...Refraction, Reflection and Optics ITT Technical Institute Physical Networking – NT1310 11/10/2014 Refraction, Reflection and Optics Refraction The most common real life example used when discussing refraction is a straw in water. When a straw is placed in a glass of water and viewed from the side, it appears to be broken or bent. This is due to the difference in the refractive indices of air and water. Since water is denser than air, the straw appears to bend as the light it reflects is slowed by the density of the water. This phenomenon also makes submerged objects, such as fish look closer to the surface than they actually are. Another common example is a rainbow, where sunlight is refracted by raindrops. Sunlight consists of a mixture of different wavelengths, or colors, of light, with blue, for example, having a shorter wavelength than red. When this light passes through raindrops, the shorter wavelengths are bent more than the longer ones, splitting the light into its different colors. Reflection Pretty much everything you see could be considered reflection. The fact we can see is due to light reflecting off of objects and into our eyes. A good example, I guess, is the moon. When it glows at night that is just light from the sun reflecting onto the Moon's surface, and bouncing back, giving it that glow. Degradation of signal strength in fiber-optic transmission Some of the main factors that cause degradation are electromagnetic fields, heat, quality of fiber...
Words: 376 - Pages: 2
...Invitation to Participate in Wellness Works Obesity Prevention and Control Planning Committee TO: Dr. Jeff Ritter, Chief Financial Officer FROM: Bertha Simmons, Wellness Program Director RE: Capella Banking Bureau Obesity Prevention and Control Worksite Program As you may be aware, Capella Banking Bureau is planning to continue implementing a worksite obesity prevention and control program in September, 2014. The new program will involve planning, building, promoting, and assessing a variety of nutrition and physical activity program components Capella Banking Bureau employees. We are inviting you to be a part of the Planning Committee. The purpose of this committee is to develop, guide, and oversee the program, including— • Identifying the interests of company employees • Motivating employees to participate in the program • Keeping management excited about the company’s obesity prevention efforts • Discussing potential program components and deciding what activities to include “With high obesity rates in the United States, these health care costs can directly affect employer profits.4 It is estimated that employers spend $13 billion annually on the total cost of obesity.3 Approximately 9.1% of all health care costs in the United States are related to obesity and overweight” (CDC, 2011). “Workplace obesity prevention and control programs can be an effective way for employers to reduce obesity’ (CDC, 2011). Along with your participation, I am...
Words: 1873 - Pages: 8
...Assignment 7 Siddhant Sharma 2013160 a) Division of Assignment In Assignment 6, we used an ADC to convert values that the LDR and NTC thermistor measured and make LEDs light up according to the particular threshold values. Here, we are required to take a user driven input from the terminal, check if the input is valid, and then see whether the LED light from the LDR or NTC is on or off. We do this using a UART library. We connect the MCU via a cable to a serial USB port, here : USB0. For taking an input from the terminal, we use a command called screen. Screen takes an argument for the port that the Arduino Microcontroller is connected to. In this case, it is USB0, therefore, command : screen /dev/ttyUSB0. Proper communication between...
Words: 592 - Pages: 3
...Unit 7. Assignment 1. Refraction, Reflection and Optics Refraction: The most common real life example used when discussing refraction is a straw in water. When a straw is placed in a glass of water and viewed from the side, it appears to be broken or bent. This is due to the difference in the refractive indices of air and water. Since water is denser than air, the straw appears to bend as the light it reflects is slowed by the density of the water. This phenomenon also makes submerged objects, such as fish look closer to the surface than they actually are. Another common example is a rainbow, where sunlight is refracted by raindrops. Sunlight consists of a mixture of different wavelengths, or colors, of light, with blue, for example, having a shorter wavelength than red. When this light passes through raindrops, the shorter wavelengths are bent more than the longer ones, splitting the light into its different colors. Reflection: Pretty much everything you see could be considered reflection. The fact we can see is due to light reflecting off of objects and into our eyes. A good example, I guess, is the moon. When it glows at night that is just light from the sun reflecting onto the Moon's surface, and bouncing back, giving it that glow. Degradation of signal strength in fiber-optic transmission. The main factors that affect this is number of connectors, splicing, Quality of Fiber / connectors, also not using an Attenuator according to the distance, or using dirty attenuators...
Words: 256 - Pages: 2
...Unit 1 Assignment: Homework 1. Why is the CPU the most important component in a computer? A. The CPU sends signals to control the other parts of the computer, almost like how a brain controls a body. The CPU is an electronic machine that works on a list of things to do, called 'instructions'. It reads the list of instructions and does each one in order. A list of instructions that a CPU can run is a computer program. 2. What number does a bit that is turned on represent? What number does a bit that is turned off represent? A. When a bit is turned on it represents a 1, when a bit is turned off it represents a 0. 3. What would you call a device that works with binary data? A. A device that works with binary data is called digital data. 4. What are the words that make up a high-level programming language called? A. The words that make up a high-level programming are called key words or reserved words. 5. What are the short words that are used in assembly language called? A. Short words that are used in assembly language are called Nmeumonics. 6. What is the difference between a compiler and an interpreter? A. A compiler translates a high-level language program into a spate machine language program. An interpreter both translates and executes the instructions of a high level program. 7. What type of software controls the internal operations of the computer’s hardware? A. The operating system is the software that controls the internal operations of the computers...
Words: 270 - Pages: 2
...Unit 7 Assignment 1 Multiple Choice 1.) A 11.) C 2.) A, B 12.) A 3.) B, D 13.) A, D 4.) A 14.) C 5.) A 15.) B, C 6.) B, D 16.) B, D 7.) A 17.) C 8.) C 18.) B, D 9.) C 19.) A, C 10.) D 20.) B, C Key Terms Switched circuit - A circuit established through one or more intermediate switching devices, such as circuit switches or packet switches. Dedicated circuit - it is used in reference to a phone or data line, or to an electrical circuit. Circuit switching - a methodology of implementing a telecommunications link in which two network nodes establish a dedicated communications channel (circuit) through the network before the nodes may communicate. Packet switching - a digital networking communications method that groups all transmitted data into suitably sized blocks that are transmitted through a medium that may be shared by multiple simultaneous communication sessions. Leased line - connects two locations for private voice and/or data telecommunication service. Time-division multiplexing -a method of transmitting and receiving independent signals over a common signal path by means of synchronized switches at each end of the transmission line so that each signal appears on the line only a fraction of time in an alternating pattern. T-carrier system – one of several digital transmission systems developed by Bell Labs, sometimes called T-CXR. DS0 – a standard digital transmission rate for digital telecommunications, stands for Digital Signal Zero. DS1 –...
Words: 336 - Pages: 2
...Unit 7 Assignment 1 The scalability of the mobile computing in this infrastructure will benefit the school district by being cost effective and the IT technician would not have to monitor/manage many devices in this environment. Reducing the cost of deployment on WLAN implementation, you will want to address many areas of concern: individuals accessing your network, risk of deploying new Software/Configuration, compliant with standards and laws, classification, encryption, security, protocols, and the use of mobile devices. The implementation of access controls in your WLAN will assist in making your environment a little more secure than without. Utilization of the Acceptable Use Policy (AUP), will instruct staff members and students on how to utilize WLAN correctly by law, policies, and standards. Any individual that is not compliant will be subject to disciplinary measures by the school district. Staff members will use access control Role Base Access Control (RBAC), using this control will assign user rights based on the user’s job specification within the school. As for the student body, students will be issued temporary usernames and passwords that will be issued quarterly. Students will have minimum accessibility to files, folders, and services. All accounts are subject to being audited at any given moment notice. There will always be risk involved with any network. Deploying WLAN in a school environment will be a concern with security always. The protection of data...
Words: 499 - Pages: 2
...| Unit 7 Assignment 1 | Implementation of Authentication Process | | | WLANs (wireless local area networks) are becoming increasingly prevalent, not only in schools, but in many businesses and establishments. They can provide a plethora of benefits within a school environment including flexibility, speed, and resource mobility. A WLAN would assist in ease of use, and make many of the day-to-day functions of school employees easier. If a WLAN were implemented into the school, it would need to have groups with users assigned to their pertinent groups. Possible groups include students, teachers, IT department, administration, counselors, and high-level admin (Principals, Vice Principals). Of course, within the teachers/educators group, would be all teachers in the classroom. Within the IT department group would be the IT department and any other employees involved in managing and configuring any IT systems. Within the administrators group would be anyone in the front office and does daily administration duties within the school. Counselors would include any student or education counselors in the office. Lastly, high-level administrators would be the highest ranking individuals in the school including the Principal and Vice Principal. With any network, including a WLAN, there are inherent risks involved. With a WLAN, the wireless aspect opens up additional avenues for hackers or data being compromised. There could be tech-savvy students who could access the network...
Words: 549 - Pages: 3
...Scenario 1: End user complains of lack of connectivity to any resource not on the directly connected network. The host cannot ping its default gateway. The output of the “ipconfig /all” command is below. Also the IP address assigned to the router for that segment is also displayed below. What do you think the problem is with the configuration of this host? PC “ipconfig /all” output (summarized) Ethernet adapter Local Area Connection: Physical Address. . . . . . . . . : 00-AB-C5-00-00-00 DHCP Enabled. . . . . . . . . . . : No IPv4 Address. . . . . . . . . . . : 192.168.40.9 Subnet Mask . . . . . . . . . . . : 255.255.255.128 Default Gateway . . . . . . . . . : 192.168.40.254 DNS Servers . . . . . . . . . . . : 8.8.8.8 Router “show ip interface brief” Router# show ip interface brief Interface IP-Address OK? Method Status Protocol GigabitEthernet0/0 192.168.40.254 YES NVRAM up up Answer: The problem is that either the IP address is wrong or the subnet mask is wrong. That is because the 192.168.40.9 IP address is not in the same subnet as the default gateway IP address (192.168.40.254). Changing the subnet mask to 255.255.255.0 or changing the IP address to 192.168.40.129 – 192.168.40.253 would resolve the problem. The ping command can be used to check for connectivity, and it was. The tracert command could have been used to see where the ping failed. Scenario 2: One user complains of lack of connectivity...
Words: 1499 - Pages: 6
...The new technology that is going to exist in the future will be a Nano Earpiece Turaion. This device will be hands free, it will only to attach to the user in the ear. What it is, a new modified, advanced, and shrieked version of a computer. Just that you would be able to control everything with your mind. For example, if you wanted to look for a song that you wanted to hear, you give the command in your mind, and the device automatically reacts to your command and bring ups the song. How this device works is that it reacts to the persons mind you see the brain gives out signals so the device is programmed to detect the person’s given signal and so they respond to the person’s command by bringing up what they want. This would benefit the society is easy to use, it can be carried anywhere and it would damage your ear drum. Those who work from home would benefit them, in which they would be able to do in chore or duty in the house while using the Nano Earpiece Turaion. Basically people of all ages will be able to use this device without a problem, it will make people lives easier, just by thinking about it they can use the internet and make payments, browse, anything the person tends to look up will be with a simple thought. I think it would do some impact in the economy therefore it will be used only by Wi-Fi so no more bills for the people using internet. I assume it will help politics in their work or any given relevance that could be useful to them for using the...
Words: 288 - Pages: 2
...David Lewandowski Mobile Communication Devices Unit 7 Assignment 1 Mobile Application A Static Web Application is any web application that can be delivered directly to an end user’s browser without any server side alteration of the HTM, JavaScript or CSS content. Static web applications generally refer to rich sites that utilize technologies in the browser instead of on the server to deliver dynamic content. The primary difference is that a traditional web app, the server is the one responsible for fetching the data and compiling it all into the HTML that the user then can see, while the static web application, the browser is responsible for doing that. Static Web Application: 1. The user agents browser sends a request to a static web server at a specified address 2. The Server receives the network request and maps the address to “barebones’ HTML file is stored on the server 3. The server sends the HTML file to the user agent, which will then render it and display it to the user 4. The JavaScript in the HTML pages uses the browser to connect to the data services and then fetches the information it needs to construct the content of the page you are on 5. The JavaScript in the web page, takes the data and manipulates the HTML of the page, updating it with the data the it fetched (Step 4) Advantage of Static Web Application: * Cheaper to Build * Quick to Build * Easier for Search Engines to Index * Quicker Load Times Disadvantages...
Words: 421 - Pages: 2
...Unit 7 Assignment 1: Calculating Credit Scores Course Objectives and Learning Outcomes Identify the factors that determine someone’s credit rating. Calculate the cost of a loan given various ratings of the borrower. Analyze various personal finance scenarios dealing with student loans, personal consumer loans, mortgages, the true cost of bad credit, compound interest, savings, investing in assets, budgeting, and using self-control when spending. Assignment Requirements A credit score needs to be protected and improved. You need to understand the true value of a credit score by researching the causes of bad credit scores and how to improve them. Using the Internet and ITT Tech Virtual Library, you will research how the credit score is calculated and what influences the credit score. Answer the following questions in detail. How is your credit score (FICO) created? Who reports your FICO score? What are the factors in determining the FICO score? What steps could you take to improve your FICO score? Required Resources Skills for Living a Rich Life, Chapter 12 Computer with MS Word and Internet access ITT Tech Virtual Library Printer Submission Requirements Prepare a two- to three-page typed paper, double-spaced, using 12-point Times New Roman font. Please include appropriate references in APA format. This assignment is due at the beginning of Unit 8. GS2745 UNIT 7 ASSIGNMENT 1 How is your credit score (FICO) created? FICO Scores are calculated...
Words: 872 - Pages: 4
...given to the customer so that we can call at any time to have access at night as well. Sale of each product or service, the customer service, it should be backed up as part of the quality assurance. Are delivered to customers in real time on an ongoing basis the hosting service and Internet, the customer immediately detect a problem even a little in the quality. That's why there is a possibility that the service has received final issue, a working knowledge of the customer support team 24/7/365 to resolve quickly the customer and must be Isp host. To retain customers, better chance support services from a variety of fast, of the company. To provide support to consumer Internet-related services that are many different ways. In particular, customer support services provided by the Web hosting company, is characterized by a truly great diversity of support channel. In this sense, you can get there is a chance you've noticed all queries, performed at high speed in the time frame of the solution. 24/7 support means the customer support service of 24 hours. It is a Quality Assurance Department that is provided by the Web host. To ensure uninterrupted service web hosting services of any, this is a feature high priority...
Words: 802 - Pages: 4
...There are different tools available to help in the configuration and troubleshooting of networks. TRACERT and Ping are two of them. This assignment will be discussing troubleshooting procedures of both. These two tools of troubleshooting are among the most popular and can be used on Windows as well as other platforms. They are very simple to use and give out a lot of output but very little input. TRACERT decides the route by sending the first echo packet with a TTL of 1 and incrementing the TTL by 1 on each subsequent transmission until the target replies or the full TTL is reached. The TRACERT command determines where a packet stopped on the network. Default gateway found there was not a valid path for the host. Could possibly have a configuration problem with the router or network where several paths can be taken to arrive at the same place, or where several intermediate systems which can include a router or bride can be involved. Time Exceeded message is a command that is used by the TRACERT along with IP TTL field letting it be known that each router has a successive router in a route. A Port Unreachable message is a message that the traceroute command that the complete route has been found, and the command can quit. In conclusion of the TRACERT command, this tool is much better because it determines if the route works, and it can supply the IP address of each router in the route. Ping allows computers to talk between each other’s and this helps narrow down the cause of...
Words: 556 - Pages: 3
...Unit 7 Assignment 1 AD Password Policy Planning TO: Client I can understand you’re concerned with your company’s security after all information on competitors can be invaluable or very harmful to a company and this is why it must be protected from prying eyes. This does not have to mean that you have to lose productivity over trying to secure your networks information. Simple measure like user names and passwords can be used to protect less sensitive information however how strong you make those usernames and passwords can have a great effect on how well your information is protected. I’m going to give you some tips on how to better secure your network with the tools that you already have at hand, keep in mind that you can also buy better security items to better protect you network things like; smart card, finger print scanners, retinal scanners, etc. but I only recommend these for really sensitive information and only for certain users in your company. On the server that is the DC log in to the administrator account and in the “Active Directory Users and Computers” in the Domain icon in the left pane click on the “Users” icon, you’ll be able to see all of the users in that domain. From here you can click on any user and make changes as necessary, for user names I recommend you use the following format; using capital and lower case letters the first letter of their name, their whole last name and their employee number, ex. “JVentura10415867@Domain*%$.Local” if someone...
Words: 470 - Pages: 2