...IGN (In Game Name): 600th Age: 18 Timezone: PST Country: United States. Do you have a good quality mic?: Yes. Do you have Telegram & Teamspeak?: Yes I have both. How many hours can you put in the server per week: 5 hours per day. About 25 hours or more in the week, but if I have a event coming up I would let admin know ahead of time. Any previous punishments on Faithful?: I was False banned but I got unbanned few minutes later other than that no. Any past experiences in being a staff member: Yes I was staff on Hysteria Network. Really nice community I just told them I didn't feel like being there anymore plus I wanted to focus more on school and I just wanted to play on other servers. I was Helper on there I SS a lot of people and found Vape and other clients etc. I have patience and I follow the rules. Why do you want to become staff?: I would like to become a staff member because I love helping people and making them enjoy their Minecraft experience. I am active and have a mature set of mind on things. I am also really responsible and independent. The reason I want to be staff is because, there have been many hackers that have been ruining the fun for others who are actually legit. Hackers who use like (Huzuni, Vape Client). The Nocheat system isn't that good because I have seen people hacking in front off people like its nothing flying around and all so I could always ban them and take care of it instead of having the person get to do what they want. From my experience...
Words: 711 - Pages: 3
...IGN - TheGamerzRock Previous IGN's (If changed in name changes) - 10big_gamer, I rue the day I made that decision Age - 14, Yes I understand I was denied due to the low age but I turn 15 in January, I have also noticed some staff have been 14, and I also understand you must be extremely professional, mature, and experience to bypass the age restriction which I am trying hard to do. Do you have teamspeak and a microphone? - I do have teamspeak 3 on my laptop, and phone, the microphone doesnt seem to cooperate on my phone but it does on my computer, though it is a little quiet and difficult at times it does work and gets the job done. Timezone? - Eastern timezone Where are you from? (e.g. United Kingdom) - The United States. Are you multilingual (Speak more than one language)? - I speak fluent English and have the basic Spanish knowledge as well as basic Spanish vocabulary, although if I do not know something I would usually translate through google translate...
Words: 1320 - Pages: 6
...For the unit 3 assignment, there will be three tasks: First you must create a logic circuit using only basic gates such as AND, OR, NOR, NAND, NOT, etc. to implement an ADDER capable of adding two 4 bit binary numbers. Second you must create a logic circuit using only basic gates such as AND, OR, NOR, NAND, NOT, etc. to implement a Subtractor that is capable of subtracting the second number from the first, by converting the second number into its 2's complement form and then adding the resulting number to the first number. You do not need to worry about accomodating the addition or subtraction of negative numbers as part of your assignment. Finally, for the third part of the assignment you must create a limited ALU (Arithmetic logic unit) circuit using Logism that implements a Full...
Words: 945 - Pages: 4
...Dear Ms. Leigh, Thank you for reaching out to me in your time of need. I am here to assist you in understanding the network that you are needing set up. Just to be clear that you understand what a network is, a network is a couple or more electronic devices communicating with each other. A network allows sharing of files and data amongst computers. Networks are categorized by the distance between network devices, also by the way a network is administered and the medium type used to transfer information from site to site. I would like to introduce you to five network types that are commonly used. A personal area network (PAN) is a personal network that you would use to communicate with your own devices such as smartphones, notebooks, Bluetooth tablets. A local area network (LAN) is a small area such as an office in a building or a restaurant. A home area network ((HAN) is used for in home networks. It is a specific LAN type that allows a wide range of devices to communicate, such as a surveillance cameras, computers, DVRs and small servers. A metropolitan area network (MAN) is a network that is used for a city or a large campus. A wide area network (WAN) is a network that covers both national and international networks. A WAN is a collection of all sub networks previously mentioned. An example would be the Kaplan University network considering Kaplan is national. The network can be administered centrally or locally. Central administration network means if you make a change on...
Words: 661 - Pages: 3
...from your iPhone, you can either use the “Photos” app on iPhone to share the video on Facebook or you can also use the Facebook application to upload videos. Using Facebook Application, you will also able to tag your friends in the video, and tell about your feelings but sharing via “Photos” app won’t let you do that. Normally, Videos will be uploaded in the normal quality, however, you can also upload the videos in high definition, just make sure to enable the “Upload HD” options in settings to upload the high definition video. Here’s how you can do that. Go to settings, Scroll down and Tap on “Facebook” Screenshot 1 Login with your Facebook account and tap on “Settings” Screenshot 2 Scroll down and enable the “Upload HD” video Screenshot 3 Now, use whatever method you want to use to upload videos to Facebook. Step by Step guide to upload videos to Facebook from iPhone: 1. Use “Photos” App to upload videos on Facebook: Open Photos and select the video that you want to upload on Facebook. Tap on the “Blue Arrow” at bottom left. Tap on “Next” Screenshot 4 From sharing options, Swipe left to see Facebook and tap on it. Screenshot 5 Now, a new pop-up will be shown. Write down the description of video, select the Location and Audience of Video and hit the “Post” button at top. Screenshot 6 That’s it! Your video will be automatically uploaded to the Facebook in the background. 2. Upload Videos using the Facebook App: Open Facebook Application and Tap on “Photo” right next to...
Words: 657 - Pages: 3
...Hello, Professor and Classmates! 1.Have you successfully downloaded and saved the Final Project from Doc Sharing? If not, please do so now and then return to this area to complete this Discussion. Yes, I have successfully downloaded and saved the Final Project from Doc Sharing. I’m done with my final project, but I plan on taking the class on 12th, so I can make sure I have done all the area correctly. 2.Have you successfully downloaded the Project Dataset from Doc Sharing? If not, please do so now and then return to this area to complete this Discussion Yes, I have successfully downloaded the Project Dataset from Doc Sharing. It’s easy to do if you have Excel installed on the computer. 3. Have you located the Excel tutorials that you may use for the Final Project in Doc Sharing? Which tutorial have you found to be the most useful?...
Words: 525 - Pages: 3
...Table of Contents Question 1: Three New Knowledge/Items Learned From The Videos. 2 1.1 Before the OSI model 2 1.2 The OSI Model is Just a model 3 1.3 TCP/IP Model Addressing 3 Question 2: Two Interesting Topics 4 2.1 The Arpanet 4 2. Different Types of Operating Systems 4 Question 3: One Question or Doubt 6 Has CSMA CD become Obsolete? 6 Referencing 7 Apprentices 8 Turnitin Plagiarism Report 8 Question 1: Three New Knowledge/Items Learned From The Videos. 1.1 Before the OSI model Imagine this: Mr. Mac wakes up from a wonderful dream and he’s dying to share it with somebody. He walks out of his house and grabs Mr. Novell, the first man he sees. He starts sharing with Mr. Novell his dream only to realize a minute later that Mr....
Words: 1128 - Pages: 5
...10, I find that the mute key icon remains in an ‘ON’ mode and this holds true irrespective of whether the speaker remains in a muted state or not. I have simply not been able to enjoy any forms of assistances from the Microsoft website. What can be done regarding such an issue? Windows 8.1 BSOD (possibly ntsokrnl.exe) For no valid reasons, I find that by system keeps experiencing a series of BSOD related issues and the fault message remains highlighted by the string as: DRIVER_POWER_STATE_FAILURE. Carrying out a fair extent of research reveals that such an issue remains triggered because of a number of failing drivers. Is there any way through which such a typical form of fault can be put to rest? Windows 7 Black Screen with Cursor on Load. 3-5 minutes long I am simply not able to understand as to what might be the singular cause that my HP 8740w Elitebook loaded with a genuine edition of Windows 7 keeps demanding approximately five (5) minutes so as to be able to complete its initial load phase properly. The system gets overheated and it is perceived that the netsvcs group consumes approximately 900 MB + of RAM. What could be the right way of fixing such an issue? Driver power state failure Windows 8.1 caused by several drivers It is almost on a daily basis that I keep experiencing an issue similar to the Driver Power State Failure. A look at the Bluescreen View which highlights that there are several causes behind the occurrence of such a fault and all of the same include; ntoskrnl...
Words: 1248 - Pages: 5
...as they are out of the office regularly. Docking stations at workstations, these allow an external monitor to be used at same time as laptop display. NETWORK Switches Managed, Layer 2 switches exist throughout the entire network. The previous network in charge choose to invest in switches rather than hubs, as switches are more efficient in forwarding data between specific network devices, making the best use of bandwidth available (Fitzgerald et al. 2012). The previous network in charge chose layer 2 switches because this was the most affordable technology available at that time, they were easy to develop and since each building only had one /24 subnet, it meant no routing in the LAN so no need for the expense of Layer 3 switching. The switches also utilize the SNMP protocol, using an agent that collects diagnostic “information about itself and the messages it processes” (Fitzgerald et al., 2012 p427) to monitor performance(FitzGerald and Dennis, 2005). The current network manager runs Solarwinds Network Management software, allowing retrieving and evaluating diagnostic information from the switches (Solarwinds 2013). Firewall/Router A SonicWALL NSA 240 Router is used in both buildings. It terminates the internet connection in each office. There is a site to site VPN tunnel between the two devices, connected over the internet. The SonicWALL is the default gateway (router) in each office that routes traffic either to the internet...
Words: 946 - Pages: 4
...curious-looking chord symbols in the songs you play. Here are the most common and user-friendly chord symbols, the variety of ways they may be written, the chord type, and a recipe for building the chord. Note: The examples in the table all use C as the root, but you can apply these recipes to any root note and make the chord you want. Chord Symbol Chord Type Ingredients C Major 1-3-5 Cmin; Cm Minor 1-♭ó3-5 Caug; C(♯5); C+ Augmented 1-3-♯5 Cdim; Cdim. Diminished 1-♭ó3-♭ó5 Csus2 Suspended second 1-2-5 C(add2); C(add9) Add second (or ninth) 1-2-3-5 Cm(add2); Cm(add9) Minor, add second (or ninth) 1-2-♭ó3-5 Csus4 Suspended fourth 1-4-5 C(♭ó5) Flat fifth 1-3-♭ó5 C6 Sixth 1-3-5-6 Cm6 Minor sixth 1-♭ó3-5-6 C7 Seventh 1-3-5-♭ó7 Cmaj7; CM7; C△7 Major seventh 1-3-5-7 Cmin7; Cm7; C-7 Minor seventh 1-♭ó3-5-♭ó7 Cdim.7; Cdim7 Diminished seventh 1-♭ó3-♭ó5-6 C7sus4 Seventh, suspended fourth 1-4-5-♭ó7 Cm(maj7) Minor, major seventh 1-♭ó3-5-7 C7♯5; C7+ Seventh, sharp fifth 1-3-♯5-♭ó7 C7♭ó5; C7-5 Seventh, flat fifth 1-3-♭ó5-♭ó7 Cm7♭ó5; CØ7 Minor seventh, flat fifth 1-♭ó3-♭ó5-♭ó7 Cmaj7♭ó5 Major seventh, flat fifth 1-3-♭ó5-7 The number recipe 1-3-♯5-7 is applied to three different root notes — C, F, G — to illustrate how chord building works with different root notes and thus different scale notes. By the way, the resulting chord is called a Cmaj7♯5 because you add the seventh interval and sharp (raise one half step) the fifth interval. image1.jpg...
Words: 614 - Pages: 3
...Area 2 Name : The Application Purpose : There are 2 accounts types : The professor account contains a personal data storage of 10GB. The professor will be able to see his schedule and his courses. For each course, the professor will be able to download the students' assignments and review them. All courses will be recorded, the professor will be able to show a file of his storage on the classroom's projector when connected to the LAN through the classroom's computer. If the course is online, the professor will be able to upload video. The student account contains a personal storage of 1GB. The student will be able to access to the university computers by login to his session. The computers will not save anything, they just contain computer...
Words: 1527 - Pages: 7
...Assignment 1 Task 1 Task 1 a): Iron Man DVD Interface The purpose of this example, is that it is a DVD that is made for the entertainment of who ever watches the movie. It gives you four things to choose from, Play, Set up, Special features and scene selection. The menu uses button that are interactive and take you to different scenes that have different types of media, for example the special features button will take you to a new scene with different features such as deleted scenes and a cartoon adventures. I think the DVD is a very good display of imagery and animation. It’s very easy to navigate, the buttons are clear and is just a very simple user interface. The graphics used are very crisp and clear. They are well sized as they are...
Words: 1493 - Pages: 6
...ASSIGNMENT-3 NETWORK ARCHITECTURE-1 Submitted by: YENUGU SATHYADHARI 16190296 Compare GBN, SR and TCP(no delayed ACK).Assume that the timeout values for all three protocols are sufficiently long such that 7 consecutive data segments and their corresponding ACKs can be received( if not lost in the channel) by the receiving host(host B) and the sending host (host A) respectively. Suppose Host A sends 7 data segments to Host B, and the 2nd segment (sent from A) is lost. In the end, all 7 segments have been correctly received by Host B. How many segments has Host A sent in total and how many ACKs has Host B sent in total? What are their sequence numbers? Answer this question for all the 3 protocols? Sol: Given 3 protocols...
Words: 2402 - Pages: 10
...1.1 Critically evaluate the different LAN technologies like Ethernet WLAN using 802 or 802.11 wireless standards that are meeting the client based requirements and identify the requirement that will be used in each technology. How Ethernet transfers data on a network: – Carrier Sense Multiple Access with Collision Detection (CSMA/CD) – Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) • Both are contention-based access methods – Different nodes on the network segment compete to see which node is able to send out its packet first • A method used by Ethernet to access a local area network • Most commonly used for wireless networks • Differs from CSMA/CD in that CSMA/CA first sends out a warning message letting all the other computers on the network know that a data packet is coming Wifi connectivity intended for personal computers is currently well established as well as the majority of new notebook computers have a Wi-Fi capability. With the WLAN answers that are offered the actual IEEE 802. 11 regular, • Baseband means that a cable can only carry one signal one way at one time – In most modern Ethernet cables, one line for sending signals and another line for receiving signals – Can result in collisions • Broadband media type can carry multiple data signals on the same wire using some type of multiplexing IEEE 802.11 is a set of media access control (MAC) and physical layer (PHY) specifications for implementing wireless local area network (WLAN) computer...
Words: 527 - Pages: 3
...2. Identified Risks There are a number of organisations that maintain a database of vulnerabilities. The list below is not exhaustive, but the vulnerabilities listed in this report have been extracted from Cve.mitre.org (n.d.). 2.1 The Catastrophic List These vulnerabilities were identified during the assessment and need urgent remediation as they pose a serious security risk to the organisation. ID Vulnerability Description Risk Category Remediation Method V001 A firewall is on the edge of the network acting as the first line of defence against any attempts to access the network without permission. However, the network not optimally protected, as the firewall is poorly managed. Catastrophic: Attempts to scan or penetrate network will not be detected all the time. • Operating system firewall installed where required. • Hardware firewall must be installed V002 Since users have full control of their PC, they can install their own software. Catastrophic: The software may contain Viruses, Worms, and Trojans. PCs are a gateway to the network, infecting other connected devices to the network. • Remove administration rights to all users. Each user must be allocated access rights according to their roles. • Remove all unauthorised software 2.2 HTTP Server Vulnerabilities ID Vulnerability Description Risk Category Remediation Method V003 Cross-site scripting (XSS) vulnerability in the highlighter plugin in Joomla! 2.5.x before 2.5.10 and 3.0.x before 3.0.4 allows remote attackers...
Words: 718 - Pages: 3