destination and UDP is for unreliable , unlike TCP using UDP there will not be any confirmation source like TCP, when the latency (signal) is bad you would use UDP. The network layer which is layer 3, it provides connection between host on different network, the datagrams on layer 3 are called packets where IPv6 and IPv4 begins process. Next, is layer 2 which is data connection which is known as data link, this is where ethernet will be operating. Also Mac addresses also know as hardware addresses, the layers on layer 2 are called frames. Lastly, Layer 1 they are for devices such hubs,connectors and cables. The physical layer describes all electricals and physical specifications for devices. The data are called bits. When troubleshooting it will always start at the physical layer. TCP TCP which stand for Transmission Control Protocol, it is a protocol of which works with reliability, it guarantees delivery of data from sender to receiver. TCP works at the transport layer which is layer 4. TCP three-way handshake, these are the steps on how it works it establishes the route of device is present on the network, 2. It verifies the information of which is being sent has an active service which will be accepting request on numbers of ports which clients are wanting to use for these sessions...
Words: 974 - Pages: 4
...Task 1.1 and 1.2, Significant features of Local Area Networks. A Describe in detail peer to peer. Peers are computer networks that are connected to each other through the internet. Files can be shared directly between systems without the need of a central server, which makes each computer on a p2p system its own client as well as a file server. A P2P (peer to peer) network requires only that you have an internet connection and P2P software such as, Kazaa , LimeWire, or bearshare. When a P2P is connected it allows you to search for files on other peoples computers, while at the same time allows other users on the network to access yours that are typically assigned onto a single folder that you have designated to share. One of the main upsides to a p2p network is that it does not need an expensive server as each individual computer acts as one. The user sets their own privacy settings as to which files are accessible to others. When a computer fails it does not affect the other parts of the network, though the files from the non-functioning computer are inaccessible. The p2p as with all networks has its downsides. There is no central backup for files, and files are difficult to locate if the computers owner has no logical filing system. The network requires a joint effort from each individual user to ensure that viruses are not introduced into the entire network. There is essentially no security other than user permission settings. Describe client server: Client/server, is...
Words: 1570 - Pages: 7
... Bridge A software/hardware that have job as a media to connect separate networks together so they can communicate each other called as a bridge. For example, there a two networks. The first one the device are connected by wireless technology and other by cables. The device which using wireless only can communicate with other wireless and the wired device only can communicate with wired also. So, all device can communicate with each other using a network bridge. It also determines a data packet are allowed or not to the other part of the Ethernet segments. Router Router is a device that allows the similar network to interchanges data packets between them. Similar network like same servers, workstations and protocols. Routers forward data based on information at layer 3. Nowadays, every home share a broadband internet connection by using a wireless routers. Also, people can give password to their routers to manage the traffic and forward to the correct computer only. Router also have other advantages like can connect to different WAN (Wide Area Network). So, we can find the usage of router to WAN of a network or larger networks. DSL Modem Internet is a computer network which have part to connect one device to another device base on TCP/IP (Internet Protocol). Have many ways to connect a device to the internet, one of them is by using DSL Modem. DSL stands for Digital Subscriber Line, which is a device which can send a signal by using a copper wire or telephone cable. Some part...
Words: 777 - Pages: 4
...Controlled Assessment Task 1 Test What to test How to carry out the test Expected Outcome Actual Outcome Action Needed 1a Green button that works. You tap the green button. Expect to see green dot or line when you draw with your finger. Green line drawn on the screen. No action needed. Works successfully. 1b Blue button that works. You tap the blue button. Expect to see blue dot or line when you draw with your finger. Blue line drawn on the screen. No action needed. Works successfully. 1c Red button that works. You tap the red button. Expect to see red dot or line when you draw with your finger. Red line drawn on the screen. No action needed. Works successfully. 1d Wipe button that works. You tap...
Words: 856 - Pages: 4
...ASSIGNMENT 3 1. Using only the following protocols (ARP, DNS, HTTP, ICMP, IP, NTP, RTP, UDP, TCP), describe the steps involved when the Internet host red.color.net pings another host green.paint.net. Describe this step by step, in detail- what happens in each host. Assume all caches are empty (i.e. No name or address resolution has been done, yet) You have to think through the whole chain of how address discovery works and what protocols are used at every step. Let red.color.net be Host A with IP Address 192.168.1.100 and green.paint.net be Host B with IP Address 192.168.1.200. Let’s assume that Host B have a web server running on it, and its port 80 is ready to accept http connections. Now, we open a web browser in Host A and type the URL...
Words: 977 - Pages: 4
... Locate the USB ports on the Surface Dock and connect your computer peripherals. 4. Locate a Mini Display Port on the Surface Dock and connect a cable from the monitor to it. You may need to purchase another cable or an adapter if you discover that the monitor cable does not have a Mini DisplayPort connector 5. Connect any accessories for audio purposes, such as speakers or headphones. Without outer speakers, it may be impossible to hear audio when you are using your Surface Pro 4. If this so, go to Troubleshoot Surface Dock on Surface.com to find out how to switch to the built-in speakers on your Surface. With this done you can now connect to your monitors and peripherals with a sole connection to the power port on your Surface Pro: 1. Plug out the Surface power supply and remove any accessories that are attached to the device. A microSD card can be left in themicroSD card slot. 2. Using the cable provided, connect Surface Dock to the charging port of your Surface. Connect or project to a monitor, screen, or other...
Words: 1020 - Pages: 5
...Semantics communicates with each section of bits such as how it will specify the pattern to be interpreted and what action is to be taken based on that interpretation. Finally it will identify the route to send the message to the final destination. Timing: It discussed about two characteristics, one when the data should be sent and second how fast the data can be sent. Sometimes when data is transmission there will be chances for overload due to that a huge data will be lost. Protocol Architecture: There is several protocol architecture which will be defines the objects and procedures how the data will exchange between the devices. For example TCP/IP protocol architecture, it has a five layers and the model is known as DARPA (Defense Advanced Research Project Agency). The five layers of DARPA model are • Application • Transport •...
Words: 541 - Pages: 3
...Save Incase you are unable to find the router IP address, it can be found using command prompt. For the same, follow below steps 1. Click Windows + X 2. Power User Menu opens up. 3. Then Click Command Prompt. 4. Type- “ipconfig”. This will display all the connections established on your computer 5. Look out for “ Default Gateway” 6. This gateway is under LAN tab 7. The default gateway is basically the IP address of your route Why is critical to change username and password of your router? The routers shipped from manufacturers come with default password and username. The Manufacturers use a standard combination of username and password. Easy way of identification is seeing the sticker on the router hardware device. Example- Motorola uses Username as admin and password as admin or password. Similarly other players have basic passwords which mandatorily should be changed as soon as purchase is done to avoid any hacks/leaks from your system Incase your IP 192.168.1.254 is not working, then what to do? Try following below options before contacting the service centre of the manufacturer 1. Ensure you have entered the correct address using HTTP:// 2. Some people mistake // with \\, so ensure correct...
Words: 494 - Pages: 2
...Name: MUTAIB HAIL ALSAHLI ID: 120004631 Answer, Question number 1, Before we talk about the differences there are Some people who may easily forget the fact that the USB Type-C and USB 3.1 are different from each other, considering the fact that both cross platforms were developed by the USB Forum (USB-IF) simultaneously, USB Type-C is a physical connector and USB 3.1 is a technology standard. Compatible devices can transfer data at a very high speed of up to 10GB per second.USB 3.1 standard allows for high-speed data transfer, but other devices such as tablets and smartphones might not transfer data that fast's Type-C and USB 3.1 are often confused with each other. The main difference between the two is that USB Type-C is developed to support USB 3.1 signals. Some devices might have Type-C connectors which only support the older USB standards such as USB 2.0 and USB 3.0. With more and more devices such as the new Lumia, Nexus are getting equipped with USB Type-C connectors combined with USB...
Words: 445 - Pages: 2