...Unit 6 Assignment 1: Cable Testers In almost every application in dealing with cable installations, cable testing is a must. Some methods of testing cables include testing for attenuation, continuity testers, DC Resistance, a wire mapper and cable length. In all cable types- copper or fiber, 10BASE-T or 100BASEFX, the standards are constantly being changed and developed into a new standard for all future technologies. When testing cable, you can guarantee that the users will be satisfied when all connections prove effective for not just uninterrupted transmission but correct bandwidths to support. A wire mapper is the most common tool. It simply provides a test of a standard Cat5 cable to ensure each individual wire not only carries a strong signal through the entire length of the route, but it proves if each wire ends up in the correct pin number on the opposite end to receive the transmission. It will give the technician an idea if a cable has a short, or if it is a crossover cable. It is also very useful with telephone connections. It should be a part of each cable installation kit. Another common tool is a continuity tester. It shows if there is a direct connection between two points. If there is a closed electrical pathway for the tester to detect, then the device will make a sound. This is useful not only to test for a short, but also to determine and identify which cable is which in a closet full of many cables. This is also a very important tool in any application...
Words: 437 - Pages: 2
...IS3340-WINDOWS SECURITY | Minimizing Recovery Time Strategies | Unit 6 Assignment 1 | | | 5/5/2014 | | This document outlines the required steps to follow, in-order to properly scan the necessary servers and workstations in the Ken 7 Windows Limited Domain for security vulnerabilities. 1) Acquire and install MBSA(Microsoft Baseline Security Anaylizer) •Download MBSA. Download MBSA from the MBSA home page, and then install it to the default directory. •Updates for MBSA. If both the computer you will be scanning and the computer with MBSA installed have Internet access, the latest security catalog (.cab file), authentication files, and WUA installer files will be automatically downloaded, if needed. If either the target computer or the computer with MBSA installed does not have Internet access, download the following files and place them in the C:\Documents and Settings\<username>\Local Settings\Application Data\Microsoft\MBSA\2.0\Cache\ directory on the computer that is performing the scan. 2) Scan computers Run MBSA and clear the Check for security updates check box when performing the scan. Using the Graphical Interface Tool The following procedure describes how to use the MBSA GUI tool. To use the MBSA GUI tool to scan for updates and patches 1. On the Programs menu, click Microsoft Baseline Security Analyzer. 2. Click Scan a computer. 3. Make sure that the following options are not selected, and then click Start scan. * Check...
Words: 487 - Pages: 2
...Used to connect devices that contained DB9 pin connections usually mouse’s and keyboards. In todays computers Serial Ports have all been upgraded to USB ports. • Parallel Port- Used to connect printers or external devices such as hard disk drives. Parallel Parts are unique with a DB25 pin connection. They call it DSUB or DB25 cause the connection looks like a D • SRAM- also known as (Static random access memory) is a type of semiconductor memory where the word static indicates that, unlike dynamic ram or DRAM, it doesn’t need to be periodically refreshed. • DRAM- also known as (Dynamic Random Access Memory), DRAM is one of the most commonly found memory modules in PC compatible personal computers and workstations. Though out the assignment I have learned and gave my self a clear understanding on what certain terms and well older technology that has paved the way for our new technology to exist. The...
Words: 340 - Pages: 2
...interference and degrade network performance. The following paragraphs describe three (3) cable testers and how they work and which cable system(s) they are most suitable for. The first tester is the wire-mapper. Wire-mappers are used primarily with copper twisted-pair cable installations. These devices, according to Oliviero and Woodward (2011, p.422, 441) “Transmit signals through each pair in a twisted-pair cable to determine if it is connected correctly to the correct pin at each end.” The second tool is the tone generator. A tone generator is a two-piece unit that consists of a tone generator and a probe. This type of tester's primary function, amongst installers, is to identify specific locations in a punch-down block then label accordingly. According to Oliviero and Woodward (2011, p.442-443), these testers “Transmit[s] a signal, or, with an alligator clip, you connect the unit to an individual wire. The other unit is an inductive amplifier, which is a pen-like probe that emits an audible tone when touched to the other end of the conductor.” Primary functions are identify a particular cable within a bundle and to test for opens, shorts, and miswires of individual wires. Unfortunately, there is a disadvantage to using this device; time consuming. The third and final tester to be discussed are Multifunction Cable Scanners (commonly referred to as a certification tool). Alarmingly, these devices are highly expensive but are available for both copper and fiber-optic networks...
Words: 399 - Pages: 2
...Unit 6 Assignment 1: Homework Learning Objectives and Outcomes Name the main events in the development of SQL statements. Run SELECT queries with wild cards, DISTINCT key word, calculations, sorting and aliasing. Run queries with the WHERE clause to filter the result sets. Use the Aggregate functions COUNT, AVG, SUM, MIN, and MAX. Assignment Requirements Answer the true-or-false questions on the next page by filling out the answer sheet. Required Resources Textbook Submission Requirements Submit your completed answer sheet to your instructor at the beginning of Unit 7. Unit 6 True/False Questions Indicate whether the following statements are true or false on the student answer sheet. 1) SQL is the programming language used to manipulate data and data objects in a relational database management system. 2) SQL is a procedural language. 3) A declarative language is a language in which you tell the computer what to do not how. 4) DML, or Data Manipulation Language, contains all the commands for selecting and modifying data. 5) DDL, or Data Definition Language, contains all the commands for selecting and modifying data. 6) The * in SELECT * clause of an SQL statement is a wildcard for returning all columns in a table. 7) The DISTINCT keyword in a SELECT statement returns only unique rows. 8) The FROM keyword is used in a SELECT clause to determine which columns are included in the query. 9) An alias in SQL is a substitute...
Words: 363 - Pages: 2
...Unit 6. Assignment 1. AD User/Group Design Scenario Dear Junior Admin, I received your E-mail and in response I recommend that you do the following. Since there is a domain for each department, such as Marketing, accessing one printer is rather easy. To start off you will need to create a group that allows access to the one printer within each department in your company. After creating each group you must then assign it to a domain local group, global group and then to a universal group. Then you will need to add it to the marketing domain local group. For HR, you will need to take all of the users within the forest and add them to a global then universal group. Proceed to take the universal group and add it to the domain local group within their domain. These users will then have access to whatever is in that universal group, therefore you must make sure that you assign the printer for them to print vacation requests to the HR department. You must take a slightly different approach for R&D. To allow access to only the server, you must first create a domain local group that has some administrative rights. Add them to a customized admins group that you have control of. You can assign these rights and permissions as you create and assign them. Remember to limit their access to their local machines only. You can do all of this through the desktop local user account settings. You may also take a different route if you choose to. This is one of the approaches you may take...
Words: 288 - Pages: 2
...PT2520 Database Concepts Unit 6 Research Assignment 1: Explore the latest ANSI and ISO Standard True/False 23-Jul-2016 Tim Church Daigre ANSI- The American National Standards Institute (ANSI) oversees the creation, promulgation and use of thousands of norms and guidelines that directly impact businesses in nearly every sector: from acoustical devices to construction equipment, from dairy and livestock production to energy distribution, and many more. ANSI is also actively engaged in accreditation - assessing the competence of organizations determining conformance to standards. To enhance both the global competitiveness of U.S. business and the U.S. quality of life by promoting and facilitating voluntary consensus standards and conformity assessment systems, and safeguarding their integrity. ISO- International Organization for Standardization (ISO) is an independent, non-governmental international organization with a membership of 163 national standards bodies. Through its members, it brings together experts to share knowledge and develop voluntary, consensus-based, market relevant International Standards that support innovation and provide solutions to global challenges. Part II- The latest SQL standard was adopted in July 2003 and is often called SQL:2003. One part of the SQL standard, Part 14, SQL/XML (ISO/IEC 9075-14) was revised in 2006 and is often referenced as "SQL/XML:2006". ANSI/ISO/IEC 9075:2003, "Database Language SQL", Parts 1 ("SQL/Framework"), 2 ("SQL/Foundation")...
Words: 278 - Pages: 2
...IS3340 Unit 6 Assignment 1 1. How much data has been modified between the last backup and the time of failure? No data should have been lost since nothing was change since the last backup and the backup would have been completed before the error occurred. 2. What images are necessary to recover the workstation? The images that are necessary would be the reimaging image along with the latest back up image available. 3. What are the steps necessary to fix the problem that cause the data loss? Verify what caused the loss by reading the logs. Determine the fix for the issue. Reimage the computer. Restore the computer to last backup state and disable the issue that caused the data loss. 4. What steps should Ken 7 take to avoid a reoccurrence of this issue in the future? Read the logs to find out what caused the issue that caused the data lose. Right a procedure guide to prevent the issue from occurring. Alert users of the occurrence of the issue and the way to prevent the issue. (Soloman, 2001) Procedure Guide: 1. Read logs to decide what cause the issue to occur. 2. Re-Image the computer to default configuration. 3. Restore to first available backup of the system. Restore Process: 1. Right-click on your Computer desktop icon (or click Start and right-click on the Computer tab on the right pane of the menu). 2. Click on Properties. 3. Locate the System protection tab in the System Properties menu. 4. Select the hard disk that you...
Words: 393 - Pages: 2
...B. Methodology - B1. Participants or Stakeholders: Because this is an applied research project with a focus on the evaluation of curricular practices, I am the main and active participant. There are an additional three other stakeholders in my proposed capstone research, which includes administrators, students, and the community where I teach. This is because my research will affect these individuals when I get to the application portion of my capstone research. Likewise, two characteristics of my stakeholders relevant to my problem statement include being both supportive and hesitant. First, my stakeholders are supportive. I have felt very supported as the art educator in my school district by administration, students, and the community. This is relevant to the problem statement in Part A because I know I have the support to create curriculum in my classroom. I know that if I asked for resources or help with my curriculum, that it would be provided. Second, my stakeholders are also hesitant. I believe that they would be hesitant specifically to make a change in my curriculum. This goes back to my problem statement because I am responsible for the curriculum I create. This means that if I decide to change the curriculum currently in place at my school, I believe there will be hesitancy with administration, students, and the community. While these stakeholders support me, change can be scary for some individuals. I believe there is an expectation from these individuals to continue...
Words: 1052 - Pages: 5
...The worst case scenario experienced resulted to be the exposition of comments containing key pair values published on the GitHub repository; it was used by hackers to launch instances by spot requests in different regions that are not monitored frequently. Opportunely, the AWS security team could detect this leak of information and proceeded to handle this problem creating a case. Unfortunately, when their team sent the information, the intruders had already placed their Spot instance requests. Concluding, a frequent monitoring is needed and the credentials are to be handled locally (.aws and .ssh folders) with the appropriate permissions and never used as static values in the code. A total of US$ 638.48 (Figure 1) was charged in 2 days, AWS security team assigned Credits to solve this...
Words: 1197 - Pages: 5
...You are provided with the following list of privileges, roles, rights, and actions: 1. Must authenticate when accessing network resources 2. Is allowed remote access 3. Periodically reviews all user accounts 4. Authorizes risk assessments 5. Performs security assessments 6. Creates group policy objects 7. May send inbound e-mail 8. Is allowed to install software in a secured network 9. Performs daily log reviews 10. Is allowed to change the firewall rules 11. Manages incident response 12. Provides user awareness training 13. Access the file system within authorized system and groups 14. Develop infrastructure architecture plan 15. Manages Internet service provider (ISP) and Internet connectivity 16. Install patches on production system 17. May delete files from group folder 18. Installs security software 19. Create system users 20. Monitors systems for dormant accounts 21. May request file system changes 22. Develops and implements configuration standards 23. Grants access to resources 24. Create user accounts 25. May make file system changes 26. Run a backup program to capture changes to data and systems 27. May appoint a data/application custodian 28. May disable/delete unused accounts 29. May bypass authentication 30. Approves access to resources In the table given below, you need to relate the matching privileges, roles, rights, and actions to the account type on the left...
Words: 269 - Pages: 2
...Scenario 6 Additionally, in order to calculate the probability that exactly 1 marriage will be in the stock, one would apply the same formula as before. Since the stock is composed only of three cards, there could only be 1 marriage. There are 22 possible cards to receive (n) which are not a marriage since there can only be 1 other card (r). It doesn't matter whether the other card would be a pair card or not since it couldn't be a marriage by itself. There are four diverse marriages which means there could be four various marriages with 1 different card from the 22 other cards. This probability is extraordinarily low. It's the lowest probability of all. From my personal experience playing this game, it seems to be true, however, in an actual game the fact that players get cards one by one and not in a row, alters the probability and decreases it even more. The probability of getting exactly 1 marriage in the stock is exceedingly low itself. Rarely does it happen, that there is a pair in the stock which supports this calculation....
Words: 463 - Pages: 2
...Week 06 Assignments Textbook Reading * Chapter 4 * Chapter 5 sections 5.1, 5.2, and 5.3 (pages 196-201) Week 06 Homework From the Gaddis textbook: * Programming Exercises 2, 6 and 9, on pages 160-161 For the Programming Exercises, design a program means write the pseudocode for the program. Except for Programming Exercise 2, your design should include multiple modules, not just main(). Upload a Microsoft Word document with the pseudocode to your shared PT1420 community website or submit a paper copy to your instructor by the beginning of the Week 7 class. Programing Exercises pg. 160-161 2. Areas of rectangles Module Main() Declare width1 integer = 0 Declare length1 integer = 0 Declare width2 integer = 0 Declare length2 integer = 0 Declare area1 integer = 0 Declare area2 integer = 0 Call rectangle1 (width1, length1, area1) Call rectangle2 (width2, length2, area2) Call comparison (rectangle1, rectangle2) Display “press enter to continue” End module Module rectangle1 (value width1 as integer, value length1 as integer, value area1 as integer) Display "Enter the width of rectangle 1” Input width1 Display "Enter the length of rectangle 1" Input length1 area1 = width1 * length1 End module Module rectangle2 (value width2 as integer, value length2 as integer, value area2 as integer) Display "Enter the width of rectangle 2” Input width2 Display "Enter the length of rectangle 2" Input length2 area2 = width2 * length2 End module ...
Words: 764 - Pages: 4
...Problem Statement For this problem we are trying to find how many rebounds and corners it will take the ball to go into a pocket. We are also trying to find out what pocket the ball will land in,and if there are any patterns that meet that criteria. The rules include that you have to start at the lower left corner , and at a 45 degree angle. Also you have to start with whole number dimensions(4 by4 , 2 by 3), and there is only 4 pockets on the pool table. Process We had each member of our group draw out the pool table and try different whole number dimensions . Afterwards , we looked at each of our examples and charts and compared them to make a bigger chart with all the dimensions of 1-4 . We did this just to figure out if there were any common patterns within the the pictures and tables. Making a super pool table and coming up with our own patterns within the dimensions and rebounds was something we also did, by doing this we got to see if one of our patterns can match a bigger size dimension pool table along with the other dimensions. In conclusion we made a mini poster explaining our thoughts about this problem, within this project we got to go around to see what our classmates also had in mind. Solution...
Words: 436 - Pages: 2
...Assignment Ans A: LDD is used in NMOS only, LDD is used to reduce the electric field strength, the gate-drain capacitance and the hot electron impact ionisation effect. LDD reduces the drain-bulk depletion region at the reversed biased junction diode. Therefore LDD reduces leakage current through this diode B: The value of SPACE.MULT is the amount by which the grid spacing specified in the ATHENA Mesh Define menu is multiplied. A value for SPACE.MULT that is greater than will reduce the total number of grid points. A SPACE.MULT value that is less than will create a finer mesh throughout the initial structure. Reducing the number of grid nodes greatly increases speed. C: Just the doping below the gate has a significant influence on the final...
Words: 645 - Pages: 3