...Mid-term Exam Unit 1 Questions: 1. Explain the Morris Worm and its significance. It is considered to be the first Internet Worm. It was designed to count the number of systems connected to the Internet, however due to a flaw the worm replicated quickly and caused widespread slowdown across the globe. 2. Explain what____ hackers are. White-Hat- Those that know how hacking works but use skills for good Black-Hat – Those that through actions or stated intent, indicated that their hacking is designed to break the law, disrupt systems or businesses, or generate an illegal return Grey-Hat – Rehabilitated hackers or those that once were on the (black-hat) dark side but are now reformed, not all people will trust a grey-hat hacker 3. What is ECPA and what does it regulate? The Electronic Communications Privacy Act it prohibits eavesdropping or the interception of message contents without distinguishing between private or public systems 4. What is SOX and what does it regulate? It is the Sarbanes-Oxley Act and it generates laws that affect public corporations financial reporting. Under SOX corps must certify the accuracy and integrity of financial reporting and accounting 5. What is the main motivation for hackers today and what was the previous motivation for earlier generations of hackers? Today’s hackers are motivated by greed or money some for status/terrorism/revenge and some for fun. Early hackers were in it for the curiosity. However also today...
Words: 3888 - Pages: 16
...Unit 10 Assignment 1: Video Summary 8 Video 2.04 chkdsk (Check Disk) Topics * Disk Options * Drive properties Terms * Cross-linked Files: FAT Files that point to the same cluster. Cross-linked files are created as the computer is improperly shut down or an application abnormally aborts. For this video it reminded me that chkdsk used to be scandisk. Video 2.01 Windows Update Topics * Security Center * Control panel access * Internet explorer access route Video 2.10 Support Tools Topic * The Dependency Walker Terms * Dependency walker: troubleshoots faulty applications. For this video, I have learned the name of the process I have used to repair applications. Video 2.15 DirectX Diagnostic tool Topics * Run line access point / run line command * System tools access point Terms * Dxdiag: DirectX multimedia program run code. Video 4.01 Comparing LAN’s and WAN’s Topics * Stand-alone computer * Peer-to-peer Network * Client server Terms * LAN: Local Area Network * WAN: Wide Area Network * Work group: A peer-to peer network and all network computers. * Domain: A type of client-server network that requires at least on server prompted to have the role of domain controller. In the Video 4.01, I learned that Local Area Networks cover a short distance, and that Wide Area Networks can cover...
Words: 494 - Pages: 2
...Don Delara/IT320 IT320 Wan Technology/ Unit 4 Assignment: 4.1 1. At what layer of the OSI model does CDP operate? Data Link layer 2. What is the primary use for CDP? To discover information about directly connected Cisco devices 3. What network layer protocols can CDP provide information for? IP, Internetwork Packet Exchange (IPX), and AppleTalk 4. When CDP is enabled on an interface, a router (or switch) sends CDP advertisements on a regular basis, which list information about the sending router. Included in the packets are a series of Type/Length/Value, or TLV, data structures. 5. The show cdp neighbors command can be used to display one line of information about each directly connected CDP-enabled device. List the six pieces of information displayed. Device ID, local interface, holdtime, capability, platform, and port ID 6. In the topology of all Cisco devices shown in Figure 4-1, you are on Host A and consoled in to RTA. What devices can you see in the output from CDP commands? SWA, RTB, and RTC—only the directly connected devices that are attached to RTA 7. How would you gather information about other CDP-enabled devices in the network? By Telneting to those devices and using the show cdp neighbors command 8. From RTB in Figure 4-1, what devices can you see in the output from CDP commands? RTA and RTD 9. From RTC in Figure 4-1, what devices can you see in the output from CDP commands? RTA and RTD 10. From RTD in Figure 4-1, what devices...
Words: 1186 - Pages: 5
...QualNet 5.0.2 User’s Guide March 2010 Scalable Network Technologies, Inc. 6100 Center Drive, Suite 1250 Los Angeles, CA 90045 Phone: 310-338-3318 Fax: 310-338-7213 http://www.scalable-networks.com http://www.qualnet.com Copyright Information © 2010 Scalable Network Technologies, Inc. All rights reserved. QualNet is a registered trademark of Scalable Network Technologies, Inc. All other trademarks and trade names used are property of their respective companies. Scalable Network Technologies, Inc. 6100 Center Drive, Suite 1250 Los Angeles, CA 90045 Phone: 310-338-3318 Fax: 310-338-7213 http://www.scalable-networks.com http://www.qualnet.com ii QualNet 5.0.2 User’s Guide Table of Contents Preface................................................................................. xiii Chapter 1 Introduction to QualNet .......................................................... 1 1.1 Overview .................................................................................................................. 1 1.2 QualNet Architecture .............................................................................................. 2 1.3 Scenario-based Network Simulation..................................................................... 4 1.3.1 General Approach .............................................................................................. 4 1.3.2 Creating Scenarios............................................................................................. 4 1.3.3 Files...
Words: 86998 - Pages: 348
...User Guide YML864 Rev1 www.netcomm.com.a� ����4 ��e�� ����e 54Mbps Wireless Router 1 NB504 CoNteNts Package Contents .........................................................................................................................................4 Chapter 1: About this Guide ..........................................................................................................................5 1.1 Purposes ...........................................................................................................................................5 1.2 Conventions .......................................................................................................................................5 1.3 Overview of this User Guide ................................................................................................................5 Chapter 2: Introduction .................................................................................................................................6 2.1 Overview of the Router........................................................................................................................6 2.2 Features ............................................................................................................................................7 2.3 Panel Layout ......................................................................................................................................8 2.3.1 The Front...
Words: 19282 - Pages: 78
...IP Troubleshooting Small Group Exercise Activity Overview: This is a small group activity consisting of an IP troubleshooting exercise consisting of five scenario based questions. The exercise begins with a review of a recommend IP troubleshooting procedure and continues with five scenario based questions. Simplified IP Troubleshooting Procedures: Host: * Verify layer-1 and layer-2 * Physical connectivity to the host to connected. Ethernet connection should indicate electrical connectivity with some type of LED indicator light. * Verify OS detecting network interface correctly by verifying drivers installed correctly and OS display the interface as “connected” * If you have access to switching infrastructure ensure that host is assigned to the proper VLAN with the correct interface switching type (access or trunk) * Verify layer-3 * Verify IP address assignment configuration with “ipconfig /all” command on MS Windows OSs * IP address and mask correctly assigned? * Default gateway; is the host on the same IP subnet as the default gateway? * Attempt to ping default gateway, * If successful host has layer-3 connectivity to directly connection network * If unsuccessful attempt to ping other host on directly connected IP subnet * If host is having issues with pinging hosts on directly connected network, verify ARP resolution by using the command ”arp –a” command. This command...
Words: 1729 - Pages: 7
...Quantitative Methods and Analysis Ip U1 Unit 1 - Fundamentals of Statistics Jeanna Starr American InterContinental University Abstract A data analysis was done on job satisfaction for the company AIU categorized by age, gender, tenure, position, and department. Overall job satisfaction as well as intrinsic (satisfaction with the actual performance of the job) and extrinsic (office location or work colleagues) job satisfaction were considered in this survey. Introduction AIU assembled a team of researchers to study job satisfaction. I was selected as part of a group to participate in a massive global undertaking. The study required me to examine data and analyze the results. The study consists of job satisfaction, which is extremely important to an organization’s overall success. This particular study will allow managers to gain understanding and knowledge about what type of human behaviors can be used to strengthen an organization’s performance. Chosen Variables I have chosen gender for my qualitative data and intrinsic for my quantitative data. The reason that I have chosen these two variables is because I thought it would be interesting to analyze if males or females were more satisfied with their job, and how the actual job performance reflected their job satisfaction rating. Difference in variable types Qualitative variables include subjects that are non-numerical, such as gender. Quantitative variables include subjects...
Words: 313 - Pages: 2
...THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio-frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case users will be required to correct the interference at their own expense. The following information is for FCC compliance of Class B devices: This equipment has been tested and found to comply with...
Words: 26881 - Pages: 108
...E-COMMERCE (TIT-501) UNIT I Introduction What is E-Commerce, Forces behind E-Commerce Industry Framework, Brief history of ECommerce, Inter Organizational E-Commerce Intra Organizational E-Commerce, and Consumer to Business Electronic Commerce, Architectural framework Network Infrastructure for E-Commerce Network Infrastructure for E-Commerce, Market forces behind I Way, Component of I way Access Equipment, Global Information Distribution Network, Broad band Telecommunication. UNIT-II Mobile Commerce Introduction to Mobile Commerce, Mobile Computing Application, Wireless Application Protocols, WAP Technology, Mobile Information Devices, Web Security Introduction to Web security, Firewalls & Transaction Security, Client Server Network, Emerging Client Server Security Threats, firewalls & Network Security. UNIT-III Encryption World Wide Web & Security, Encryption, Transaction security, Secret Key Encryption, Public Key Encryption, Virtual Private Network (VPM), Implementation Management Issues. UNIT - IV Electronic Payments Overview of Electronics payments, Digital Token based Electronics payment System, Smart Cards, Credit Card I Debit Card based EPS, Emerging financial Instruments, Home Banking, Online Banking. UNIT-V Net Commerce EDA, EDI Application in Business, Legal requirement in E -Commerce, Introduction to supply Chain Management, CRM, issues in Customer Relationship Management. References: 1. Greenstein and Feinman, “E-Commerce”, TMH 2. Ravi Kalakota, Andrew Whinston...
Words: 2913 - Pages: 12
...Jiang 1 Forecasting Imports Price Growth in China With Many Potentially Relevant Predictors: An Analysis of Forecast Methods Lili Jiang Saint Louis University ECON 698 Professor: Hailong Qian Jiang 2 Abstract This paper examines to forecast monthly growth rate of import price in China in the presence of 19 potentially relevant predictors, including international trade related variables, broad economic trend measurement, world CPI and world commodity prices and indices from January 1994 to January 2013. Simulated out-of-sample autoregressive model serves as the benchmark model. Individual autoregressive distributed lag (ARDL) model, simple averaging combination forecast, approximate Bayesian model averaging combination forecast, discount MSFE combination forecast and diffusion indices forecast are built to compete the benchmark model. We found that all combination forecasts outperform benchmark forecast but are not statistically significant by using Clark & West test. The ARDL model with the predictor of China export price and China PPI beat the benchmark model significantly. Finally, resorting to Diebold and Mariano test, we found that the predictor of PPI in China performs best in forecasting the growth rate of import price in China. Jiang 3 1. Introduction In the past 20 years, China has undertaken market oriented economic reforms and achieved an average annual growth rate of 9.62%. The expansion of economic...
Words: 7204 - Pages: 29
...The product I choose to be obsolescing is a landline also known as POTS (Plain Old Telephone Service). The landline phone has been on the decline and has been replaced with cellphones. In the late 90’s and early 2000s the landline was used to connect to the internet. To cellphones can be used as mobile hotspots to connect wirelessly to the internet using a laptop, notebook, Generation Y is contributing factor of the cellphone is now become a house phone. Consumers, who like the variety and the convenience of mobile phone allows the cellphone very accessible. According to The CDC statistics stated that one out of every four Americans has given up their landline phone and are now using their cellular phone exclusively. There are a few reasons why many consumers have, in huge numbers, ditched the hard-wired phone and relied solely on their cell phone. One of the reasons is that alternative means of communication have reduced the number of phone calls that phone users make. Many of these means of communication can be utilized via a cell phone. For example, many use their cell phone for obtaining and sending e-mail, messaging on Facebook and other social media sites, and SMS texting. The decline of landline phones and the rise in cell phone use does not simply mark a shift between one types of phone to another. The decline of the landline is also a reflection of how individuals have changed in our preferred means of communication. “The phone network is thus not just a technical infrastructure...
Words: 1495 - Pages: 6
...Olokoyo Department of Finance, School of Business, College of Development Studies, Covenant University Ota, Ogun State, Nigeria Tel: +234-802-394-8641 Email: felicitymy79@gmail.com Received: January 20, 2011 Accepted: March 30, 2011 doi:10.5430/ijfr.v2n2p61 Abstract This study investigated the determinants of commercial banks’ lending behaviour in the Nigerian context. The study aimed to test and confirm the effectiveness of the common determinants of commercial banks lending behaviour and how it affects the lending behaviour of commercial banks in Nigeria. The model used is estimated using Nigerian commercial banks loan advance (LOA) and other determinants or variables such as their volume of deposits (Vd), their investment portfolio (Ip), interest (lending) rate (Ir), stipulated cash reserve requirements ratio (Rr) and their liquidity ratio (Lr) for the period; 1980 – 2005. The model hypothesizes that there is functional relationship between the dependent variable and the specified independent variables. From the regression analysis, the model was found to be significant and its estimators turned out as expected and it was discovered that commercial banks deposits have the greatest impacts on their lending behaviour. The study then suggests that commercial banks should focus on mobilizing more deposits as this will enhance their lending performance and should formulate critical, realistic and comprehensive strategic and financial plans. Keywords: Lending, Deposits...
Words: 8220 - Pages: 33
...Problem in a Modern Era Your name KNOCK, KNOCK!!! …Who there? It Is I...I who? This is the question everyone must pose nowadays, for we don’t know who actual is behind that door. It could be your friend, family member or you banker but worst yet it can some devious individual posing to be someone you know or impersonating someone else to gain your trust in order to steal from you by stealing your identity. Identity thief has become a common practice in this Age of High Tech. One such area is the internet which has made transmission of our personally identifying information quick and easy, and sometimes less secure. Therefore just about anyone and everyone is susceptible to getting their identity stolen or compromised. So how did we get here you may ask? Well, that a good question. Brief History Identity thief is not something new despite the belief that it began with the internet. It has been around for thousand years or more. One of first recorded Identity thief in history and perhaps one of the greatest to occur happen in the Bible. It is The Blessing of Jacob by Deception (Genesis 27:1-46, King James Version). Jacob the youngest son of Isaac deceives his father by claiming to be his oldest brother, Esau (eldest son of Isaac) in order to receive the blessing that was reserved for the firstborn son. And Jacob said unto his father, I am Esau thy firstborn; I have done according as thou badest me: arise, I pay thee, sit and eat of my venison, that thy soul may bless me. (Genesis...
Words: 2005 - Pages: 9
...Microsoft Age of Empires III Readme File September 2005 Welcome to Microsoft® Age of Empires® III! This file contains information to help you install Age of Empires III. It also includes late-breaking information not included in the manual or in-game Help. CONTENTS A. Installing Age of Empires III B. Starting Age of Empires III C. Getting Help D. What's on the Disc? E. Multiplayer Guide F. Shortcut Keys G. Manual Corrections H. Gameplay Troubleshooting I. DirectX Troubleshooting J. Video Troubleshooting K. CD-ROM Drive Troubleshooting L. Audio Troubleshooting M. Processor Troubleshooting N. Performance Troubleshooting O. Multiplayer Troubleshooting P. Age of Empires III Information A. Installing Age of Empires III To install Age of Empires III, you must have administrator rights on your computer and your computer must be running Microsoft Windows® XP. To install Age of Empires III · Insert the Age of Empires III disc into the disc drive. If AutoPlay is enabled, the installation menu will appear; click Install, and then follow the on-screen prompts. —or— · If AutoPlay is disabled, on the Start menu, click My Computer. In the My Computer window, double-click the disc drive icon, and then double-click Setup.exe. On the Setup screen, click Install, and then follow the on-screen prompts. B. Starting Age of Empires III You must have the Age of Empires III disc 1 in your disc drive to play. To start Age of Empires III · Insert the...
Words: 4090 - Pages: 17
...Microsoft Age of Empires III Readme File September 2005 Welcome to Microsoft® Age of Empires® III! This file contains information to help you install Age of Empires III. It also includes late-breaking information not included in the manual or in-game Help. CONTENTS A. Installing Age of Empires III B. Starting Age of Empires III C. Getting Help D. What's on the Disc? E. Multiplayer Guide F. Shortcut Keys G. Manual Corrections H. Gameplay Troubleshooting I. DirectX Troubleshooting J. Video Troubleshooting K. CD-ROM Drive Troubleshooting L. Audio Troubleshooting M. Processor Troubleshooting N. Performance Troubleshooting O. Multiplayer Troubleshooting P. Age of Empires III Information A. Installing Age of Empires III To install Age of Empires III, you must have administrator rights on your computer and your computer must be running Microsoft Windows® XP. To install Age of Empires III · Insert the Age of Empires III disc into the disc drive. If AutoPlay is enabled, the installation menu will appear; click Install, and then follow the on-screen prompts. —or— · If AutoPlay is disabled, on the Start menu, click My Computer. In the My Computer window, double-click the disc drive icon, and then double-click Setup.exe. On the Setup screen, click Install, and then follow the on-screen prompts. B. Starting Age of Empires III You must have the Age of Empires III disc 1 in your disc drive to play. To start Age of Empires III · Insert the...
Words: 4090 - Pages: 17