...Lab 1.2 Define Major Topics for a Database. Nouns Major Topic Hospitals - Conducting a double blind test of a new depression drug Doctors - Need to be able to see their own patient’s information and be able to enter blood pressures, blood results, depressions indicators, notes, etc. Patients - Should be able to see their own medical profile, doctor notes Drugs - A new drug will be dispersed in generic bottles, given to half of the patients for depression & to test the side effects. Lab1.3 Create a Statement of Work. Grandfield College: There is a law that requires businesses’ including schools, track their software. It is important to know what software the school owns, the versions, & license agreement. They’re a several licensing schemes. The least restrictive is a site that allows am institution to have a copy of the software in any machine in the school property. It is also important for the school to know which software is installed on the machine, location & which users have access. The school just wants to track the faculty & staff computers & software. For students it will be separate & treated as a second project later. Lab 1.4 Challenge Activities 1. Describe a situation in which the database might become inconsistent. * Transaction failure, database system failure 2. How could a relational database ensure data consistency? * Data integrity 3. What are some potential drawbacks to a flat-file database? * It usually...
Words: 256 - Pages: 2
...Unit 1 Exercise 1: IP Addressing Scenario 1. What subnet range/s should be used? One requirement to consider when choosing that one mask provide enough host IP addresses to support the largest subnet. Doing so the number of host bits (H) defined by the mask must be large enough so the 2h-2 is larger than or equal to the number of host IP addresses required in the largest subnet. To accommodate the growing subnet you will need at least 8 host bits. Eight host bits would be enough because 28-2=254 and 7 host bits will not be enough (27=126). 2^8-2=254 will support more than enough for 145 more host and with the growth of the company. 2. Should IP addresses be dynamically or statically assigned? Your IP addresses I would recommend dynamically assigned with having DHCP can dynamically allocate an IP address from a pool of addresses and reclaim it when no longer needed. To prevent any duplication of addresses and by a properly configured DHCP server, as an administrator you can move computers between subnets without manually configuring. With statically assigned, static IP addresses which you must configure and maintained manually. This is a time consuming task as the number of systems grow to larger numbers 3. Should one or more network/subnets be used? With plan of your company with a growth of 50% more which you currently have 145 hosts so add 145 hosts more to accommodate the 50 % growth, using the formula 2^8-2=254 for calculating the number of host/subnet. So 145 you will require...
Words: 452 - Pages: 2
...Unit 2 Explore and discuss Assignments EXT2 was the default file system for Linux until EXT3 came along. EXT2 still is a favored file system for Flash and USB drives due the lack of journaling. Journaling requires more writes to the storage unit and can be slow on these external devices. The Flash and USB drives have a limited number of write cycles. The File system Hierarchy Standard (FHS) is a reference describing the conventions used for the layout of a UNIX system. It has been made popular by its use in Linux distributions, but it is used by other UNIX variants as well. The Linux Standard Base (LSB) refers to it as a standard. In the FHS all files and directories appear under the root directory "/", even if they are stored on different physical or virtual devices. Note however that some of these directories may or may not be present on a UNIX system depending on whether certain subsystems, such as the X Window System, are installed. The Linux Standard Base (LSB) is a joint project by several Linux distributions under the organizational structure of the Linux Foundation to standardize the software system structure, including the file system hierarchy used in the GNU/Linux operating system. When targeting Linux as a platform, application developers want to have some assurance that the code they write on one Linux distribution will run on other Linux distributions without having to go through extra effort. This matches their experiences on other popular platforms, such...
Words: 333 - Pages: 2
...NT1330 Unit 2 Assignment. Due before class Week 3. A. Students will respond to the following technical support email from a junior IT admin with further questions and considerations. Facilitation Read the scenario below and respond in detail with clarifying questions, suggested approaches and/or possible solutions. Dear IT Admin: I am working at a branch office and have been tasked with changing out the DHCP scope to match the overall corporate IP address scheme. The main office assigned me an IP address range of 192.168.0.200 through 192.168.0.225. I changed the scope on Friday afternoon and came in on Monday morning to discover that only some of the workstations had picked up new leases from the new DHCP scope. Any ideas as to what may be happening, what I might check or adjust? Thank you, Junior Admin B. Students will respond to the following technical support email from a junior IT admin with further questions and considerations. Facilitation Read the scenario below and respond in detail with clarifying questions, recommendations and/or considerations. Dear IT Admin: I am working at two branch offices and have been tasked with where to place Active-Directory Integrated DNS Servers and what type to use. One of the branch offices is very small (maybe 5 users) and has very slow network connectivity. Do I need a DNS Server and, if so, which type of zone should it host? The second branch office is much larger (about 30 users) and has better...
Words: 276 - Pages: 2
...Lab 2 worksheet CONFIGURING DNS AND DHCP THIS LAB CONTAINS THE FOLLOWING EXERCISES: Exercise 2.1 Designing a DNS Namespace Exercise 2.2 Creating a Zone Exercise 2.3 Creating Domains Exercise 2.4 Creating Resource Records Exercise 2.5 Creating a Scope Exercise 2.6 Confirming DHCP Server Functionality Exercise 2.7 Configuring DHCP Reservations Workstation Reset: Returning to Baseline Estimated lab time: 100 minutes |Exercise 2.1 |Designing a DNS Namespace | |Overview |You have been tasked with creating a test DNS namespace structure for your organization. Your first | | |task is to design that namespace by specifying appropriate domain and host names for the computers in| | |the division. | |Completion time |15 minutes | 2. In the diagram provided in Figure 2-1, write both the domain names and the fully qualified domain names that you have selected for the computers in the appropriate spaces. Figure 2-1 |Exercise 2.2 |Creating a Zone | |Overview...
Words: 782 - Pages: 4
...1. (4)Implemen 6)Implementing and monitoring organisational procedures and legal requirements for identifying hazards and assessing and controlling risks • Identify the potential hazards in the organisation in accordance with WHS policies and procedures According to WHS policies and procedure the potential harzards in the company are: 1. keyboard work for long periods without a break 2. activities that involve lifting or carrying materials or equipment 3. trip hazards like trailing cords, frayed carpet or boxes in walkways 4. using a hazardous substance for cleaning 5. noise generated by machinery 6. working with sharp instruments, e.g. broken can for recycle them 7. working with or close to machinery with moving parts • Explain the steps that the organisation would take for the hazards and risks that have been reported 1) To identify the hazard- Involves finding things and situations that could potentially cause harm to workers 2) To access the risks- A risk assessment involves considering what could happen if someone is exposed to a hazard and the likelihood of it happening 3) To control the risks- Managing risks involves eliminating them so far as is reasonably practicable, or if that is not possible, minimising the risks so far as is reasonably practicable. 4) To review control- Measures that you put in place should be reviewed regularly to make sure they work as planned 5) To keep records- Keeping records of the risk management process demonstrates potential compliance...
Words: 479 - Pages: 2
...1.1 Identify legislation and policies that are designed to promote the human rights, inclusion, equal life chances and citizenship of individuals with learning disabilities? .Essential Standards .Mental Capacity Act. .Equality Act .Human Wright Act .National Health Serve and Community Care Act 1990 .Company policies and procedure 1.2 Explain how this legislation and policies influence the day-to-day experiences of individuals with learning disabilities and their families? It helped and protect people with disabilities from discrimination and protect them from abuse. 2.1 Explain what is meant by ‘learning disability’? A learning disability affects the way people understand information and may need support to develop new skill. 2.2 Give examples of causes of learning disabilities? Complication during birth resulting in lack of oxygen A learning disability can be caused by early childhood illnesses 2.3 Describe the medical and social models of disability? The medical model of disability view disability as a problem that belongs to disabled person. The social model of disability, in contract, would see the steps as disabling barrier. 2.4 State the approximate proportion of individuals with a learning disability for whom the cause is ‘not known’? The people that have mild learning disability, 50%of this disability the cause is unknown. but people with severe learning disability the rate of unknown cause is approximately 25%. 2.5 Describe the possible impact...
Words: 1069 - Pages: 5
...1. What is the primary means of identifying network devices and services in a Windows Server 2008 network? A) DHCP B) TCP/IP C) DNS D) IP Feedback: In a Windows Server 2008 network, the primary means of identifying network devices and services is through the use of DNS. Correct Answer(s): C 2. The process of obtaining an IP address for a computer name (for example, “ComputerA”) is called __________. A) name resolution B) address controlling C) address resolution D) name controlling Feedback: The process of obtaining an IP address for a computer name (for example, “ComputerA”) is called name resolution. Correct Answer(s): A 3. Which of the following is not a top-level domain name? A) .aero B) .coop C) .museum D) .corp Feedback: The available generic top-level domain names include .aero, .biz, .com, .coop, .edu, .gov, .info, .int, .mil, .museum, .name, .net, .org, and .pro. Correct Answer(s): D 4. The routing service included with Windows Server 2008 is better suited for __________. A) a smaller network B) a larger network C) a mid-size network D) large amounts of traffic Feedback: The routing service included with Windows Server 2008 is better suited for a smaller network or one with a small amount of network traffic that needs to pass between subnets. Correct Answer(s): A 5. Which feature is an integral part of IPv6, whereas it was an optional feature under IPv4? A) IP security B) subnetting C) DNS security D) name resolution Feedback: IP security through the use of IPSec...
Words: 9157 - Pages: 37
...NT1330 Assignment 1: Introduction to Windows 2008 Network Services 1.) The Domain Name System consists of a hierarchical set of DNS servers. Each domain or subdomain has one or more authoritative DNS servers that publish information about that domain and the nameservers of any domains "beneath" it. The hierarchy of authoritative DNS servers matches the hierarchy of domains. At the top of the hierarchy stand the root nameservers: the servers to query when looking up (resolving) a top-level domain name (TLD) Features • Scalability—Because DNS is capable of distributing workload across several databases or computers, it can scale to handle any level of name resolution required. • Constancy—Host names remain constant even when associated IP addresses change, which makes locating network resources much easier. • Ease of Use—Users access computers using easy-to-remember names such as www. microsoft.com rather than a numerical IP address, such as 192.168.1.100. • Simplicity—Users need to learn only one naming convention to find resources on either the Internet or an intranet. 2.) DHCP stands for Dynamic Host Configuration Protocol. As the name suggests, DHCP is used to control the network configuration of a host through a remote server. DHCP functionality comes installed as a default feature in most of the contemporary operating systems. DHCP is an excellent alternative to the time-consuming manual configuration of network settings on a host or a network device. Features · DHCP client...
Words: 1542 - Pages: 7
...NT1330 Client Server Networking II Mr. Pham Unit 2 Assignment 1 Dear Junior Admin, Regarding your task with changing out the DHCP You can start by checking the workstations and seeing if they have an static IP setup on the network adapter. There are 2 ways to check this. The first way is to click on the run command in the start menu and type cmd and hit enter. Next type in ipconfig /all, depending on how many Network Interface Card or NIC cards are installed (both logically and virtually.) you might get a long list . Look for your main NIC card that you are configuring. Once you find your NIC card that you are looking for, you should see a line that says DHCP Enabled. If there is no static IP address set up then it should say yes. The second way to check is to open the control panel. Find and open the Network and Sharing Center. On the right hand side you should see an option for change adapter settings. Select you main NIC card and right click and select properties. Select and double click on Internet Protocol Version 4 (IPv4). Once the window pops up, make sure that both the radio buttons for obtain IP Address automatically are selected. You should also check to see if each workstation has renewed its DHCP lease. To do this you can repeat the steps in the first way to change the DHCP setup. Once again you want to look for your main NIC card that you are configuring. Once you find your NIC card that you are configuring you should see 2 lines that say Lease Obtained...
Words: 357 - Pages: 2
...ITT Technical Institute 3825 West Cheyenne Avenue, Suite 600 North Las Vegas, Nevada 89032 NT1330 Client-Server Networking II Name: ____________________________________________________ Date: _______________________ NT1330 Week 2, Assignment 2 Instructions: 1. Complete this assignment and submit it prior to the beginning of the next class meeting. 2. Completely fill in the bubble for the correct answer(s), any other mark such as an X or just a line through it will be marked as incorrect. 1. DHCP frees system administrators from manually configuring each host on the network. A True B False 2. The smaller the network, the greater the benefit of using a dynamic address assignment. A True B False 3. DHCP provides three key benefits to those managing and maintaining a TCP/IP network. A True B False 4. The key aspect of the DHCP process is that it is dynamic. A True B False 5. Once a DHCP scope is defined and exclusion ranges are applied, the remaining addresses form what is called an available address pool within the scope. A B True False 6. To conserve disk space, DNS servers store only the most recent updates. A True B False 7. The primary DNS server for a zone is not required to perform an incremental zone transfer. A True B False Steve Todd Page 1 of 8 8. For replication of Active Directory–integrated zones, DNS notification is needed. A True B False 9. Scavenging is enabled by default. A True B False 10. As long as the TTL for a cached resource record does not expire...
Words: 1735 - Pages: 7
...NT1330 Client-Server Networking II Name: Homework 1 Ch. 1 (70-642): Introduction to Networking Concepts Fill in the Blank: 1-10 The most widely used IP addressing scheme is IPv4. The most recent and largest address space IP addressing scheme is IPv6. To distribute IP addresses automatically, a network administrator would configure the DHCP service. The first attempt at breaking up IP address space used classful addressing to provide address ranges of differing sizes. Prior to the introduction of the Domain Name System, computers used HOST files to map human-readable named to IP addresses. A(n) Subnet Mask is used to separate the host address portion of an IP address from the network address. The subnet mask within the TCP/IP configuration is used to distinguish the network address from the host address. In dotted-decimal notation, each IPv4 address is broken up into four octets. Server computers and other systems that need to be accessed reliably by network clients should be configured with a(n) static IP address. The method of breaking up IP address space into address ranges of flexible size is called CIDR . Page Break Case Scenario Case Scenario 1-1: Designing Windows Server 2008 Network Services Lucerne Publishing is a publishing company based in New York City, New York, which produces science textbooks for colleges and medical schools. In recent months, Lucerne Publishing has been planning...
Words: 574 - Pages: 3
...NT1330 Mr. Ajero Assignment 1 September 14, 2015 DNS – Domain Name System DNS is a hierarchical representation of all the IT devices and their sub-domains in a (company) network. So, in case you see an address like mail.subdomain.company.com, you can easily recognize the name of the system (mail), name of the sub-domain (sub-domain), name of the company (company) and the name of the primary domain (.com). DHCP – Dynamic Host Control Protocol A DHCP server automatically assigns the IP addresses for a device. Any device, before communicating with any other device in the network needs an IP address. These IP addresses are given to the network devices dynamically by a DHCP server (IP addresses ought to be within a certain range and the range is already specified). The IP addresses assigned this way are not permanent – they are actually leased for a certain amount of time to the devices (till they log-out of the network, for example). I believe that two hosts should be sufficient. Using a DHCP Relay Agent would greatly reduce the time necessary for me to set up the name allocation and resolution. If I were to do this manually on a static IP Address, I would have to put a stop to it at 25 machines as it would waste valuable time with trying to get to the other pieces of equipment my client owns. Regardless of if I was getting paid by the hour, I would need extra time for future maintenance and upgrades References DNS and DCHP explanation/definition:...
Words: 276 - Pages: 2
...Dear Junior Admin, PCs generally have an eight day default lease period. The PC will not make contact to the DCHP server again until halfway through the lease time. Since you changed the scope on Friday, the PCs that just renewed a lease will not contact the DCHP until Tuesday. You may force the PCs to grab new IP addresses by opening a DOS prompt, and do an “ipconfig/release” and an “ipconfig/renew” on each computer. If the problem still isn’t solved, check your scope configuration, and make sure the network/subnet mask match what is configured on the router that is connected to this local LAN. Terra Klaase IT Admin PART B Dear Junior Admin, Active Directory integrated zones must be hosted by Domain Controllers (DCs), and all Active Directory integrated zones are primary zones. Given this, we’re really talking about where to place Domain Controllers servicing the additional role of DNS server. Determining where to place DCs/DNS servers isn’t always straight-forward. However, as a rule of thumb, I take the view that any branch location that’s going to be utilize Active Directory services (authentication, file services, etc.), benefits from having a local DC and domain-integrated DNS services. You might already know much of this, so bear with me… When deciding where to place DC/DNS Servers, keep the following things in mind: * Domain members rely heavily on DNS services to locate domain resources. For example, when a domain-joined computer boots, it queries domain Service Locator...
Words: 617 - Pages: 3
...1. Describe a local land line phone system based on the following Landline Telephone Components: Local Loop – Connects the customer to the central office. Central Office – Makes the connection between local loops (customers) to local exchanges. Local Exchanges – Routes calls either to another central office or POP. POP – Routes calls from one local exchange to another or to a long distance system. Long Distance System – Connects POPs together to route calls over long distances. Fixed Line – Describes using copper wiring rather than a cellular method. 2. Define and describe the following Telecommunications Network Components: Cellular Telephones: Voice – Device (smartphone, computer), Cell site, carrier Data – Device (smartphone, computer), Cell site, carrier Telephone Network Topology: Demarcation Point – This is the point where the service provider verifies that services are available and the obligation of wiring shifts to the customer. Equipment – Any equipment not touched by an end user for a carrier to provide telecommunication services. Access Networks – Part of a telecommunications network that connects customers to their service provider (carrier). Regional/Metro Networks – A network that covers a particular region or metropolitan area, generally determined by geographic location. Cable TV Broadcast TV – Involves the act of broadcasting audio and video over the airwaves for TV antennas to pick up. Community Antenna – Generally a larger...
Words: 382 - Pages: 2